/third_party/openssl/test/recipes/ |
D | 15-test_rsaoaep.t | 38 my $key_file = srctop_file("test", "testrsa2048.pem"); 62 '-inkey', $key_file, 73 '-in', $key_file, 74 '-inkey', $key_file, 84 '-inkey', $key_file, 97 '-inkey', $key_file, 108 '-inkey', $key_file, 120 '-inkey', $key_file, 132 '-inkey', $key_file, 144 '-inkey', $key_file, [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_pkparse.function | 13 void pk_parse_keyfile_rsa( char * key_file, char * password, int result ) 24 res = mbedtls_pk_parse_keyfile( &ctx, key_file, pwd, 43 void pk_parse_public_keyfile_rsa( char * key_file, int result ) 50 res = mbedtls_pk_parse_public_keyfile( &ctx, key_file ); 68 void pk_parse_public_keyfile_ec( char * key_file, int result ) 75 res = mbedtls_pk_parse_public_keyfile( &ctx, key_file ); 93 void pk_parse_keyfile_ec( char * key_file, char * password, int result ) 100 res = mbedtls_pk_parse_keyfile( &ctx, key_file, password,
|
D | test_suite_pkwrite.function | 13 void pk_write_pubkey_check( char * key_file ) 26 TEST_ASSERT( mbedtls_pk_parse_public_keyfile( &key, key_file ) == 0 ); 39 f = fopen( key_file, "r" ); 53 void pk_write_key_check( char * key_file ) 66 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL, 80 f = fopen( key_file, "r" );
|
D | test_suite_x509write.function | 79 void x509_csr_check( char * key_file, char * cert_req_check_file, int md_type, 97 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL, 147 void x509_csr_check_opaque( char *key_file, int md_type, int key_usage, 167 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL,
|
/third_party/mbedtls/programs/psa/ |
D | key_ladder_demo.c | 174 FILE *key_file = NULL; in save_key() local 179 SYS_CHECK( ( key_file = fopen( output_file_name, "wb" ) ) != NULL ); in save_key() 180 SYS_CHECK( fwrite( key_data, 1, key_size, key_file ) == key_size ); in save_key() 181 SYS_CHECK( fclose( key_file ) == 0 ); in save_key() 182 key_file = NULL; in save_key() 185 if( key_file != NULL) in save_key() 186 fclose( key_file ); in save_key() 230 FILE *key_file = NULL; in import_key_from_file() local 233 SYS_CHECK( ( key_file = fopen( key_file_name, "rb" ) ) != NULL ); in import_key_from_file() 235 key_file ) ) != 0 ); in import_key_from_file() [all …]
|
/third_party/ffmpeg/libavformat/ |
D | tls.h | 33 char *key_file; member 51 …Private key file", offsetof(pstruct, options_field . key_file), AV_OPT_TYPE_ST…
|
D | tls_gnutls.c | 166 if (c->cert_file && c->key_file) { in tls_open() 168 c->cert_file, c->key_file, in tls_open() 173 c->cert_file, c->key_file, gnutls_strerror(ret)); in tls_open() 177 } else if (c->cert_file || c->key_file) in tls_open()
|
D | tls.c | 52 if (!c->key_file && av_find_info_tag(buf, sizeof(buf), "key", p)) in set_options() 53 c->key_file = av_strdup(buf); in set_options()
|
D | tls_openssl.c | 269 if (c->key_file && !SSL_CTX_use_PrivateKey_file(p->ctx, c->key_file, SSL_FILETYPE_PEM)) { in tls_open() 271 c->key_file, ERR_error_string(ERR_get_error(), NULL)); in tls_open()
|
D | tls_libtls.c | 109 if (c->key_file && tls_config_set_key_file(cfg, c->key_file) == -1) in ff_tls_open()
|
D | hlsenc.c | 170 char key_file[LINE_BUFFER_SIZE + 1]; member 232 char key_file[LINE_BUFFER_SIZE + 1]; member 732 av_strlcpy(hls->key_file, hls->key_url, sizeof(hls->key_file)); in do_encrypt() 735 av_strlcpy(hls->key_file, hls->key_basename, sizeof(hls->key_file)); in do_encrypt() 758 if (!*hls->key_file) { in do_encrypt() 776 ret = s->io_open(s, &pb, hls->key_file, AVIO_FLAG_WRITE, &options); in do_encrypt() 808 ff_get_line(pb, vs->key_file, sizeof(vs->key_file)); in hls_encryption_start() 809 vs->key_file[strcspn(vs->key_file, "\r\n")] = '\0'; in hls_encryption_start() 821 if (!*vs->key_file) { in hls_encryption_start() 827 ret = s->io_open(s, &pb, vs->key_file, AVIO_FLAG_READ, &options); in hls_encryption_start() [all …]
|
D | tls_mbedtls.c | 199 if (shr->key_file) { in tls_open() 201 shr->key_file, in tls_open()
|
D | tls_securetransport.c | 165 if ((ret = import_pem(h, c->tls_shared.key_file, &keyArray)) < 0) in load_cert()
|
/third_party/python/Lib/test/ |
