/third_party/node/deps/openssl/openssl/apps/ |
D | smime.c | 146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 283 if (keyfile == NULL) in smime_main() 284 keyfile = signerfile; in smime_main() 288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 289 keyfile = NULL; in smime_main() 304 if (keyfile != NULL) { in smime_main() 318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 320 keyfile = opt_arg(); in smime_main() 385 if (keyfile && !signerfile) { in smime_main() 396 if (!keyfile) in smime_main() [all …]
|
D | cms.c | 292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local 581 if (keyfile == NULL) in cms_main() 582 keyfile = signerfile; in cms_main() 586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 587 keyfile = NULL; in cms_main() 596 if (keyfile != NULL) { in cms_main() 609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 611 keyfile = opt_arg(); in cms_main() 638 if (keyfile != NULL || signerfile != NULL) in cms_main() 742 if (keyfile != NULL && signerfile == NULL) { in cms_main() [all …]
|
D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 107 keyfile = opt_arg(); in spkac_main() 145 if (keyfile != NULL) { in spkac_main() 149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
D | dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 155 keyfile = opt_arg(); in dgst_main() 161 keyfile = opt_arg(); in dgst_main() 165 keyfile = opt_arg(); in dgst_main() 227 if (keyfile != NULL && argc > 1) { in dgst_main() 264 if (keyfile != NULL) in dgst_main() 274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 279 if (keyfile != NULL) { in dgst_main() 283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
|
D | rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 155 keyfile = opt_arg(); in rsautl_main() 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main() 199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
D | crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 132 keyfile = opt_arg(); in crl_main() 261 if (!keyfile) { in crl_main() 268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
/third_party/openssl/apps/ |
D | smime.c | 146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 283 if (keyfile == NULL) in smime_main() 284 keyfile = signerfile; in smime_main() 288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 289 keyfile = NULL; in smime_main() 304 if (keyfile != NULL) { in smime_main() 318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 320 keyfile = opt_arg(); in smime_main() 385 if (keyfile && !signerfile) { in smime_main() 396 if (!keyfile) in smime_main() [all …]
|
D | cms.c | 292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local 581 if (keyfile == NULL) in cms_main() 582 keyfile = signerfile; in cms_main() 586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 587 keyfile = NULL; in cms_main() 596 if (keyfile != NULL) { in cms_main() 609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 611 keyfile = opt_arg(); in cms_main() 638 if (keyfile != NULL || signerfile != NULL) in cms_main() 742 if (keyfile != NULL && signerfile == NULL) { in cms_main() [all …]
|
D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 107 keyfile = opt_arg(); in spkac_main() 145 if (keyfile != NULL) { in spkac_main() 149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
D | dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 155 keyfile = opt_arg(); in dgst_main() 161 keyfile = opt_arg(); in dgst_main() 165 keyfile = opt_arg(); in dgst_main() 227 if (keyfile != NULL && argc > 1) { in dgst_main() 264 if (keyfile != NULL) in dgst_main() 274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 279 if (keyfile != NULL) { in dgst_main() 283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
|
D | rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 155 keyfile = opt_arg(); in rsautl_main() 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main() 199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
D | crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 132 keyfile = opt_arg(); in crl_main() 261 if (!keyfile) { in crl_main() 268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
/third_party/glib/patch/ |
D | backport-gkeyfile-Ensure-we-don-t-add-extra-blank-line-above-new-group.patch | 15 glib/tests/keyfile.c | 10 ++++++++++ 36 diff --git a/glib/tests/keyfile.c b/glib/tests/keyfile.c 38 --- a/glib/tests/keyfile.c 39 +++ b/glib/tests/keyfile.c 48 + g_key_file_set_value (keyfile, "group4", "key1", "value1\n\n# group comment"); 49 + g_key_file_set_string (keyfile, "group5", "key1", "value1"); 50 + comment = g_key_file_get_comment (keyfile, "group5", NULL, &error); 54 g_key_file_free (keyfile);
|
