/macosx-10.10.1/postfix-255/postfix/src/tls/ |
H A D | tls_certkey.c | 15 /* int tls_set_my_certificate_key_info(ctx, cert_file, key_file, 20 /* const char *key_file; 112 const char *key_file) 116 * We need both the private key (in key_file) and the public key 128 if (SSL_CTX_use_PrivateKey_file(ctx, key_file, SSL_FILETYPE_PEM) <= 0) { 130 "disabling TLS support", cert_type, key_file); 140 "disabling TLS support", cert_type, key_file, cert_file); 150 const char *key_file, 161 if (*cert_file && !set_cert_stuff(ctx, "RSA", cert_file, key_file)) 110 set_cert_stuff(SSL_CTX *ctx, const char *cert_type, const char *cert_file, const char *key_file) argument 148 tls_set_my_certificate_key_info(SSL_CTX *ctx, const char *cert_file, const char *key_file, const char *dcert_file, const char *dkey_file, const char *eccert_file, const char *eckey_file) argument
|
H A D | tls.h | 370 const char *key_file; member in struct:__anon11611 428 const char *key_file; member in struct:__anon11613
|
H A D | tls_client.c | 414 props->key_file,
|
H A D | tls_server.c | 531 props->key_file,
|
/macosx-10.10.1/ruby-106/ruby/sample/openssl/ |
H A D | smime_read.rb | 8 key_file = options["k"] 14 key = PKey::RSA.new(File::read(key_file))
|
H A D | smime_write.rb | 8 key_file = options["k"] 12 key = PKey::RSA.new(File::read(key_file))
|
H A D | echo_cli.rb | 12 key_file = options["k"] 16 if cert_file && key_file 18 ctx.key = OpenSSL::PKey::RSA.new(File::read(key_file))
|
H A D | echo_svr.rb | 11 key_file = options["k"] 14 if cert_file && key_file 16 key = OpenSSL::PKey::RSA.new(File::read(key_file))
|
/macosx-10.10.1/OpenSSL098-52/src/demos/easy_tls/ |
H A D | easy-tls.h | 33 const char *key_file; member in struct:tls_create_ctx_args
|
H A D | easy-tls.c | 641 ret.key_file = NULL; 669 if ((a.certificate_file != NULL) || (a.key_file != NULL)) { 670 if (a.key_file == NULL) { 679 if (!SSL_CTX_use_PrivateKey_file(ret, a.key_file, SSL_FILETYPE_PEM)) 684 if (tls_rand_seed_from_file(a.key_file, 0, apparg) == -1) 690 tls_errprintf(1, apparg, "Private key \"%s\" does not match certificate \"%s\".\n", a.key_file, a.certificate_file);
|
H A D | test.c | 68 a.key_file = "cert.pem";
|
/macosx-10.10.1/libtelnet-13/ |
H A D | rsaencpwd.c | 108 static char key_file[2*NAME_SZ]; variable 158 memset(key_file, 0, sizeof(key_file)); 161 strcpy(key_file, "/etc/."); 162 strcat(key_file, lhostname); 163 strcat(key_file, "_privkey"); 164 if ((fp=fopen(key_file, "r"))==NULL) return(0); 212 if ((fp=fopen(key_file, "r"))==NULL) { 267 if ((fp=fopen(key_file, "r"))==NULL) {
|
/macosx-10.10.1/Heimdal-398.1.2/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 109 static char key_file[2*NAME_SZ]; variable 159 memset(key_file, 0, sizeof(key_file)); 162 snprintf(key_file, sizeof(key_file), 164 if ((fp=fopen(key_file, "r"))==NULL) return(0); 212 if ((fp=fopen(key_file, "r"))==NULL) { 267 if ((fp=fopen(key_file, "r"))==NULL) {
|
/macosx-10.10.1/OpenSSL098-52/src/apps/ |
H A D | s_cb.c | 182 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) argument 198 if (key_file == NULL) key_file=cert_file; 199 if (SSL_CTX_use_PrivateKey_file(ctx,key_file, 202 BIO_printf(bio_err,"unable to get private key from '%s'\n",key_file);
