/frameworks/base/keystore/java/android/security/ |
SystemKeyStore.java | 74 File keyFile = getKeyFile(keyName); 75 if (keyFile.exists()) { 88 if (!keyFile.createNewFile()) { 92 FileOutputStream fos = new FileOutputStream(keyFile); 97 FileUtils.setPermissions(keyFile.getName(), (FileUtils.S_IRUSR | FileUtils.S_IWUSR), 108 File keyFile = new File(sysKeystoreDir, keyName + KEY_FILE_EXTENSION); 109 return keyFile; 117 File keyFile = getKeyFile(keyName); 118 if (!keyFile.exists()) { 121 return IoUtils.readFileAsByteArray(keyFile.toString()) [all...] |
/external/zlib/src/contrib/dotzlib/DotZLib/ |
AssemblyInfo.cs | 40 // Provider (CSP) on your machine. KeyFile refers to a file which contains
42 // (*) If the KeyFile and the KeyName values are both specified, the
45 // (2) If the KeyName does not exist and the KeyFile does exist, the key
46 // in the KeyFile is installed into the CSP and used.
47 // (*) In order to create a KeyFile, you can use the sn.exe (Strong Name) utility.
48 // When specifying the KeyFile, the location of the KeyFile should be
50 // %Project Directory%\obj\<configuration>. For example, if your KeyFile is
|
/external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/ |
AssemblyInfo.cs | 77 // Provider (CSP) on your machine. KeyFile refers to a file which contains 79 // (*) If the KeyFile and the KeyName values are both specified, the 82 // (2) If the KeyName does not exist and the KeyFile does exist, the key 83 // in the KeyFile is installed into the CSP and used. 84 // (*) In order to create a KeyFile, you can use the sn.exe (Strong Name) utility. 85 // When specifying the KeyFile, the location of the KeyFile should be 87 // %Project Directory%\obj\<configuration>. For example, if your KeyFile is
|
/external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Utility/ |
AssemblyInfo.cs | 74 // Provider (CSP) on your machine. KeyFile refers to a file which contains 76 // (*) If the KeyFile and the KeyName values are both specified, the 79 // (2) If the KeyName does not exist and the KeyFile does exist, the key 80 // in the KeyFile is installed into the CSP and used. 81 // (*) In order to create a KeyFile, you can use the sn.exe (Strong Name) utility. 82 // When specifying the KeyFile, the location of the KeyFile should be 84 // %Project Directory%\obj\<configuration>. For example, if your KeyFile is
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
smime.c | 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 265 if (!keyfile) 266 keyfile = signerfile; 269 sk_OPENSSL_STRING_push(skkeys, keyfile); 270 keyfile = NULL; 297 if (keyfile) 310 sk_OPENSSL_STRING_push(skkeys, keyfile); 312 keyfile = *++args; 384 if (keyfile && !signerfile) 396 if (!keyfile) [all...] |
cms.c | 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 402 if (!keyfile) 403 keyfile = signerfile; 406 sk_OPENSSL_STRING_push(skkeys, keyfile); 407 keyfile = NULL; 440 if (keyfile) 453 sk_OPENSSL_STRING_push(skkeys, keyfile); 455 keyfile = *++args; 543 if (keyfile && !signerfile) 556 if (!keyfile) [all...] |
dgst.c | 118 const char *outfile = NULL, *keyfile = NULL; local 174 keyfile=*(++argv); 185 keyfile=*(++argv); 192 keyfile=*(++argv); 316 if(keyfile) 345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1) 351 if(keyfile) 354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
rsautl.c | 93 char *keyfile = NULL; local 135 keyfile = *(++argv); 201 pkey = load_key(bio_err, keyfile, keyform, 0, 206 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 211 x = load_cert(bio_err, keyfile, keyform,
|
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 130 keyfile= *(++argv); 195 if(keyfile) { 197 strcmp(keyfile, "-") ? keyfile : NULL,
|
/external/openssl/apps/ |
smime.c | 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 265 if (!keyfile) 266 keyfile = signerfile; 269 sk_OPENSSL_STRING_push(skkeys, keyfile); 270 keyfile = NULL; 297 if (keyfile) 310 sk_OPENSSL_STRING_push(skkeys, keyfile); 312 keyfile = *++args; 384 if (keyfile && !signerfile) 396 if (!keyfile) [all...] |
