| /src/usr.bin/btkey/ |
| file.c | 42 static const char *key_file = "/var/db/bthcid.keys"; variable 57 db = prop_dictionary_internalize_from_file(key_file); 102 db = prop_dictionary_internalize_from_file(key_file); 133 db = prop_dictionary_internalize_from_file(key_file); 162 rv = prop_dictionary_externalize_to_file(db, key_file); 181 db = prop_dictionary_internalize_from_file(key_file); 196 rv = prop_dictionary_externalize_to_file(db, key_file);
|
| /src/usr.sbin/bthcid/ |
| config.c | 48 static const char *key_file = "/var/db/bthcid.keys"; variable 59 fd = open(key_file, O_RDONLY, 0); 186 syslog(LOG_ERR, "Cannot open new keyfile %s: %m", key_file); 203 if (rename(new_key_file, key_file) < 0) { 205 new_key_file, key_file);
|
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_proxy_server_scan.c | 99 VSTRING *key_file = vstring_alloc(25); local 124 RECV_ATTR_STR(TLS_ATTR_KEY_FILE, key_file), 144 props->key_file = vstring_export(key_file); 174 myfree((void *) props->key_file);
|
| tls_certkey.c | 18 /* cert_file, key_file, 24 /* const char *key_file; 541 const char *key_file) 548 if (strcmp(cert_file, key_file) == 0) 552 * We need both the private key (in key_file) and the public key 564 if (SSL_CTX_use_PrivateKey_file(ctx, key_file, SSL_FILETYPE_PEM) <= 0) { 566 "disabling TLS support", cert_type, key_file); 576 "disabling TLS support", cert_type, key_file, cert_file); 586 const char *key_file, 601 if (*cert_file && !set_cert_stuff(ctx, "RSA", cert_file, key_file)) 650 char *key_file = 0; local [all...] |
| tls_proxy_client_scan.c | 239 myfree((void *) props->key_file); 263 VSTRING *key_file = vstring_alloc(25); local 286 RECV_ATTR_STR(TLS_ATTR_KEY_FILE, key_file), 301 props->key_file = vstring_export(key_file);
|
| tls.h | 480 const char *key_file; member in struct:__anon23191 553 const char *key_file; member in struct:__anon23193
|
| /src/usr.bin/nbsvtool/ |
| nbsvtool.c | 239 * key file `key_file'. The private key is checked to make sure it 245 load_keys(const char *cert_file, const char *chain_file, const char *key_file) 253 if (key_file == NULL) 267 f = fopen(key_file, "r"); 269 errx(1, "Failed to open private key file %s", key_file); 275 errx(EXIT_FAILURE, "Can't read private key %s", key_file); 282 key_file, cert_file); 305 const char *cert_file = NULL, *key_file = NULL, *chain_file = NULL; local 326 key_file = optarg; 372 load_keys(cert_file, chain_file, key_file); [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| bio_pw_callback_test.c | 28 static char *key_file = NULL; variable 361 key_file = opt_arg(); 372 if (!TEST_ptr(bio = BIO_new_file(key_file, "r")))
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| bio_pw_callback_test.c | 28 static char *key_file = NULL; variable 361 key_file = opt_arg(); 372 if (!TEST_ptr(bio = BIO_new_file(key_file, "r")))
|
| /src/crypto/external/bsd/openssl.old/dist/test/ossl_shim/ |
| test_config.h | 23 std::string key_file; member in struct:TestConfig
|
| /src/external/mpl/bind/dist/lib/dns/ |
| transport.c | 429 const char *key_file = dns_transport_get_keyfile(transport); local 522 INSIST(key_file != NULL); 525 tlsctx, key_file, cert_file);
|
| /src/crypto/external/apache2/openssl/dist/test/radix/ |
| terp.c | 18 static const char *cert_file, *key_file; variable
|
| /src/external/bsd/ntp/dist/ntpdate/ |
| ntpdate.c | 191 const char *key_file = KEYFILE; variable 193 char key_file_storage[MAX_PATH+1], *key_file ; variable 326 key_file = key_file_storage; 328 if (!ExpandEnvironmentStrings(KEYFILE, key_file, MAX_PATH)) 392 key_file = ntp_optarg; 525 if (!authreadkeys(key_file)) { 526 msyslog(LOG_ERR, "no key file <%s>, exiting", key_file);
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| s_client.c | 804 char *cert_file = NULL, *key_file = NULL, *chain_file = NULL; local 1304 key_file = opt_arg(); 1624 if (key_file == NULL) 1625 key_file = cert_file; 1627 if (key_file != NULL) { 1628 key = load_key(key_file, key_format, 0, pass, e,
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| s_client.c | 902 char *cert_file = NULL, *key_file = NULL, *chain_file = NULL; local 1383 key_file = opt_arg(); 1668 if (key_file == NULL) 1669 key_file = cert_file; 1671 if (key_file != NULL) { 1672 key = load_key(key_file, key_format, 0, pass, e,
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| s_client.c | 951 char *cert_file = NULL, *key_file = NULL, *chain_file = NULL; local 1489 key_file = opt_arg(); 1829 if (key_file == NULL) 1830 key_file = cert_file; 1832 if (key_file != NULL) { 1833 key = load_key(key_file, key_format, 0, pass, e,
|