HomeSort by relevance Sort by last modified time
    Searched full:keyfile (Results 26 - 50 of 83) sorted by null

12 3 4

  /frameworks/base/tools/obbtool/
mkobb.sh 141 if [ "x${keyfile}" != "x" -a -f "${keyfile}" ]; then \
142 rm -f ${keyfile}
  /external/chromium_org/third_party/skia/platform_tools/barelinux/bin/
arm64_download 76 local keyfile='CLEAN_AND_CONFIGURED_key'
92 try cp "${working_dir}/${keyfile}" "${working_dir}/key" || return
  /external/skia/platform_tools/barelinux/bin/
arm64_download 76 local keyfile='CLEAN_AND_CONFIGURED_key'
92 try cp "${working_dir}/${keyfile}" "${working_dir}/key" || return
  /packages/services/Telephony/src/com/android/phone/
CallTime.java 204 String keyFile = baseName + ".key";
211 file = new File(keyFile);
  /external/chromium_org/third_party/openssl/openssl/apps/
pkeyutl.c 76 char *keyfile, int keyform, int key_type,
414 char *keyfile, int keyform, int key_type,
437 pkey = load_key(bio_err, keyfile, keyform, 0,
442 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
447 x = load_cert(bio_err, keyfile, keyform,
ocsp.c 132 char *signfile = NULL, *keyfile = NULL; local
393 keyfile = *args;
709 if (!keyfile) keyfile = signfile;
723 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
    [all...]
x509.c 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local
323 keyfile= *(++argv);
961 keyfile, keyformat, 0,
994 if (keyfile == NULL)
1002 keyfile, keyformat, 0,
    [all...]
req.c 93 #define KEYFILE "default_keyfile"
175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local
247 keyfile= *(++argv);
619 if (keyfile != NULL)
621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e,
712 keyout=NCONF_get_string(req_conf,SECTION,KEYFILE);
    [all...]
CA.pl 118 "-keyfile ${CATOP}/private/$CAKEY -selfsign " .
CA.pl.in 118 "-keyfile ${CATOP}/private/$CAKEY -selfsign " .
  /external/openssl/apps/
pkeyutl.c 76 char *keyfile, int keyform, int key_type,
414 char *keyfile, int keyform, int key_type,
437 pkey = load_key(bio_err, keyfile, keyform, 0,
442 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
447 x = load_cert(bio_err, keyfile, keyform,
ocsp.c 133 char *signfile = NULL, *keyfile = NULL; local
403 keyfile = *args;
719 if (!keyfile) keyfile = signfile;
733 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
    [all...]
x509.c 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local
323 keyfile= *(++argv);
961 keyfile, keyformat, 0,
994 if (keyfile == NULL)
1002 keyfile, keyformat, 0,
    [all...]
req.c 93 #define KEYFILE "default_keyfile"
175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local
247 keyfile= *(++argv);
619 if (keyfile != NULL)
621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e,
711 keyout=NCONF_get_string(req_conf,SECTION,KEYFILE);
    [all...]
  /external/wpa_supplicant_8/hs20/server/ca/
setup.sh 28 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate"
47 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate"
61 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.pem -days 730 -extensions v3_OCSP
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
smtplib.py 617 def starttls(self, keyfile=None, certfile=None):
624 session. If you provide the keyfile and certfile parameters,
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
773 keyfile=None, certfile=None,
775 self.keyfile = keyfile
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
imaplib.py     [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
smtplib.py 617 def starttls(self, keyfile=None, certfile=None):
624 session. If you provide the keyfile and certfile parameters,
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
773 keyfile=None, certfile=None,
775 self.keyfile = keyfile
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
imaplib.py     [all...]
  /build/tools/signapk/
SignApk.java 171 * @param keyFile The file containing the private key. Used to prompt the user.
173 private static String readPassword(File keyFile) {
175 System.out.print("Enter password for " + keyFile + " (password will not be hidden): ");
192 * @param keyFile The file containing the private key
194 private static PKCS8EncodedKeySpec decryptPrivateKey(byte[] encryptedPrivateKey, File keyFile)
204 char[] password = readPassword(keyFile).toCharArray();
215 System.err.println("signapk: Password for " + keyFile + " may be bad.");
    [all...]
  /external/chromium_org/tools/gyp/pylib/gyp/
MSVSSettings_test.py 147 'KeyFile': 'a_file_name',
396 'KeyFile': 'a_file_name',
    [all...]
  /external/chromium_org/third_party/skia/tools/bug_chomper/src/server/
server.go 33 const keyFile = "certs/key.pem"
368 err = http.ListenAndServeTLS(port, certFile, keyFile, nil)
  /external/skia/tools/bug_chomper/src/server/
server.go 33 const keyFile = "certs/key.pem"
368 err = http.ListenAndServeTLS(port, certFile, keyFile, nil)
  /development/samples/Vault/src/com/example/android/vault/
VaultProvider.java 169 private void loadOrGenerateKeys(Context context, File keyFile)
174 if (!keyFile.exists()) {
181 writeFully(keyFile, wrapped);
186 final byte[] wrapped = readFully(keyFile);
  /external/chromium_org/native_client_sdk/src/build_tools/sdk_tools/third_party/fancy_urllib/
__init__.py 148 keyfile=self.key_file,
161 keyfile=self.key_file,

Completed in 417 milliseconds

12 3 4