/third_party/node/deps/openssl/openssl/apps/ |
H A D | ec.c | 43 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 74 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in ec_main() local 172 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in ec_main() 180 eckey = load_pubkey(infile, informat, 1, passin, e, "public key"); in ec_main() 182 eckey = load_key(infile, informat, 1, passin, e, "private key"); in ec_main() 289 if (passin != NULL) in ec_main() 290 OPENSSL_clear_free(passin, strlen(passin)); in ec_main()
|
H A D | dsa.c | 62 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 84 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in dsa_main() local 176 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in dsa_main() 183 pkey = load_pubkey(infile, informat, 1, passin, e, "public key"); in dsa_main() 185 pkey = load_key(infile, informat, 1, passin, e, "private key"); in dsa_main() 308 OPENSSL_free(passin); in dsa_main()
|
H A D | pkey.c | 44 {"passin", OPT_PASSIN, 's', "Key input pass phrase source"}, 75 char *infile = NULL, *outfile = NULL, *passin = NULL, *passout = NULL; in pkey_main() local 208 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkey_main() 218 pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key"); in pkey_main() 220 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkey_main() 328 OPENSSL_free(passin); in pkey_main()
|
H A D | pkcs8.c | 45 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 83 char *passin = NULL, *passout = NULL, *p8pass = NULL; in pkcs8_main() local 209 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs8_main() 226 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkcs8_main() 325 if (passin != NULL) { in pkcs8_main() 326 p8pass = passin; in pkcs8_main() 377 OPENSSL_free(passin); in pkcs8_main()
|
H A D | pkeyutl.c | 74 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 336 char *passin = strchr(opt, ':'); in pkeyutl_main() local 339 if (passin == NULL) { in pkeyutl_main() 360 /* Get password as a passin argument: First split option name in pkeyutl_main() 362 *passin = 0; in pkeyutl_main() 363 passin++; in pkeyutl_main() 364 if (app_passwd(passin, NULL, &passwd, NULL) == 0) { in pkeyutl_main() 533 char *passin = NULL; in init_ctx() local 543 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in init_ctx() 549 pkey = load_key(keyfile, keyform, 0, passin, in init_ctx() [all...] |
H A D | spkac.c | 44 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 67 char *infile = NULL, *outfile = NULL, *passinarg = NULL, *passin = NULL; in spkac_main() local 140 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in spkac_main() 150 keyformat, 1, passin, e, "private key"); in spkac_main() 231 OPENSSL_free(passin); in spkac_main()
|
H A D | rsautl.c | 55 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 80 char *passinarg = NULL, *passin = NULL, *prog; in rsautl_main() local 184 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in rsautl_main() 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 291 OPENSSL_free(passin); in rsautl_main()
|
H A D | rsa.c | 67 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 130 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in rsa_main() local 230 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in rsa_main() 251 pkey = load_pubkey(infile, tmpformat, 1, passin, e, "public key"); in rsa_main() 253 pkey = load_key(infile, informat, 1, passin, e, "private key"); in rsa_main() 412 OPENSSL_free(passin); in rsa_main()
|
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 56 const char *queryfile, const char *passin, 106 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 142 " [-queryfile file] [-passin password]", 168 char *in = NULL, *out = NULL, *queryfile = NULL, *passin = NULL; in ts_main() local 253 passin = opt_arg(); in ts_main() 302 if (mode == OPT_REPLY && passin && in ts_main() 303 !app_passwd(passin, NULL, &password, NULL)) { in ts_main() 585 const char *queryfile, const char *passin, const char *inkey, in reply_command() 608 passin, inke in reply_command() 584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) reply_command() argument 692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) create_response() argument [all...] |
H A D | srp.c | 124 const char *passin, int verbose) in srp_verify_user() 133 cb_tmp.password = passin; in srp_verify_user() 221 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 240 char *passin = NULL, *passout = NULL, *gN = NULL, *userinfo = NULL; in srp_main() local 334 "-passin, -passout arguments only valid with one user.\n"); in srp_main() 338 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in srp_main() 522 irow ? irow[DB_srpverifier] : NULL, passin, in srp_main() 623 OPENSSL_free(passin); in srp_main() 122 srp_verify_user(const char *user, const char *srp_verifier, char *srp_usersalt, const char *g, const char *N, const char *passin, int verbose) srp_verify_user() argument
|
H A D | req.c | 147 {"passin", OPT_PASSIN, 's', "Private key and certificate password source"}, 253 char *passin = NULL, *passout = NULL; in req_main() local 496 if (!app_passwd(passargin, passargout, &passin, &passout)) { in req_main() 579 if (passin == NULL) { in req_main() 580 passin = nofree_passin = in req_main() 582 if (passin == NULL) in req_main() 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 764 0, passin, e, in req_main() 772 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main() 1061 if (passin ! in req_main() [all...] |
H A D | smime.c | 80 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 148 char *passinarg = NULL, *passin = NULL, *to = NULL, *from = NULL; in smime_main() local 419 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in smime_main() 489 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main() 581 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main() 674 OPENSSL_free(passin); in smime_main()
|
