/third_party/glib/glib/tests/ |
D | keyfile.c | 12 GKeyFile *keyfile; in load_data() local 15 keyfile = g_key_file_new (); in load_data() 16 g_key_file_load_from_data (keyfile, data, -1, flags, &error); in load_data() 18 return keyfile; in load_data() 38 check_string_value (GKeyFile *keyfile, in check_string_value() argument 46 value = g_key_file_get_string (keyfile, group, key, &error); in check_string_value() 54 check_locale_string_value (GKeyFile *keyfile, in check_locale_string_value() argument 63 value = g_key_file_get_locale_string (keyfile, group, key, locale, &error); in check_locale_string_value() 71 check_string_locale_value (GKeyFile *keyfile, in check_string_locale_value() argument 79 value = g_key_file_get_locale_for_key (keyfile, group, key, locale); in check_string_locale_value() [all …]
|
/third_party/openssl/apps/ |
D | smime.c | 125 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 251 if (keyfile == NULL) in smime_main() 252 keyfile = signerfile; in smime_main() 256 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 257 keyfile = NULL; in smime_main() 274 if (keyfile != NULL) { in smime_main() 288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 290 keyfile = opt_arg(); in smime_main() 331 if (keyfile && !signerfile) { in smime_main() 342 if (!keyfile) in smime_main() [all …]
|
D | cms.c | 202 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local 479 if (keyfile == NULL) in cms_main() 480 keyfile = signerfile; in cms_main() 484 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 485 keyfile = NULL; in cms_main() 491 if (keyfile != NULL) { in cms_main() 504 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 506 keyfile = opt_arg(); in cms_main() 536 if (keyfile != NULL || signerfile != NULL) in cms_main() 605 if (keyfile != NULL && signerfile == NULL) { in cms_main() [all …]
|
D | spkac.c | 57 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 96 keyfile = opt_arg(); in spkac_main() 125 if (keyfile != NULL) { in spkac_main() 126 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
D | dgst.c | 95 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 143 keyfile = opt_arg(); in dgst_main() 149 keyfile = opt_arg(); in dgst_main() 153 keyfile = opt_arg(); in dgst_main() 208 if (keyfile != NULL && argc > 1) { in dgst_main() 240 if (keyfile != NULL) in dgst_main() 250 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 255 if (keyfile != NULL) { in dgst_main() 259 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "key file"); in dgst_main() 261 sigkey = load_key(keyfile, keyform, 0, passin, e, "key file"); in dgst_main()
|
D | rsautl.c | 72 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 150 keyfile = opt_arg(); in rsautl_main() 177 pkey = load_key(keyfile, keyformat, 0, passin, e, "Private Key"); in rsautl_main() 181 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "Public Key"); in rsautl_main() 185 x = load_cert(keyfile, keyformat, "Certificate"); in rsautl_main()
|
D | crl.c | 73 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 116 keyfile = opt_arg(); in crl_main() 223 if (!keyfile) { in crl_main() 230 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
D | pkeyutl.c | 23 const char *keyfile, int keyform, int key_type, 365 const char *keyfile, int keyform, int key_type, in init_ctx() argument 387 pkey = load_key(keyfile, keyform, 0, passin, e, "Private Key"); in init_ctx() 391 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "Public Key"); in init_ctx() 395 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx()
|
D | s_time.c | 99 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 145 keyfile = opt_arg(); in s_time_main() 206 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
