/third_party/glib/patch/ |
D | backport-gkeyfile-Fix-group-comment-management.patch | 20 g_key_file_init (GKeyFile *key_file) 22 - key_file->current_group = g_slice_new0 (GKeyFileGroup); 23 + key_file->current_group = g_new0 (GKeyFileGroup, 1); 24 key_file->groups = g_list_prepend (NULL, key_file->current_group); 25 key_file->group_hash = NULL; 26 key_file->start_group = NULL; 29 GKeyFile *key_file; 31 - key_file = g_slice_new0 (GKeyFile); 32 + key_file = g_new0 (GKeyFile, 1); 33 key_file->ref_count = 1; [all …]
|
D | backport-gkeyfile-Skip-group-comment-when-adding-a-new-key-to-a-group.patch | 23 static void g_key_file_add_key_value_pair (GKeyFile *key_file, 28 static void g_key_file_add_key (GKeyFile *key_file, 31 @@ -1447,7 +1448,8 @@ g_key_file_parse_key_value_pair (GKeyFile *key_file, 35 - g_key_file_add_key_value_pair (key_file, key_file->current_group, pair); 36 + g_key_file_add_key_value_pair (key_file, key_file->current_group, pair, 37 + key_file->current_group->key_value_pairs); 41 @@ -4034,10 +4036,11 @@ g_key_file_remove_group (GKeyFile *key_file, 43 g_key_file_add_key_value_pair (GKeyFile *key_file, 55 @@ -4047,12 +4050,18 @@ g_key_file_add_key (GKeyFile *key_file, 65 - g_key_file_add_key_value_pair (key_file, group, pair); [all …]
|
D | backport-gkeyfile-Ensure-we-don-t-add-extra-blank-line-above-new-group.patch | 22 @@ -3858,8 +3858,12 @@ g_key_file_add_group (GKeyFile *key_file, 25 GKeyFileGroup *next_group = key_file->groups->next->data;
|
/third_party/openssl/test/recipes/ |
D | 15-test_rsaoaep.t | 38 my $key_file = srctop_file("test", "testrsa2048.pem"); 62 '-inkey', $key_file, 73 '-in', $key_file, 74 '-inkey', $key_file, 84 '-inkey', $key_file, 97 '-inkey', $key_file, 108 '-inkey', $key_file, 120 '-inkey', $key_file, 132 '-inkey', $key_file, 144 '-inkey', $key_file, [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_pkparse.function | 15 void pk_parse_keyfile_rsa(char *key_file, char *password, int result) 28 res = mbedtls_pk_parse_keyfile(&ctx, key_file, pwd, 47 void pk_parse_public_keyfile_rsa(char *key_file, int result) 55 res = mbedtls_pk_parse_public_keyfile(&ctx, key_file); 73 void pk_parse_public_keyfile_ec(char *key_file, int result) 80 res = mbedtls_pk_parse_public_keyfile(&ctx, key_file); 97 void pk_parse_keyfile_ec(char *key_file, char *password, int result) 104 res = mbedtls_pk_parse_keyfile(&ctx, key_file, password,
|
D | test_suite_pkwrite.function | 13 void pk_write_pubkey_check(char *key_file) 26 TEST_ASSERT(mbedtls_pk_parse_public_keyfile(&key, key_file) == 0); 38 f = fopen(key_file, "r"); 52 void pk_write_key_check(char *key_file) 65 TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL, 78 f = fopen(key_file, "r");
|
D | test_suite_x509write.function | 138 void x509_csr_check(char *key_file, char *cert_req_check_file, int md_type, 184 TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL, 257 void x509_csr_check_opaque(char *key_file, int md_type, int key_usage, 280 TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL,
|
/third_party/mbedtls/programs/psa/ |
D | key_ladder_demo.c | 173 FILE *key_file = NULL; in save_key() local 178 SYS_CHECK((key_file = fopen(output_file_name, "wb")) != NULL); in save_key() 180 mbedtls_setbuf(key_file, NULL); in save_key() 181 SYS_CHECK(fwrite(key_data, 1, key_size, key_file) == key_size); in save_key() 182 SYS_CHECK(fclose(key_file) == 0); in save_key() 183 key_file = NULL; in save_key() 186 if (key_file != NULL) { in save_key() 187 fclose(key_file); in save_key() 232 FILE *key_file = NULL; in import_key_from_file() local 235 SYS_CHECK((key_file = fopen(key_file_name, "rb")) != NULL); in import_key_from_file() [all …]
|
/third_party/ffmpeg/libavformat/ |
D | tls.h | 33 char *key_file; member 51 …Private key file", offsetof(pstruct, options_field . key_file), AV_OPT_TYPE_ST…
|
D | tls_gnutls.c | 166 if (c->cert_file && c->key_file) { in tls_open() 168 c->cert_file, c->key_file, in tls_open() 173 c->cert_file, c->key_file, gnutls_strerror(ret)); in tls_open() 177 } else if (c->cert_file || c->key_file) in tls_open()
|
D | tls.c | 52 if (!c->key_file && av_find_info_tag(buf, sizeof(buf), "key", p)) in set_options() 53 c->key_file = av_strdup(buf); in set_options()
|
