HomeSort by relevance Sort by last modified time
    Searched full:keyfile (Results 1 - 25 of 83) sorted by null

1 2 3 4

  /frameworks/base/keystore/java/android/security/
SystemKeyStore.java 74 File keyFile = getKeyFile(keyName);
75 if (keyFile.exists()) {
88 if (!keyFile.createNewFile()) {
92 FileOutputStream fos = new FileOutputStream(keyFile);
97 FileUtils.setPermissions(keyFile.getName(), (FileUtils.S_IRUSR | FileUtils.S_IWUSR),
108 File keyFile = new File(sysKeystoreDir, keyName + KEY_FILE_EXTENSION);
109 return keyFile;
117 File keyFile = getKeyFile(keyName);
118 if (!keyFile.exists()) {
121 return IoUtils.readFileAsByteArray(keyFile.toString())
    [all...]
  /external/zlib/src/contrib/dotzlib/DotZLib/
AssemblyInfo.cs 40 // Provider (CSP) on your machine. KeyFile refers to a file which contains
42 // (*) If the KeyFile and the KeyName values are both specified, the
45 // (2) If the KeyName does not exist and the KeyFile does exist, the key
46 // in the KeyFile is installed into the CSP and used.
47 // (*) In order to create a KeyFile, you can use the sn.exe (Strong Name) utility.
48 // When specifying the KeyFile, the location of the KeyFile should be
50 // %Project Directory%\obj\<configuration>. For example, if your KeyFile is
  /external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/
AssemblyInfo.cs 77 // Provider (CSP) on your machine. KeyFile refers to a file which contains
79 // (*) If the KeyFile and the KeyName values are both specified, the
82 // (2) If the KeyName does not exist and the KeyFile does exist, the key
83 // in the KeyFile is installed into the CSP and used.
84 // (*) In order to create a KeyFile, you can use the sn.exe (Strong Name) utility.
85 // When specifying the KeyFile, the location of the KeyFile should be
87 // %Project Directory%\obj\<configuration>. For example, if your KeyFile is
  /external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Utility/
AssemblyInfo.cs 74 // Provider (CSP) on your machine. KeyFile refers to a file which contains
76 // (*) If the KeyFile and the KeyName values are both specified, the
79 // (2) If the KeyName does not exist and the KeyFile does exist, the key
80 // in the KeyFile is installed into the CSP and used.
81 // (*) In order to create a KeyFile, you can use the sn.exe (Strong Name) utility.
82 // When specifying the KeyFile, the location of the KeyFile should be
84 // %Project Directory%\obj\<configuration>. For example, if your KeyFile is
  /external/chromium_org/third_party/openssl/openssl/apps/
smime.c 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
265 if (!keyfile)
266 keyfile = signerfile;
269 sk_OPENSSL_STRING_push(skkeys, keyfile);
270 keyfile = NULL;
297 if (keyfile)
310 sk_OPENSSL_STRING_push(skkeys, keyfile);
312 keyfile = *++args;
384 if (keyfile && !signerfile)
396 if (!keyfile)
    [all...]
cms.c 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
402 if (!keyfile)
403 keyfile = signerfile;
406 sk_OPENSSL_STRING_push(skkeys, keyfile);
407 keyfile = NULL;
440 if (keyfile)
453 sk_OPENSSL_STRING_push(skkeys, keyfile);
455 keyfile = *++args;
543 if (keyfile && !signerfile)
556 if (!keyfile)
    [all...]
dgst.c 118 const char *outfile = NULL, *keyfile = NULL; local
174 keyfile=*(++argv);
185 keyfile=*(++argv);
192 keyfile=*(++argv);
316 if(keyfile)
345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1)
351 if(keyfile)
354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
rsautl.c 93 char *keyfile = NULL; local
135 keyfile = *(++argv);
201 pkey = load_key(bio_err, keyfile, keyform, 0,
206 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
211 x = load_cert(bio_err, keyfile, keyform,
spkac.c 92 char *challenge = NULL, *keyfile = NULL; local
130 keyfile= *(++argv);
195 if(keyfile) {
197 strcmp(keyfile, "-") ? keyfile : NULL,
  /external/openssl/apps/
smime.c 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
265 if (!keyfile)
266 keyfile = signerfile;
269 sk_OPENSSL_STRING_push(skkeys, keyfile);
270 keyfile = NULL;
297 if (keyfile)
310 sk_OPENSSL_STRING_push(skkeys, keyfile);
312 keyfile = *++args;
384 if (keyfile && !signerfile)
396 if (!keyfile)
    [all...]
cms.c 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
402 if (!keyfile)
403 keyfile = signerfile;
406 sk_OPENSSL_STRING_push(skkeys, keyfile);
407 keyfile = NULL;
440 if (keyfile)
453 sk_OPENSSL_STRING_push(skkeys, keyfile);
455 keyfile = *++args;
543 if (keyfile && !signerfile)
556 if (!keyfile)
    [all...]
dgst.c 118 const char *outfile = NULL, *keyfile = NULL; local
174 keyfile=*(++argv);
185 keyfile=*(++argv);
192 keyfile=*(++argv);
316 if(keyfile)
345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1)
351 if(keyfile)
354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
rsautl.c 93 char *keyfile = NULL; local
135 keyfile = *(++argv);
201 pkey = load_key(bio_err, keyfile, keyform, 0,
206 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
211 x = load_cert(bio_err, keyfile, keyform,
spkac.c 92 char *challenge = NULL, *keyfile = NULL; local
130 keyfile= *(++argv);
195 if(keyfile) {
197 strcmp(keyfile, "-") ? keyfile : NULL,
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
  /frameworks/base/services/usb/java/com/android/server/usb/
UsbDebuggingManager.java 316 File keyFile = getUserKeyFile();
318 if (keyFile == null) {
322 if (!keyFile.exists()) {
323 keyFile.createNewFile();
324 FileUtils.setPermissions(keyFile.toString(),
329 FileOutputStream fo = new FileOutputStream(keyFile, true);
340 File keyFile = getUserKeyFile();
341 if (keyFile != null) {
342 keyFile.delete();
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.sample-plainrsa 9 # Racoon will look for a keyfile in this directory.
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
dec.c 75 char *keyfile=NULL; local
103 keyfile = argv[1];
119 if(!keyfile) {
124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
enc.c 76 char *keyfile = NULL; local
98 keyfile = argv[2];
101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
  /external/openssl/crypto/pkcs7/
dec.c 75 char *keyfile=NULL; local
103 keyfile = argv[1];
119 if(!keyfile) {
124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
enc.c 76 char *keyfile = NULL; local
98 keyfile = argv[2];
101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 94 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config ${DIR}/default.cnf
98 openssl ca -revoke /tmp/cert-rsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -config ${DIR}/default.cnf
99 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config ${DIR}/default.cnf
107 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config ${DIR}/default.cnf
108 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config ${DIR}/default.cnf
109 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out ${DIR}/crl-rsa-dsa-sigopt.pem -config ${DIR}/default.cnf -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1
114 openssl ca -gencrl -crlexts unsupported_cert -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-unsupported.pem -config ${DIR}/default.cnf

Completed in 281 milliseconds

1 2 3 4