Home
last modified time | relevance | path

Searched refs:passin (Results 1 – 25 of 45) sorted by relevance

12

/third_party/openssl/apps/
Dec.c74 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in ec_main() local
172 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in ec_main()
180 eckey = load_pubkey(infile, informat, 1, passin, e, "public key"); in ec_main()
182 eckey = load_key(infile, informat, 1, passin, e, "private key"); in ec_main()
289 if (passin != NULL) in ec_main()
290 OPENSSL_clear_free(passin, strlen(passin)); in ec_main()
Dpkey.c75 char *infile = NULL, *outfile = NULL, *passin = NULL, *passout = NULL; in pkey_main() local
208 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkey_main()
218 pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key"); in pkey_main()
220 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkey_main()
328 OPENSSL_free(passin); in pkey_main()
Ddsa.c84 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in dsa_main() local
176 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in dsa_main()
183 pkey = load_pubkey(infile, informat, 1, passin, e, "public key"); in dsa_main()
185 pkey = load_key(infile, informat, 1, passin, e, "private key"); in dsa_main()
308 OPENSSL_free(passin); in dsa_main()
Dpkcs8.c83 char *passin = NULL, *passout = NULL, *p8pass = NULL; in pkcs8_main() local
209 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs8_main()
226 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkcs8_main()
325 if (passin != NULL) { in pkcs8_main()
326 p8pass = passin; in pkcs8_main()
377 OPENSSL_free(passin); in pkcs8_main()
Dspkac.c67 char *infile = NULL, *outfile = NULL, *passinarg = NULL, *passin = NULL; in spkac_main() local
140 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in spkac_main()
150 keyformat, 1, passin, e, "private key"); in spkac_main()
231 OPENSSL_free(passin); in spkac_main()
Drsa.c130 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in rsa_main() local
230 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in rsa_main()
251 pkey = load_pubkey(infile, tmpformat, 1, passin, e, "public key"); in rsa_main()
253 pkey = load_key(infile, informat, 1, passin, e, "private key"); in rsa_main()
412 OPENSSL_free(passin); in rsa_main()
Dpkeyutl.c336 char *passin = strchr(opt, ':'); in pkeyutl_main() local
339 if (passin == NULL) { in pkeyutl_main()
362 *passin = 0; in pkeyutl_main()
363 passin++; in pkeyutl_main()
364 if (app_passwd(passin, NULL, &passwd, NULL) == 0) { in pkeyutl_main()
533 char *passin = NULL; in init_ctx() local
543 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in init_ctx()
549 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx()
655 OPENSSL_free(passin); in init_ctx()
Drsautl.c80 char *passinarg = NULL, *passin = NULL, *prog; in rsautl_main() local
184 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in rsautl_main()
191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main()
291 OPENSSL_free(passin); in rsautl_main()
Dts.c50 const char *queryfile, const char *passin, const char *inkey,
56 const char *queryfile, const char *passin,
168 char *in = NULL, *out = NULL, *queryfile = NULL, *passin = NULL; in ts_main() local
253 passin = opt_arg(); in ts_main()
302 if (mode == OPT_REPLY && passin && in ts_main()
303 !app_passwd(passin, NULL, &password, NULL)) { in ts_main()
585 const char *queryfile, const char *passin, const char *inkey, in reply_command() argument
608 passin, inkey, md, signer, chain, policy); in reply_command()
693 const char *queryfile, const char *passin, in create_response() argument
718 if (!TS_CONF_set_signer_key(conf, section, inkey, passin, resp_ctx)) in create_response()
Dsrp.c124 const char *passin, int verbose) in srp_verify_user() argument
133 cb_tmp.password = passin; in srp_verify_user()
240 char *passin = NULL, *passout = NULL, *gN = NULL, *userinfo = NULL; in srp_main() local
338 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in srp_main()
522 irow ? irow[DB_srpverifier] : NULL, passin, in srp_main()
623 OPENSSL_free(passin); in srp_main()
Dstoreutl.c73 char *outfile = NULL, *passin = NULL, *passinarg = NULL; in storeutl_main() local
310 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in storeutl_main()
314 pw_cb_data.password = passin; in storeutl_main()
334 OPENSSL_free(passin); in storeutl_main()
Dreq.c253 char *passin = NULL, *passout = NULL; in req_main() local
496 if (!app_passwd(passargin, passargout, &passin, &passout)) { in req_main()
579 if (passin == NULL) { in req_main()
580 passin = nofree_passin = in req_main()
