HomeSort by relevance Sort by last modified time
    Searched refs:passin (Results 1 - 25 of 34) sorted by null

1 2

  /system/core/fastboot/
p12topem.sh 9 openssl pkcs12 -passin pass:"$2" -passout pass:"$2" -in $1.p12 -out $1.pem
signfile.sh 9 openssl dgst -passin pass:"$3" -binary -sha1 -sign $1.pem $2 > $2.sign
genkey.sh 14 openssl req -new -x509 -key $1.pem -passin pass:"$2" \
20 openssl pkcs12 -export -in $1-cert.pem -inkey $1.pem -passin pass:"$2" \
  /external/chromium_org/third_party/openssl/openssl/apps/
pkey.c 79 char *passin = NULL, *passout = NULL; local
118 else if (!strcmp(*args,"-passin"))
190 BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
204 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
232 passin, e, "Public Key");
235 passin, e, "key");
278 if (passin)
279 OPENSSL_free(passin);
pkcs8.c 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local
168 else if (!strcmp(*args,"-passin"))
214 BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
236 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
279 passin, e, "key");
365 if (passin)
366 p8pass = passin;
433 if (passin)
434 OPENSSL_free(passin);
dsa.c 112 char *passin = NULL, *passout = NULL; local
159 else if (strcmp(*argv,"-passin") == 0)
210 BIO_printf(bio_err," -passin arg input file pass phrase source\n");
244 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
275 passin, e, "Public Key");
278 passin, e, "Private Key");
365 if(passin) OPENSSL_free(passin);
ec.c 98 char *passin = NULL, *passout = NULL; local
144 else if (strcmp(*argv,"-passin") == 0)
217 BIO_printf(bio_err, " -passin arg input file pass "
257 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
297 passin);
393 if (passin)
394 OPENSSL_free(passin);
rsautl.c 102 char *passargin = NULL, *passin = NULL; local
136 } else if (!strcmp(*argv,"-passin")) {
191 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
202 passin, e, "Private Key");
316 if(passin) OPENSSL_free(passin);
340 BIO_printf (bio_err, "-passin arg pass phrase source\n");
spkac.c 89 char *passargin = NULL, *passin = NULL; local
122 else if (strcmp(*argv,"-passin") == 0)
173 BIO_printf(bio_err," -passin arg input file pass phrase source\n");
186 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
198 FORMAT_PEM, 1, passin, e, "private key");
305 if(passin) OPENSSL_free(passin);
rsa.c 112 char *passin = NULL, *passout = NULL; local
159 else if (strcmp(*argv,"-passin") == 0)
219 BIO_printf(bio_err," -passin arg input file pass phrase source\n");
256 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
287 passin, e, "Public Key");
293 passin, e, "Private Key");
439 if(passin) OPENSSL_free(passin);
dgst.c 124 char *passargin = NULL, *passin = NULL; local
176 else if (!strcmp(*argv,"-passin"))
303 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
544 if (passin)
545 OPENSSL_free(passin);
pkeyutl.c 159 else if (!strcmp(*argv,"-passin"))
409 BIO_printf(bio_err, "-passin arg pass phrase source\n");
419 char *passin = NULL; local
429 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
438 passin, e, "Private Key");
505 if (passin)
506 OPENSSL_free(passin);
smime.c 109 char *passargin = NULL, *passin = NULL; local
230 else if (!strcmp(*args,"-passin"))
487 BIO_printf (bio_err, "-passin arg input file pass phrase source\n");
499 if (!app_passwd(bio_err, passargin, NULL, &passin, NULL))
602 key = load_key(bio_err, keyfile, keyform, 0, passin, e,
718 key = load_key(bio_err, keyfile, keyform, 0, passin, e,
822 if (passin) OPENSSL_free(passin);
srp.c 97 " -passin arg input file pass phrase source\n",
213 const char *passin, BIO *bio, int verbose)
221 cb_tmp.password = passin;
277 char *passin = NULL, *passout = NULL; local
357 else if (strcmp(*argv,"-passin") == 0)
404 if ((passin || passout) && argc != 1 )
406 BIO_printf(bio_err,"-passin, -passout arguments only valid with one user.\n");
