/external/python/cpython2/Demo/pdist/ |
D | security.py | 7 keyfile = env['PYTHON_KEYFILE'] 9 keyfile = '.python_keyfile' 11 keyfile = os.path.join(env['HOME'], keyfile) 12 if not os.path.exists(keyfile): 15 kf = os.path.join(dir, keyfile) 17 keyfile = kf 20 self._key = eval(open(keyfile).readline()) 22 raise IOError, "python keyfile %s: cannot open" % keyfile
|
/external/epid-sdk/tools/extractgrps/src/ |
D | main.c | 65 struct arg_file* keyfile = in main() local 78 argtable[0] = keyfile; in main() 129 if (!FileExists(keyfile->filename[0])) { in main() 130 log_error("cannot access '%s'", keyfile->filename[0]); in main() 135 keyfile_size = GetFileSize(keyfile->filename[0]); in main() 140 keyfile->filename[0]); in main() 153 file = fopen(keyfile->filename[0], "rb"); in main() 155 log_error("failed read from '%s'", keyfile->filename[0]); in main() 168 keyfile->filename[0]); in main() 177 keyfile->filename[0]); in main() [all …]
|
/external/epid-sdk/tools/extractkeys/src/ |
D | main.c | 83 struct arg_file* keyfile = in main() local 98 argtable[0] = keyfile; in main() 150 if (!FileExists(keyfile->filename[0])) { in main() 151 log_error("cannot access '%s'", keyfile->filename[0]); in main() 156 keyfile_size = GetFileSize(keyfile->filename[0]); in main() 171 keyfile->filename[0]); in main() 184 file = fopen(keyfile->filename[0], "rb"); in main() 186 log_error("failed read from '%s'", keyfile->filename[0]); in main() 199 keyfile->filename[0]); in main() 211 keyfile->filename[0]); in main()
|
/external/python/rsa/rsa/ |
D | key.py | 61 def _load_pkcs1_pem(cls, keyfile): argument 73 def _load_pkcs1_der(cls, keyfile): argument 99 def load_pkcs1(cls, keyfile, format='PEM'): argument 118 return method(keyfile) 237 def _load_pkcs1_der(cls, keyfile): argument 260 (priv, _) = decoder.decode(keyfile, asn1Spec=AsnPubKey()) 281 def _load_pkcs1_pem(cls, keyfile): argument 292 der = rsa.pem.load_pem(keyfile, 'RSA PUBLIC KEY') 306 def load_pkcs1_openssl_pem(cls, keyfile): argument 321 der = rsa.pem.load_pem(keyfile, 'PUBLIC KEY') [all …]
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
D | platform_EncryptedStateful.py | 124 keyfile = self.key 127 keyfile = self.needs_finalization 129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile)) 133 info = os.stat(keyfile) 135 "%s is regular file" % (keyfile)) 136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile)) 137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile)) 139 "%s is S_IRUSR | S_IWUSR" % (keyfile)) 140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
|
/external/u-boot/tools/ |
D | fit_check_sign.c | 43 char *keyfile = NULL; in main() local 57 keyfile = optarg; in main() 68 if (!keyfile) { in main() 76 kfd = mmap_fdt(cmdname, keyfile, 0, &key_blob, &ksbuf, false); in main()
|
/external/libcups/cups/ |
D | tls-gnutls.c | 73 keyfile[1024]; /* Private key filename */ in cupsMakeServerCredentials() local 99 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); in cupsMakeServerCredentials() 125 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) in cupsMakeServerCredentials() 127 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); in cupsMakeServerCredentials() 133 …upsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))… in cupsMakeServerCredentials() 1352 keyfile[1024]; /* Private key file */ in _httpTLSStart() local 1397 http_gnutls_make_path(keyfile, sizeof(keyfile), tls_keypath, hostname, "key"); in _httpTLSStart() 1399 if (access(crtfile, R_OK) || access(keyfile, R_OK)) in _httpTLSStart() 1431 strlcpy(keyfile, cakeyfile, sizeof(keyfile)); in _httpTLSStart() 1435 have_creds = !access(crtfile, R_OK) && !access(keyfile, R_OK); in _httpTLSStart() [all …]
|
/external/python/cpython2/Lib/ |
D | ssl.py | 466 certfile=None, keyfile=None, argument 489 if keyfile and not certfile: 491 if certfile or keyfile: 492 context.load_cert_chain(certfile, keyfile) 535 def __init__(self, sock=None, keyfile=None, certfile=None, argument 551 if keyfile and not certfile: 553 if certfile and not keyfile: 554 keyfile = certfile 560 self._context.load_cert_chain(certfile, keyfile) 565 self.keyfile = keyfile [all …]
|
D | poplib.py | 338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): argument 341 self.keyfile = keyfile 360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
D | smtplib.py | 626 def starttls(self, keyfile=None, certfile=None): argument 650 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 798 keyfile=None, certfile=None, argument 800 self.keyfile = keyfile 808 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