D | make_ssl_certs.py | 126 req_file, cert_file, key_file = tempnames 137 '-newkey', key, '-keyout', key_file, 165 with open(key_file, 'r') as f:
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_mail_client.c | 158 const char *key_file; /* the file with the client key */ member 426 opt.key_file = DFL_KEY_FILE; in main() 471 opt.key_file = q; in main() 554 if( strlen( opt.key_file ) ) in main() 556 ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, "", in main()
|
D | ssl_server2.c | 575 const char *key_file; /* the file with the server key */ member 731 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 750 GET_ITEM( key_file ); in sni_parse() 765 mbedtls_pk_parse_keyfile( new->key, key_file, "", rng_get, &rng ) != 0 ) in sni_parse() 1501 opt.key_file = DFL_KEY_FILE; in main() 1631 opt.key_file = q; in main() 2399 if( strlen( opt.key_file ) && strcmp( opt.key_file, "none" ) != 0 ) in main() 2402 if( ( ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, in main() 2444 strcmp( opt.key_file, "none" ) != 0 && in main()
|
D | ssl_client2.c | 460 const char *key_file; /* the file with the client key */ member 828 opt.key_file = DFL_KEY_FILE; in main() 956 opt.key_file = q; in main() 1675 if( strcmp( opt.key_file, "none" ) == 0 ) in main() 1679 if( strlen( opt.key_file ) ) in main() 1680 ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, opt.key_pwd, rng_get, &rng ); in main() 1888 strcmp( opt.key_file, "none" ) != 0 ) in main()
|
/third_party/libcoap/examples/ |
D | coap-client.c | 89 static char *key_file = NULL; /* private key in PEM, DER or PKCS11 URI */ variable 1248 if ((key_file && strncasecmp (key_file, "pkcs11:", 7) == 0) || in setup_pki() 1253 dtls_pki.pki_key.key.pkcs11.private_key = key_file ? in setup_pki() 1254 key_file : cert_file; in setup_pki() 1261 dtls_pki.pki_key.key.pem.private_key = key_file ? key_file : cert_file; in setup_pki() 1269 key_mem = read_file_mem(key_file, &key_mem_len); in setup_pki() 1460 key_file = optarg; in main()
|
D | coap-server.c | 86 static char *key_file = NULL; /* private key in PEM, DER or PKCS11 URI */ variable 1900 update_pki_key(&dtls_key, key_file, cert_file, ca_file); in verify_pki_sni_callback() 2055 update_pki_key(&dtls_pki.pki_key, key_file, cert_file, ca_file); in setup_pki() 2637 key_file = optarg; in main()
|
/third_party/nghttp2/examples/ |
D | libevent-server.c | 143 static SSL_CTX *create_ssl_ctx(const char *key_file, const char *cert_file) { in create_ssl_ctx() argument 173 if (SSL_CTX_use_PrivateKey_file(ssl_ctx, key_file, SSL_FILETYPE_PEM) != 1) { in create_ssl_ctx() 174 errx(1, "Could not read private key file %s", key_file); in create_ssl_ctx() 791 static void run(const char *service, const char *key_file, in run() argument 797 ssl_ctx = create_ssl_ctx(key_file, cert_file); in run()
|
/third_party/python/Lib/http/ |
D | client.py | 1405 def __init__(self, host, port=None, key_file=None, cert_file=None, argument 1412 if (key_file is not None or cert_file is not None or 1418 self.key_file = key_file 1434 if key_file or cert_file: 1435 context.load_cert_chain(cert_file, key_file)
|
/third_party/openssl/apps/lib/ |
D | s_cb.c | 114 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) in set_cert_stuff() argument 124 if (key_file == NULL) in set_cert_stuff() 125 key_file = cert_file; in set_cert_stuff() 126 if (SSL_CTX_use_PrivateKey_file(ctx, key_file, SSL_FILETYPE_PEM) <= 0) { in set_cert_stuff() 128 key_file); in set_cert_stuff()
|
/third_party/openssl/apps/include/ |
D | s_apps.h | 26 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
/third_party/openssl/apps/ |
D | s_client.c | 804 char *cert_file = NULL, *key_file = NULL, *chain_file = NULL; in s_client_main() local 1304 key_file = opt_arg(); in s_client_main() 1624 if (key_file == NULL) in s_client_main() 1625 key_file = cert_file; in s_client_main() 1627 if (key_file != NULL) { in s_client_main() 1628 key = load_key(key_file, key_format, 0, pass, e, in s_client_main()
|
/third_party/python/Doc/library/ |
D | http.client.rst | 68 .. class:: HTTPSConnection(host, port=None, key_file=None, \ 109 *key_file* and *cert_file* are deprecated in favor of *context*.
|