/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
enc.c | 76 char *keyfile = NULL; local 98 keyfile = argv[2]; 101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
|
dec.c | 75 char *keyfile=NULL; local 103 keyfile = argv[1]; 119 if(!keyfile) { 124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
|
/external/ganymed-ssh2/examples/ |
PortForwarding.java | 29 File keyfile = new File("~/.ssh/id_rsa"); // or "~/.ssh/id_dsa" local 44 boolean isAuthenticated = conn.authenticateWithPublicKey(username, keyfile, keyfilePass);
|
PublicKeyAuthentication.java | 22 File keyfile = new File("~/.ssh/id_rsa"); // or "~/.ssh/id_dsa" local 37 boolean isAuthenticated = conn.authenticateWithPublicKey(username, keyfile, keyfilePass);
|
/external/openssl/crypto/pkcs7/ |
enc.c | 76 char *keyfile = NULL; local 98 keyfile = argv[2]; 101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
|
dec.c | 75 char *keyfile=NULL; local 103 keyfile = argv[1]; 119 if(!keyfile) { 124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 130 keyfile= *(++argv); 195 if(keyfile) { 197 strcmp(keyfile, "-") ? keyfile : NULL,
|
dgst.c | 118 const char *outfile = NULL, *keyfile = NULL; local 174 keyfile=*(++argv); 185 keyfile=*(++argv); 192 keyfile=*(++argv); 316 if(keyfile) 345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1) 351 if(keyfile) 354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
rsautl.c | 93 char *keyfile = NULL; local 135 keyfile = *(++argv); 201 pkey = load_key(bio_err, keyfile, keyform, 0, 206 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 211 x = load_cert(bio_err, keyfile, keyform,
|
smime.c | 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 265 if (!keyfile) 266 keyfile = signerfile; 269 sk_OPENSSL_STRING_push(skkeys, keyfile); 270 keyfile = NULL; 297 if (keyfile) 310 sk_OPENSSL_STRING_push(skkeys, keyfile); 312 keyfile = *++args; 384 if (keyfile && !signerfile) 396 if (!keyfile) [all...] |
cms.c | 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 402 if (!keyfile) 403 keyfile = signerfile; 406 sk_OPENSSL_STRING_push(skkeys, keyfile); 407 keyfile = NULL; 440 if (keyfile) 453 sk_OPENSSL_STRING_push(skkeys, keyfile); 455 keyfile = *++args; 543 if (keyfile && !signerfile) 556 if (!keyfile) [all...] |
ocsp.c | 132 char *signfile = NULL, *keyfile = NULL; local 393 keyfile = *args; 709 if (!keyfile) keyfile = signfile; 723 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, [all...] |
req.c | 93 #define KEYFILE "default_keyfile" 175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local 247 keyfile= *(++argv); 619 if (keyfile != NULL) 621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e, 712 keyout=NCONF_get_string(req_conf,SECTION,KEYFILE); [all...] |
x509.c | 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 323 keyfile= *(++argv); 961 keyfile, keyformat, 0, 994 if (keyfile == NULL) 1002 keyfile, keyformat, 0, [all...] |
ca.c | 162 " -keyfile arg - private key file\n", 269 char *keyfile=NULL; local 400 else if (strcmp(*argv,"-keyfile") == 0) 403 keyfile= *(++argv); 746 if ((keyfile == NULL) && ((keyfile=NCONF_get_string(conf, 761 pkey = load_key(bio_err, keyfile, keyform, 0, key, e, [all...] |
/external/openssl/apps/ |
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 130 keyfile= *(++argv); 195 if(keyfile) { 197 strcmp(keyfile, "-") ? keyfile : NULL,
|
dgst.c | 118 const char *outfile = NULL, *keyfile = NULL; local 174 keyfile=*(++argv); 185 keyfile=*(++argv); 192 keyfile=*(++argv); 316 if(keyfile) 345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1) 351 if(keyfile) 354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
rsautl.c | 93 char *keyfile = NULL; local 135 keyfile = *(++argv); 201 pkey = load_key(bio_err, keyfile, keyform, 0, 206 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 211 x = load_cert(bio_err, keyfile, keyform,
|
smime.c | 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 265 if (!keyfile) 266 keyfile = signerfile; 269 sk_OPENSSL_STRING_push(skkeys, keyfile); 270 keyfile = NULL; 297 if (keyfile) 310 sk_OPENSSL_STRING_push(skkeys, keyfile); 312 keyfile = *++args; 384 if (keyfile && !signerfile) 396 if (!keyfile) [all...] |
cms.c | 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 402 if (!keyfile) 403 keyfile = signerfile; 406 sk_OPENSSL_STRING_push(skkeys, keyfile); 407 keyfile = NULL; 440 if (keyfile) 453 sk_OPENSSL_STRING_push(skkeys, keyfile); 455 keyfile = *++args; 543 if (keyfile && !signerfile) 556 if (!keyfile) [all...] |
ocsp.c | 132 char *signfile = NULL, *keyfile = NULL; local 393 keyfile = *args; 709 if (!keyfile) keyfile = signfile; 723 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, [all...] |
req.c | 93 #define KEYFILE "default_keyfile" 175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local 247 keyfile= *(++argv); 619 if (keyfile != NULL) 621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e, 712 keyout=NCONF_get_string(req_conf,SECTION,KEYFILE); [all...] |
x509.c | 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 323 keyfile= *(++argv); 961 keyfile, keyformat, 0, 994 if (keyfile == NULL) 1002 keyfile, keyformat, 0, [all...] |
ca.c | 162 " -keyfile arg - private key file\n", 269 char *keyfile=NULL; local 400 else if (strcmp(*argv,"-keyfile") == 0) 403 keyfile= *(++argv); 746 if ((keyfile == NULL) && ((keyfile=NCONF_get_string(conf, 761 pkey = load_key(bio_err, keyfile, keyform, 0, key, e, [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-jsch.jar | |