| /src/lib/libskey/ |
| skey.h | 22 FILE *keyfile; member in struct:skey
|
| skeylogin.c | 66 fclose(mp->keyfile); 67 mp->keyfile = NULL; 96 fclose(mp->keyfile); 97 mp->keyfile = NULL; 106 FILE *keyfile = NULL; local 110 (keyfile = fopen(_PATH_SKEYKEYS, "r+"))) { 112 fchmod(fileno(keyfile), 0600); 114 keyfile = NULL; 117 return keyfile; 133 if(!(mp->keyfile = openSkey()) [all...] |
| /src/external/bsd/libpcap/dist/ |
| sslutils.c | 55 void ssl_set_keyfile(const char *keyfile) 57 ssl_keyfile = keyfile; 91 char const *keyfile = ssl_keyfile[0] ? ssl_keyfile : "key.pem"; local 92 if (1 != SSL_CTX_use_PrivateKey_file(ctx, keyfile, SSL_FILETYPE_PEM)) 94 snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_get_error(), NULL));
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kstash.c | 40 static char *keyfile; variable 53 { "key-file", 'k', arg_string, &keyfile, "master key file", "file" }, 55 "just convert keyfile to new format", NULL }, 90 if (keyfile == NULL) { 91 aret = asprintf(&keyfile, "%s/m-key", hdb_db_dir(context)); 100 ret = hdb_read_master_key(context, keyfile, &mkey); 102 krb5_err(context, 1, ret, "reading master key from %s", keyfile); 106 krb5_err(context, 1, ret, "reading master key from %s", keyfile); 146 aret = asprintf(&old, "%s.old", keyfile); 152 aret = asprintf(&new, "%s.new", keyfile); [all...] |
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| kadmin.c | 41 static char *keyfile; variable 65 "key-file", 'k', arg_string, &keyfile, 219 if (keyfile) { 220 conf.stash_file = keyfile;
|
| /src/external/mpl/bind/dist/bin/confgen/ |
| rndc-confgen.c | 63 const char *keyfile, *keydef; variable 72 %s [-a] [-b bits] [-c keyfile] [-k keyname] [-p port] \ 74 -a: generate just the key clause and write it to keyfile (%s)\n\ 77 -c keyfile: specify an alternate key file (requires -a)\n\ 82 -t chrootdir: write a keyfile in chrootdir as well (requires -a)\n\ 83 -u user: set the keyfile owner to \"user\" (requires -a)\n", 112 keydef = keyfile = RNDC_KEYFILE; 148 keyfile = isc_commandline_argument; 235 write_key_file(keyfile, chrootdir == NULL ? user : NULL, 238 printf("wrote key file \"%s\"\n", keyfile); [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| rsautl.c | 95 char *infile = NULL, *outfile = NULL, *keyfile = NULL; local 171 keyfile = opt_arg(); 206 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); 210 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); 214 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate");
|
| spkac.c | 76 char *challenge = NULL, *keyfile = NULL; local 117 keyfile = opt_arg(); 154 if (keyfile != NULL) { 158 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL,
|
| crl.c | 110 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local 156 keyfile = opt_arg(); 284 if (!keyfile) { 291 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key");
|
| s_time.c | 142 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; local 187 keyfile = opt_arg(); 276 if (!set_cert_stuff(ctx, certfile, keyfile))
|
| dgst.c | 124 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; local 178 keyfile = opt_arg(); 184 keyfile = opt_arg(); 188 keyfile = opt_arg(); 250 if (keyfile != NULL && argc > 1) { 287 if (keyfile != NULL) 297 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { 302 if (keyfile != NULL) { 304 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); 306 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key") [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| quic_tserver_test.c | 25 static const char *certfile, *keyfile; variable 127 keyfile))) { 441 || !TEST_ptr(keyfile = test_get_argument(1)))
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; local 155 keyfile = opt_arg(); 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); 195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); 199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate");
|
| spkac.c | 66 char *challenge = NULL, *keyfile = NULL; local 107 keyfile = opt_arg(); 145 if (keyfile != NULL) { 149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL,
|
| crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local 132 keyfile = opt_arg(); 261 if (!keyfile) { 268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key");
|
| s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; local 169 keyfile = opt_arg(); 259 if (!set_cert_stuff(ctx, certfile, keyfile))
|
| dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; local 155 keyfile = opt_arg(); 161 keyfile = opt_arg(); 165 keyfile = opt_arg(); 227 if (keyfile != NULL && argc > 1) { 264 if (keyfile != NULL) 274 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { 279 if (keyfile != NULL) { 283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); 285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key") [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| rsautl.c | 72 char *infile = NULL, *outfile = NULL, *keyfile = NULL; local 150 keyfile = opt_arg(); 177 pkey = load_key(keyfile, keyformat, 0, passin, e, "Private Key"); 181 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "Public Key"); 185 x = load_cert(keyfile, keyformat, "Certificate");
|
| spkac.c | 57 char *challenge = NULL, *keyfile = NULL; local 96 keyfile = opt_arg(); 125 if (keyfile != NULL) { 126 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL,
|
| crl.c | 73 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local 116 keyfile = opt_arg(); 223 if (!keyfile) { 230 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key");
|
| s_time.c | 99 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; local 145 keyfile = opt_arg(); 206 if (!set_cert_stuff(ctx, certfile, keyfile))
|
| dgst.c | 95 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; local 143 keyfile = opt_arg(); 149 keyfile = opt_arg(); 153 keyfile = opt_arg(); 208 if (keyfile != NULL && argc > 1) { 240 if (keyfile != NULL) 250 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { 255 if (keyfile != NULL) { 259 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "key file"); 261 sigkey = load_key(keyfile, keyform, 0, passin, e, "key file") [all...] |
| smime.c | 125 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local 251 if (keyfile == NULL) 252 keyfile = signerfile; 256 sk_OPENSSL_STRING_push(skkeys, keyfile); 257 keyfile = NULL; 274 if (keyfile != NULL) { 288 sk_OPENSSL_STRING_push(skkeys, keyfile); 290 keyfile = opt_arg(); 331 if (keyfile && !signerfile) { 342 if (!keyfile) [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| transport.c | 58 char *keyfile; member in struct:dns_transport::__anon24108 117 return transport->tls.keyfile; 180 dns_transport_set_keyfile(dns_transport_t *transport, const char *keyfile) { 185 if (transport->tls.keyfile != NULL) { 186 isc_mem_free(transport->mctx, transport->tls.keyfile); 189 if (keyfile != NULL) { 190 transport->tls.keyfile = isc_mem_strdup(transport->mctx, 191 keyfile); 635 if (transport->tls.keyfile != NULL) { 636 isc_mem_free(transport->mctx, transport->tls.keyfile); [all...] |
| /src/usr.sbin/syslogd/ |
| syslogd.h | 396 char *keyfile; /* file with private key */ member in struct:tls_global_options_t
|