Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 - 25 of 53) sorted by relevance

123

/third_party/node/deps/openssl/openssl/apps/
H A Dsmime.c146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
283 if (keyfile == NULL) in smime_main()
284 keyfile = signerfile; in smime_main()
288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
289 keyfile = NULL; in smime_main()
304 if (keyfile != NULL) { in smime_main()
318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
320 keyfile = opt_arg(); in smime_main()
385 if (keyfile && !signerfile) { in smime_main()
396 if (!keyfile) in smime_main()
[all...]
H A Dcms.c292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local
581 if (keyfile == NULL) in cms_main()
582 keyfile = signerfile; in cms_main()
586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
587 keyfile = NULL; in cms_main()
596 if (keyfile != NULL) { in cms_main()
609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
611 keyfile = opt_arg(); in cms_main()
639 if (keyfile != NULL || signerfile != NULL) in cms_main()
743 if (keyfile ! in cms_main()
[all...]
H A Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
107 keyfile = opt_arg(); in spkac_main()
145 if (keyfile != NULL) { in spkac_main()
149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
H A Drsautl.c79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local
155 keyfile = opt_arg(); in rsautl_main()
191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main()
195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main()
199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
H A Ddgst.c104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local
155 keyfile = opt_arg(); in dgst_main()
161 keyfile = opt_arg(); in dgst_main()
165 keyfile = opt_arg(); in dgst_main()
227 if (keyfile != NULL && argc > 1) { in dgst_main()
264 if (keyfile != NULL) in dgst_main()
274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main()
279 if (keyfile != NULL) { in dgst_main()
283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main()
285 sigkey = load_key(keyfile, keyfor in dgst_main()
[all...]
H A Dcrl.c87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local
132 keyfile = opt_arg(); in crl_main()
261 if (!keyfile) { in crl_main()
268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
H A Dpkeyutl.c24 const char *keyfile, int keyform, int key_type,
524 const char *keyfile, int keyform, int key_type, in init_ctx()
549 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx()
553 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in init_ctx()
557 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx()
523 init_ctx(const char *kdfalg, int *pkeysize, const char *keyfile, int keyform, int key_type, char *passinarg, int pkey_op, ENGINE *e, const int engine_impl, int rawin, EVP_PKEY **ppkey, EVP_MD_CTX *mctx, const char *digestname, OSSL_LIB_CTX *libctx, const char *propq) init_ctx() argument
/third_party/openssl/apps/
H A Dsmime.c146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
283 if (keyfile == NULL) in smime_main()
284 keyfile = signerfile; in smime_main()
288 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
289 keyfile = NULL; in smime_main()
304 if (keyfile != NULL) { in smime_main()
318 sk_OPENSSL_STRING_push(skkeys, keyfile); in smime_main()
320 keyfile = opt_arg(); in smime_main()
385 if (keyfile && !signerfile) { in smime_main()
396 if (!keyfile) in smime_main()
[all...]
H A Dcms.c292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local
581 if (keyfile == NULL) in cms_main()
582 keyfile = signerfile; in cms_main()
586 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
587 keyfile = NULL; in cms_main()
596 if (keyfile != NULL) { in cms_main()
609 sk_OPENSSL_STRING_push(skkeys, keyfile); in cms_main()
611 keyfile = opt_arg(); in cms_main()
638 if (keyfile != NULL || signerfile != NULL) in cms_main()
742 if (keyfile ! in cms_main()
[all...]
H A Drsautl.c79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local
155 keyfile = opt_arg(); in rsautl_main()
191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main()
195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main()
199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
H A Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
107 keyfile = opt_arg(); in spkac_main()
145 if (keyfile != NULL) { in spkac_main()
149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
H A Ddgst.c104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local
155 keyfile = opt_arg(); in dgst_main()
161 keyfile = opt_arg(); in dgst_main()
165 keyfile = opt_arg(); in dgst_main()
227 if (keyfile != NULL && argc > 1) { in dgst_main()
264 if (keyfile != NULL) in dgst_main()
274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main()
279 if (keyfile != NULL) { in dgst_main()
283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main()
285 sigkey = load_key(keyfile, keyfor in dgst_main()
[all...]
H A Dcrl.c87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local
132 keyfile = opt_arg(); in crl_main()
261 if (!keyfile) { in crl_main()
