Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 25 of 94) sorted by relevance

1234

/third_party/node/deps/openssl/openssl/apps/
Dsmime.c146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
283 if (keyfile == NULL) in smime_main()
284 keyfile = signerfile; in smime_main()
288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
289 keyfile = NULL; in smime_main()
304 if (keyfile != NULL) { in smime_main()
318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
320 keyfile = opt_arg(); in smime_main()
385 if (keyfile && !signerfile) { in smime_main()
396 if (!keyfile) in smime_main()
[all …]
Dcms.c292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local
581 if (keyfile == NULL) in cms_main()
582 keyfile = signerfile; in cms_main()
586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
587 keyfile = NULL; in cms_main()
596 if (keyfile != NULL) { in cms_main()
609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
611 keyfile = opt_arg(); in cms_main()
638 if (keyfile != NULL || signerfile != NULL) in cms_main()
742 if (keyfile != NULL && signerfile == NULL) { in cms_main()
[all …]
Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
107 keyfile = opt_arg(); in spkac_main()
145 if (keyfile != NULL) { in spkac_main()
149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
Ddgst.c104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local
155 keyfile = opt_arg(); in dgst_main()
161 keyfile = opt_arg(); in dgst_main()
165 keyfile = opt_arg(); in dgst_main()
227 if (keyfile != NULL && argc > 1) { in dgst_main()
264 if (keyfile != NULL) in dgst_main()
274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main()
279 if (keyfile != NULL) { in dgst_main()
283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main()
285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
Drsautl.c79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local
155 keyfile = opt_arg(); in rsautl_main()
191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main()
195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main()
199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
Dcrl.c87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local
132 keyfile = opt_arg(); in crl_main()
261 if (!keyfile) { in crl_main()
268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
/third_party/openssl/apps/
Dsmime.c146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
283 if (keyfile == NULL) in smime_main()
284 keyfile = signerfile; in smime_main()
288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
289 keyfile = NULL; in smime_main()
304 if (keyfile != NULL) { in smime_main()
318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
320 keyfile = opt_arg(); in smime_main()
385 if (keyfile && !signerfile) { in smime_main()
396 if (!keyfile) in smime_main()
[all …]
Dcms.c292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local
581 if (keyfile == NULL) in cms_main()
582 keyfile = signerfile; in cms_main()
586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
587 keyfile = NULL; in cms_main()
596 if (keyfile != NULL) { in cms_main()
609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
611 keyfile = opt_arg(); in cms_main()
638 if (keyfile != NULL || signerfile != NULL) in cms_main()
742 if (keyfile != NULL && signerfile == NULL) { in cms_main()
[all …]
Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
107 keyfile = opt_arg(); in spkac_main()
145 if (keyfile != NULL) { in spkac_main()
149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
Ddgst.c104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local
155 keyfile = opt_arg(); in dgst_main()
161 keyfile = opt_arg(); in dgst_main()
165 keyfile = opt_arg(); in dgst_main()
227 if (keyfile != NULL && argc > 1) { in dgst_main()
264 if (keyfile != NULL) in dgst_main()
274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main()
279 if (keyfile != NULL) { in dgst_main()
283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main()
285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
Drsautl.c79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local
155 keyfile = opt_arg(); in rsautl_main()
191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main()
195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main()
199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
Dcrl.c87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local
132 keyfile = opt_arg(); in crl_main()
261 if (!keyfile) { in crl_main()
268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
/third_party/glib/patch/
Dbackport-gkeyfile-Ensure-we-don-t-add-extra-blank-line-above-new-group.patch15 glib/tests/keyfile.c | 10 ++++++++++
36 diff --git a/glib/tests/keyfile.c b/glib/tests/keyfile.c
38 --- a/glib/tests/keyfile.c
39 +++ b/glib/tests/keyfile.c
48 + g_key_file_set_value (keyfile, "group4", "key1", "value1\n\n# group comment");
49 + g_key_file_set_string (keyfile, "group5", "key1", "value1");
