HomeSort by relevance Sort by last modified time
    Searched refs:keyfile (Results 1 - 25 of 57) sorted by null

1 2 3

  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/s3/
test_keyfile.py 25 from boto.s3.keyfile import KeyFile
38 self.keyfile = KeyFile(key)
41 self.keyfile.close()
44 self.assertEqual(self.keyfile.read(len(self.contents)), self.contents)
47 self.assertEqual(self.keyfile.read(5), self.contents[:5])
48 self.assertEqual(self.keyfile.read(5), self.contents[5:])
51 self.assertEqual(self.keyfile.tell(), 0)
52 self.keyfile.read(4
    [all...]
  /external/libvncserver/libvncserver/
rfbssl_openssl.c 42 char *keyfile; local
50 keyfile = cl->screen->sslkeyfile;
52 keyfile = cl->screen->sslcertfile;
61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) {
62 rfbErr("Unable to load private key file %s\n", keyfile);
rfbssl_gnutls.c 123 char *keyfile; local
124 if (!(keyfile = cl->screen->sslkeyfile))
125 keyfile = cl->screen->sslcertfile;
127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) {
  /external/libmicrohttpd/src/microspdy/
daemon.h 42 * @param keyfile path to the keyfile for the certificate
63 const char *keyfile,
daemon.c 172 const char *keyfile,
230 if (NULL == keyfile
231 || NULL == (daemon->keyfile = strdup (keyfile)))
233 SPDYF_DEBUG("strdup (keyfile)");
364 if(NULL != daemon->keyfile)
365 free(daemon->keyfile);
385 free(daemon->keyfile);
io_openssl.c 108 if(1 != SSL_CTX_use_PrivateKey_file(daemon->io_context, daemon->keyfile, SSL_FILETYPE_PEM))
  /prebuilts/gdb/darwin-x86/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
smtplib.py 617 def starttls(self, keyfile=None, certfile=None):
624 session. If you provide the keyfile and certfile parameters,
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
773 keyfile=None, certfile=None,
775 self.keyfile = keyfile
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
  /prebuilts/gdb/linux-x86/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
smtplib.py 617 def starttls(self, keyfile=None, certfile=None):
624 session. If you provide the keyfile and certfile parameters,
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
773 keyfile=None, certfile=None,
775 self.keyfile = keyfile
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
smtplib.py 617 def starttls(self, keyfile=None, certfile=None):
624 session. If you provide the keyfile and certfile parameters,
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
773 keyfile=None, certfile=None,
775 self.keyfile = keyfile
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
smtplib.py 617 def starttls(self, keyfile=None, certfile=None):
624 session. If you provide the keyfile and certfile parameters,
641 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
765 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
773 keyfile=None, certfile=None,
775 self.keyfile = keyfile
783 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
  /external/autotest/client/site_tests/platform_EncryptedStateful/
platform_EncryptedStateful.py 124 keyfile = self.key
127 keyfile = self.needs_finalization
129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile))
133 info = os.stat(keyfile)
135 "%s is regular file" % (keyfile))
136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile))
137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile))
139 "%s is S_IRUSR | S_IWUSR" % (keyfile))
140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
    [all...]
  /external/autotest/client/cros/
ownership.py 302 keyfile = scoped_tempfile.tempdir.name + '/private.key'
305 OPENSSLREQ, '/CN=me', keyfile, certfile)
307 return (keyfile, certfile)
319 keyfile = scoped_tempfile(keypath)
321 return (utils.read_file(keyfile.name),
325 def push_to_nss(keyfile, certfile, nssdb):
331 @param keyfile: path to PEM-formatted private key file.
337 OPENSSLP12, certfile, keyfile, for_push.name)
  /frameworks/base/tools/obbtool/
mkobb.sh 141 if [ "x${keyfile}" != "x" -a -f "${keyfile}" ]; then \
142 rm -f ${keyfile}
  /cts/apps/CtsVerifier/
create_test_certs.sh 68 -keyfile 'cakey.pem' \
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
key.py 43 def load_pkcs1(cls, keyfile, format='PEM'):
46 :param keyfile: contents of a DER- or PEM-encoded file that contains
65 return method(keyfile)
137 def _load_pkcs1_der(cls, keyfile):
140 @param keyfile: contents of a DER-encoded file that contains the public
160 (priv, _) = decoder.decode(keyfile, asn1Spec=AsnPubKey())
180 def _load_pkcs1_pem(cls, keyfile):
186 @param keyfile: contents of a PEM-encoded file that contains the public
191 der = rsa.pem.load_pem(keyfile, 'RSA PUBLIC KEY')
204 def load_pkcs1_openssl_pem(cls, keyfile)
    [all...]
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 94 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config "$DIR/default.cnf"
98 openssl ca -revoke /tmp/cert-rsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -config "$DIR/default.cnf"
99 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config "$DIR/default.cnf"
107 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config "$DIR/default.cnf"
108 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config "$DIR/default.cnf"
109 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out "$DIR/crl-rsa-dsa-sigopt.pem" -config "$DIR/default.cnf" -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1
114 openssl ca -gencrl -crlexts unsupported_cert -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-unsupported.pem -config "$DIR/default.cnf"
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/
https_connection.py 128 self.sock = ssl.wrap_socket(sock, keyfile=self.key_file,

Completed in 713 milliseconds

1 2 3