/third_party/node/deps/openssl/openssl/apps/ |
H A D | smime.c | 146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 283 if (keyfile == NULL) in smime_main() 284 keyfile = signerfile; in smime_main() 288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 289 keyfile = NULL; in smime_main() 304 if (keyfile != NULL) { in smime_main() 318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 320 keyfile = opt_arg(); in smime_main() 385 if (keyfile && !signerfile) { in smime_main() 396 if (!keyfile) in smime_main() [all...] |
H A D | cms.c | 292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local 581 if (keyfile == NULL) in cms_main() 582 keyfile = signerfile; in cms_main() 586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 587 keyfile = NULL; in cms_main() 596 if (keyfile != NULL) { in cms_main() 609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 611 keyfile = opt_arg(); in cms_main() 639 if (keyfile != NULL || signerfile != NULL) in cms_main() 743 if (keyfile ! in cms_main() [all...] |
H A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 107 keyfile = opt_arg(); in spkac_main() 145 if (keyfile != NULL) { in spkac_main() 149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
H A D | rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 155 keyfile = opt_arg(); in rsautl_main() 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main() 199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
H A D | dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 155 keyfile = opt_arg(); in dgst_main() 161 keyfile = opt_arg(); in dgst_main() 165 keyfile = opt_arg(); in dgst_main() 227 if (keyfile != NULL && argc > 1) { in dgst_main() 264 if (keyfile != NULL) in dgst_main() 274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 279 if (keyfile != NULL) { in dgst_main() 283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 285 sigkey = load_key(keyfile, keyfor in dgst_main() [all...] |
H A D | crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 132 keyfile = opt_arg(); in crl_main() 261 if (!keyfile) { in crl_main() 268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
H A D | pkeyutl.c | 24 const char *keyfile, int keyform, int key_type, 524 const char *keyfile, int keyform, int key_type, in init_ctx() 549 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx() 553 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in init_ctx() 557 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx() 523 init_ctx(const char *kdfalg, int *pkeysize, const char *keyfile, int keyform, int key_type, char *passinarg, int pkey_op, ENGINE *e, const int engine_impl, int rawin, EVP_PKEY **ppkey, EVP_MD_CTX *mctx, const char *digestname, OSSL_LIB_CTX *libctx, const char *propq) init_ctx() argument
|
/third_party/openssl/apps/ |
H A D | smime.c | 146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 283 if (keyfile == NULL) in smime_main() 284 keyfile = signerfile; in smime_main() 288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 289 keyfile = NULL; in smime_main() 304 if (keyfile != NULL) { in smime_main() 318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main() 320 keyfile = opt_arg(); in smime_main() 385 if (keyfile && !signerfile) { in smime_main() 396 if (!keyfile) in smime_main() [all...] |
H A D | cms.c | 292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local 581 if (keyfile == NULL) in cms_main() 582 keyfile = signerfile; in cms_main() 586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 587 keyfile = NULL; in cms_main() 596 if (keyfile != NULL) { in cms_main() 609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main() 611 keyfile = opt_arg(); in cms_main() 638 if (keyfile != NULL || signerfile != NULL) in cms_main() 742 if (keyfile ! in cms_main() [all...] |
H A D | rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 155 keyfile = opt_arg(); in rsautl_main() 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main() 199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
H A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 107 keyfile = opt_arg(); in spkac_main() 145 if (keyfile != NULL) { in spkac_main() 149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
H A D | dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 155 keyfile = opt_arg(); in dgst_main() 161 keyfile = opt_arg(); in dgst_main() 165 keyfile = opt_arg(); in dgst_main() 227 if (keyfile != NULL && argc > 1) { in dgst_main() 264 if (keyfile != NULL) in dgst_main() 274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 279 if (keyfile != NULL) { in dgst_main() 283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 285 sigkey = load_key(keyfile, keyfor in dgst_main() [all...] |
H A D | crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 132 keyfile = opt_arg(); in crl_main() 261 if (!keyfile) { in crl_main() 268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
