/freebsd-11-stable/contrib/sendmail/src/ |
H A D | tls.c | 669 ** keyfile -- filename of private key 676 load_certkey(ssl, srv, certfile, keyfile) 680 char *keyfile; 694 TLS_OK_F(keyfile, "KeyFile", bitset(TLS_I_KEY_EX, req), 707 TLS_SAFE_F(keyfile, sff | TLS_KEYSFF(req), 729 SSL_use_PrivateKey_file(ssl, keyfile, SSL_FILETYPE_PEM) <= 0) 735 who, keyfile); 751 who, keyfile, r); 907 ** keyfile -- filename of private key 933 inittls(ctx, req, options, srv, certfile, keyfile, cacertpat [all...] |
H A D | readcf.c | 2365 char *keyfile, *certfile; local 2375 keyfile = certfile = opt = val = NULL; 2529 else if (sm_strcasecmp(opt, "keyfile") == 0) 2530 keyfile = val; 2548 if (keyfile != NULL && certfile != NULL) 2550 load_certkey(ssl, srv, certfile, keyfile); 2551 keyfile = certfile = NULL; 2553 else if (keyfile != NULL || certfile != NULL)
|
/freebsd-11-stable/contrib/ntp/ntpd/ |
H A D | ntp_util.c | 951 const char *keyfile 956 len = strlen(keyfile); 962 memcpy(key_file_name, keyfile, len + 1); 967 if (!ExpandEnvironmentStrings(keyfile, key_file_name, 971 strlcpy(key_file_name, keyfile, _MAX_PATH);
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | CA.sh | 133 -keyfile ${CATOP}/private/$CAKEY -selfsign \
|
H A D | s_cb.c | 1170 const char *keyfile; member in struct:ssl_excert_st 1283 exc->keyfile = NULL; 1342 if (exc->keyfile) { 1343 exc->key = load_key(err, exc->keyfile, exc->keyform, 1393 if (exc->keyfile) { 1398 exc->keyfile = argn;
|
H A D | x509.c | 190 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local 324 keyfile = *(++argv); 910 keyfile, keyformat, 0, 939 if (keyfile == NULL) { 944 keyfile, keyformat, 0,
|
H A D | ocsp.c | 139 char *signfile = NULL, *keyfile = NULL; local 357 keyfile = *args; 675 if (!keyfile) 676 keyfile = signfile; 689 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
|
H A D | req.c | 180 char *infile, *outfile, *prog, *keyfile = NULL, *template = local 247 keyfile = *(++argv); 600 if (keyfile != NULL) { 601 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e,
|
H A D | ca.c | 156 " -keyfile arg - private key file\n", 268 char *keyfile = NULL; local 388 } else if (strcmp(*argv, "-keyfile") == 0) { 391 keyfile = *(++argv); 703 if ((keyfile == NULL) && ((keyfile = NCONF_get_string(conf, 717 pkey = load_key(bio_err, keyfile, keyform, 0, key, e, "CA private key");
|
/freebsd-11-stable/sbin/gbde/ |
H A D | gbde.c | 139 "usage: gbde attach destination [-k keyfile] [-l lockfile] [-p pass-phrase]\n" 141 " gbde init destination [-i] [-f filename] [-K new-keyfile]\n" 144 " [-k keyfile] [-l lockfile] [-p pass-phrase]\n" 145 " [-K new-keyfile] [-L new-lockfile] [-P new-pass-phrase]\n" 147 " [-k keyfile] [-l lockfile] [-p pass-phrase]\n" 148 " gbde destroy destination [-k keyfile] [-l lockfile] [-p pass-phrase]\n"); 203 const char *keyfile) 210 if (keyfile != NULL) { 211 /* Read up to BUFSIZ bytes from keyfile */ 212 kfd = open(keyfile, O_RDONL 202 setup_passphrase(struct g_bde_softc *sc, int sure, const char *input, const char *keyfile) argument [all...] |
/freebsd-11-stable/etc/rc.d/ |
H A D | sendmail | 143 -out newcert.pem -keyfile cakey.pem -cert cacert.pem \
|
/freebsd-11-stable/crypto/heimdal/lib/hdb/ |
H A D | mkey.c | 146 /* read a MIT master keyfile */ 580 const char *keyfile) 585 ret = hdb_read_master_key(context, keyfile, &key); 578 hdb_set_master_keyfile(krb5_context context, HDB *db, const char *keyfile) argument
|