/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/ |
security.py | 7 keyfile = env['PYTHON_KEYFILE']
9 keyfile = '.python_keyfile'
11 keyfile = os.path.join(env['HOME'], keyfile)
12 if not os.path.exists(keyfile):
15 kf = os.path.join(dir, keyfile)
17 keyfile = kf
20 self._key = eval(open(keyfile).readline())
22 raise IOError, "python keyfile %s: cannot open" % keyfile
[all...] |
/external/python/cpython2/Demo/pdist/ |
security.py | 7 keyfile = env['PYTHON_KEYFILE'] 9 keyfile = '.python_keyfile' 11 keyfile = os.path.join(env['HOME'], keyfile) 12 if not os.path.exists(keyfile): 15 kf = os.path.join(dir, keyfile) 17 keyfile = kf 20 self._key = eval(open(keyfile).readline()) 22 raise IOError, "python keyfile %s: cannot open" % keyfile [all...] |
/external/libvncserver/libvncserver/ |
rfbssl_openssl.c | 42 char *keyfile; local 50 keyfile = cl->screen->sslkeyfile; 52 keyfile = cl->screen->sslcertfile; 61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { 62 rfbErr("Unable to load private key file %s\n", keyfile);
|
rfbssl_gnutls.c | 123 char *keyfile; local 124 if (!(keyfile = cl->screen->sslkeyfile)) 125 keyfile = cl->screen->sslcertfile; 127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) {
|
/external/libmicrohttpd/src/microspdy/ |
daemon.h | 42 * @param keyfile path to the keyfile for the certificate 63 const char *keyfile,
|
daemon.c | 172 const char *keyfile, 230 if (NULL == keyfile 231 || NULL == (daemon->keyfile = strdup (keyfile))) 233 SPDYF_DEBUG("strdup (keyfile)"); 364 if(NULL != daemon->keyfile) 365 free(daemon->keyfile); 385 free(daemon->keyfile);
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
ssl.py | 100 def __init__(self, sock, keyfile=None, certfile=None,
115 if certfile and not keyfile:
116 keyfile = certfile
130 keyfile, certfile,
135 self.keyfile = keyfile
303 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
337 keyfile=self.keyfile,
361 def wrap_socket(sock, keyfile=None, certfile=None, [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
ssl.py | 106 def __init__(self, sock, keyfile=None, certfile=None, 124 if certfile and not keyfile: 125 keyfile = certfile 139 keyfile, certfile, 144 self.keyfile = keyfile 312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile, 349 keyfile=self.keyfile, 376 def wrap_socket(sock, keyfile=None, certfile=None [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 324 keyfile - PEM formatted file that countains your private key 330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 333 self.keyfile = keyfile 352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/prebuilts/gdb/linux-x86/lib/python2.7/ |
ssl.py | 106 def __init__(self, sock, keyfile=None, certfile=None, 124 if certfile and not keyfile: 125 keyfile = certfile 139 keyfile, certfile, 144 self.keyfile = keyfile 312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile, 349 keyfile=self.keyfile, 376 def wrap_socket(sock, keyfile=None, certfile=None [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 324 keyfile - PEM formatted file that countains your private key 330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 333 self.keyfile = keyfile 352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 106 def __init__(self, sock, keyfile=None, certfile=None, 124 if certfile and not keyfile: 125 keyfile = certfile 139 keyfile, certfile, 144 self.keyfile = keyfile 312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile, 349 keyfile=self.keyfile, 376 def wrap_socket(sock, keyfile=None, certfile=None [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 324 keyfile - PEM formatted file that countains your private key 330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 333 self.keyfile = keyfile 352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 106 def __init__(self, sock, keyfile=None, certfile=None, 124 if certfile and not keyfile: 125 keyfile = certfile 139 keyfile, certfile, 144 self.keyfile = keyfile 312 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile, 349 keyfile=self.keyfile, 376 def wrap_socket(sock, keyfile=None, certfile=None [all...] |
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
