Home
last modified time | relevance | path

Searched refs:passin (Results 1 – 25 of 42) sorted by relevance

12

/third_party/openssl/apps/
Dec.c76 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in ec_main() local
165 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in ec_main()
185 pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key"); in ec_main()
187 pkey = load_key(infile, informat, 1, passin, e, "Private Key"); in ec_main()
196 eckey = PEM_read_bio_ECPrivateKey(in, NULL, NULL, passin); in ec_main()
275 OPENSSL_free(passin); in ec_main()
Dpkey.c56 char *infile = NULL, *outfile = NULL, *passin = NULL, *passout = NULL; in pkey_main() local
135 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkey_main()
145 pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key"); in pkey_main()
147 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkey_main()
239 OPENSSL_free(passin); in pkey_main()
Ddsa.c66 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in dsa_main() local
147 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in dsa_main()
157 pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key"); in dsa_main()
159 pkey = load_key(infile, informat, 1, passin, e, "Private Key"); in dsa_main()
257 OPENSSL_free(passin); in dsa_main()
Dpkcs8.c74 char *passin = NULL, *passout = NULL, *p8pass = NULL; in pkcs8_main() local
189 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs8_main()
205 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkcs8_main()
304 if (passin != NULL) { in pkcs8_main()
305 p8pass = passin; in pkcs8_main()
355 OPENSSL_free(passin); in pkcs8_main()
Dspkac.c58 char *infile = NULL, *outfile = NULL, *passinarg = NULL, *passin = NULL; in spkac_main() local
120 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in spkac_main()
127 keyformat, 1, passin, e, "private key"); in spkac_main()
200 OPENSSL_free(passin); in spkac_main()
Drsa.c70 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in rsa_main() local
157 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in rsa_main()
180 pkey = load_pubkey(infile, tmpformat, 1, passin, e, "Public Key"); in rsa_main()
182 pkey = load_key(infile, informat, 1, passin, e, "Private Key"); in rsa_main()
308 OPENSSL_free(passin); in rsa_main()
Drsautl.c73 char *passinarg = NULL, *passin = NULL, *prog; in rsautl_main() local
170 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in rsautl_main()
177 pkey = load_key(keyfile, keyformat, 0, passin, e, "Private Key"); in rsautl_main()
275 OPENSSL_free(passin); in rsautl_main()
Dts.c50 const char *queryfile, const char *passin, const char *inkey,
56 const char *queryfile, const char *passin,
159 char *in = NULL, *out = NULL, *queryfile = NULL, *passin = NULL; in ts_main() local
239 passin = opt_arg(); in ts_main()
276 if (mode == OPT_REPLY && passin && in ts_main()
277 !app_passwd(passin, NULL, &password, NULL)) { in ts_main()
557 const char *queryfile, const char *passin, const char *inkey, in reply_command() argument
580 passin, inkey, md, signer, chain, policy); in reply_command()
665 const char *queryfile, const char *passin, in create_response() argument
690 if (!TS_CONF_set_signer_key(conf, section, inkey, passin, resp_ctx)) in create_response()
Dsrp.c120 const char *passin, int verbose) in srp_verify_user() argument
129 cb_tmp.password = passin; in srp_verify_user()
225 char *passin = NULL, *passout = NULL, *gN = NULL, *userinfo = NULL; in srp_main() local
314 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in srp_main()
499 irow ? irow[DB_srpverifier] : NULL, passin, in srp_main()
600 OPENSSL_free(passin); in srp_main()
Dstoreutl.c59 char *outfile = NULL, *passin = NULL, *passinarg = NULL; in storeutl_main() local
295 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in storeutl_main()
299 pw_cb_data.password = passin; in storeutl_main()
318 OPENSSL_free(passin); in storeutl_main()
Dpkeyutl.c372 char *passin = NULL; in init_ctx() local
381 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in init_ctx()
387 pkey = load_key(keyfile, keyform, 0, passin, e, "Private Key"); in init_ctx()
