HomeSort by: relevance | last modified time | path
    Searched defs:keyfile (Results 1 - 25 of 52) sorted by relevancy

1 2 3

  /src/lib/libskey/
skey.h 22 FILE *keyfile; member in struct:skey
skeylogin.c 66 fclose(mp->keyfile);
67 mp->keyfile = NULL;
96 fclose(mp->keyfile);
97 mp->keyfile = NULL;
106 FILE *keyfile = NULL; local
110 (keyfile = fopen(_PATH_SKEYKEYS, "r+"))) {
112 fchmod(fileno(keyfile), 0600);
114 keyfile = NULL;
117 return keyfile;
133 if(!(mp->keyfile = openSkey())
    [all...]
  /src/external/bsd/libpcap/dist/
sslutils.c 55 void ssl_set_keyfile(const char *keyfile)
57 ssl_keyfile = keyfile;
91 char const *keyfile = ssl_keyfile[0] ? ssl_keyfile : "key.pem"; local
92 if (1 != SSL_CTX_use_PrivateKey_file(ctx, keyfile, SSL_FILETYPE_PEM))
94 snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_get_error(), NULL));
  /src/crypto/external/bsd/heimdal/dist/kdc/
kstash.c 40 static char *keyfile; variable
53 { "key-file", 'k', arg_string, &keyfile, "master key file", "file" },
55 "just convert keyfile to new format", NULL },
90 if (keyfile == NULL) {
91 aret = asprintf(&keyfile, "%s/m-key", hdb_db_dir(context));
100 ret = hdb_read_master_key(context, keyfile, &mkey);
102 krb5_err(context, 1, ret, "reading master key from %s", keyfile);
106 krb5_err(context, 1, ret, "reading master key from %s", keyfile);
146 aret = asprintf(&old, "%s.old", keyfile);
152 aret = asprintf(&new, "%s.new", keyfile);
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kadmin/
kadmin.c 41 static char *keyfile; variable
65 "key-file", 'k', arg_string, &keyfile,
219 if (keyfile) {
220 conf.stash_file = keyfile;
  /src/external/mpl/bind/dist/bin/confgen/
rndc-confgen.c 63 const char *keyfile, *keydef; variable
72 %s [-a] [-b bits] [-c keyfile] [-k keyname] [-p port] \
74 -a: generate just the key clause and write it to keyfile (%s)\n\
77 -c keyfile: specify an alternate key file (requires -a)\n\
82 -t chrootdir: write a keyfile in chrootdir as well (requires -a)\n\
83 -u user: set the keyfile owner to \"user\" (requires -a)\n",
112 keydef = keyfile = RNDC_KEYFILE;
148 keyfile = isc_commandline_argument;
235 write_key_file(keyfile, chrootdir == NULL ? user : NULL,
238 printf("wrote key file \"%s\"\n", keyfile);
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
rsautl.c 95 char *infile = NULL, *outfile = NULL, *keyfile = NULL; local
171 keyfile = opt_arg();
206 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key");
210 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key");
214 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate");
spkac.c 76 char *challenge = NULL, *keyfile = NULL; local
117 keyfile = opt_arg();
154 if (keyfile != NULL) {
158 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL,
crl.c 110 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local
156 keyfile = opt_arg();
284 if (!keyfile) {
291 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key");
s_time.c 142 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; local
187 keyfile = opt_arg();
276 if (!set_cert_stuff(ctx, certfile, keyfile))
dgst.c 124 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; local
178 keyfile = opt_arg();
184 keyfile = opt_arg();
188 keyfile = opt_arg();
250 if (keyfile != NULL && argc > 1) {
287 if (keyfile != NULL)
297 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) {
302 if (keyfile != NULL) {
304 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key");
306 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key")
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
quic_tserver_test.c 25 static const char *certfile, *keyfile; variable
127 keyfile))) {
441 || !TEST_ptr(keyfile = test_get_argument(1)))
  /src/crypto/external/bsd/openssl/dist/apps/
rsautl.c 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; local
155 keyfile = opt_arg();
191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key");
195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key");
199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate");
spkac.c 66 char *challenge = NULL, *keyfile = NULL; local
107 keyfile = opt_arg();
145 if (keyfile != NULL) {
149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL,
crl.c 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local
132 keyfile = opt_arg();
261 if (!keyfile) {
268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key");
s_time.c 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; local
169 keyfile = opt_arg();
259 if (!set_cert_stuff(ctx, certfile, keyfile))
dgst.c 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; local
155 keyfile = opt_arg();
161 keyfile = opt_arg();
165 keyfile = opt_arg();
227 if (keyfile != NULL && argc > 1) {
264 if (keyfile != NULL)
274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) {
279 if (keyfile != NULL) {
283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key");
285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key")
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
rsautl.c 72 char *infile = NULL, *outfile = NULL, *keyfile = NULL; local
150 keyfile = opt_arg();
177 pkey = load_key(keyfile, keyformat, 0, passin, e, "Private Key");
181 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "Public Key");
185 x = load_cert(keyfile, keyformat, "Certificate");
spkac.c 57 char *challenge = NULL, *keyfile = NULL; local
96 keyfile = opt_arg();
125 if (keyfile != NULL) {
126 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL,
crl.c 73 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local
116 keyfile = opt_arg();
223 if (!keyfile) {
230 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key");
s_time.c 99 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; local
145 keyfile = opt_arg();
206 if (!set_cert_stuff(ctx, certfile, keyfile))
dgst.c 95 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; local
143 keyfile = opt_arg();
149 keyfile = opt_arg();
153 keyfile = opt_arg();
208 if (keyfile != NULL && argc > 1) {
240 if (keyfile != NULL)
250 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) {
255 if (keyfile != NULL) {
259 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "key file");
261 sigkey = load_key(keyfile, keyform, 0, passin, e, "key file")
    [all...]
smime.c 125 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local
251 if (keyfile == NULL)
252 keyfile = signerfile;
256 sk_OPENSSL_STRING_push(skkeys, keyfile);
257 keyfile = NULL;
274 if (keyfile != NULL) {
288 sk_OPENSSL_STRING_push(skkeys, keyfile);
290 keyfile = opt_arg();
331 if (keyfile && !signerfile) {
342 if (!keyfile)
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
transport.c 58 char *keyfile; member in struct:dns_transport::__anon24108
117 return transport->tls.keyfile;
180 dns_transport_set_keyfile(dns_transport_t *transport, const char *keyfile) {
185 if (transport->tls.keyfile != NULL) {
186 isc_mem_free(transport->mctx, transport->tls.keyfile);
189 if (keyfile != NULL) {
190 transport->tls.keyfile = isc_mem_strdup(transport->mctx,
191 keyfile);
635 if (transport->tls.keyfile != NULL) {
636 isc_mem_free(transport->mctx, transport->tls.keyfile);
    [all...]
  /src/usr.sbin/syslogd/
syslogd.h 396 char *keyfile; /* file with private key */ member in struct:tls_global_options_t

Completed in 84 milliseconds

1 2 3