268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
H A Dpkeyutl.c24 const char *keyfile, int keyform, int key_type,
524 const char *keyfile, int keyform, int key_type, in init_ctx()
549 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx()
553 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in init_ctx()
557 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx()
523 init_ctx(const char *kdfalg, int *pkeysize, const char *keyfile, int keyform, int key_type, char *passinarg, int pkey_op, ENGINE *e, const int engine_impl, int rawin, EVP_PKEY **ppkey, EVP_MD_CTX *mctx, const char *digestname, OSSL_LIB_CTX *libctx, const char *propq) init_ctx() argument
/third_party/python/Lib/
H A Dpoplib.py422 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None,
427 keyfile - PEM formatted file that contains your private key
434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None,
436 if context is not None and keyfile is not None:
437 raise ValueError("context and keyfile arguments are mutually "
442 if keyfile is not None or certfile is not None:
444 warnings.warn("keyfile and certfile are deprecated, use a "
446 self.keyfile = keyfile
450 keyfile
[all...]
H A Dsmtplib.py752 def starttls(self, keyfile=None, certfile=None, context=None):
759 session. If you provide the keyfile and certfile parameters,
777 if context is not None and keyfile is not None:
778 raise ValueError("context and keyfile arguments are mutually "
783 if keyfile is not None or certfile is not None:
785 warnings.warn("keyfile and certfile are deprecated, use a "
789 keyfile=keyfile)
1020 as they do in the SMTP class. keyfile and certfile are also optional -
1023 SSLContext, and is an alternative to keyfile an
[all...]
H A Dftplib.py719 keyfile=None, certfile=None, context=None,
722 if context is not None and keyfile is not None:
723 raise ValueError("context and keyfile arguments are mutually "
728 if keyfile is not None or certfile is not None:
730 warnings.warn("keyfile and certfile are deprecated, use a "
732 self.keyfile = keyfile
737 keyfile=keyfile)
/third_party/skia/third_party/externals/microhttpd/src/microspdy/
H A Ddaemon.c172 const char *keyfile, in SPDYF_start_daemon_va()
230 if (NULL == keyfile in SPDYF_start_daemon_va()
231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va()
233 SPDYF_DEBUG("strdup (keyfile)"); in SPDYF_start_daemon_va()
364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va()
365 free(daemon->keyfile); in SPDYF_start_daemon_va()
385 free(daemon->keyfile); in SPDYF_stop_daemon()
170 SPDYF_start_daemon_va(uint16_t port, const char *certfile, const char *keyfile, SPDY_NewSessionCallback nscb, SPDY_SessionClosedCallback sccb, SPDY_NewRequestCallback nrcb, SPDY_NewDataCallback npdcb, SPDYF_NewStreamCallback fnscb, SPDYF_NewDataCallback fndcb, void * cls, void * fcls, va_list valist) SPDYF_start_daemon_va() argument
H A Ddaemon.h42 * @param keyfile path to the keyfile for the certificate
63 const char *keyfile,
/third_party/fsverity-utils/programs/
H A Dcmd_sign.c60 if (sig_params.keyfile != NULL) { in fsverity_cmd_sign()
64 sig_params.keyfile = optarg; in fsverity_cmd_sign()
114 sig_params.certfile = sig_params.keyfile; in fsverity_cmd_sign()
H A Dtest_sign_digest.c22 .keyfile = "testdata/key.pem", in main()
/third_party/fsverity-utils/lib/
H A Dsign_digest.c53 static int read_private_key(const char *keyfile, EVP_PKEY **pkey_ret) in read_private_key() argument
60 bio = BIO_new_file(keyfile, "r"); in read_private_key()
62 error_msg_openssl("can't open '%s' for reading", keyfile); in read_private_key()
70 keyfile); in read_private_key()
388 if (sig_params->keyfile) { in get_private_key()
394 if (!sig_params->keyfile) { in get_private_key()
398 return read_private_key(sig_params->keyfile, pkey_ret); in get_private_key()
/third_party/skia/third_party/externals/swiftshader/tests/regres/llvm/
H A Dllvm.go92 keyfile, err := os.Open(key)
96 defer keyfile.Close()
98 if err := util.CheckPGP(bytes.NewReader(content), sigfile, keyfile); err != nil {
/third_party/ntfs-3g/ntfsprogs/
H A Dntfsdecrypt.c126 char *keyfile; /* .pfx file containing the user's private key. */ member
173 " -k --keyfile name.pfx Use file name as the user's private key file.\n" in usage()
201 {"keyfile", required_argument, NULL, 'k'}, in parse_options()
240 if (!opts.keyfile) in parse_options()
241 opts.keyfile = argv[optind - 1]; in parse_options()
282 if (!opts.keyfile) { in parse_options()
316 static int ntfs_pkcs12_load_pfxfile(const char *keyfile, u8 **pfx, in ntfs_pkcs12_load_pfxfile() argument
322 if (!keyfile || !pfx || !pfx_size) { in ntfs_pkcs12_load_pfxfile()
328 f = open(keyfile, O_RDONLY); in ntfs_pkcs12_load_pfxfile()
1563 if (ntfs_pkcs12_load_pfxfile(opts.keyfile, in main()
[all...]
/third_party/python/Lib/msilib/
H A D__init__.py261 def start_component(self, component = None, feature = None, flags = None, keyfile = None, uuid=None):
265 flags are used. If no keyfile is given, the KeyPath is left null in the Component
278 if keyfile:
279 keyid = self.cab.gen_id(keyfile)
280 self.keyfiles[keyfile] = keyid

Completed in 21 milliseconds

123