/external/vboot_reference/host/lib/ |
H A D | signature_digest.c | 41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file, argument 49 key_fp = fopen(key_file, "r"); 51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file)); 59 key_file));
|
H A D | host_signature.c | 249 const char* key_file, 292 key_file, /* Key file to use */ 248 CalculateSignature_external(const uint8_t* data, uint64_t size, const char* key_file, uint64_t key_algorithm, const char* external_signer) argument
|
/external/openssh/regress/unittests/hostkeys/ |
H A D | test_iterate.c | 26 const char *key_file; /* Path for key, NULL for none */ member in struct:expected 151 if (expected[i].key_file == NULL) 162 test_data_file(expected[i].key_file), &expected[i].l.key,
|
/external/libbrillo/policy/ |
H A D | device_policy_impl.cc | 25 // Reads the public key used to sign the policy from |key_file| and stores it 27 bool ReadPublicKeyFromFile(const base::FilePath& key_file, argument 29 if (!base::PathExists(key_file)) 32 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) {
|
/external/autotest/client/deps/fakegudev/src/ |
H A D | fakegudev.c | 181 GKeyFile *key_file; local 187 key_file = g_key_file_new(); 188 if (!g_key_file_load_from_file (key_file, 194 groups = g_key_file_get_groups(key_file, &num_groups); 206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) { 214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) { 224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error); 234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error); 250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error); 256 value = g_key_file_get_string (key_file, grou [all...] |
/external/boringssl/src/ssl/test/ |
H A D | test_config.h | 32 std::string key_file; member in struct:TestConfig
|
/external/curl/lib/vtls/ |
H A D | nss.c | 581 char *key_file) 591 result = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE); 628 char *cert_file, char *key_file) 646 if(key_file || (is_file(cert_file))) { 647 if(key_file) 648 result = nss_load_key(conn, sockindex, key_file); 654 if(!display_error(conn, err, key_file)) { 580 nss_load_key(struct connectdata *conn, int sockindex, char *key_file) argument 627 cert_stuff(struct connectdata *conn, int sockindex, char *cert_file, char *key_file) argument
|
H A D | openssl.c | 333 char *key_file, 541 if(!key_file) 543 key_file=cert_file; 545 if(SSL_CTX_use_PrivateKey_file(ctx, key_file, file_type) != 1) { 547 key_file, key_type?key_type:"PEM"); 569 ENGINE_load_private_key(data->state.engine, key_file, 329 cert_stuff(struct connectdata *conn, SSL_CTX* ctx, char *cert_file, const char *cert_type, char *key_file, const char *key_type, char *key_passwd) argument
|