Searched refs:key_file (Results 1 - 25 of 28) sorted by relevance

12

/macosx-10.10.1/postfix-255/postfix/src/tls/
H A Dtls_certkey.c15 /* int tls_set_my_certificate_key_info(ctx, cert_file, key_file,
20 /* const char *key_file;
112 const char *key_file)
116 * We need both the private key (in key_file) and the public key
128 if (SSL_CTX_use_PrivateKey_file(ctx, key_file, SSL_FILETYPE_PEM) <= 0) {
130 "disabling TLS support", cert_type, key_file);
140 "disabling TLS support", cert_type, key_file, cert_file);
150 const char *key_file,
161 if (*cert_file && !set_cert_stuff(ctx, "RSA", cert_file, key_file))
110 set_cert_stuff(SSL_CTX *ctx, const char *cert_type, const char *cert_file, const char *key_file) argument
148 tls_set_my_certificate_key_info(SSL_CTX *ctx, const char *cert_file, const char *key_file, const char *dcert_file, const char *dkey_file, const char *eccert_file, const char *eckey_file) argument
H A Dtls.h370 const char *key_file; member in struct:__anon11611
428 const char *key_file; member in struct:__anon11613
H A Dtls_client.c414 props->key_file,
H A Dtls_server.c531 props->key_file,
/macosx-10.10.1/ruby-106/ruby/sample/openssl/
H A Dsmime_read.rb8 key_file = options["k"]
14 key = PKey::RSA.new(File::read(key_file))
H A Dsmime_write.rb8 key_file = options["k"]
12 key = PKey::RSA.new(File::read(key_file))
H A Decho_cli.rb12 key_file = options["k"]
16 if cert_file && key_file
18 ctx.key = OpenSSL::PKey::RSA.new(File::read(key_file))
H A Decho_svr.rb11 key_file = options["k"]
14 if cert_file && key_file
16 key = OpenSSL::PKey::RSA.new(File::read(key_file))
/macosx-10.10.1/OpenSSL098-52/src/demos/easy_tls/
H A Deasy-tls.h33 const char *key_file; member in struct:tls_create_ctx_args
H A Deasy-tls.c641 ret.key_file = NULL;
669 if ((a.certificate_file != NULL) || (a.key_file != NULL)) {
670 if (a.key_file == NULL) {
679 if (!SSL_CTX_use_PrivateKey_file(ret, a.key_file, SSL_FILETYPE_PEM))
684 if (tls_rand_seed_from_file(a.key_file, 0, apparg) == -1)
690 tls_errprintf(1, apparg, "Private key \"%s\" does not match certificate \"%s\".\n", a.key_file, a.certificate_file);
H A Dtest.c68 a.key_file = "cert.pem";
/macosx-10.10.1/libtelnet-13/
H A Drsaencpwd.c108 static char key_file[2*NAME_SZ]; variable
158 memset(key_file, 0, sizeof(key_file));
161 strcpy(key_file, "/etc/.");
162 strcat(key_file, lhostname);
163 strcat(key_file, "_privkey");
164 if ((fp=fopen(key_file, "r"))==NULL) return(0);
212 if ((fp=fopen(key_file, "r"))==NULL) {
267 if ((fp=fopen(key_file, "r"))==NULL) {
/macosx-10.10.1/Heimdal-398.1.2/appl/telnet/libtelnet/
H A Drsaencpwd.c109 static char key_file[2*NAME_SZ]; variable
159 memset(key_file, 0, sizeof(key_file));
162 snprintf(key_file, sizeof(key_file),
164 if ((fp=fopen(key_file, "r"))==NULL) return(0);
212 if ((fp=fopen(key_file, "r"))==NULL) {
267 if ((fp=fopen(key_file, "r"))==NULL) {
/macosx-10.10.1/OpenSSL098-52/src/apps/
H A Ds_cb.c182 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) argument
198 if (key_file == NULL) key_file=cert_file;
199 if (SSL_CTX_use_PrivateKey_file(ctx,key_file,
202 BIO_printf(bio_err,"unable to get private key from '%s'\n",key_file);
H A Ds_apps.h156 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
H A Ds_client.c301 char *cert_file=NULL,*key_file=NULL; local
506 key_file= *(++argv);
636 if (key_file == NULL)
637 key_file = cert_file;
640 if (key_file)
644 key = load_key(bio_err, key_file, key_format, 0, pass, e,
/macosx-10.10.1/ntp-92/ntpdate/
H A Dntptime_config.c126 extern char *key_file;
371 key_file = (char *) emalloc(strlen(tokens[1]) + 1);
372 strcpy(key_file, tokens[1]);
H A Dntptimeset.c280 const char *key_file = KEYFILE; variable
282 char key_file_storage[MAX_PATH+1], *key_file ; variable
585 if (!key_file) key_file = KEYFILE;
586 if (!ExpandEnvironmentStrings(key_file, key_file_storage, MAX_PATH))
589 key_file);
591 key_file = key_file_storage;
595 if (!authreadkeys(key_file)) {
H A Dntpdate.c194 const char *key_file = KEYFILE; variable
196 char key_file_storage[MAX_PATH+1], *key_file ; variable
329 key_file = key_file_storage;
331 if (!ExpandEnvironmentStrings(KEYFILE, key_file, MAX_PATH))
391 key_file = ntp_optarg;
516 if (!authreadkeys(key_file)) {
517 msyslog(LOG_ERR, "no key file <%s>, exiting", key_file);
/macosx-10.10.1/ruby-106/ruby/lib/rubygems/commands/
H A Dcert_command.rb22 OptionParser.accept OpenSSL::PKey::RSA do |key_file|
24 key = OpenSSL::PKey::RSA.new File.read key_file
26 raise OptionParser::InvalidArgument, "#{key_file}: does not exist"
28 raise OptionParser::InvalidArgument, "#{key_file}: invalid RSA key"
32 "#{key_file}: private key not found" unless key.private?
199 key_file = File.join Gem.default_key_path
200 key = File.read key_file
/macosx-10.10.1/ruby-106/ruby/test/rubygems/
H A Dtest_gem_security_signer.rb68 key_file = PRIVATE_KEY_PATH
70 signer = Gem::Security::Signer.new key_file, nil
/macosx-10.10.1/curl-83.1.2/curl/lib/vtls/
H A Dnss.c541 char *key_file)
549 rv = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE);
588 char *cert_file, char *key_file)
606 if(key_file || (is_file(cert_file))) {
607 if(key_file)
608 rv = nss_load_key(conn, sockindex, key_file);
614 if(!display_error(conn, err, key_file)) {
540 nss_load_key(struct connectdata *conn, int sockindex, char *key_file) argument
587 cert_stuff(struct connectdata *conn, int sockindex, char *cert_file, char *key_file) argument
H A Dopenssl.c346 char *key_file,
559 if(key_file == NULL)
561 key_file=cert_file;
563 if(SSL_CTX_use_PrivateKey_file(ctx, key_file, file_type) != 1) {
565 key_file, key_type?key_type:"PEM");
588 ENGINE_load_private_key(data->state.engine,key_file,
342 cert_stuff(struct connectdata *conn, SSL_CTX* ctx, char *cert_file, const char *cert_type, char *key_file, const char *key_type) argument
/macosx-10.10.1/ruby-106/ruby/lib/rubygems/
H A Dtest_case.rb1086 key_file = key_path key_name
1088 key = File.read key_file
/macosx-10.10.1/postfix-255/postfix/src/smtp/
H A Dsmtp.c1129 key_file = var_smtp_tls_key_file,

Completed in 296 milliseconds

12