HomeSort by relevance Sort by last modified time
    Searched refs:keyfile (Results 1 - 25 of 82) sorted by null

1 2 3 4

  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/
security.py 7 keyfile = env['PYTHON_KEYFILE']
9 keyfile = '.python_keyfile'
11 keyfile = os.path.join(env['HOME'], keyfile)
12 if not os.path.exists(keyfile):
15 kf = os.path.join(dir, keyfile)
17 keyfile = kf
20 self._key = eval(open(keyfile).readline())
22 raise IOError, "python keyfile %s: cannot open" % keyfile
    [all...]
  /external/python/cpython2/Demo/pdist/
security.py 7 keyfile = env['PYTHON_KEYFILE']
9 keyfile = '.python_keyfile'
11 keyfile = os.path.join(env['HOME'], keyfile)
12 if not os.path.exists(keyfile):
15 kf = os.path.join(dir, keyfile)
17 keyfile = kf
20 self._key = eval(open(keyfile).readline())
22 raise IOError, "python keyfile %s: cannot open" % keyfile
    [all...]
  /external/libvncserver/libvncserver/
rfbssl_openssl.c 42 char *keyfile; local
50 keyfile = cl->screen->sslkeyfile;
52 keyfile = cl->screen->sslcertfile;
61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) {
62 rfbErr("Unable to load private key file %s\n", keyfile);
rfbssl_gnutls.c 123 char *keyfile; local
124 if (!(keyfile = cl->screen->sslkeyfile))
125 keyfile = cl->screen->sslcertfile;
127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) {
  /external/libmicrohttpd/src/microspdy/
daemon.h 42 * @param keyfile path to the keyfile for the certificate
63 const char *keyfile,
daemon.c 172 const char *keyfile,
230 if (NULL == keyfile
231 || NULL == (daemon->keyfile = strdup (keyfile)))
233 SPDYF_DEBUG("strdup (keyfile)");
364 if(NULL != daemon->keyfile)
365 free(daemon->keyfile);
385 free(daemon->keyfile);
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
ssl.py 100 def __init__(self, sock, keyfile=None, certfile=None,
115 if certfile and not keyfile:
116 keyfile = certfile
130 keyfile, certfile,
135 self.keyfile = keyfile
303 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
337 keyfile=self.keyfile,
361 def wrap_socket(sock, keyfile=None, certfile=None,
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
  /prebuilts/gdb/darwin-x86/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
  /prebuilts/gdb/linux-x86/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 106 def __init__(self, sock, keyfile=None, certfile=None,
124 if certfile and not keyfile:
125 keyfile = certfile
139 keyfile, certfile,
144 self.keyfile = keyfile
312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
349 keyfile=self.keyfile,
376 def wrap_socket(sock, keyfile=None, certfile=None
    [all...]
  /external/autotest/client/site_tests/platform_EncryptedStateful/
platform_EncryptedStateful.py 124 keyfile = self.key
127 keyfile = self.needs_finalization
129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile))
133 info = os.stat(keyfile)
135 "%s is regular file" % (keyfile))
136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile))
137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile))
139 "%s is S_IRUSR | S_IWUSR" % (keyfile))
140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
    [all...]
  /external/python/cpython3/Lib/
poplib.py 414 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None,
419 keyfile - PEM formatted file that contains your private key
426 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None,
428 if context is not None and keyfile is not None:
429 raise ValueError("context and keyfile arguments are mutually "
434 if keyfile is not None or certfile is not None:
436 warnings.warn("keyfile and certfile are deprecated, use a"
438 self.keyfile = keyfile
442 keyfile=keyfile
    [all...]
  /external/autotest/client/cros/
ownership.py 287 keyfile = scoped_tempfile.tempdir.name + '/private.key'
290 OPENSSLREQ, '/CN=me', keyfile, certfile)
292 return (keyfile, certfile)
304 keyfile = scoped_tempfile(keypath)
306 return (utils.read_file(keyfile.name),
310 def push_to_nss(keyfile, certfile, nssdb):
316 @param keyfile: path to PEM-formatted private key file.
322 OPENSSLP12, certfile, keyfile, for_push.name)
  /external/libcups/cups/
tls-gnutls.c 71 keyfile[1024]; /* Private key filename */ local
97 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key");
123 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL)
125 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile));
131 DEBUG_printf(("1cupsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno)));
1334 keyfile[1024]; \/* Private key file *\/ local
    [all...]
  /external/devlib/devlib/utils/
ssh.py 49 def ssh_get_shell(host, username, password=None, keyfile=None, port=None, timeout=10, telnet=False, original_prompt=None):
54 if keyfile:
55 raise ValueError('keyfile may not be used with a telnet connection.')
61 if keyfile:
62 conn.login(host, username, ssh_key=keyfile, port=port, login_timeout=timeout)
124 def check_keyfile(keyfile):
126 keyfile must have the right access premissions in order to be useable. If the specified
129 Returns either the ``keyfile`` (if the permissions on it are correct) or the path to a
133 actual_mask = os.stat(keyfile).st_mode & 0xFF
135 tmp_file = os.path.join(tempfile.gettempdir(), os.path.basename(keyfile))
    [all...]
  /frameworks/base/tools/obbtool/
mkobb.sh 141 if [ "x${keyfile}" != "x" -a -f "${keyfile}" ]; then \
142 rm -f ${keyfile}
  /cts/apps/CtsVerifier/
create_test_certs.sh 74 -keyfile 'cakey.pem' \
  /external/python/cpython2/Lib/
ssl.py 460 certfile=None, keyfile=None,
483 if keyfile and not certfile:
485 if certfile or keyfile:
486 context.load_cert_chain(certfile, keyfile)
529 def __init__(self, sock=None, keyfile=None, certfile=None,
545 if keyfile and not certfile:
547 if certfile and not keyfile:
548 keyfile = certfile
554 self._context.load_cert_chain(certfile, keyfile)
559 self.keyfile = keyfil
    [all...]
poplib.py 328 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
332 keyfile - PEM formatted file that contains your private key
338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
341 self.keyfile = keyfile
360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 94 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config "$DIR/default.cnf"
98 openssl ca -revoke /tmp/cert-rsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -config "$DIR/default.cnf"
99 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config "$DIR/default.cnf"
107 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config "$DIR/default.cnf"
108 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config "$DIR/default.cnf"
109 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out "$DIR/crl-rsa-dsa-sigopt.pem" -config "$DIR/default.cnf" -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1
114 openssl ca -gencrl -crlexts unsupported_cert -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-unsupported.pem -config "$DIR/default.cnf"

Completed in 455 milliseconds

1 2 3 4