D | tls_openssl.c | 269 if (c->key_file && !SSL_CTX_use_PrivateKey_file(p->ctx, c->key_file, SSL_FILETYPE_PEM)) { in tls_open() 271 c->key_file, ERR_error_string(ERR_get_error(), NULL)); in tls_open()
|
D | tls_libtls.c | 109 if (c->key_file && tls_config_set_key_file(cfg, c->key_file) == -1) in ff_tls_open()
|
D | hlsenc.c | 170 char key_file[LINE_BUFFER_SIZE + 1]; member 232 char key_file[LINE_BUFFER_SIZE + 1]; member 732 av_strlcpy(hls->key_file, hls->key_url, sizeof(hls->key_file)); in do_encrypt() 735 av_strlcpy(hls->key_file, hls->key_basename, sizeof(hls->key_file)); in do_encrypt() 758 if (!*hls->key_file) { in do_encrypt() 776 ret = s->io_open(s, &pb, hls->key_file, AVIO_FLAG_WRITE, &options); in do_encrypt() 808 ff_get_line(pb, vs->key_file, sizeof(vs->key_file)); in hls_encryption_start() 809 vs->key_file[strcspn(vs->key_file, "\r\n")] = '\0'; in hls_encryption_start() 821 if (!*vs->key_file) { in hls_encryption_start() 827 ret = s->io_open(s, &pb, vs->key_file, AVIO_FLAG_READ, &options); in hls_encryption_start() [all …]
|
D | tls_mbedtls.c | 199 if (shr->key_file) { in tls_open() 201 shr->key_file, in tls_open()
|
/third_party/python/Lib/test/ |
D | make_ssl_certs.py | 126 req_file, cert_file, key_file = tempnames 137 '-newkey', key, '-keyout', key_file, 165 with open(key_file, 'r') as f:
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_mail_client.c | 147 const char *key_file; /* the file with the client key */ member 397 opt.key_file = DFL_KEY_FILE; in main() 439 opt.key_file = q; in main() 519 if (strlen(opt.key_file)) { in main() 520 ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, "", in main()
|
D | ssl_client2.c | 490 const char *key_file; /* the file with the client key */ member 913 opt.key_file = DFL_KEY_FILE; in main() 1050 opt.key_file = q; in main() 1723 if (strcmp(opt.key_file, "none") == 0) { in main() 1727 if (strlen(opt.key_file)) { in main() 1728 ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, opt.key_pwd, rng_get, &rng); in main() 1763 strlen(opt.key_file) || strlen(opt.key_opaque_alg1) ? in main() 1940 strcmp(opt.key_file, "none") != 0) { in main()
|
/third_party/nghttp2/examples/ |
D | libevent-server.c | 143 static SSL_CTX *create_ssl_ctx(const char *key_file, const char *cert_file) { in create_ssl_ctx() argument 173 if (SSL_CTX_use_PrivateKey_file(ssl_ctx, key_file, SSL_FILETYPE_PEM) != 1) { in create_ssl_ctx() 174 errx(1, "Could not read private key file %s", key_file); in create_ssl_ctx() 791 static void run(const char *service, const char *key_file, in run() argument 797 ssl_ctx = create_ssl_ctx(key_file, cert_file); in run()
|
/third_party/libcoap/examples/ |
D | coap-client.c | 106 static char *key_file = NULL; /* private key in PEM, DER or PKCS11 URI */ variable 1373 if ((key_file && strncasecmp(key_file, "pkcs11:", 7) == 0) || in setup_pki() 1378 dtls_pki.pki_key.key.pkcs11.private_key = key_file ? in setup_pki() 1379 key_file : cert_file; in setup_pki() 1385 dtls_pki.pki_key.key.pem.private_key = key_file ? key_file : cert_file; in setup_pki() 1392 key_mem = read_file_mem(key_file, &key_mem_len); in setup_pki() 1643 key_file = optarg; in main()
|
/third_party/curl/lib/vtls/ |
D | openssl.h | 53 const char *cert_type, char *key_file,
|
/third_party/json/tools/serve_header/ |
D | serve_header.yml.example | 11 # key_file: localhost-key.pem
|
/third_party/python/Lib/http/ |
D | client.py | 1405 def __init__(self, host, port=None, key_file=None, cert_file=None, argument 1412 if (key_file is not None or cert_file is not None or 1418 self.key_file = key_file 1434 if key_file or cert_file: 1435 context.load_cert_chain(cert_file, key_file)
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
D | s_cb.c | 114 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) in set_cert_stuff() argument 124 if (key_file == NULL) in set_cert_stuff() 125 key_file = cert_file; in set_cert_stuff() 126 if (SSL_CTX_use_PrivateKey_file(ctx, key_file, SSL_FILETYPE_PEM) <= 0) { in set_cert_stuff() 128 key_file); in set_cert_stuff()
|
/third_party/openssl/apps/lib/ |
D | s_cb.c | 114 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) in set_cert_stuff() argument 124 if (key_file == NULL) in set_cert_stuff() 125 key_file = cert_file; in set_cert_stuff() 126 if (SSL_CTX_use_PrivateKey_file(ctx, key_file, SSL_FILETYPE_PEM) <= 0) { in set_cert_stuff() 128 key_file); in set_cert_stuff()
|