D | ftplib.py | 660 def __init__(self, host='', user='', passwd='', acct='', keyfile=None, argument 663 if context is not None and keyfile is not None: 669 self.keyfile = keyfile 674 keyfile=keyfile)
|
/external/python/cpython3/Lib/ |
D | poplib.py | 429 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, argument 431 if context is not None and keyfile is not None: 437 if keyfile is not None or certfile is not None: 441 self.keyfile = keyfile 445 keyfile=keyfile) 455 def stls(self, keyfile=None, certfile=None, context=None): argument
|
D | smtplib.py | 732 def starttls(self, keyfile=None, certfile=None, context=None): argument 757 if context is not None and keyfile is not None: 763 if keyfile is not None or certfile is not None: 769 keyfile=keyfile) 1011 keyfile=None, certfile=None, argument 1014 if context is not None and keyfile is not None: 1020 if keyfile is not None or certfile is not None: 1024 self.keyfile = keyfile 1028 keyfile=keyfile)
|
D | ftplib.py | 724 def __init__(self, host='', user='', passwd='', acct='', keyfile=None, argument 727 if context is not None and keyfile is not None: 733 if keyfile is not None or certfile is not None: 737 self.keyfile = keyfile 742 keyfile=keyfile)
|
D | ssl.py | 583 certfile=None, keyfile=None, argument 607 if keyfile and not certfile: 609 if certfile or keyfile: 610 context.load_cert_chain(certfile, keyfile) 1199 def wrap_socket(sock, keyfile=None, certfile=None, argument 1209 if keyfile and not certfile: 1216 context.load_cert_chain(certfile, keyfile)
|
/external/autotest/client/cros/ |
D | ownership.py | 287 keyfile = scoped_tempfile.tempdir.name + '/private.key' 290 OPENSSLREQ, '/CN=me', keyfile, certfile) 292 return (keyfile, certfile) 304 keyfile = scoped_tempfile(keypath) 306 return (utils.read_file(keyfile.name), 310 def push_to_nss(keyfile, certfile, nssdb): argument 322 OPENSSLP12, certfile, keyfile, for_push.name)
|
/external/fsverity-utils/ |
D | sign.c | 40 static EVP_PKEY *read_private_key(const char *keyfile) in read_private_key() argument 45 bio = BIO_new_file(keyfile, "r"); in read_private_key() 47 error_msg_openssl("can't open '%s' for reading", keyfile); in read_private_key() 55 keyfile); in read_private_key() 380 const char *keyfile, const char *certfile, in sign_data() argument 389 pkey = read_private_key(keyfile); in sign_data()
|
/external/tensorflow/tensorflow/contrib/ignite/python/ops/ |
D | ignite_dataset_ops.py | 99 def __init__(self, host, port, certfile=None, keyfile=None, password=None): argument 121 context.load_cert_chain(certfile, keyfile, password) 124 if keyfile is not None: 337 keyfile=None, argument 354 TcpClient.__init__(self, host, port, certfile, keyfile, cert_password) 717 keyfile=None, argument 738 with IgniteClient(host, port, username, password, certfile, keyfile,
|
/external/grpc-grpc-java/testing/src/main/resources/certs/ |
D | README | 36 $ openssl ca -in client.csr -out client.pem -keyfile ca.key -cert ca.pem -verbose -config openssl.c… 50 $ openssl ca -in server0.csr -out server0.pem -keyfile ca.key -cert ca.pem -verbose -config openssl… 64 $ openssl ca -in server1.csr -out server1.pem -keyfile ca.key -cert ca.pem -verbose -config server1…
|
/external/tensorflow/tensorflow/contrib/ignite/kernels/dataset/ |
D | ignite_dataset_ops.cc | 83 string keyfile = ""; in MakeDataset() local 152 if (env_keyfile) keyfile = string(env_keyfile); in MakeDataset() 188 std::move(certfile), std::move(keyfile), std::move(cert_password), in MakeDataset()
|
D | ignite_dataset.cc | 24 string certfile, string keyfile, in IgniteDataset() argument 39 keyfile_(std::move(keyfile)), in IgniteDataset()
|
/external/tensorflow/tensorflow/contrib/ignite/kernels/client/ |
D | ignite_ssl_wrapper.cc | 33 string keyfile, string cert_password, bool big_endian) in SslWrapper() argument 37 keyfile_(std::move(keyfile)), in SslWrapper()
|
/external/openssh/ |
D | README.dns | 15 ssh-keygen -r hostname -f keyfile -g 17 where "hostname" is your fully qualified hostname and "keyfile" is the
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 107 …tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/ca… 128 ….tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/ca… 144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi…
|
/external/python/cpython3/Lib/msilib/ |
D | __init__.py | 258 …def start_component(self, component = None, feature = None, flags = None, keyfile = None, uuid=Non… argument 275 if keyfile: 276 keyid = self.cab.gen_id(self.absolute, keyfile) 277 self.keyfiles[keyfile] = keyid
|