D | backport-gkeyfile-Fix-group-comment-management.patch | 177 glib/tests/keyfile.c | 75 ++++++++++++++++++++++- 418 diff --git a/glib/tests/keyfile.c b/glib/tests/keyfile.c 420 --- a/glib/tests/keyfile.c 421 +++ b/glib/tests/keyfile.c 437 + g_key_file_remove_comment (keyfile, NULL, NULL, &error); 439 + comment = g_key_file_get_comment (keyfile, NULL, NULL, &error); 443 comment = g_key_file_get_comment (keyfile, "group1", "key2", &error); 453 + g_key_file_remove_comment (keyfile, "group2", NULL, &error); 455 + comment = g_key_file_get_comment (keyfile, "group2", NULL, &error); 459 comment = g_key_file_get_comment (keyfile, "group3", NULL, &error); [all …]
|
D | backport-gkeyfile-Skip-group-comment-when-adding-a-new-key-to-a-group.patch | 14 glib/tests/keyfile.c | 9 +++++++++ 75 diff --git a/glib/tests/keyfile.c b/glib/tests/keyfile.c 77 --- a/glib/tests/keyfile.c 78 +++ b/glib/tests/keyfile.c 86 + g_key_file_set_string (keyfile, "group1", "key5", "value5"); 87 + comment = g_key_file_get_comment (keyfile, "group2", NULL, &error);
|
/third_party/node/deps/npm/node_modules/npm-registry-fetch/lib/ |
D | auth.js | 77 keyfile: forceAuth.keyfile, property 102 [`${regKey}:keyfile`]: keyfile, 112 keyfile, property 117 constructor ({ token, auth, username, password, scopeAuthKey, certfile, keyfile }) { field 134 if (certfile && keyfile) { 136 const key = maybeReadFile(keyfile, 'utf-8')
|
/third_party/curl/tests/ |
D | http2-server.pl | 106 $keyfile = "$srcdir/certs/$cert.key"; 108 $keyfile = abs_path($keyfile); 117 "$keyfile $certfile";
|
D | http3-server.pl | 106 $keyfile = "$srcdir/certs/$cert.key"; 108 $keyfile = abs_path($keyfile); 117 "$keyfile $certfile";
|
/third_party/python/Lib/ |
D | poplib.py | 434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, argument 436 if context is not None and keyfile is not None: 442 if keyfile is not None or certfile is not None: 446 self.keyfile = keyfile 450 keyfile=keyfile) 460 def stls(self, keyfile=None, certfile=None, context=None): argument
|
D | smtplib.py | 752 def starttls(self, keyfile=None, certfile=None, context=None): argument 777 if context is not None and keyfile is not None: 783 if keyfile is not None or certfile is not None: 789 keyfile=keyfile) 1031 keyfile=None, certfile=None, argument 1034 if context is not None and keyfile is not None: 1040 if keyfile is not None or certfile is not None: 1044 self.keyfile = keyfile 1048 keyfile=keyfile)
|
/third_party/openssl/demos/certs/ |
D | mkcerts.sh | 81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \ 83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \ 85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \ 88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
|
/third_party/skia/third_party/externals/microhttpd/src/microspdy/ |
D | daemon.c | 172 const char *keyfile, in SPDYF_start_daemon_va() argument 230 if (NULL == keyfile in SPDYF_start_daemon_va() 231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va() 364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va() 365 free(daemon->keyfile); in SPDYF_start_daemon_va() 385 free(daemon->keyfile); in SPDYF_stop_daemon()
|
/third_party/fsverity-utils/lib/ |
D | sign_digest.c | 53 static int read_private_key(const char *keyfile, EVP_PKEY **pkey_ret) in read_private_key() argument 60 bio = BIO_new_file(keyfile, "r"); in read_private_key() 62 error_msg_openssl("can't open '%s' for reading", keyfile); in read_private_key() 70 keyfile); in read_private_key() 388 if (sig_params->keyfile) { in get_private_key() 394 if (!sig_params->keyfile) { in get_private_key() 398 return read_private_key(sig_params->keyfile, pkey_ret); in get_private_key()
|
/third_party/fsverity-utils/programs/ |
D | cmd_sign.c | 60 if (sig_params.keyfile != NULL) { in fsverity_cmd_sign() 64 sig_params.keyfile = optarg; in fsverity_cmd_sign() 114 sig_params.certfile = sig_params.keyfile; in fsverity_cmd_sign()
|
/third_party/gstreamer/gstplugins_bad/sys/dvb/ |
D | parsechannels.c | 359 GKeyFile *keyfile; in parse_and_configure_from_v5_conf_file() local 363 keyfile = g_key_file_new (); in parse_and_configure_from_v5_conf_file() 364 if (!g_key_file_load_from_file (keyfile, filename, G_KEY_FILE_NONE, &err)) in parse_and_configure_from_v5_conf_file() 367 if (!g_key_file_has_group (keyfile, channel_name)) in parse_and_configure_from_v5_conf_file() 370 keys = g_key_file_get_keys (keyfile, channel_name, NULL, &err); in parse_and_configure_from_v5_conf_file() 384 if (!map_entry->set_func (dvbbasebin, map_entry->elem_property, keyfile, in parse_and_configure_from_v5_conf_file() 402 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file() 422 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file() 431 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file() 440 g_key_file_unref (keyfile); in parse_and_configure_from_v5_conf_file()
|