Lines Matching refs:bio_err
110 if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE); in MAIN()
112 if (!load_config(bio_err, NULL)) in MAIN()
145 BIO_puts(bio_err, in MAIN()
147 ERR_print_errors(bio_err); in MAIN()
156 else if (!setup_peer(bio_err, ctx, peerform, *(++argv))) in MAIN()
180 e = setup_engine(bio_err, *(++argv), 0); in MAIN()
211 BIO_puts(bio_err, in MAIN()
217 BIO_puts(bio_err, "parameter setting error\n"); in MAIN()
218 ERR_print_errors(bio_err); in MAIN()
240 BIO_puts(bio_err, "Signature file specified for non verify\n"); in MAIN()
246 BIO_puts(bio_err, "No signature file specified for verify\n"); in MAIN()
251 app_RAND_load_file(NULL, bio_err, 0); in MAIN()
259 BIO_puts(bio_err, in MAIN()
261 ERR_print_errors(bio_err); in MAIN()
273 BIO_printf(bio_err, "Error Creating Output File\n"); in MAIN()
274 ERR_print_errors(bio_err); in MAIN()
294 BIO_printf(bio_err, "Can't open signature file %s\n", in MAIN()
302 BIO_printf(bio_err, "Error reading signature data\n"); in MAIN()
313 BIO_printf(bio_err, "Error reading input Data\n"); in MAIN()
359 BIO_printf(bio_err, "Public Key operation error\n"); in MAIN()
360 ERR_print_errors(bio_err); in MAIN()
367 ERR_print_errors(bio_err); in MAIN()
390 BIO_printf(bio_err, "Usage: pkeyutl [options]\n"); in usage()
391 BIO_printf(bio_err, "-in file input file\n"); in usage()
392 BIO_printf(bio_err, "-out file output file\n"); in usage()
393 BIO_printf(bio_err, "-sigfile file signature file (verify operation only)\n"); in usage()
394 BIO_printf(bio_err, "-inkey file input key\n"); in usage()
395 BIO_printf(bio_err, "-keyform arg private key format - default PEM\n"); in usage()
396 BIO_printf(bio_err, "-pubin input is a public key\n"); in usage()
397 BIO_printf(bio_err, "-certin input is a certificate carrying a public key\n"); in usage()
398 BIO_printf(bio_err, "-pkeyopt X:Y public key options\n"); in usage()
399 BIO_printf(bio_err, "-sign sign with private key\n"); in usage()
400 BIO_printf(bio_err, "-verify verify with public key\n"); in usage()
401 BIO_printf(bio_err, "-verifyrecover verify with public key, recover original data\n"); in usage()
402 BIO_printf(bio_err, "-encrypt encrypt with public key\n"); in usage()
403 BIO_printf(bio_err, "-decrypt decrypt with private key\n"); in usage()
404 BIO_printf(bio_err, "-derive derive shared secret\n"); in usage()
405 BIO_printf(bio_err, "-hexdump hex dump output\n"); in usage()
407 BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n"); in usage()
409 BIO_printf(bio_err, "-passin arg pass phrase source\n"); in usage()
426 BIO_printf(bio_err, "A private key is needed for this operation\n"); in init_ctx()
429 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) in init_ctx()
431 BIO_printf(bio_err, "Error getting password\n"); in init_ctx()
437 pkey = load_key(bio_err, keyfile, keyform, 0, in init_ctx()
442 pkey = load_pubkey(bio_err, keyfile, keyform, 0, in init_ctx()
447 x = load_cert(bio_err, keyfile, keyform, in init_ctx()
524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); in setup_peer()
528 BIO_printf(bio_err, "Error reading peer key %s\n", file); in setup_peer()