/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/keyFromCert/ |
H A D | keyFromCert.cpp | 19 printf("Usage: %s [-q] certFile keyFile\n", argv[0]); 33 const char *keyFile = NULL; local 38 keyFile = argv[2]; 44 keyFile = argv[3]; 70 rtn = writeFile(keyFile, pubKey->KeyData.Data, pubKey->KeyData.Length); 73 keyFile);
|
/macosx-10.10.1/WebKit2-7600.1.25/Shared/gtk/ |
H A D | ArgumentCodersGtk.cpp | 237 static void encodeGKeyFile(ArgumentEncoder& encoder, GKeyFile* keyFile) argument 240 GUniquePtr<char> data(g_key_file_to_data(keyFile, &dataSize, 0)); 244 static bool decodeGKeyFile(ArgumentDecoder& decoder, GUniquePtr<GKeyFile>& keyFile) argument 253 keyFile.reset(g_key_file_new()); 254 if (!g_key_file_load_from_data(keyFile.get(), reinterpret_cast<const gchar*>(dataReference.data()), dataReference.size(), G_KEY_FILE_NONE, 0)) { 255 keyFile.reset(); 264 GUniquePtr<GKeyFile> keyFile(g_key_file_new()); 265 gtk_print_settings_to_key_file(printSettings, keyFile.get(), "Print Settings"); 266 encodeGKeyFile(encoder, keyFile.get()); 271 GUniquePtr<GKeyFile> keyFile; local 294 GUniquePtr<GKeyFile> keyFile; local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/dbTool/ |
H A D | dbCert.h | 36 const char *keyFile,
|
H A D | dbCert.cpp | 430 const char *keyFile, 465 keyFile, keyAlg, pemFormat, keyFormat, 468 printf("***Error importing key %s. Aborting.\n", keyFile); 426 importBadCert( CSSM_DL_HANDLE dlHand, const char *dbFileName, const char *certFile, const char *keyFile, CSSM_ALGORITHMS keyAlg, CSSM_BOOL pemFormat, CSSM_KEYBLOB_FORMAT keyFormat, CSSM_BOOL verbose) argument
|
H A D | dbTool.cpp | 37 printf(" k=keyFile\n"); 658 char *keyFile = NULL; local 695 keyFile = &argp[2]; 709 keyFile, keyAlg, pemFormat, keyFormat, verbose);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/symReference/ |
H A D | symReference.cpp | 106 char *keyFile, 111 sprintf(keyFile, "key_%s", algStr); 133 char keyFile[FILENAME_MAX]; local 189 genFileNames(algParams->algStr, keyFile, ptextFile, ctextFile, ivFile); 190 if(writeFile(keyFile, rawKey.KeyData.Data, (unsigned)rawKey.KeyData.Length) || 236 char keyFile[FILENAME_MAX]; local 258 genFileNames(algParams->algStr, keyFile, ptextFile, ctextFile, ivFile); 259 if(readFile(keyFile, &symKeyBits, &symKeyLen) || 104 genFileNames( const char *algStr, char *keyFile, char *ptextFile, char *ctextFile, char *ivFile) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/libDER/Tests/ |
H A D | parseTicket.c | 148 const char *keyFile, 158 fp = fopen ( (char*) keyFile, "r" ); 160 fprintf( stderr, "failed to open file=%s\n", keyFile ); 194 const char *keyFile, 204 fp = fopen ( (char*) keyFile, "r" ); 206 fprintf( stderr, "failed to open file=%s\n", keyFile ); 299 const char *keyFile, 316 if ( keyFile ) { 318 keyFile, 348 const char *keyFile ) 147 rsa_sign( const char *keyFile, unsigned char *plain, unsigned plainLength, unsigned char signature[SIG_LEN] ) argument 193 rsa_verify( const char *keyFile, unsigned char *plain, unsigned plainLength, unsigned char signature[SIG_LEN] ) argument 296 verify_bb_ticket( unsigned char *ticketData, unsigned ticketLength, const char *keyFile, bool doPrint ) argument [all...] |