H A D | pkeyutl.c | 24 const char *keyfile, int keyform, int key_type, 524 const char *keyfile, int keyform, int key_type, in init_ctx() 549 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx() 553 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in init_ctx() 557 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx() 523 init_ctx(const char *kdfalg, int *pkeysize, const char *keyfile, int keyform, int key_type, char *passinarg, int pkey_op, ENGINE *e, const int engine_impl, int rawin, EVP_PKEY **ppkey, EVP_MD_CTX *mctx, const char *digestname, OSSL_LIB_CTX *libctx, const char *propq) init_ctx() argument
|
/third_party/python/Lib/ |
H A D | poplib.py | 422 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None, 427 keyfile - PEM formatted file that contains your private key 434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, 436 if context is not None and keyfile is not None: 437 raise ValueError("context and keyfile arguments are mutually " 442 if keyfile is not None or certfile is not None: 444 warnings.warn("keyfile and certfile are deprecated, use a " 446 self.keyfile = keyfile 450 keyfile [all...] |
H A D | smtplib.py | 752 def starttls(self, keyfile=None, certfile=None, context=None): 759 session. If you provide the keyfile and certfile parameters, 777 if context is not None and keyfile is not None: 778 raise ValueError("context and keyfile arguments are mutually " 783 if keyfile is not None or certfile is not None: 785 warnings.warn("keyfile and certfile are deprecated, use a " 789 keyfile=keyfile) 1020 as they do in the SMTP class. keyfile and certfile are also optional - 1023 SSLContext, and is an alternative to keyfile an [all...] |
H A D | ftplib.py | 719 keyfile=None, certfile=None, context=None, 722 if context is not None and keyfile is not None: 723 raise ValueError("context and keyfile arguments are mutually " 728 if keyfile is not None or certfile is not None: 730 warnings.warn("keyfile and certfile are deprecated, use a " 732 self.keyfile = keyfile 737 keyfile=keyfile)
|
/third_party/skia/third_party/externals/microhttpd/src/microspdy/ |
H A D | daemon.c | 172 const char *keyfile, in SPDYF_start_daemon_va() 230 if (NULL == keyfile in SPDYF_start_daemon_va() 231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va() 233 SPDYF_DEBUG("strdup (keyfile)"); in SPDYF_start_daemon_va() 364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va() 365 free(daemon->keyfile); in SPDYF_start_daemon_va() 385 free(daemon->keyfile); in SPDYF_stop_daemon() 170 SPDYF_start_daemon_va(uint16_t port, const char *certfile, const char *keyfile, SPDY_NewSessionCallback nscb, SPDY_SessionClosedCallback sccb, SPDY_NewRequestCallback nrcb, SPDY_NewDataCallback npdcb, SPDYF_NewStreamCallback fnscb, SPDYF_NewDataCallback fndcb, void * cls, void * fcls, va_list valist) SPDYF_start_daemon_va() argument
|
H A D | daemon.h | 42 * @param keyfile path to the keyfile for the certificate 63 const char *keyfile,
|
/third_party/fsverity-utils/programs/ |
H A D | cmd_sign.c | 60 if (sig_params.keyfile != NULL) { in fsverity_cmd_sign() 64 sig_params.keyfile = optarg; in fsverity_cmd_sign() 114 sig_params.certfile = sig_params.keyfile; in fsverity_cmd_sign()
|
H A D | test_sign_digest.c | 22 .keyfile = "testdata/key.pem", in main()
|
/third_party/fsverity-utils/lib/ |
H A D | sign_digest.c | 53 static int read_private_key(const char *keyfile, EVP_PKEY **pkey_ret) in read_private_key() argument 60 bio = BIO_new_file(keyfile, "r"); in read_private_key() 62 error_msg_openssl("can't open '%s' for reading", keyfile); in read_private_key() 70 keyfile); in read_private_key() 388 if (sig_params->keyfile) { in get_private_key() 394 if (!sig_params->keyfile) { in get_private_key() 398 return read_private_key(sig_params->keyfile, pkey_ret); in get_private_key()
|
/third_party/skia/third_party/externals/swiftshader/tests/regres/llvm/ |
H A D | llvm.go | 92 keyfile, err := os.Open(key) 96 defer keyfile.Close() 98 if err := util.CheckPGP(bytes.NewReader(content), sigfile, keyfile); err != nil {
|
/third_party/ntfs-3g/ntfsprogs/ |
H A D | ntfsdecrypt.c | 126 char *keyfile; /* .pfx file containing the user's private key. */ member 173 " -k --keyfile name.pfx Use file name as the user's private key file.\n" in usage() 201 {"keyfile", required_argument, NULL, 'k'}, in parse_options() 240 if (!opts.keyfile) in parse_options() 241 opts.keyfile = argv[optind - 1]; in parse_options() 282 if (!opts.keyfile) { in parse_options() 316 static int ntfs_pkcs12_load_pfxfile(const char *keyfile, u8 **pfx, in ntfs_pkcs12_load_pfxfile() argument 322 if (!keyfile || !pfx || !pfx_size) { in ntfs_pkcs12_load_pfxfile() 328 f = open(keyfile, O_RDONLY); in ntfs_pkcs12_load_pfxfile() 1563 if (ntfs_pkcs12_load_pfxfile(opts.keyfile, in main() [all...] |
/third_party/python/Lib/msilib/ |
H A D | __init__.py | 261 def start_component(self, component = None, feature = None, flags = None, keyfile = None, uuid=None): 265 flags are used. If no keyfile is given, the KeyPath is left null in the Component 278 if keyfile: 279 keyid = self.cab.gen_id(keyfile) 280 self.keyfiles[keyfile] = keyid
|