/external/libvncserver/libvncserver/ |
H A D | rfbssl_openssl.c | 42 char *keyfile; local 50 keyfile = cl->screen->sslkeyfile; 52 keyfile = cl->screen->sslcertfile; 61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { 62 rfbErr("Unable to load private key file %s\n", keyfile);
|
H A D | rfbssl_gnutls.c | 123 char *keyfile; local 124 if (!(keyfile = cl->screen->sslkeyfile)) 125 keyfile = cl->screen->sslcertfile; 127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) {
|
/external/libcups/cups/ |
H A D | tls-boringssl.c | 88 keyfile[1024]; /* Private key filename */ local
|
H A D | tls-gnutls.c | 71 keyfile[1024]; /* Private key filename */ local 97 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); 123 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) 125 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); 131 DEBUG_printf(("1cupsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))); 1334 keyfile[1024]; /* Private key file */ local 1379 http_gnutls_make_path(keyfile, sizeof(keyfile), tls_keypath, hostname, "key"); 1381 if (access(crtfile, R_OK) || access(keyfile, R_O [all...] |
/external/libmicrohttpd/src/microspdy/ |
H A D | daemon.c | 172 const char *keyfile, 230 if (NULL == keyfile 231 || NULL == (daemon->keyfile = strdup (keyfile))) 233 SPDYF_DEBUG("strdup (keyfile)"); 364 if(NULL != daemon->keyfile) 365 free(daemon->keyfile); 385 free(daemon->keyfile); 170 SPDYF_start_daemon_va(uint16_t port, const char *certfile, const char *keyfile, SPDY_NewSessionCallback nscb, SPDY_SessionClosedCallback sccb, SPDY_NewRequestCallback nrcb, SPDY_NewDataCallback npdcb, SPDYF_NewStreamCallback fnscb, SPDYF_NewDataCallback fndcb, void * cls, void * fcls, va_list valist) argument
|
H A D | applicationlayer.c | 327 const char *keyfile, 350 if(NULL == keyfile) 352 SPDYF_DEBUG("keyfile is NULL"); 360 keyfile, 325 SPDY_start_daemon(uint16_t port, const char *certfile, const char *keyfile, SPDY_NewSessionCallback nscb, SPDY_SessionClosedCallback sccb, SPDY_NewRequestCallback nrcb, SPDY_NewDataCallback npdcb, void * cls, ...) argument
|
H A D | structures.h | 897 char *keyfile; member in struct:SPDY_Daemon
|
/external/python/cpython3/Modules/clinic/ |
H A D | _ssl.c.h | 467 "load_cert_chain($self, /, certfile, keyfile=None, password=None)\n" 476 PyObject *keyfile, PyObject *password); 482 static const char * const _keywords[] = {"certfile", "keyfile", "password", NULL}; 485 PyObject *keyfile = NULL; local 489 &certfile, &keyfile, &password)) { 492 return_value = _ssl__SSLContext_load_cert_chain_impl(self, certfile, keyfile, password);
|
/external/python/cpython2/Modules/ |
H A D | _ssl.c | 2644 char *kwlist[] = {"certfile", "keyfile", "password", NULL}; 2645 PyObject *keyfile = NULL, *keyfile_bytes = NULL, *password = NULL; local 2657 &keyfile, &password)) 2660 if (keyfile && keyfile != Py_None) { 2661 if (PyString_Check(keyfile)) { 2662 Py_INCREF(keyfile); 2663 keyfile_bytes = keyfile; 2665 PyObject *u = PyUnicode_FromObject(keyfile);
|
/external/python/cpython3/Modules/ |
H A D | _ssl.c | 3234 keyfile: object = NULL 3241 PyObject *keyfile, PyObject *password) 3252 if (keyfile == Py_None) 3253 keyfile = NULL; 3259 if (keyfile && !PyUnicode_FSConverter(keyfile, &keyfile_bytes)) { 3261 "keyfile should be a valid filesystem path"); 3294 PyBytes_AS_STRING(keyfile ? keyfile_bytes : certfile_bytes), 3240 _ssl__SSLContext_load_cert_chain_impl(PySSLContext *self, PyObject *certfile, PyObject *keyfile, PyObject *password) argument
|