| /freebsd/crypto/openssl/apps/ |
| H A D | ec.c | 88 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in ec_main() local 182 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in ec_main() 190 eckey = load_pubkey(infile, informat, 1, passin, e, "public key"); in ec_main() 192 eckey = load_key(infile, informat, 1, passin, e, "private key"); in ec_main() 299 if (passin != NULL) in ec_main() 300 OPENSSL_clear_free(passin, strlen(passin)); in ec_main()
|
| H A D | dsa.c | 96 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in dsa_main() local 184 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in dsa_main() 191 pkey = load_pubkey(infile, informat, 1, passin, e, "public key"); in dsa_main() 193 pkey = load_key(infile, informat, 1, passin, e, "private key"); in dsa_main() 316 OPENSSL_free(passin); in dsa_main()
|
| H A D | pkey.c | 89 char *infile = NULL, *outfile = NULL, *passin = NULL, *passout = NULL; in pkey_main() local 220 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkey_main() 226 pkey = load_pubkey(infile, informat, 1, passin, e, "Public Key"); in pkey_main() 228 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkey_main() 340 OPENSSL_free(passin); in pkey_main()
|
| H A D | pkcs8.c | 103 char *passin = NULL, *passout = NULL, *p8pass = NULL; in pkcs8_main() local 233 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs8_main() 247 pkey = load_key(infile, informat, 1, passin, e, "key"); in pkcs8_main() 347 if (passin != NULL) { in pkcs8_main() 348 p8pass = passin; in pkcs8_main() 402 OPENSSL_free(passin); in pkcs8_main()
|
| H A D | spkac.c | 77 char *infile = NULL, *outfile = NULL, *passinarg = NULL, *passin = NULL; in spkac_main() local 149 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in spkac_main() 159 keyformat, 1, passin, e, "private key"); in spkac_main() 241 OPENSSL_free(passin); in spkac_main()
|
| H A D | rsa.c | 145 char *passin = NULL, *passout = NULL, *passinarg = NULL, *passoutarg = NULL; in rsa_main() local 243 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in rsa_main() 264 pkey = load_pubkey(infile, tmpformat, 1, passin, e, "public key"); in rsa_main() 266 pkey = load_key(infile, informat, 1, passin, e, "private key"); in rsa_main() 425 OPENSSL_free(passin); in rsa_main()
|
| H A D | rsautl.c | 96 char *passinarg = NULL, *passin = NULL, *prog; in rsautl_main() local 199 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in rsautl_main() 206 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 307 OPENSSL_free(passin); in rsautl_main()
|
| H A D | ts.c | 48 const char *queryfile, const char *passin, const char *inkey, 54 const char *queryfile, const char *passin, 189 char *in = NULL, *out = NULL, *queryfile = NULL, *passin = NULL; in ts_main() local 277 passin = opt_arg(); in ts_main() 327 if (mode == OPT_REPLY && passin && !app_passwd(passin, NULL, &password, NULL)) { in ts_main() 612 const char *queryfile, const char *passin, const char *inkey, in reply_command() argument 635 passin, inkey, md, signer, chain, policy); in reply_command() 720 const char *queryfile, const char *passin, in create_response() argument 745 if (!TS_CONF_set_signer_key(conf, section, inkey, passin, resp_ctx)) in create_response()
|
| H A D | pkeyutl.c | 411 char *passin = strchr(opt, ':'); in pkeyutl_main() local 414 if (passin == NULL) { in pkeyutl_main() 439 *passin = 0; in pkeyutl_main() 440 passin++; in pkeyutl_main() 441 if (app_passwd(passin, NULL, &passwd, NULL) == 0) { in pkeyutl_main() 644 char *passin = NULL; in get_pkey() local 653 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in get_pkey() 659 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in get_pkey() 677 OPENSSL_free(passin); in get_pkey()
|
| H A D | srp.c | 122 const char *passin, int verbose) in srp_verify_user() argument 131 cb_tmp.password = passin; in srp_verify_user() 251 char *passin = NULL, *passout = NULL, *gN = NULL, *userinfo = NULL; in srp_main() local 349 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in srp_main() 526 irow ? irow[DB_srpverifier] : NULL, passin, in srp_main() 625 OPENSSL_free(passin); in srp_main()
