/third_party/python/Lib/ |
H A D | ssl.py | 785 certfile=None, keyfile=None, 817 if keyfile and not certfile: 819 if certfile or keyfile: 820 context.load_cert_chain(certfile, keyfile) 1451 def wrap_socket(sock, keyfile=None, certfile=None, 1465 if keyfile and not certfile: 1472 context.load_cert_chain(certfile, keyfile)
|
H A D | imaplib.py | 1288 Instantiate with: IMAP4_SSL([host[, port[, keyfile[, certfile[, ssl_context[, timeout=None]]]]]]) 1292 keyfile - PEM formatted file that contains your private key (default: None); 1296 Note: if ssl_context is provided, then parameters keyfile or 1305 def __init__(self, host='', port=IMAP4_SSL_PORT, keyfile=None, 1307 if ssl_context is not None and keyfile is not None: 1308 raise ValueError("ssl_context and keyfile arguments are mutually " 1313 if keyfile is not None or certfile is not None: 1315 warnings.warn("keyfile and certfile are deprecated, use a " 1317 self.keyfile = keyfile [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 169 keyfile = opt_arg(); in s_time_main() 259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
H A D | req.c | 251 char *outfile = NULL, *keyfile = NULL, *digest = NULL; in req_main() local 305 keyfile = opt_arg(); in req_main() 629 if (keyfile != NULL) { in req_main() 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 694 if (keyout == NULL && keyfile == NULL) { in req_main() 700 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main()
|
H A D | ocsp.c | 248 char *signfile = NULL, *keyfile = NULL; in ocsp_main() local 419 keyfile = opt_arg(); in ocsp_main() 688 if (keyfile == NULL) in ocsp_main() 689 keyfile = signfile; in ocsp_main() 700 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
|
H A D | ca.c | 214 {"keyfile", OPT_KEYFILE, 's', "The CA private key"}, 276 char *dgst = NULL, *policy = NULL, *keyfile = NULL; in ca_main() local 373 keyfile = opt_arg(); in ca_main() 581 if (keyfile == NULL in ca_main() 582 && (keyfile = lookup_conf(conf, section, ENV_PRIVATE_KEY)) == NULL) in ca_main() 592 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main()
|
/third_party/openssl/apps/ |
H A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 169 keyfile = opt_arg(); in s_time_main() 259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
H A D | req.c | 251 char *outfile = NULL, *keyfile = NULL, *digest = NULL; in req_main() local 305 keyfile = opt_arg(); in req_main() 629 if (keyfile != NULL) { in req_main() 630 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 692 if (keyout == NULL && keyfile == NULL) { in req_main() 698 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main()
|
H A D | ocsp.c | 248 char *signfile = NULL, *keyfile = NULL; in ocsp_main() local 419 keyfile = opt_arg(); in ocsp_main() 688 if (keyfile == NULL) in ocsp_main() 689 keyfile = signfile; in ocsp_main() 700 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
|
H A D | ca.c | 214 {"keyfile", OPT_KEYFILE, 's', "The CA private key"}, 276 char *dgst = NULL, *policy = NULL, *keyfile = NULL; in ca_main() local 373 keyfile = opt_arg(); in ca_main() 581 if (keyfile == NULL in ca_main() 582 && (keyfile = lookup_conf(conf, section, ENV_PRIVATE_KEY)) == NULL) in ca_main() 592 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main()
|
/third_party/fsverity-utils/include/ |
H A D | libfsverity.h | 88 * set @keyfile. Alternatively, to specify the private key by PKCS#11 token, 96 /** @keyfile: the path to the key file in PEM format, when applicable */ 97 const char *keyfile; member
|
/third_party/skia/third_party/externals/microhttpd/src/microspdy/ |
H A D | io_openssl.c | 108 if(1 != SSL_CTX_use_PrivateKey_file(daemon->io_context, daemon->keyfile, SSL_FILETYPE_PEM)) in SPDYF_openssl_init()
|
H A D | applicationlayer.c | 327 const char *keyfile, in SPDY_start_daemon() 350 if(NULL == keyfile) in SPDY_start_daemon() 352 SPDYF_DEBUG("keyfile is NULL"); in SPDY_start_daemon() 360 keyfile, in SPDY_start_daemon() 325 SPDY_start_daemon(uint16_t port, const char *certfile, const char *keyfile, SPDY_NewSessionCallback nscb, SPDY_SessionClosedCallback sccb, SPDY_NewRequestCallback nrcb, SPDY_NewDataCallback npdcb, void * cls, ...) SPDY_start_daemon() argument
