/openssl/apps/ |
H A D | pkcs8.c | 91 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, topk8 = 0, pbe_nid = -1; in pkcs8_main() 227 informat == FORMAT_UNDEF ? FORMAT_PEM : informat); in pkcs8_main() 310 if (informat == FORMAT_PEM || informat == FORMAT_UNDEF) { in pkcs8_main() 319 if (informat == FORMAT_PEM || informat == FORMAT_UNDEF) { in pkcs8_main()
|
H A D | rsautl.c | 84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() 198 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
H A D | smime.c | 183 FORMAT_UNDEF; in smime_main() 480 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main() 499 if ((recip = load_cert(recipfile, FORMAT_UNDEF, in smime_main() 606 signer = load_cert(signerfile, FORMAT_UNDEF, "signer certificate"); in smime_main()
|
H A D | rsa.c | 132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() 238 int tmpformat = FORMAT_UNDEF; in rsa_main()
|
H A D | ocsp.c | 425 issuer = load_cert(opt_arg(), FORMAT_UNDEF, "issuer certificate"); in ocsp_main() 438 cert = load_cert(opt_arg(), FORMAT_UNDEF, "certificate"); in ocsp_main() 585 rsigner = load_cert(rsignfile, FORMAT_UNDEF, "responder certificate"); in ocsp_main() 601 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main() 686 signer = load_cert(signfile, FORMAT_UNDEF, "signer certificate"); in ocsp_main() 696 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
|
H A D | cms.c | 312 int verify_retcode = 0, rctformat = FORMAT_SMIME, keyform = FORMAT_UNDEF; in cms_main() 630 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main() 833 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main() 851 if ((recip = load_cert(recipfile, FORMAT_UNDEF, in cms_main() 859 if ((originator = load_cert(originatorfile, FORMAT_UNDEF, in cms_main() 867 if ((signer = load_cert(signerfile, FORMAT_UNDEF, in cms_main() 1096 signer = load_cert(signerfile, FORMAT_UNDEF, "signer certificate"); in cms_main()
|
H A D | crl.c | 92 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyformat = FORMAT_UNDEF; in crl_main()
|
H A D | x509.c | 290 int CAformat = FORMAT_UNDEF, CAkeyformat = FORMAT_UNDEF; in x509_main() 293 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyformat = FORMAT_UNDEF; in x509_main() 700 if (CAkeyformat != FORMAT_UNDEF) in x509_main() 702 if (CAformat != FORMAT_UNDEF) in x509_main()
|
H A D | gendsa.c | 126 pkey = load_keyparams(dsaparams, FORMAT_UNDEF, 1, "DSA", "DSA parameters"); in gendsa_main()
|
H A D | spkac.c | 73 int keyformat = FORMAT_UNDEF; in spkac_main()
|
H A D | dsaparam.c | 72 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, noout = 0; in dsaparam_main()
|
H A D | dsa.c | 86 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in dsa_main()
|
H A D | ec.c | 76 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in ec_main()
|
H A D | pkey.c | 78 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM; in pkey_main()
|
H A D | req.c | 272 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyform = FORMAT_UNDEF; in req_main() 764 if ((CAkey = load_key(CAkeyfile, FORMAT_UNDEF, in req_main() 773 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
|
H A D | s_server.c | 1039 int s_cert_format = FORMAT_UNDEF, s_key_format = FORMAT_UNDEF; in s_server_main() 1040 int s_dcert_format = FORMAT_UNDEF, s_dkey_format = FORMAT_UNDEF; in s_server_main() 1043 int state = 0, crl_format = FORMAT_UNDEF, crl_download = 0; in s_server_main() 2116 dhpkey = load_keyparams(dhfile, FORMAT_UNDEF, 0, "DH", "DH parameters"); in s_server_main() 2118 dhpkey = load_keyparams_suppress(s_cert_file, FORMAT_UNDEF, 0, "DH", in s_server_main() 2152 FORMAT_UNDEF, in s_server_main()
|
H A D | verify.c | 256 x = load_cert(file, FORMAT_UNDEF, "certificate file"); in check()
|
H A D | pkeyutl.c | 139 int keyform = FORMAT_UNDEF, peerform = FORMAT_UNDEF; in pkeyutl_main()
|
H A D | cmp.c | 159 static int opt_keyform = FORMAT_UNDEF; 769 cert = load_cert_pass(uri, FORMAT_UNDEF, 0, pass_string, desc); in load_cert_pwd() 1052 if ((crl = load_crl(file, FORMAT_UNDEF, 0, desc)) == NULL) in setup_mock_crlout() 1858 csr = load_csr_autofmt(opt_csr, FORMAT_UNDEF, NULL, "PKCS#10 CSR"); in setup_request_ctx() 3416 oldcrl = load_crl(opt_oldcrl, FORMAT_UNDEF, 0, in do_genm()
|
H A D | dgst.c | 108 int separator = 0, debug = 0, keyform = FORMAT_UNDEF, siglen = 0; in dgst_main()
|
H A D | ca.c | 284 int certformat = FORMAT_UNDEF, informat = FORMAT_UNDEF; in ca_main() 300 int keyformat = FORMAT_UNDEF, multirdn = 1, notext = 0, output_der = 0; in ca_main()
|
H A D | s_client.c | 879 int build_chain = 0, cert_format = FORMAT_UNDEF; in s_client_main() 881 int key_format = FORMAT_UNDEF, crlf = 0, full_log = 1, mbuf_len = 0; in s_client_main() 889 int starttls_proto = PROTO_OFF, crl_format = FORMAT_UNDEF, crl_download = 0; in s_client_main()
|
/openssl/apps/include/ |
H A D | fmt.h | 27 # define FORMAT_UNDEF 0 macro
|
/openssl/apps/lib/ |
H A D | apps.c | 534 if (format == FORMAT_UNDEF) in load_csr() 563 if (format != FORMAT_UNDEF) { in load_csr_autofmt() 755 ret = load_key_certs_crls(uri, FORMAT_UNDEF, 0, pass_string, desc, 0, in load_cert_certs() 863 ret = load_key_certs_crls(uri, FORMAT_UNDEF, maybe_stdin, pass, desc, 0, in load_certs() 884 ret = load_key_certs_crls(uri, FORMAT_UNDEF, 0, pass, desc, 0, in load_crls() 2493 return load_crl(urlptr, FORMAT_UNDEF, 0, "CRL via CDP"); in load_crl_crldp()
|