platform_EncryptedStateful.py | 124 keyfile = self.key 127 keyfile = self.needs_finalization 129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile)) 133 info = os.stat(keyfile) 135 "%s is regular file" % (keyfile)) 136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile)) 137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile)) 139 "%s is S_IRUSR | S_IWUSR" % (keyfile)) 140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile)) [all...] |
/external/python/cpython3/Lib/ |
poplib.py | 414 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None, 419 keyfile - PEM formatted file that contains your private key 426 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, 428 if context is not None and keyfile is not None: 429 raise ValueError("context and keyfile arguments are mutually " 434 if keyfile is not None or certfile is not None: 436 warnings.warn("keyfile and certfile are deprecated, use a" 438 self.keyfile = keyfile 442 keyfile=keyfile [all...] |
/external/autotest/client/cros/ |
ownership.py | 287 keyfile = scoped_tempfile.tempdir.name + '/private.key' 290 OPENSSLREQ, '/CN=me', keyfile, certfile) 292 return (keyfile, certfile) 304 keyfile = scoped_tempfile(keypath) 306 return (utils.read_file(keyfile.name), 310 def push_to_nss(keyfile, certfile, nssdb): 316 @param keyfile: path to PEM-formatted private key file. 322 OPENSSLP12, certfile, keyfile, for_push.name)
|
/external/libcups/cups/ |
tls-gnutls.c | 71 keyfile[1024]; /* Private key filename */ local 97 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); 123 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) 125 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); 131 DEBUG_printf(("1cupsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))); 1334 keyfile[1024]; \/* Private key file *\/ local [all...] |
/external/devlib/devlib/utils/ |
ssh.py | 49 def ssh_get_shell(host, username, password=None, keyfile=None, port=None, timeout=10, telnet=False, original_prompt=None): 54 if keyfile: 55 raise ValueError('keyfile may not be used with a telnet connection.') 61 if keyfile: 62 conn.login(host, username, ssh_key=keyfile, port=port, login_timeout=timeout) 124 def check_keyfile(keyfile): 126 keyfile must have the right access premissions in order to be useable. If the specified 129 Returns either the ``keyfile`` (if the permissions on it are correct) or the path to a 133 actual_mask = os.stat(keyfile).st_mode & 0xFF 135 tmp_file = os.path.join(tempfile.gettempdir(), os.path.basename(keyfile)) [all...] |
/frameworks/base/tools/obbtool/ |
mkobb.sh | 141 if [ "x${keyfile}" != "x" -a -f "${keyfile}" ]; then \ 142 rm -f ${keyfile}
|
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 74 -keyfile 'cakey.pem' \
|
/external/python/cpython2/Lib/ |
ssl.py | 460 certfile=None, keyfile=None, 483 if keyfile and not certfile: 485 if certfile or keyfile: 486 context.load_cert_chain(certfile, keyfile) 529 def __init__(self, sock=None, keyfile=None, certfile=None, 545 if keyfile and not certfile: 547 if certfile and not keyfile: 548 keyfile = certfile 554 self._context.load_cert_chain(certfile, keyfile) 559 self.keyfile = keyfil [all...] |
poplib.py | 328 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 332 keyfile - PEM formatted file that contains your private key 338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 341 self.keyfile = keyfile 360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 94 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config "$DIR/default.cnf" 98 openssl ca -revoke /tmp/cert-rsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -config "$DIR/default.cnf" 99 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config "$DIR/default.cnf" 107 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config "$DIR/default.cnf" 108 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config "$DIR/default.cnf" 109 openssl ca -gencrl -startdate 140101010101Z -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out "$DIR/crl-rsa-dsa-sigopt.pem" -config "$DIR/default.cnf" -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1 114 openssl ca -gencrl -crlexts unsupported_cert -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-unsupported.pem -config "$DIR/default.cnf"
|