|
H A D | structures.h | 897 char *keyfile; member
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | s_cb.c | 862 const char *keyfile; member 1026 if (exc->keyfile != NULL) { in load_excert() 1027 exc->key = load_key(exc->keyfile, exc->keyform, in load_excert() 1074 if (exc->keyfile != NULL) { in args_excert() 1078 exc->keyfile = opt_arg(); in args_excert()
|
/third_party/openssl/apps/lib/ |
H A D | s_cb.c | 862 const char *keyfile; member 1026 if (exc->keyfile != NULL) { in load_excert() 1027 exc->key = load_key(exc->keyfile, exc->keyform, in load_excert() 1074 if (exc->keyfile != NULL) { in args_excert() 1078 exc->keyfile = opt_arg(); in args_excert()
|
/third_party/python/Modules/clinic/ |
H A D | _ssl.c.h | 519 "load_cert_chain($self, /, certfile, keyfile=None, password=None)\n" 528 PyObject *keyfile, PyObject *password); 534 static const char * const _keywords[] = {"certfile", "keyfile", "password", NULL}; in _ssl__SSLContext_load_cert_chain() 539 PyObject *keyfile = Py_None; in _ssl__SSLContext_load_cert_chain() local 551 keyfile = args[1]; in _ssl__SSLContext_load_cert_chain() 558 return_value = _ssl__SSLContext_load_cert_chain_impl(self, certfile, keyfile, password); in _ssl__SSLContext_load_cert_chain()
|
/third_party/nghttp2/src/ |
H A D | nghttp.h | 69 std::string keyfile; member
|
H A D | nghttp.cc | 2333 if (!config.keyfile.empty()) { in communicate() 2334 if (SSL_CTX_use_PrivateKey_file(ssl_ctx, config.keyfile.c_str(), in communicate() 2999 config.keyfile = optarg; in main()
|
/third_party/python/Lib/test/ |
H A D | test_poplib.py | 429 self.server.port, keyfile=CERTFILE, context=ctx) 433 self.server.port, keyfile=CERTFILE,
|
H A D | test_ssl.py | 285 ciphers=None, certfile=None, keyfile=None, 298 if certfile is not None or keyfile is not None: 299 context.load_cert_chain(certfile, keyfile) 650 ssl.wrap_socket, sock, keyfile=CERTFILE) 667 certfile=CERTFILE, keyfile=NONEXISTINGCERT) 672 certfile=NONEXISTINGCERT, keyfile=NONEXISTINGCERT) 1376 ctx.load_cert_chain(CERTFILE, keyfile=None) 1377 ctx.load_cert_chain(CERTFILE, keyfile=CERTFILE) 1378 self.assertRaises(TypeError, ctx.load_cert_chain, keyfile=CERTFILE) 1389 ctx.load_cert_chain(certfile=ONLYCERT, keyfile [all...] |
/third_party/skia/third_party/externals/microhttpd/src/include/ |
H A D | microspdy.h | 867 * @param keyfile path to the keyfile for the certificate
882 const char *keyfile,
|
/third_party/python/Lib/test/test_asyncio/ |
H A D | test_events.py | 942 def _create_ssl_context(self, certfile, keyfile=None): 945 sslcontext.load_cert_chain(certfile, keyfile) 948 def _make_ssl_server(self, factory, certfile, keyfile=None): 949 sslcontext = self._create_ssl_context(certfile, keyfile) 959 def _make_ssl_unix_server(self, factory, certfile, keyfile=None): 960 sslcontext = self._create_ssl_context(certfile, keyfile)
|
H A D | test_ssl.py | 150 def _create_server_ssl_context(self, certfile, keyfile=None): 153 sslcontext.load_cert_chain(certfile, keyfile)
|
/third_party/python/Modules/ |
H A D | _ssl.c | 3842 keyfile: object = None 3849 PyObject *keyfile, PyObject *password) in _ssl__SSLContext_load_cert_chain_impl() 3860 if (keyfile == Py_None) in _ssl__SSLContext_load_cert_chain_impl() 3861 keyfile = NULL; in _ssl__SSLContext_load_cert_chain_impl() 3869 if (keyfile && !PyUnicode_FSConverter(keyfile, &keyfile_bytes)) { in _ssl__SSLContext_load_cert_chain_impl() 3872 "keyfile should be a valid filesystem path"); in _ssl__SSLContext_load_cert_chain_impl() 3906 PyBytes_AS_STRING(keyfile ? keyfile_bytes : certfile_bytes), in _ssl__SSLContext_load_cert_chain_impl() 3848 _ssl__SSLContext_load_cert_chain_impl(PySSLContext *self, PyObject *certfile, PyObject *keyfile, PyObject *password) _ssl__SSLContext_load_cert_chain_impl() argument
|