|
| H A D | storeutl.c | 85 char *outfile = NULL, *passin = NULL, *passinarg = NULL; in storeutl_main() local 316 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in storeutl_main() 320 pw_cb_data.password = passin; in storeutl_main() 336 OPENSSL_free(passin); in storeutl_main()
|
| H A D | smime.c | 211 char *passinarg = NULL, *passin = NULL, *to = NULL, *from = NULL; in smime_main() local 492 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in smime_main() 557 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main() 650 key = load_key(keyfile, keyform, 0, passin, e, "signing key"); in smime_main() 743 OPENSSL_free(passin); in smime_main()
|
| H A D | req.c | 301 char *passin = NULL, *passout = NULL; in req_main() local 571 if (!app_passwd(passargin, passargout, &passin, &passout)) { in req_main() 645 if (passin == NULL) in req_main() 646 passin = nofree_passin = app_conf_try_string(req_conf, section, "input_password"); in req_main() 664 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 801 0, passin, e, in req_main() 810 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main() 1104 if (passin != nofree_passin) in req_main() 1105 OPENSSL_free(passin); in req_main()
|
| H A D | ca.c | 106 const char *passin, EVP_PKEY *pkey, X509 *x509, 333 char *passin = NULL; in ca_main() local 447 passin = opt_arg(); in ca_main() 632 if (passin == NULL) { in ca_main() 634 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in ca_main() 639 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main() 640 cleanse(passin); in ca_main() 652 x509 = load_cert_pass(certfile, certformat, 1, passin, "CA certificate"); in ca_main() 993 j = certify_cert(&x, ss_cert_file, certformat, passin, pkey, in ca_main() 1318 revcert = load_cert_pass(infile, informat, 1, passin, in ca_main() [all …]
|
| H A D | x509.c | 342 char *extsect = NULL, *extfile = NULL, *passin = NULL, *passinarg = NULL; in x509_main() local 700 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in x509_main() 718 privkey = load_key(privkeyfile, keyformat, 0, passin, e, "private key"); in x509_main() 848 x = load_cert_pass(infile, informat, 1, passin, "certificate"); in x509_main() 861 xca = load_cert_pass(CAfile, CAformat, 1, passin, "CA certificate"); in x509_main() 988 0, passin, e, "CA private key")) in x509_main() 1189 clear_free(passin); in x509_main()
|
| H A D | dgst.c | 122 char *passinarg = NULL, *passin = NULL; in dgst_main() local 281 if (!app_passwd(passinarg, NULL, &passin, NULL)) { in dgst_main() 306 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main() 508 OPENSSL_free(passin); in dgst_main()
|
| H A D | pkcs12.c | 222 char *passin = NULL, *passout = NULL, *macalg = NULL, *pbmac1_pbkdf2_md = NULL; in pkcs12_main() local 535 if (!app_passwd(passinarg, passoutarg, &passin, &passout)) { in pkcs12_main() 544 cpass = passin; in pkcs12_main() 600 FORMAT_PEM, 1, passin, e, in pkcs12_main() 608 if (!load_certs(infile, 1, &certs, passin, in pkcs12_main() 955 OPENSSL_free(passin); in pkcs12_main()
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-passphrase-options.pod | 16 Several OpenSSL commands accept password arguments, typically using B<-passin> 53 If the same I<pathname> argument is supplied to both B<-passin> and B<-passout>
|
| H A D | openssl-srp.pod.in | 21 [B<-passin> I<arg>] 87 =item B<-passin> I<arg>, B<-passout> I<arg>
|
| H A D | openssl-storeutl.pod.in | 18 [B<-passin> I<arg>] 58 =item B<-passin> I<arg>
|
| H A D | openssl-spkac.pod.in | 21 [B<-passin> I<arg>] 70 =item B<-passin> I<arg>
|
| H A D | openssl-pkey.pod.in | 21 [B<-passin> I<arg>] 75 If the key input is encrypted and B<-passin> is not given 83 =item B<-passin> I<arg>
|
| /freebsd/sys/netinet6/ |
| H A D | ip6_fastfwd.c | 170 goto passin; in ip6_tryforward() 199 passin: in ip6_tryforward()
|
| H A D | ip6_input.c | 568 goto passin; in ip6_input() 705 goto passin; in ip6_input() 714 goto passin; in ip6_input() 726 goto passin; in ip6_input() 745 passin: in ip6_input()
|
| /freebsd/sys/netinet/ |
| H A D | ip_fastfwd.c | 312 goto passin; in ip_tryforward() 345 passin: in ip_tryforward()
|