50 + comment = g_key_file_get_comment (keyfile, "group5", NULL, &error);
54 g_key_file_free (keyfile);
Dbackport-gkeyfile-Fix-group-comment-management.patch177 glib/tests/keyfile.c | 75 ++++++++++++++++++++++-
418 diff --git a/glib/tests/keyfile.c b/glib/tests/keyfile.c
420 --- a/glib/tests/keyfile.c
421 +++ b/glib/tests/keyfile.c
437 + g_key_file_remove_comment (keyfile, NULL, NULL, &error);
439 + comment = g_key_file_get_comment (keyfile, NULL, NULL, &error);
443 comment = g_key_file_get_comment (keyfile, "group1", "key2", &error);
453 + g_key_file_remove_comment (keyfile, "group2", NULL, &error);
455 + comment = g_key_file_get_comment (keyfile, "group2", NULL, &error);
459 comment = g_key_file_get_comment (keyfile, "group3", NULL, &error);
[all …]
Dbackport-gkeyfile-Skip-group-comment-when-adding-a-new-key-to-a-group.patch14 glib/tests/keyfile.c | 9 +++++++++
75 diff --git a/glib/tests/keyfile.c b/glib/tests/keyfile.c
77 --- a/glib/tests/keyfile.c
78 +++ b/glib/tests/keyfile.c
86 + g_key_file_set_string (keyfile, "group1", "key5", "value5");
87 + comment = g_key_file_get_comment (keyfile, "group2", NULL, &error);
/third_party/node/deps/npm/node_modules/npm-registry-fetch/lib/
Dauth.js77 keyfile: forceAuth.keyfile, property
102 [`${regKey}:keyfile`]: keyfile,
112 keyfile, property
117 constructor ({ token, auth, username, password, scopeAuthKey, certfile, keyfile }) { field
134 if (certfile && keyfile) {
136 const key = maybeReadFile(keyfile, 'utf-8')
/third_party/curl/tests/
Dhttp2-server.pl106 $keyfile = "$srcdir/certs/$cert.key";
108 $keyfile = abs_path($keyfile);
117 "$keyfile $certfile";
Dhttp3-server.pl106 $keyfile = "$srcdir/certs/$cert.key";
108 $keyfile = abs_path($keyfile);
117 "$keyfile $certfile";
/third_party/python/Lib/
Dpoplib.py434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, argument
436 if context is not None and keyfile is not None:
442 if keyfile is not None or certfile is not None:
446 self.keyfile = keyfile
450 keyfile=keyfile)
460 def stls(self, keyfile=None, certfile=None, context=None): argument
Dsmtplib.py752 def starttls(self, keyfile=None, certfile=None, context=None): argument
777 if context is not None and keyfile is not None:
783 if keyfile is not None or certfile is not None:
789 keyfile=keyfile)
1031 keyfile=None, certfile=None, argument
1034 if context is not None and keyfile is not None:
1040 if keyfile is not None or certfile is not None:
1044 self.keyfile = keyfile
1048 keyfile=keyfile)
/third_party/openssl/demos/certs/
Dmkcerts.sh81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \
83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \
85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \
88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1
94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
/third_party/skia/third_party/externals/microhttpd/src/microspdy/
Ddaemon.c172 const char *keyfile, in SPDYF_start_daemon_va() argument
230 if (NULL == keyfile in SPDYF_start_daemon_va()
231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va()
364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va()
365 free(daemon->keyfile); in SPDYF_start_daemon_va()
385 free(daemon->keyfile); in SPDYF_stop_daemon()
/third_party/fsverity-utils/lib/
Dsign_digest.c53 static int read_private_key(const char *keyfile, EVP_PKEY **pkey_ret) in read_private_key() argument
60 bio = BIO_new_file(keyfile, "r"); in read_private_key()
62 error_msg_openssl("can't open '%s' for reading", keyfile); in read_private_key()
70 keyfile); in read_private_key()
388 if (sig_params->keyfile) { in get_private_key()
394 if (!sig_params->keyfile) { in get_private_key()
398 return read_private_key(sig_params->keyfile, pkey_ret); in get_private_key()
/third_party/fsverity-utils/programs/
Dcmd_sign.c60 if (sig_params.keyfile != NULL) { in fsverity_cmd_sign()
64 sig_params.keyfile = optarg; in fsverity_cmd_sign()
114 sig_params.certfile = sig_params.keyfile; in fsverity_cmd_sign()
/third_party/gstreamer/gstplugins_bad/sys/dvb/
Dparsechannels.c359 GKeyFile *keyfile; in parse_and_configure_from_v5_conf_file() local
363 keyfile = g_key_file_new (); in parse_and_configure_from_v5_conf_file()
364 if (!g_key_file_load_from_file (keyfile, filename, G_KEY_FILE_NONE, &err)) in parse_and_configure_from_v5_conf_file()
367 if (!g_key_file_has_group (keyfile, channel_name)) in parse_and_configure_from_v5_conf_file()
370 keys = g_key_file_get_keys (keyfile, channel_name, NULL, &err); in parse_and_configure_from_v5_conf_file()
384 if (!map_entry->set_func (dvbbasebin, map_entry->elem_property, keyfile, in parse_and_configure_from_v5_conf_file()
402 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
422 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
431 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
440 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()

1234