HomeSort by relevance Sort by last modified time
    Searched refs:keyfile (Results 1 - 22 of 22) sorted by null

  /external/ganymed-ssh2/examples/
PortForwarding.java 29 File keyfile = new File("~/.ssh/id_rsa"); // or "~/.ssh/id_dsa" local
44 boolean isAuthenticated = conn.authenticateWithPublicKey(username, keyfile, keyfilePass);
PublicKeyAuthentication.java 22 File keyfile = new File("~/.ssh/id_rsa"); // or "~/.ssh/id_dsa" local
37 boolean isAuthenticated = conn.authenticateWithPublicKey(username, keyfile, keyfilePass);
  /external/openssl/apps/
smime.c 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
265 if (!keyfile)
266 keyfile = signerfile;
269 sk_OPENSSL_STRING_push(skkeys, keyfile);
270 keyfile = NULL;
297 if (keyfile)
310 sk_OPENSSL_STRING_push(skkeys, keyfile);
312 keyfile = *++args;
384 if (keyfile && !signerfile)
396 if (!keyfile)
    [all...]
cms.c 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
402 if (!keyfile)
403 keyfile = signerfile;
406 sk_OPENSSL_STRING_push(skkeys, keyfile);
407 keyfile = NULL;
440 if (keyfile)
453 sk_OPENSSL_STRING_push(skkeys, keyfile);
455 keyfile = *++args;
543 if (keyfile && !signerfile)
556 if (!keyfile)
    [all...]
dgst.c 118 const char *outfile = NULL, *keyfile = NULL; local
174 keyfile=*(++argv);
185 keyfile=*(++argv);
192 keyfile=*(++argv);
316 if(keyfile)
345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1)
351 if(keyfile)
354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
rsautl.c 93 char *keyfile = NULL; local
135 keyfile = *(++argv);
201 pkey = load_key(bio_err, keyfile, keyform, 0,
206 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
211 x = load_cert(bio_err, keyfile, keyform,
spkac.c 92 char *challenge = NULL, *keyfile = NULL; local
130 keyfile= *(++argv);
195 if(keyfile) {
197 strcmp(keyfile, "-") ? keyfile : NULL,
pkeyutl.c 76 char *keyfile, int keyform, int key_type,
414 char *keyfile, int keyform, int key_type,
437 pkey = load_key(bio_err, keyfile, keyform, 0,
442 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
447 x = load_cert(bio_err, keyfile, keyform,
CA.sh 133 -keyfile ${CATOP}/private/$CAKEY -selfsign \
ocsp.c 132 char *signfile = NULL, *keyfile = NULL; local
393 keyfile = *args;
709 if (!keyfile) keyfile = signfile;
723 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
    [all...]
x509.c 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local
323 keyfile= *(++argv);
961 keyfile, keyformat, 0,
994 if (keyfile == NULL)
1002 keyfile, keyformat, 0,
    [all...]
req.c 93 #define KEYFILE "default_keyfile"
175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local
247 keyfile= *(++argv);
619 if (keyfile != NULL)
621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e,
712 keyout=NCONF_get_string(req_conf,SECTION,KEYFILE);
    [all...]
ca.c 162 " -keyfile arg - private key file\n",
269 char *keyfile=NULL; local
400 else if (strcmp(*argv,"-keyfile") == 0)
403 keyfile= *(++argv);
746 if ((keyfile == NULL) && ((keyfile=NCONF_get_string(conf,
761 pkey = load_key(bio_err, keyfile, keyform, 0, key, e,
    [all...]
  /external/openssl/crypto/pkcs7/
enc.c 76 char *keyfile = NULL; local
98 keyfile = argv[2];
101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
dec.c 75 char *keyfile=NULL; local
103 keyfile = argv[1];
119 if(!keyfile) {
124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
  /frameworks/base/tools/obbtool/
mkobb.sh 141 if [ "x${keyfile}" != "x" -a -f "${keyfile}" ]; then \
142 rm -f ${keyfile}
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 83 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config ${DIR}/default.cnf
87 openssl ca -revoke /tmp/cert-rsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -config ${DIR}/default.cnf
88 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config ${DIR}/default.cnf
96 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config ${DIR}/default.cnf
97 openssl ca -gencrl -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config ${DIR}/default.cnf
98 openssl ca -gencrl -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out ${DIR}/crl-rsa-dsa-sigopt.pem -config ${DIR}/default.cnf -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1
103 openssl ca -gencrl -crlexts unsupported_cert -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-unsupported.pem -config ${DIR}/default.cnf
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
ant-jsch.jar 
ant-nodeps.jar 
  /external/chromium-trace/trace-viewer/examples/stream_server/
standalone.py 338 keyfile=self.websocket_server_options.private_key,
    [all...]
  /external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
standalone.py 334 keyfile=self.websocket_server_options.private_key,
    [all...]
  /external/libvpx/libvpx/vp8/encoder/
onyx_if.c 104 FILE *keyfile;
    [all...]

Completed in 522 milliseconds