Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 25 of 80) sorted by relevance

1234

/third_party/glib/glib/tests/
Dkeyfile.c12 GKeyFile *keyfile; in load_data() local
15 keyfile = g_key_file_new (); in load_data()
16 g_key_file_load_from_data (keyfile, data, -1, flags, &error); in load_data()
18 return keyfile; in load_data()
38 check_string_value (GKeyFile *keyfile, in check_string_value() argument
46 value = g_key_file_get_string (keyfile, group, key, &error); in check_string_value()
54 check_locale_string_value (GKeyFile *keyfile, in check_locale_string_value() argument
63 value = g_key_file_get_locale_string (keyfile, group, key, locale, &error); in check_locale_string_value()
71 check_string_locale_value (GKeyFile *keyfile, in check_string_locale_value() argument
79 value = g_key_file_get_locale_for_key (keyfile, group, key, locale); in check_string_locale_value()
[all …]
/third_party/openssl/apps/
Dsmime.c125 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
251 if (keyfile == NULL) in smime_main()
252 keyfile = signerfile; in smime_main()
256 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
257 keyfile = NULL; in smime_main()
274 if (keyfile != NULL) { in smime_main()
288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
290 keyfile = opt_arg(); in smime_main()
331 if (keyfile && !signerfile) { in smime_main()
342 if (!keyfile) in smime_main()
[all …]
Dcms.c202 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local
479 if (keyfile == NULL) in cms_main()
480 keyfile = signerfile; in cms_main()
484 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
485 keyfile = NULL; in cms_main()
491 if (keyfile != NULL) { in cms_main()
504 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
506 keyfile = opt_arg(); in cms_main()
536 if (keyfile != NULL || signerfile != NULL) in cms_main()
605 if (keyfile != NULL && signerfile == NULL) { in cms_main()
[all …]
Dspkac.c57 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
96 keyfile = opt_arg(); in spkac_main()
125 if (keyfile != NULL) { in spkac_main()
126 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
Ddgst.c95 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local
143 keyfile = opt_arg(); in dgst_main()
149 keyfile = opt_arg(); in dgst_main()
153 keyfile = opt_arg(); in dgst_main()
208 if (keyfile != NULL && argc > 1) { in dgst_main()
240 if (keyfile != NULL) in dgst_main()
250 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main()
255 if (keyfile != NULL) { in dgst_main()
259 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "key file"); in dgst_main()
261 sigkey = load_key(keyfile, keyform, 0, passin, e, "key file"); in dgst_main()
Drsautl.c72 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local
150 keyfile = opt_arg(); in rsautl_main()
177 pkey = load_key(keyfile, keyformat, 0, passin, e, "Private Key"); in rsautl_main()
181 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "Public Key"); in rsautl_main()
185 x = load_cert(keyfile, keyformat, "Certificate"); in rsautl_main()
Dcrl.c73 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local
116 keyfile = opt_arg(); in crl_main()
223 if (!keyfile) { in crl_main()
230 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
Dpkeyutl.c23 const char *keyfile, int keyform, int key_type,
365 const char *keyfile, int keyform, int key_type, in init_ctx() argument
387 pkey = load_key(keyfile, keyform, 0, passin, e, "Private Key"); in init_ctx()
391 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "Public Key"); in init_ctx()
395 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx()
Ds_time.c99 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local
145 keyfile = opt_arg(); in s_time_main()
206 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
/third_party/glib/gio/
Dgportalsupport.c38 GKeyFile *keyfile; in read_flatpak_info() local
44 keyfile = g_key_file_new (); in read_flatpak_info()
45 if (g_key_file_load_from_file (keyfile, path, G_KEY_FILE_NONE, NULL)) in read_flatpak_info()
50 shared = g_key_file_get_string_list (keyfile, "Context", "shared", NULL, NULL); in read_flatpak_info()
57 … dconf_policy = g_key_file_get_string (keyfile, "Session Bus Policy", "ca.desrt.dconf", NULL); in read_flatpak_info()
66 g_key_file_unref (keyfile); in read_flatpak_info()
Dgio-tool-launch.c45 GKeyFile *keyfile = NULL; in handle_launch() local
95 keyfile = g_key_file_new (); in handle_launch()
96 if (!g_key_file_load_from_file (keyfile, desktop_file, G_KEY_FILE_NONE, &error)) in handle_launch()
104 app = (GAppInfo*)g_desktop_app_info_new_from_keyfile (keyfile); in handle_launch()
128 g_key_file_free (keyfile); in handle_launch()
Dgkeyfilesettingsbackend.c61 GKeyFile *keyfile; member
116 contents = g_key_file_to_data (kfsb->keyfile, &length, NULL); in g_keyfile_settings_backend_keyfile_write()
231 str = g_key_file_get_value (kfsb->keyfile, group, name, NULL); in get_from_keyfile()
293 g_key_file_set_value (kfsb->keyfile, group, name, str); in set_to_keyfile()
304 groups = g_key_file_get_groups (kfsb->keyfile, NULL); in set_to_keyfile()
308 g_key_file_remove_group (kfsb->keyfile, groups[i], NULL); in set_to_keyfile()
313 g_key_file_remove_key (kfsb->keyfile, group, name, NULL); in set_to_keyfile()
473 GKeyFile *keyfile, in keyfile_to_tree() argument
479 groups = g_key_file_get_groups (keyfile, NULL); in keyfile_to_tree()
494 keys = g_key_file_get_keys (keyfile, groups[i], NULL, NULL); in keyfile_to_tree()
