/system/core/fastboot/ |
p12topem.sh | 9 openssl pkcs12 -passin pass:"$2" -passout pass:"$2" -in $1.p12 -out $1.pem
|
signfile.sh | 9 openssl dgst -passin pass:"$3" -binary -sha1 -sign $1.pem $2 > $2.sign
|
genkey.sh | 14 openssl req -new -x509 -key $1.pem -passin pass:"$2" \ 20 openssl pkcs12 -export -in $1-cert.pem -inkey $1.pem -passin pass:"$2" \
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkey.c | 79 char *passin = NULL, *passout = NULL; local 118 else if (!strcmp(*args,"-passin")) 190 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 204 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 232 passin, e, "Public Key"); 235 passin, e, "key"); 278 if (passin) 279 OPENSSL_free(passin);
|
pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local 168 else if (!strcmp(*args,"-passin")) 214 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 236 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 279 passin, e, "key"); 365 if (passin) 366 p8pass = passin; 433 if (passin) 434 OPENSSL_free(passin);
|
dsa.c | 112 char *passin = NULL, *passout = NULL; local 159 else if (strcmp(*argv,"-passin") == 0) 210 BIO_printf(bio_err," -passin arg input file pass phrase source\n"); 244 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) { 275 passin, e, "Public Key"); 278 passin, e, "Private Key"); 365 if(passin) OPENSSL_free(passin);
|
ec.c | 98 char *passin = NULL, *passout = NULL; local 144 else if (strcmp(*argv,"-passin") == 0) 217 BIO_printf(bio_err, " -passin arg input file pass " 257 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 297 passin); 393 if (passin) 394 OPENSSL_free(passin);
|
rsautl.c | 102 char *passargin = NULL, *passin = NULL; local 136 } else if (!strcmp(*argv,"-passin")) { 191 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) { 202 passin, e, "Private Key"); 316 if(passin) OPENSSL_free(passin); 340 BIO_printf (bio_err, "-passin arg pass phrase source\n");
|
spkac.c | 89 char *passargin = NULL, *passin = NULL; local 122 else if (strcmp(*argv,"-passin") == 0) 173 BIO_printf(bio_err," -passin arg input file pass phrase source\n"); 186 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) { 198 FORMAT_PEM, 1, passin, e, "private key"); 305 if(passin) OPENSSL_free(passin);
|
rsa.c | 112 char *passin = NULL, *passout = NULL; local 159 else if (strcmp(*argv,"-passin") == 0) 219 BIO_printf(bio_err," -passin arg input file pass phrase source\n"); 256 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) { 287 passin, e, "Public Key"); 293 passin, e, "Private Key"); 439 if(passin) OPENSSL_free(passin);
|
dgst.c | 124 char *passargin = NULL, *passin = NULL; local 176 else if (!strcmp(*argv,"-passin")) 303 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin, 544 if (passin) 545 OPENSSL_free(passin);
|
pkeyutl.c | 159 else if (!strcmp(*argv,"-passin")) 409 BIO_printf(bio_err, "-passin arg pass phrase source\n"); 419 char *passin = NULL; local 429 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) 438 passin, e, "Private Key"); 505 if (passin) 506 OPENSSL_free(passin);
|
smime.c | 109 char *passargin = NULL, *passin = NULL; local 230 else if (!strcmp(*args,"-passin")) 487 BIO_printf (bio_err, "-passin arg input file pass phrase source\n"); 499 if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) 602 key = load_key(bio_err, keyfile, keyform, 0, passin, e, 718 key = load_key(bio_err, keyfile, keyform, 0, passin, e, 822 if (passin) OPENSSL_free(passin);
|
srp.c | 97 " -passin arg input file pass phrase source\n", 213 const char *passin, BIO *bio, int verbose) 221 cb_tmp.password = passin; 277 char *passin = NULL, *passout = NULL; local 357 else if (strcmp(*argv,"-passin") == 0) 404 if ((passin || passout) && argc != 1 ) 406 BIO_printf(bio_err,"-passin, -passout arguments only valid with one user.\n"); 427 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 656 if (!srp_verify_user(user, row[DB_srpverifier], row[DB_srpsalt], irow ? irow[DB_srpsalt] : row[DB_srpgN], irow ? irow[DB_srpverifier] : NULL, passin, bio_err, verbose))
