/frameworks/base/tools/obbtool/ |
mkobb.sh | 141 if [ "x${keyfile}" != "x" -a -f "${keyfile}" ]; then \ 142 rm -f ${keyfile}
|
/external/chromium_org/third_party/skia/platform_tools/barelinux/bin/ |
arm64_download | 76 local keyfile='CLEAN_AND_CONFIGURED_key' 92 try cp "${working_dir}/${keyfile}" "${working_dir}/key" || return
|
/external/skia/platform_tools/barelinux/bin/ |
arm64_download | 76 local keyfile='CLEAN_AND_CONFIGURED_key' 92 try cp "${working_dir}/${keyfile}" "${working_dir}/key" || return
|
/packages/services/Telephony/src/com/android/phone/ |
CallTime.java | 204 String keyFile = baseName + ".key"; 211 file = new File(keyFile);
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkeyutl.c | 76 char *keyfile, int keyform, int key_type, 414 char *keyfile, int keyform, int key_type, 437 pkey = load_key(bio_err, keyfile, keyform, 0, 442 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 447 x = load_cert(bio_err, keyfile, keyform,
|
ocsp.c | 132 char *signfile = NULL, *keyfile = NULL; local 393 keyfile = *args; 709 if (!keyfile) keyfile = signfile; 723 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, [all...] |
x509.c | 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 323 keyfile= *(++argv); 961 keyfile, keyformat, 0, 994 if (keyfile == NULL) 1002 keyfile, keyformat, 0, [all...] |
req.c | 93 #define KEYFILE "default_keyfile" 175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local 247 keyfile= *(++argv); 619 if (keyfile != NULL) 621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e, 712 keyout=NCONF_get_string(req_conf,SECTION,KEYFILE); [all...] |
CA.pl | 118 "-keyfile ${CATOP}/private/$CAKEY -selfsign " .
|
CA.pl.in | 118 "-keyfile ${CATOP}/private/$CAKEY -selfsign " .
|
/external/openssl/apps/ |
pkeyutl.c | 76 char *keyfile, int keyform, int key_type, 414 char *keyfile, int keyform, int key_type, 437 pkey = load_key(bio_err, keyfile, keyform, 0, 442 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 447 x = load_cert(bio_err, keyfile, keyform,
|
ocsp.c | 133 char *signfile = NULL, *keyfile = NULL; local 403 keyfile = *args; 719 if (!keyfile) keyfile = signfile; 733 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, [all...] |
x509.c | 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 323 keyfile= *(++argv); 961 keyfile, keyformat, 0, 994 if (keyfile == NULL) 1002 keyfile, keyformat, 0, [all...] |
req.c | 93 #define KEYFILE "default_keyfile" 175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local 247 keyfile= *(++argv); 619 if (keyfile != NULL) 621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e, 711 keyout=NCONF_get_string(req_conf,SECTION,KEYFILE); [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
setup.sh | 28 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 47 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate" 61 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.pem -days 730 -extensions v3_OCSP
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtplib.py | 617 def starttls(self, keyfile=None, certfile=None): 624 session. If you provide the keyfile and certfile parameters, 641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile 773 keyfile=None, certfile=None, 775 self.keyfile = keyfile 783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
imaplib.py | [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtplib.py | 617 def starttls(self, keyfile=None, certfile=None): 624 session. If you provide the keyfile and certfile parameters, 641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile 773 keyfile=None, certfile=None, 775 self.keyfile = keyfile 783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
imaplib.py | [all...] |
/build/tools/signapk/ |
SignApk.java | 171 * @param keyFile The file containing the private key. Used to prompt the user. 173 private static String readPassword(File keyFile) { 175 System.out.print("Enter password for " + keyFile + " (password will not be hidden): "); 192 * @param keyFile The file containing the private key 194 private static PKCS8EncodedKeySpec decryptPrivateKey(byte[] encryptedPrivateKey, File keyFile) 204 char[] password = readPassword(keyFile).toCharArray(); 215 System.err.println("signapk: Password for " + keyFile + " may be bad."); [all...] |
/external/chromium_org/tools/gyp/pylib/gyp/ |
MSVSSettings_test.py | 147 'KeyFile': 'a_file_name', 396 'KeyFile': 'a_file_name', [all...] |
/external/chromium_org/third_party/skia/tools/bug_chomper/src/server/ |
server.go | 33 const keyFile = "certs/key.pem" 368 err = http.ListenAndServeTLS(port, certFile, keyFile, nil)
|
/external/skia/tools/bug_chomper/src/server/ |
server.go | 33 const keyFile = "certs/key.pem" 368 err = http.ListenAndServeTLS(port, certFile, keyFile, nil)
|
/development/samples/Vault/src/com/example/android/vault/ |
VaultProvider.java | 169 private void loadOrGenerateKeys(Context context, File keyFile) 174 if (!keyFile.exists()) { 181 writeFully(keyFile, wrapped); 186 final byte[] wrapped = readFully(keyFile);
|
/external/chromium_org/native_client_sdk/src/build_tools/sdk_tools/third_party/fancy_urllib/ |
__init__.py | 148 keyfile=self.key_file, 161 keyfile=self.key_file,
|