/third_party/glib/gio/ |
D | gportalsupport.c | 38 GKeyFile *keyfile; in read_flatpak_info() local 44 keyfile = g_key_file_new (); in read_flatpak_info() 45 if (g_key_file_load_from_file (keyfile, path, G_KEY_FILE_NONE, NULL)) in read_flatpak_info() 50 shared = g_key_file_get_string_list (keyfile, "Context", "shared", NULL, NULL); in read_flatpak_info() 57 … dconf_policy = g_key_file_get_string (keyfile, "Session Bus Policy", "ca.desrt.dconf", NULL); in read_flatpak_info() 66 g_key_file_unref (keyfile); in read_flatpak_info()
|
D | gio-tool-launch.c | 45 GKeyFile *keyfile = NULL; in handle_launch() local 95 keyfile = g_key_file_new (); in handle_launch() 96 if (!g_key_file_load_from_file (keyfile, desktop_file, G_KEY_FILE_NONE, &error)) in handle_launch() 104 app = (GAppInfo*)g_desktop_app_info_new_from_keyfile (keyfile); in handle_launch() 128 g_key_file_free (keyfile); in handle_launch()
|
D | gkeyfilesettingsbackend.c | 61 GKeyFile *keyfile; member 116 contents = g_key_file_to_data (kfsb->keyfile, &length, NULL); in g_keyfile_settings_backend_keyfile_write() 231 str = g_key_file_get_value (kfsb->keyfile, group, name, NULL); in get_from_keyfile() 293 g_key_file_set_value (kfsb->keyfile, group, name, str); in set_to_keyfile() 304 groups = g_key_file_get_groups (kfsb->keyfile, NULL); in set_to_keyfile() 308 g_key_file_remove_group (kfsb->keyfile, groups[i], NULL); in set_to_keyfile() 313 g_key_file_remove_key (kfsb->keyfile, group, name, NULL); in set_to_keyfile() 473 GKeyFile *keyfile, in keyfile_to_tree() argument 479 groups = g_key_file_get_groups (keyfile, NULL); in keyfile_to_tree() 494 keys = g_key_file_get_keys (keyfile, groups[i], NULL, NULL); in keyfile_to_tree() [all …]
|
/third_party/glib/gio/tests/ |
D | mimeapps.c | 301 GKeyFile *keyfile; in test_mime_file() local 323 keyfile = g_key_file_new (); in test_mime_file() 324 g_key_file_load_from_file (keyfile, fixture->mimeapps_list_home, G_KEY_FILE_NONE, &error); in test_mime_file() 327 assoc = g_key_file_get_string_list (keyfile, "Added Associations", contenttype, NULL, &error); in test_mime_file() 333 assoc = g_key_file_get_string_list (keyfile, "Default Applications", contenttype, NULL, &error); in test_mime_file() 337 g_key_file_free (keyfile); in test_mime_file() 343 keyfile = g_key_file_new (); in test_mime_file() 344 g_key_file_load_from_file (keyfile, fixture->mimeapps_list_home, G_KEY_FILE_NONE, &error); in test_mime_file() 347 assoc = g_key_file_get_string_list (keyfile, "Added Associations", contenttype, NULL, &error); in test_mime_file() 352 assoc = g_key_file_get_string_list (keyfile, "Default Applications", contenttype, NULL, &error); in test_mime_file() [all …]
|
D | gsettings.c | 1760 GKeyFile *keyfile; in test_keyfile() local 1792 keyfile = g_key_file_new (); in test_keyfile() 1793 g_assert_true (g_key_file_load_from_file (keyfile, store_path, 0, NULL)); in test_keyfile() 1795 str = g_key_file_get_string (keyfile, "tests", "greeting", NULL); in test_keyfile() 1799 str = g_key_file_get_string (keyfile, "tests", "farewell", NULL); in test_keyfile() 1802 g_key_file_free (keyfile); in test_keyfile() 1806 keyfile = g_key_file_new (); in test_keyfile() 1807 g_assert_true (g_key_file_load_from_file (keyfile, store_path, 0, NULL)); in test_keyfile() 1809 str = g_key_file_get_string (keyfile, "tests", "greeting", NULL); in test_keyfile() 1815 g_key_file_set_string (keyfile, "tests", "greeting", "'howdy'"); in test_keyfile() [all …]
|
/third_party/python/Lib/ |