427 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
656 if (!srp_verify_user(user, row[DB_srpverifier], row[DB_srpsalt], irow ? irow[DB_srpsalt] : row[DB_srpgN], irow ? irow[DB_srpverifier] : NULL, passin, bio_err, verbose))
  /external/openssl/apps/
pkey.c 79 char *passin = NULL, *passout = NULL; local
118 else if (!strcmp(*args,"-passin"))
190 BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
204 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
232 passin, e, "Public Key");
235 passin, e, "key");
278 if (passin)
279 OPENSSL_free(passin);
pkcs8.c 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local
168 else if (!strcmp(*args,"-passin"))
214 BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
236 if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
279 passin, e, "key");
365 if (passin)
366 p8pass = passin;
433 if (passin)
434 OPENSSL_free(passin);
dsa.c 112 char *passin = NULL, *passout = NULL; local
159 else if (strcmp(*argv,"-passin") == 0)
210 BIO_printf(bio_err," -passin arg input file pass phrase source\n");
244 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
275 passin, e, "Public Key");
278 passin, e, "Private Key");
365 if(passin) OPENSSL_free(passin);
ec.c 98 char *passin = NULL, *passout = NULL; local
144 else if (strcmp(*argv,"-passin") == 0)
217 BIO_printf(bio_err, " -passin arg input file pass "
257 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
297 passin);
393 if (passin)
394 OPENSSL_free(passin);
rsautl.c 102 char *passargin = NULL, *passin = NULL; local
136 } else if (!strcmp(*argv,"-passin")) {
191 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
202 passin, e, "Private Key");
316 if(passin) OPENSSL_free(passin);
340 BIO_printf (bio_err, "-passin arg pass phrase source\n");
spkac.c 89 char *passargin = NULL, *passin = NULL; local
122 else if (strcmp(*argv,"-passin") == 0)
173 BIO_printf(bio_err," -passin arg input file pass phrase source\n");
186 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
198 FORMAT_PEM, 1, passin, e, "private key");
305 if(passin) OPENSSL_free(passin);
rsa.c 112 char *passin = NULL, *passout = NULL; local
159 else if (strcmp(*argv,"-passin") == 0)
219 BIO_printf(bio_err," -passin arg input file pass phrase source\n");
256 if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
287 passin, e, "Public Key");
293 passin, e, "Private Key");
439 if(passin) OPENSSL_free(passin);
dgst.c 124 char *passargin = NULL, *passin = NULL; local
176 else if (!strcmp(*argv,"-passin"))
303 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
544 if (passin)
545 OPENSSL_free(passin);
pkeyutl.c 159 else if (!strcmp(*argv,"-passin"))
409 BIO_printf(bio_err, "-passin arg pass phrase source\n");
419 char *passin = NULL; local
429 if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
438 passin, e, "Private Key");
505 if (passin)
506 OPENSSL_free(passin);
smime.c 109 char *passargin = NULL, *passin = NULL; local
230 else if (!strcmp(*args,"-passin"))
487 BIO_printf (bio_err, "-passin arg input file pass phrase source\n");
499 if (!app_passwd(bio_err, passargin, NULL, &passin, NULL))
602 key = load_key(bio_err, keyfile, keyform, 0, passin, e,
718 key = load_key(bio_err, keyfile, keyform, 0, passin, e,
822 if (passin) OPENSSL_free(passin);
  /external/wpa_supplicant_8/hs20/server/ca/
setup.sh 28 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate"
47 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate"
48 # horrible from security view point, but for testing purposes since OCSP responder does not seem to support -passin
49 openssl rsa -in demoCA/private/cakey.pem -out demoCA/private/cakey-plain.pem -passin pass:$PASS
61 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.pem -days 730 -extensions v3_OCSP
116 $OPENSSL ca -config $PWD/openssl.cnf -gencrl -md sha256 -out demoCA/crl/crl.pem -passin pass:$PASS

Completed in 205 milliseconds

1 2