|
H A D | s_apps.h | 156 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
H A D | s_client.c | 301 char *cert_file=NULL,*key_file=NULL; local 506 key_file= *(++argv); 636 if (key_file == NULL) 637 key_file = cert_file; 640 if (key_file) 644 key = load_key(bio_err, key_file, key_format, 0, pass, e,
|
/macosx-10.10.1/ntp-92/ntpdate/ |
H A D | ntptime_config.c | 126 extern char *key_file; 371 key_file = (char *) emalloc(strlen(tokens[1]) + 1); 372 strcpy(key_file, tokens[1]);
|
H A D | ntptimeset.c | 280 const char *key_file = KEYFILE; variable 282 char key_file_storage[MAX_PATH+1], *key_file ; variable 585 if (!key_file) key_file = KEYFILE; 586 if (!ExpandEnvironmentStrings(key_file, key_file_storage, MAX_PATH)) 589 key_file); 591 key_file = key_file_storage; 595 if (!authreadkeys(key_file)) {
|
H A D | ntpdate.c | 194 const char *key_file = KEYFILE; variable 196 char key_file_storage[MAX_PATH+1], *key_file ; variable 329 key_file = key_file_storage; 331 if (!ExpandEnvironmentStrings(KEYFILE, key_file, MAX_PATH)) 391 key_file = ntp_optarg; 516 if (!authreadkeys(key_file)) { 517 msyslog(LOG_ERR, "no key file <%s>, exiting", key_file);
|
/macosx-10.10.1/ruby-106/ruby/lib/rubygems/commands/ |
H A D | cert_command.rb | 22 OptionParser.accept OpenSSL::PKey::RSA do |key_file| 24 key = OpenSSL::PKey::RSA.new File.read key_file 26 raise OptionParser::InvalidArgument, "#{key_file}: does not exist" 28 raise OptionParser::InvalidArgument, "#{key_file}: invalid RSA key" 32 "#{key_file}: private key not found" unless key.private? 199 key_file = File.join Gem.default_key_path 200 key = File.read key_file
|
/macosx-10.10.1/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_security_signer.rb | 68 key_file = PRIVATE_KEY_PATH 70 signer = Gem::Security::Signer.new key_file, nil
|
/macosx-10.10.1/curl-83.1.2/curl/lib/vtls/ |
H A D | nss.c | 541 char *key_file) 549 rv = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE); 588 char *cert_file, char *key_file) 606 if(key_file || (is_file(cert_file))) { 607 if(key_file) 608 rv = nss_load_key(conn, sockindex, key_file); 614 if(!display_error(conn, err, key_file)) { 540 nss_load_key(struct connectdata *conn, int sockindex, char *key_file) argument 587 cert_stuff(struct connectdata *conn, int sockindex, char *cert_file, char *key_file) argument
|
H A D | openssl.c | 346 char *key_file, 559 if(key_file == NULL) 561 key_file=cert_file; 563 if(SSL_CTX_use_PrivateKey_file(ctx, key_file, file_type) != 1) { 565 key_file, key_type?key_type:"PEM"); 588 ENGINE_load_private_key(data->state.engine,key_file, 342 cert_stuff(struct connectdata *conn, SSL_CTX* ctx, char *cert_file, const char *cert_type, char *key_file, const char *key_type) argument
|
/macosx-10.10.1/ruby-106/ruby/lib/rubygems/ |
H A D | test_case.rb | 1086 key_file = key_path key_name 1088 key = File.read key_file
|
/macosx-10.10.1/postfix-255/postfix/src/smtp/ |
H A D | smtp.c | 1129 key_file = var_smtp_tls_key_file,
|