D | poplib.py | 434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, argument 436 if context is not None and keyfile is not None: 442 if keyfile is not None or certfile is not None: 446 self.keyfile = keyfile 450 keyfile=keyfile) 460 def stls(self, keyfile=None, certfile=None, context=None): argument
|
D | smtplib.py | 752 def starttls(self, keyfile=None, certfile=None, context=None): argument 777 if context is not None and keyfile is not None: 783 if keyfile is not None or certfile is not None: 789 keyfile=keyfile) 1031 keyfile=None, certfile=None, argument 1034 if context is not None and keyfile is not None: 1040 if keyfile is not None or certfile is not None: 1044 self.keyfile = keyfile 1048 keyfile=keyfile)
|
D | ftplib.py | 719 keyfile=None, certfile=None, context=None, argument 722 if context is not None and keyfile is not None: 728 if keyfile is not None or certfile is not None: 732 self.keyfile = keyfile 737 keyfile=keyfile)
|
/third_party/openssl/demos/certs/ |
D | mkcerts.sh | 81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \ 83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \ 85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \ 88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
|
/third_party/skia/third_party/externals/microhttpd/src/microspdy/ |
D | daemon.c | 172 const char *keyfile, in SPDYF_start_daemon_va() argument 230 if (NULL == keyfile in SPDYF_start_daemon_va() 231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va() 364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va() 365 free(daemon->keyfile); in SPDYF_start_daemon_va() 385 free(daemon->keyfile); in SPDYF_stop_daemon()
|
/third_party/gstreamer/gstplugins_bad/sys/dvb/ |
D | parsechannels.c | 359 GKeyFile *keyfile; in parse_and_configure_from_v5_conf_file() local 363 keyfile = g_key_file_new (); in parse_and_configure_from_v5_conf_file() 364 if (!g_key_file_load_from_file (keyfile, filename, G_KEY_FILE_NONE, &err)) in parse_and_configure_from_v5_conf_file() 367 if (!g_key_file_has_group (keyfile, channel_name)) in parse_and_configure_from_v5_conf_file() 370 keys = g_key_file_get_keys (keyfile, channel_name, NULL, &err); in parse_and_configure_from_v5_conf_file() 384 if (!map_entry->set_func (dvbbasebin, map_entry->elem_property, keyfile, in parse_and_configure_from_v5_conf_file() 402 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file() 422 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file() 431 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file() 440 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
|
/third_party/skia/third_party/externals/swiftshader/tests/regres/llvm/ |
D | llvm.go | 92 keyfile, err := os.Open(key) 96 defer keyfile.Close() 98 if err := util.CheckPGP(bytes.NewReader(content), sigfile, keyfile); err != nil {
|
/third_party/ntfs-3g/ntfsprogs/ |
D | ntfsdecrypt.c | 126 char *keyfile; /* .pfx file containing the user's private key. */ member 240 if (!opts.keyfile) in parse_options() 241 opts.keyfile = argv[optind - 1]; in parse_options() 282 if (!opts.keyfile) { in parse_options() 316 static int ntfs_pkcs12_load_pfxfile(const char *keyfile, u8 **pfx, in ntfs_pkcs12_load_pfxfile() argument 322 if (!keyfile || !pfx || !pfx_size) { in ntfs_pkcs12_load_pfxfile() 328 f = open(keyfile, O_RDONLY); in ntfs_pkcs12_load_pfxfile() 1563 if (ntfs_pkcs12_load_pfxfile(opts.keyfile, &pfx_buf, &pfx_size)) { in main()
|
/third_party/libwebsockets/scripts/client-ca/ |
D | create-server-cert.sh | 13 -keyfile ca.key \
|
D | create-client-cert.sh | 13 -keyfile ca.key \
|
/third_party/openssl/doc/man1/ |
D | spkac.pod | 14 [B<-key keyfile>] 49 =item B<-key keyfile> 51 Create an SPKAC file using the private key in B<keyfile>. The
|