|
/external/openssl/apps/ |
pkey.c | 79 char *passin = NULL, *passout = NULL; local 118 else if (!strcmp(*args,"-passin")) 190 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 204 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 232 passin, e, "Public Key"); 235 passin, e, "key"); 278 if (passin) 279 OPENSSL_free(passin);
|
pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local 168 else if (!strcmp(*args,"-passin")) 214 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 236 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 279 passin, e, "key"); 365 if (passin) 366 p8pass = passin; 433 if (passin) 434 OPENSSL_free(passin);
|
dsa.c | 112 char *passin = NULL, *passout = NULL; local 159 else if (strcmp(*argv,"-passin") == 0) 210 BIO_printf(bio_err," -passin arg input file pass phrase source\n"); 244 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) { 275 passin, e, "Public Key"); 278 passin, e, "Private Key"); 365 if(passin) OPENSSL_free(passin);
|
ec.c | 98 char *passin = NULL, *passout = NULL; local 144 else if (strcmp(*argv,"-passin") == 0) 217 BIO_printf(bio_err, " -passin arg input file pass " 257 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 297 passin); 393 if (passin) 394 OPENSSL_free(passin);
|
rsautl.c | 102 char *passargin = NULL, *passin = NULL; local 136 } else if (!strcmp(*argv,"-passin")) { 191 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) { 202 passin, e, "Private Key"); 316 if(passin) OPENSSL_free(passin); 340 BIO_printf (bio_err, "-passin arg pass phrase source\n");
|
spkac.c | 89 char *passargin = NULL, *passin = NULL; local 122 else if (strcmp(*argv,"-passin") == 0) 173 BIO_printf(bio_err," -passin arg input file pass phrase source\n"); 186 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) { 198 FORMAT_PEM, 1, passin, e, "private key"); 305 if(passin) OPENSSL_free(passin);
|
rsa.c | 112 char *passin = NULL, *passout = NULL; local 159 else if (strcmp(*argv,"-passin") == 0) 219 BIO_printf(bio_err," -passin arg input file pass phrase source\n"); 256 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) { 287 passin, e, "Public Key"); 293 passin, e, "Private Key"); 439 if(passin) OPENSSL_free(passin);
|
dgst.c | 124 char *passargin = NULL, *passin = NULL; local 176 else if (!strcmp(*argv,"-passin")) 303 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin, 544 if (passin) 545 OPENSSL_free(passin);
|
pkeyutl.c | 159 else if (!strcmp(*argv,"-passin")) 409 BIO_printf(bio_err, "-passin arg pass phrase source\n"); 419 char *passin = NULL; local 429 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) 438 passin, e, "Private Key"); 505 if (passin) 506 OPENSSL_free(passin);
|
smime.c | 109 char *passargin = NULL, *passin = NULL; local 230 else if (!strcmp(*args,"-passin")) 487 BIO_printf (bio_err, "-passin arg input file pass phrase source\n"); 499 if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) 602 key = load_key(bio_err, keyfile, keyform, 0, passin, e, 718 key = load_key(bio_err, keyfile, keyform, 0, passin, e, 822 if (passin) OPENSSL_free(passin);
|
/external/wpa_supplicant_8/hs20/server/ca/ |
setup.sh | 28 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 47 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate" 48 # horrible from security view point, but for testing purposes since OCSP responder does not seem to support -passin 49 openssl rsa -in demoCA/private/cakey.pem -out demoCA/private/cakey-plain.pem -passin pass:$PASS 61 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.pem -days 730 -extensions v3_OCSP 116 $OPENSSL ca -config $PWD/openssl.cnf -gencrl -md sha256 -out demoCA/crl/crl.pem -passin pass:$PASS
|