/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/demos/easy_tls/ |
H A D | easy-tls.h | 33 const char *key_file; member in struct:tls_create_ctx_args
|
H A D | easy-tls.c | 641 ret.key_file = NULL; 669 if ((a.certificate_file != NULL) || (a.key_file != NULL)) { 670 if (a.key_file == NULL) { 679 if (!SSL_CTX_use_PrivateKey_file(ret, a.key_file, SSL_FILETYPE_PEM)) 684 if (tls_rand_seed_from_file(a.key_file, 0, apparg) == -1) 690 tls_errprintf(1, apparg, "Private key \"%s\" does not match certificate \"%s\".\n", a.key_file, a.certificate_file);
|
H A D | test.c | 68 a.key_file = "cert.pem";
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/demos/easy_tls/ |
H A D | easy-tls.h | 33 const char *key_file; member in struct:tls_create_ctx_args
|
H A D | easy-tls.c | 641 ret.key_file = NULL; 669 if ((a.certificate_file != NULL) || (a.key_file != NULL)) { 670 if (a.key_file == NULL) { 679 if (!SSL_CTX_use_PrivateKey_file(ret, a.key_file, SSL_FILETYPE_PEM)) 684 if (tls_rand_seed_from_file(a.key_file, 0, apparg) == -1) 690 tls_errprintf(1, apparg, "Private key \"%s\" does not match certificate \"%s\".\n", a.key_file, a.certificate_file);
|
H A D | test.c | 68 a.key_file = "cert.pem";
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_cb.c | 177 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) argument 193 if (key_file == NULL) key_file=cert_file; 194 if (SSL_CTX_use_PrivateKey_file(ctx,key_file, 197 BIO_printf(bio_err,"unable to get private key from '%s'\n",key_file);
|
H A D | s_apps.h | 156 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
H A D | s_client.c | 261 char *cert_file=NULL,*key_file=NULL; local 441 key_file= *(++argv); 529 if (key_file == NULL) 530 key_file = cert_file; 533 if (key_file) 537 key = load_key(bio_err, key_file, key_format, 0, pass, e,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/ |
H A D | s_cb.c | 177 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) argument 193 if (key_file == NULL) key_file=cert_file; 194 if (SSL_CTX_use_PrivateKey_file(ctx,key_file, 197 BIO_printf(bio_err,"unable to get private key from '%s'\n",key_file);
|
H A D | s_apps.h | 155 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
H A D | s_client.c | 246 char *cert_file=NULL,*key_file=NULL; local 383 key_file= *(++argv); 509 if (!set_cert_stuff(ctx,cert_file,key_file))
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | nss.c | 500 char *key_file) 507 CURLcode rv = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE); 532 (void)key_file; /* unused */ 555 char *cert_file, char *key_file) 570 if(key_file || (is_file(cert_file))) { 571 if(key_file) 572 rv = nss_load_key(conn, sockindex, key_file); 577 if(!display_error(conn, PR_GetError(), key_file)) 499 nss_load_key(struct connectdata *conn, int sockindex, char *key_file) argument 554 cert_stuff(struct connectdata *conn, int sockindex, char *cert_file, char *key_file) argument
|
H A D | ssluse.c | 315 char *key_file, 520 if(key_file == NULL) 522 key_file=cert_file; 524 if(SSL_CTX_use_PrivateKey_file(ctx, key_file, file_type) != 1) { 526 key_file, key_type?key_type:"PEM"); 540 ENGINE_load_private_key(data->state.engine,key_file, 311 cert_stuff(struct connectdata *conn, SSL_CTX* ctx, char *cert_file, const char *cert_type, char *key_file, const char *key_type) argument
|