/system/core/fastboot/ |
p12topem.sh | 9 openssl pkcs12 -passin pass:"$2" -passout pass:"$2" -in $1.p12 -out $1.pem
|
genkey.sh | 5 echo "Usage: $0 alias \"pass phrase\"" 11 openssl genrsa -3 -out $1.pem -passout pass:"$2" 2048 14 openssl req -new -x509 -key $1.pem -passin pass:"$2" \ 20 openssl pkcs12 -export -in $1-cert.pem -inkey $1.pem -passin pass:"$2" \ 21 -out $1.p12 -name $1 -passout pass:"$2"
|
signfile.sh | 9 openssl dgst -passin pass:"$3" -binary -sha1 -sign $1.pem $2 > $2.sign
|
/packages/apps/Gallery3D/src/com/cooliris/media/ |
MediaFilter.java | 20 public abstract boolean pass(MediaItem item); method in class:MediaFilter
|
/external/openssl/crypto/pkcs12/ |
p12_p8d.c | 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) 65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
|
p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 106 if(!pass || !*pass) { 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts) [all...] |
pkcs12.h | 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 182 const char *pass, int passlen, 185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 215 const char *pass, int passlen, 218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt 254 int key_nid, char *pass); variable 256 int safe_nid, int iter, char *pass); variable [all...] |
/external/webkit/WebKitTools/pywebsocket/test/testdata/handlers/sub/ |
exception_in_transfer_wsh.py | 36 pass
|
no_wsh_at_the_end.py | 36 pass
|
plain_wsh.py | 32 pass
|
wrong_handshake_sig_wsh.py | 36 pass
|
wrong_transfer_sig_wsh.py | 36 pass
|
/external/webkit/LayoutTests/fast/js/resources/ |
js-test-post-function.js | 4 debug('<br><span class="pass">TEST COMPLETE</span>');
|
/external/protobuf/python/google/protobuf/internal/ |
message_listener.py | 78 pass
|
/external/webkit/WebKitTools/Scripts/webkitpy/layout_tests/port/ |
test.py | 81 pass 84 pass 90 pass 93 pass 96 pass 99 pass 102 pass 105 pass 144 pass
|
/external/iproute2/doc/ |
Makefile | 35 @set -e; pass=2; echo "Running LaTeX $<"; \ 38 if [ $$pass -gt 3 ]; then \ 41 echo "Re-running LaTeX $<, $${pass}d pass"; pass=$$[$$pass + 1]; \
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPasswordProtectionTest.java | 80 char [] pass = {'a', 'b', 'c'}; local 81 KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass); 84 assertEquals("Incorrect password length", pass.length, rPass.length); 85 for (int i = 0; i < pass.length; i++) { 87 .concat(")"), pass[i], rPass[i]);
|
AccessController2Test.java | 71 Boolean pass; local 80 pass = AccessController.doPrivileged(privAction, null); 82 "AccessControlContext.", pass.booleanValue()); 87 pass = AccessController.doPrivileged(privAction, acc); 89 "AccessControlContext.", pass.booleanValue()); 102 Boolean pass; local 111 pass = AccessController.doPrivileged(privAction); 113 "AccessControlContext.", pass.booleanValue()); 127 Boolean pass; local 140 pass = AccessController.doPrivileged(privExceptAction, null) 171 Boolean pass; local [all...] |
/external/clearsilver/cs/ |
test_comma.cs | 2 Comma tests, evalute both but pass right most as expression result
|
/external/chromium/third_party/icu/source/test/intltest/ |
wbnf.cpp | 1506 UBool pass; local 1522 UBool pass; local 1548 UBool pass = TRUE; local 1607 UBool pass = TRUE; local 1717 UBool pass; local [all...] |
/external/icu4c/test/intltest/ |
wbnf.cpp | 1506 UBool pass; local 1522 UBool pass; local 1548 UBool pass = TRUE; local 1607 UBool pass = TRUE; local 1717 UBool pass; local [all...] |
/external/bluetooth/bluez/test/ |
dbusdef.py | 16 pass
|
/external/chromium/third_party/icu/source/test/cintltst/ |
crestst.h | 52 int32_t pass; variable
|
/external/icu4c/test/cintltst/ |
crestst.h | 52 int32_t pass; variable
|
/external/webkit/WebKitTools/pywebsocket/example/ |
echo_wsh.py | 38 pass # Always accept.
|