467 OPENSSL_free(passin); in init_ctx()
Dsmime.c127 char *passinarg = NULL, *passin = NULL, *to = NULL, *from = NULL, *subject = NULL; in smime_main() local
367 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in smime_main()
437 key = load_key(keyfile, keyform, 0, passin, e, "signing key file"); in smime_main()
522 key = load_key(keyfile, keyform, 0, passin, e, "signing key file"); in smime_main()
612 OPENSSL_free(passin); in smime_main()
Ddgst.c93 char *passinarg = NULL, *passin = NULL; in dgst_main() local
234 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in dgst_main()
261 sigkey = load_key(keyfile, keyform, 0, passin, e, "key file"); in dgst_main()
423 OPENSSL_free(passin); in dgst_main()
Dreq.c232 char *passin = NULL, *passout = NULL; in req_main() local
434 if (!app_passwd(passargin, passargout, &passin, &passout)) { in req_main()
513 if (passin == NULL) { in req_main()
514 passin = nofree_passin = in req_main()
516 if (passin == NULL) in req_main()
563 pkey = load_key(keyfile, keyform, 0, passin, e, "Private Key"); in req_main()
982 if (passin != nofree_passin) in req_main()
983 OPENSSL_free(passin); in req_main()
Dpkcs12.c134 char *passin = NULL, *passout = NULL, *macalg = NULL; in pkcs12_main() local
296 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs12_main()
305 cpass = passin; in pkcs12_main()
357 FORMAT_PEM, 1, passin, e, "private key"); in pkcs12_main()
591 OPENSSL_free(passin); in pkcs12_main()
Dx509.c169 char *extsect = NULL, *extfile = NULL, *passin = NULL, *passinarg = NULL; in x509_main() local
470 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in x509_main()
797 passin, e, "Private key"); in x509_main()
808 0, passin, e, "CA Private Key"); in x509_main()
827 passin, e, "request key"); in x509_main()
907 OPENSSL_free(passin); in x509_main()
Dcms.c207 char *passinarg = NULL, *passin = NULL, *signerfile = NULL, *recipfile = NULL; in cms_main() local
645 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in cms_main()
726 key = load_key(keyfile, keyform, 0, passin, e, "signing key file"); in cms_main()
932 key = load_key(keyfile, keyform, 0, passin, e, "signing key file"); in cms_main()
1113 OPENSSL_free(passin); in cms_main()
/third_party/node/test/fixtures/keys/
DMakefile118 -passin "pass:password" \
144 -passin "pass:password" \
169 -passin "pass:password" \
193 -passin "pass:password" \
243 -passin "pass:password" \
298 -passin "pass:password" \
322 -passin "pass:password" \
342 -passin 'pass:password'
349 -passin 'pass:password'
364 -passin "pass:password" \
[all …]
/third_party/openssl/doc/man1/
Dsrp.pod22 [B<-passin arg>]
47 The B<-passin> and B<-passout> arguments are parsed as described in
Dstoreutl.pod14 [B<-passin arg>]
51 =item B<-passin arg>
Dspkac.pod16 [B<-passin arg>]
60 =item B<-passin password>
Dpkcs12.pod38 [B<-passin arg>]
78 =item B<-passin arg>
91 Otherwise, -password is equivalent to -passin.
156 -password, -passin (if importing) or -passout (if exporting).
209 =item B<-passin password>
Dpkey.pod15 [B<-passin arg>]
57 =item B<-passin arg>
/third_party/curl/tests/certs/scripts/
Dgenroot.sh49 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
/third_party/mbedtls/tests/data_files/
DMakefile57 $(OPENSSL) pkey -in $< -out $@ -inform PEM -outform DER -passin "pass:$(test_ca_pwd_rsa)"
77 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
81 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
85 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
94 …key_file_rsa) -extfile $(test_ca_config_file) -extensions dns_alt_names -passin "pass:$(test_ca_pw…
123 …_config_file) -extensions v3_any_policy_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
131 …le) -extensions v3_any_policy_qualifier_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
139 …onfig_file) -extensions v3_multi_policy_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
147 …file) -extensions v3_unsupported_policy_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
1036 …$(OPENSSL) ca -batch -passin "pass:$(test_ca_pwd_rsa)" -config $(test_ca_server1_config_file) -in …
[all …]

12