/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/s3/ |
D | test_keyfile.py | 25 from boto.s3.keyfile import KeyFile 38 self.keyfile = KeyFile(key) 41 self.keyfile.close() 44 self.assertEqual(self.keyfile.read(len(self.contents)), self.contents) 47 self.assertEqual(self.keyfile.read(5), self.contents[:5]) 48 self.assertEqual(self.keyfile.read(5), self.contents[5:]) 51 self.assertEqual(self.keyfile.tell(), 0) 52 self.keyfile.read(4) 53 self.assertEqual(self.keyfile.tell(), 4) 54 self.keyfile.read(6) [all …]
|
D | test_uri.py | 22 from boto.s3.keyfile import KeyFile
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
D | key.py | 43 def load_pkcs1(cls, keyfile, format='PEM'): argument 65 return method(keyfile) 137 def _load_pkcs1_der(cls, keyfile): argument 160 (priv, _) = decoder.decode(keyfile, asn1Spec=AsnPubKey()) 180 def _load_pkcs1_pem(cls, keyfile): argument 191 der = rsa.pem.load_pem(keyfile, 'RSA PUBLIC KEY') 204 def load_pkcs1_openssl_pem(cls, keyfile): argument 218 der = rsa.pem.load_pem(keyfile, 'PUBLIC KEY') 222 def load_pkcs1_openssl_der(cls, keyfile): argument 234 (keyinfo, _) = decoder.decode(keyfile, asn1Spec=OpenSSLPubKey()) [all …]
|
D | cli.py | 168 with open(filename, 'rb') as keyfile: 169 keydata = keyfile.read()
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
D | platform_EncryptedStateful.py | 124 keyfile = self.key 127 keyfile = self.needs_finalization 129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile)) 133 info = os.stat(keyfile) 135 "%s is regular file" % (keyfile)) 136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile)) 137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile)) 139 "%s is S_IRUSR | S_IWUSR" % (keyfile)) 140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
|
/external/libvncserver/libvncserver/ |
D | rfbssl_openssl.c | 42 char *keyfile; in rfbssl_init() local 50 keyfile = cl->screen->sslkeyfile; in rfbssl_init() 52 keyfile = cl->screen->sslcertfile; in rfbssl_init() 61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { in rfbssl_init() 62 rfbErr("Unable to load private key file %s\n", keyfile); in rfbssl_init()
|
D | rfbssl_gnutls.c | 123 char *keyfile; in rfbssl_init() local 124 if (!(keyfile = cl->screen->sslkeyfile)) in rfbssl_init() 125 keyfile = cl->screen->sslcertfile; in rfbssl_init() 127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) { in rfbssl_init()
|
/external/autotest/client/cros/ |
D | ownership.py | 302 keyfile = scoped_tempfile.tempdir.name + '/private.key' 305 OPENSSLREQ, '/CN=me', keyfile, certfile) 307 return (keyfile, certfile) 319 keyfile = scoped_tempfile(keypath) 321 return (utils.read_file(keyfile.name), 325 def push_to_nss(keyfile, certfile, nssdb): argument 337 OPENSSLP12, certfile, keyfile, for_push.name)
|
D | httpd.py | 222 keyfile=key_path)
|
/external/libmicrohttpd/src/microspdy/ |
D | daemon.c | 172 const char *keyfile, in SPDYF_start_daemon_va() argument 230 if (NULL == keyfile in SPDYF_start_daemon_va() 231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va() 364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va() 365 free(daemon->keyfile); in SPDYF_start_daemon_va() 385 free(daemon->keyfile); in SPDYF_stop_daemon()
|
D | daemon.h | 63 const char *keyfile,
|
D | io_openssl.c | 108 if(1 != SSL_CTX_use_PrivateKey_file(daemon->io_context, daemon->keyfile, SSL_FILETYPE_PEM)) in SPDYF_openssl_init()
|
D | applicationlayer.c | 327 const char *keyfile, in SPDY_start_daemon() argument 360 keyfile, in SPDY_start_daemon()
|
D | structures.h | 897 char *keyfile; member
|
/external/openssh/ |
D | README.dns | 15 ssh-keygen -r hostname -f keyfile -g 17 where "hostname" is your fully qualified hostname and "keyfile" is the
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 107 …tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/ca… 128 ….tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/ca… 144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi…
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-plainrsa | 9 # Racoon will look for a keyfile in this directory.
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ |
D | https_connection.py | 128 self.sock = ssl.wrap_socket(sock, keyfile=self.key_file,
|
/external/avahi/avahi-sharp/ |
D | Makefile.am | 49 …$(AM_V_GEN)MONO_SHARED_DIR=. mcs -keyfile:$(srcdir)/avahi.snk -target:library -out:$@ -debug $(AVA…
|
/external/avahi/avahi-ui-sharp/ |
D | Makefile.am | 35 …$(AM_V_GEN)mcs -keyfile:$(top_srcdir)/avahi-sharp/avahi.snk -target:library -out:$@ -debug $(AVAHI…
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/apitools/apitools/base/py/ |
D | credentials_lib.py | 505 with open(service_account_json_keyfile) as keyfile: 506 service_account_info = json.load(keyfile)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/s3/ |
D | resumable_download_handler.py | 32 from boto.s3.keyfile import KeyFile
|
/external/libmicrohttpd/src/include/ |
D | microspdy.h | 882 const char *keyfile,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/gs/ |
D | resumable_upload_handler.py | 35 from boto.s3.keyfile import KeyFile
|
D | key.py | 30 from boto.s3.keyfile import KeyFile
|