582 if (passin == NULL) in req_main()
630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main()
760 0, passin, e, in req_main()
768 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
1057 if (passin != nofree_passin) in req_main()
1058 OPENSSL_free(passin); in req_main()
Dsmime.c148 char *passinarg = NULL, *passin = NULL, *to = NULL, *from = NULL; in smime_main() local
419 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in smime_main()
488 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main()
580 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main()
673 OPENSSL_free(passin); in smime_main()
Dca.c104 const char *passin, EVP_PKEY *pkey, X509 *x509,
282 char *passin = NULL; in ca_main() local
391 passin = opt_arg(); in ca_main()
585 if (passin == NULL) { in ca_main()
587 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in ca_main()
592 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main()
593 cleanse(passin); in ca_main()
605 x509 = load_cert_pass(certfile, certformat, 1, passin, "CA certificate"); in ca_main()
973 j = certify_cert(&x, ss_cert_file, certformat, passin, pkey, in ca_main()
1302 revcert = load_cert_pass(infile, informat, 1, passin, in ca_main()
[all …]
Ddgst.c102 char *passinarg = NULL, *passin = NULL; in dgst_main() local
256 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in dgst_main()
283 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
462 OPENSSL_free(passin); in dgst_main()
Dx509.c276 char *extsect = NULL, *extfile = NULL, *passin = NULL, *passinarg = NULL; in x509_main() local
611 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in x509_main()
630 privkey = load_key(privkeyfile, keyformat, 0, passin, e, "private key"); in x509_main()
753 x = load_cert_pass(infile, informat, 1, passin, "certificate"); in x509_main()
768 xca = load_cert_pass(CAfile, CAformat, 1, passin, "CA certificate"); in x509_main()
892 0, passin, e, "CA private key")) == NULL) in x509_main()
1084 clear_free(passin); in x509_main()
Dpkcs12.c173 char *passin = NULL, *passout = NULL, *macalg = NULL; in pkcs12_main() local
472 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs12_main()
481 cpass = passin; in pkcs12_main()
536 FORMAT_PEM, 1, passin, e, in pkcs12_main()
546 if (!load_certs(infile, 1, &certs, passin, in pkcs12_main()
831 OPENSSL_free(passin); in pkcs12_main()
Dcms.c297 char *passinarg = NULL, *passin = NULL, *signerfile = NULL; in cms_main() local
782 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in cms_main()
884 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in cms_main()
1078 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in cms_main()
1276 OPENSSL_free(passin); in cms_main()
/third_party/node/test/fixtures/keys/
DMakefile118 -passin "pass:password" \
144 -passin "pass:password" \
169 -passin "pass:password" \
193 -passin "pass:password" \
243 -passin "pass:password" \
298 -passin "pass:password" \
322 -passin "pass:password" \
342 -passin 'pass:password'
349 -passin 'pass:password'
364 -passin "pass:password" \
[all …]
/third_party/openssl/doc/man1/
Dopenssl-passphrase-options.pod16 Several OpenSSL commands accept password arguments, typically using B<-passin>
50 argument is supplied to B<-passin> and B<-passout> arguments then the first
Dopenssl-srp.pod.in21 [B<-passin> I<arg>]
87 =item B<-passin> I<arg>, B<-passout> I<arg>
Dopenssl-storeutl.pod.in18 [B<-passin> I<arg>]
55 =item B<-passin> I<arg>
Dopenssl-pkey.pod.in21 [B<-passin> I<arg>]
74 If the key input is encrypted and B<-passin> is not given
82 =item B<-passin> I<arg>
Dopenssl-spkac.pod.in21 [B<-passin> I<arg>]
70 =item B<-passin> I<arg>
/third_party/mbedtls/tests/data_files/
DMakefile57 $(OPENSSL) pkey -in $< -out $@ -inform PEM -outform DER -passin "pass:$(test_ca_pwd_rsa)"
77 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
81 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
85 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
94 …key_file_rsa) -extfile $(test_ca_config_file) -extensions dns_alt_names -passin "pass:$(test_ca_pw…
123 …_config_file) -extensions v3_any_policy_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
131 …le) -extensions v3_any_policy_qualifier_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
139 …onfig_file) -extensions v3_multi_policy_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
147 …file) -extensions v3_unsupported_policy_ca -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pw…
1036 …$(OPENSSL) ca -batch -passin "pass:$(test_ca_pwd_rsa)" -config $(test_ca_server1_config_file) -in …
[all …]

12