cms.c | 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 402 if (!keyfile) 403 keyfile = signerfile; 406 sk_OPENSSL_STRING_push(skkeys, keyfile); 407 keyfile = NULL; 440 if (keyfile) 453 sk_OPENSSL_STRING_push(skkeys, keyfile); 455 keyfile = *++args; 543 if (keyfile && !signerfile) 556 if (!keyfile) [all...] |
dgst.c | 118 const char *outfile = NULL, *keyfile = NULL; local 174 keyfile=*(++argv); 185 keyfile=*(++argv); 192 keyfile=*(++argv); 316 if(keyfile) 345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1) 351 if(keyfile) 354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
rsautl.c | 93 char *keyfile = NULL; local 135 keyfile = *(++argv); 201 pkey = load_key(bio_err, keyfile, keyform, 0, 206 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 211 x = load_cert(bio_err, keyfile, keyform,
|
spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 130 keyfile= *(++argv); 195 if(keyfile) { 197 strcmp(keyfile, "-") ? keyfile : NULL,
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 106 def __init__(self, sock, keyfile=None, certfile=None, 124 if certfile and not keyfile: 125 keyfile = certfile 139 keyfile, certfile, 144 self.keyfile = keyfile 312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile, 349 keyfile=self.keyfile, 376 def wrap_socket(sock, keyfile=None, certfile=None [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 324 keyfile - PEM formatted file that countains your private key 330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 333 self.keyfile = keyfile 352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 106 def __init__(self, sock, keyfile=None, certfile=None, 124 if certfile and not keyfile: 125 keyfile = certfile 139 keyfile, certfile, 144 self.keyfile = keyfile 312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile, 349 keyfile=self.keyfile, 376 def wrap_socket(sock, keyfile=None, certfile=None [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 324 keyfile - PEM formatted file that countains your private key 330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 333 self.keyfile = keyfile 352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
UsbDebuggingManager.java | 316 File keyFile = getUserKeyFile(); 318 if (keyFile == null) { 322 if (!keyFile.exists()) { 323 keyFile.createNewFile(); 324 FileUtils.setPermissions(keyFile.toString(), 329 FileOutputStream fo = new FileOutputStream(keyFile, true); 340 File keyFile = getUserKeyFile(); 341 if (keyFile != null) { 342 keyFile.delete();
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-plainrsa | 9 # Racoon will look for a keyfile in this directory.
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
dec.c | 75 char *keyfile=NULL; local 103 keyfile = argv[1]; 119 if(!keyfile) { 124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
|
enc.c | 76 char *keyfile = NULL; local 98 keyfile = argv[2]; 101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
|
/external/openssl/crypto/pkcs7/ |
dec.c | 75 char *keyfile=NULL; local 103 keyfile = argv[1]; 119 if(!keyfile) { 124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
|
enc.c | 76 char *keyfile = NULL; local 98 keyfile = argv[2]; 101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
|
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 94 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config ${DIR}/default.cnf 98 openssl ca -revoke /tmp/cert-rsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -config ${DIR}/default.cnf 99 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config ${DIR}/default.cnf 107 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config ${DIR}/default.cnf 108 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config ${DIR}/default.cnf 109 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out ${DIR}/crl-rsa-dsa-sigopt.pem -config ${DIR}/default.cnf -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1 114 openssl ca -gencrl -crlexts unsupported_cert -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-unsupported.pem -config ${DIR}/default.cnf
|