H A D | storeutl.c | 56 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 73 char *outfile = NULL, *passin = NULL, *passinarg = NULL; in storeutl_main() local 308 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in storeutl_main() 312 pw_cb_data.password = passin; in storeutl_main() 332 OPENSSL_free(passin); in storeutl_main()
|
/third_party/openssl/apps/ |
H A D | ec.c | 43 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 74 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in ec_main() local 172 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in ec_main() 180 eckey = load_pubkey(infile, informat, 1, passin, e, "public key"); in ec_main() 182 eckey = load_key(infile, informat, 1, passin, e, "private key"); in ec_main() 289 if (passin != NULL) in ec_main() 290 OPENSSL_clear_free(passin, strlen(passin)); in ec_main()
|
H A D | dsa.c | 62 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 84 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in dsa_main() local 176 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in dsa_main() 183 pkey = load_pubkey(infile, informat, 1, passin, e, "public key"); in dsa_main() 185 pkey = load_key(infile, informat, 1, passin, e, "private key"); in dsa_main() 308 OPENSSL_free(passin); in dsa_main()
|
H A D | pkey.c | 44 {"passin", OPT_PASSIN, 's', "Key input pass phrase source"}, 75 char *infile = NULL, *outfile = NULL, *passin = NULL, *passout = NULL; in pkey_main() local 208 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkey_main() 218 pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key"); in pkey_main() 220 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkey_main() 328 OPENSSL_free(passin); in pkey_main()
|
H A D | pkcs8.c | 45 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 83 char *passin = NULL, *passout = NULL, *p8pass = NULL; in pkcs8_main() local 209 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs8_main() 226 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkcs8_main() 325 if (passin != NULL) { in pkcs8_main() 326 p8pass = passin; in pkcs8_main() 377 OPENSSL_free(passin); in pkcs8_main()
|
H A D | pkeyutl.c | 74 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 336 char *passin = strchr(opt, ':'); in pkeyutl_main() local 339 if (passin == NULL) { in pkeyutl_main() 360 /* Get password as a passin argument: First split option name in pkeyutl_main() 362 *passin = 0; in pkeyutl_main() 363 passin++; in pkeyutl_main() 364 if (app_passwd(passin, NULL, &passwd, NULL) == 0) { in pkeyutl_main() 533 char *passin = NULL; in init_ctx() local 543 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in init_ctx() 549 pkey = load_key(keyfile, keyform, 0, passin, in init_ctx() [all...] |
H A D | rsautl.c | 55 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 80 char *passinarg = NULL, *passin = NULL, *prog; in rsautl_main() local 184 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in rsautl_main() 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 291 OPENSSL_free(passin); in rsautl_main()
|
H A D | spkac.c | 44 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 67 char *infile = NULL, *outfile = NULL, *passinarg = NULL, *passin = NULL; in spkac_main() local 140 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in spkac_main() 150 keyformat, 1, passin, e, "private key"); in spkac_main() 231 OPENSSL_free(passin); in spkac_main()
|
H A D | rsa.c | 67 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 130 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in rsa_main() local 230 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in rsa_main() 251 pkey = load_pubkey(infile, tmpformat, 1, passin, e, "public key"); in rsa_main() 253 pkey = load_key(infile, informat, 1, passin, e, "private key"); in rsa_main() 412 OPENSSL_free(passin); in rsa_main()
|
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 56 const char *queryfile, const char *passin, 106 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 142 " [-queryfile file] [-passin password]", 168 char *in = NULL, *out = NULL, *queryfile = NULL, *passin = NULL; in ts_main() local 253 passin = opt_arg(); in ts_main() 302 if (mode == OPT_REPLY && passin && in ts_main() 303 !app_passwd(passin, NULL, &password, NULL)) { in ts_main() 585 const char *queryfile, const char *passin, const char *inkey, in reply_command() 608 passin, inke in reply_command() 584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) reply_command() argument 692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) create_response() argument [all...] |
H A D | srp.c | 124 const char *passin, int verbose) in srp_verify_user() 133 cb_tmp.password = passin; in srp_verify_user() 221 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 240 char *passin = NULL, *passout = NULL, *gN = NULL, *userinfo = NULL; in srp_main() local 334 "-passin, -passout arguments only valid with one user.\n"); in srp_main() 338 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in srp_main() 522 irow ? irow[DB_srpverifier] : NULL, passin, in srp_main() 623 OPENSSL_free(passin); in srp_main() 122 srp_verify_user(const char *user, const char *srp_verifier, char *srp_usersalt, const char *g, const char *N, const char *passin, int verbose) srp_verify_user() argument
|
H A D | req.c | 147 {"passin", OPT_PASSIN, 's', "Private key and certificate password source"}, 253 char *passin = NULL, *passout = NULL; in req_main() local 496 if (!app_passwd(passargin, passargout, &passin, &passout)) { in req_main() 579 if (passin == NULL) { in req_main() 580 passin = nofree_passin = in req_main() 582 if (passin == NULL) in req_main() 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 762 0, passin, e, in req_main() 770 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main() 1059 if (passin ! in req_main() [all...] |
H A D | smime.c | 80 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 148 char *passinarg = NULL, *passin = NULL, *to = NULL, *from = NULL; in smime_main() local 419 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in smime_main() 488 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main() 580 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main() 673 OPENSSL_free(passin); in smime_main()
|