[all …]
/third_party/glib/gio/tests/
Dmimeapps.c301 GKeyFile *keyfile; in test_mime_file() local
323 keyfile = g_key_file_new (); in test_mime_file()
324 g_key_file_load_from_file (keyfile, fixture->mimeapps_list_home, G_KEY_FILE_NONE, &error); in test_mime_file()
327 assoc = g_key_file_get_string_list (keyfile, "Added Associations", contenttype, NULL, &error); in test_mime_file()
333 assoc = g_key_file_get_string_list (keyfile, "Default Applications", contenttype, NULL, &error); in test_mime_file()
337 g_key_file_free (keyfile); in test_mime_file()
343 keyfile = g_key_file_new (); in test_mime_file()
344 g_key_file_load_from_file (keyfile, fixture->mimeapps_list_home, G_KEY_FILE_NONE, &error); in test_mime_file()
347 assoc = g_key_file_get_string_list (keyfile, "Added Associations", contenttype, NULL, &error); in test_mime_file()
352 assoc = g_key_file_get_string_list (keyfile, "Default Applications", contenttype, NULL, &error); in test_mime_file()
[all …]
Dgsettings.c1760 GKeyFile *keyfile; in test_keyfile() local
1792 keyfile = g_key_file_new (); in test_keyfile()
1793 g_assert_true (g_key_file_load_from_file (keyfile, store_path, 0, NULL)); in test_keyfile()
1795 str = g_key_file_get_string (keyfile, "tests", "greeting", NULL); in test_keyfile()
1799 str = g_key_file_get_string (keyfile, "tests", "farewell", NULL); in test_keyfile()
1802 g_key_file_free (keyfile); in test_keyfile()
1806 keyfile = g_key_file_new (); in test_keyfile()
1807 g_assert_true (g_key_file_load_from_file (keyfile, store_path, 0, NULL)); in test_keyfile()
1809 str = g_key_file_get_string (keyfile, "tests", "greeting", NULL); in test_keyfile()
1815 g_key_file_set_string (keyfile, "tests", "greeting", "'howdy'"); in test_keyfile()
[all …]
/third_party/python/Lib/
Dpoplib.py434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, argument
436 if context is not None and keyfile is not None:
442 if keyfile is not None or certfile is not None:
446 self.keyfile = keyfile
450 keyfile=keyfile)
460 def stls(self, keyfile=None, certfile=None, context=None): argument
Dsmtplib.py752 def starttls(self, keyfile=None, certfile=None, context=None): argument
777 if context is not None and keyfile is not None:
783 if keyfile is not None or certfile is not None:
789 keyfile=keyfile)
1031 keyfile=None, certfile=None, argument
1034 if context is not None and keyfile is not None:
1040 if keyfile is not None or certfile is not None:
1044 self.keyfile = keyfile
1048 keyfile=keyfile)
Dftplib.py719 keyfile=None, certfile=None, context=None, argument
722 if context is not None and keyfile is not None:
728 if keyfile is not None or certfile is not None:
732 self.keyfile = keyfile
737 keyfile=keyfile)
/third_party/openssl/demos/certs/
Dmkcerts.sh81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \
83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \
85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \
88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1
94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
/third_party/skia/third_party/externals/microhttpd/src/microspdy/
Ddaemon.c172 const char *keyfile, in SPDYF_start_daemon_va() argument
230 if (NULL == keyfile in SPDYF_start_daemon_va()
231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va()
364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va()
365 free(daemon->keyfile); in SPDYF_start_daemon_va()
385 free(daemon->keyfile); in SPDYF_stop_daemon()
/third_party/gstreamer/gstplugins_bad/sys/dvb/
Dparsechannels.c359 GKeyFile *keyfile; in parse_and_configure_from_v5_conf_file() local
363 keyfile = g_key_file_new (); in parse_and_configure_from_v5_conf_file()
364 if (!g_key_file_load_from_file (keyfile, filename, G_KEY_FILE_NONE, &err)) in parse_and_configure_from_v5_conf_file()
367 if (!g_key_file_has_group (keyfile, channel_name)) in parse_and_configure_from_v5_conf_file()
370 keys = g_key_file_get_keys (keyfile, channel_name, NULL, &err); in parse_and_configure_from_v5_conf_file()
384 if (!map_entry->set_func (dvbbasebin, map_entry->elem_property, keyfile, in parse_and_configure_from_v5_conf_file()
402 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
422 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
431 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
440 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
/third_party/skia/third_party/externals/swiftshader/tests/regres/llvm/
Dllvm.go92 keyfile, err := os.Open(key)
96 defer keyfile.Close()
98 if err := util.CheckPGP(bytes.NewReader(content), sigfile, keyfile); err != nil {
/third_party/ntfs-3g/ntfsprogs/
Dntfsdecrypt.c126 char *keyfile; /* .pfx file containing the user's private key. */ member
240 if (!opts.keyfile) in parse_options()
241 opts.keyfile = argv[optind - 1]; in parse_options()
282 if (!opts.keyfile) { in parse_options()
316 static int ntfs_pkcs12_load_pfxfile(const char *keyfile, u8 **pfx, in ntfs_pkcs12_load_pfxfile() argument
322 if (!keyfile || !pfx || !pfx_size) { in ntfs_pkcs12_load_pfxfile()
328 f = open(keyfile, O_RDONLY); in ntfs_pkcs12_load_pfxfile()
1563 if (ntfs_pkcs12_load_pfxfile(opts.keyfile, &pfx_buf, &pfx_size)) { in main()
/third_party/libwebsockets/scripts/client-ca/
Dcreate-server-cert.sh13 -keyfile ca.key \
Dcreate-client-cert.sh13 -keyfile ca.key \
/third_party/openssl/doc/man1/
Dspkac.pod14 [B<-key keyfile>]
49 =item B<-key keyfile>
51 Create an SPKAC file using the private key in B<keyfile>. The

1234