/external/python/cpython2/Demo/pdist/ |
D | security.py | 7 keyfile = env['PYTHON_KEYFILE'] 9 keyfile = '.python_keyfile' 11 keyfile = os.path.join(env['HOME'], keyfile) 12 if not os.path.exists(keyfile): 15 kf = os.path.join(dir, keyfile) 17 keyfile = kf 20 self._key = eval(open(keyfile).readline()) 22 raise IOError, "python keyfile %s: cannot open" % keyfile
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
D | platform_EncryptedStateful.py | 124 keyfile = self.key 127 keyfile = self.needs_finalization 129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile)) 133 info = os.stat(keyfile) 135 "%s is regular file" % (keyfile)) 136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile)) 137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile)) 139 "%s is S_IRUSR | S_IWUSR" % (keyfile)) 140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
|
/external/libvncserver/libvncserver/ |
D | rfbssl_openssl.c | 42 char *keyfile; in rfbssl_init() local 50 keyfile = cl->screen->sslkeyfile; in rfbssl_init() 52 keyfile = cl->screen->sslcertfile; in rfbssl_init() 61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { in rfbssl_init() 62 rfbErr("Unable to load private key file %s\n", keyfile); in rfbssl_init()
|
D | rfbssl_gnutls.c | 123 char *keyfile; in rfbssl_init() local 124 if (!(keyfile = cl->screen->sslkeyfile)) in rfbssl_init() 125 keyfile = cl->screen->sslcertfile; in rfbssl_init() 127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) { in rfbssl_init()
|
/external/devlib/devlib/utils/ |
D | ssh.py | 49 def ssh_get_shell(host, username, password=None, keyfile=None, port=None, timeout=10, telnet=False,… argument 54 if keyfile: 61 if keyfile: 62 conn.login(host, username, ssh_key=keyfile, port=port, login_timeout=timeout) 124 def check_keyfile(keyfile): argument 133 actual_mask = os.stat(keyfile).st_mode & 0xFF 135 tmp_file = os.path.join(tempfile.gettempdir(), os.path.basename(keyfile)) 136 shutil.copy(keyfile, tmp_file) 140 return keyfile 157 keyfile=None, argument [all …]
|
/external/autotest/client/cros/ |
D | ownership.py | 287 keyfile = scoped_tempfile.tempdir.name + '/private.key' 290 OPENSSLREQ, '/CN=me', keyfile, certfile) 292 return (keyfile, certfile) 304 keyfile = scoped_tempfile(keypath) 306 return (utils.read_file(keyfile.name), 310 def push_to_nss(keyfile, certfile, nssdb): argument 322 OPENSSLP12, certfile, keyfile, for_push.name)
|
/external/libcups/cups/ |
D | tls-gnutls.c | 73 keyfile[1024]; /* Private key filename */ in cupsMakeServerCredentials() local 99 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); in cupsMakeServerCredentials() 125 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) in cupsMakeServerCredentials() 127 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); in cupsMakeServerCredentials() 133 …upsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))… in cupsMakeServerCredentials() 1352 keyfile[1024]; /* Private key file */ in _httpTLSStart() local 1397 http_gnutls_make_path(keyfile, sizeof(keyfile), tls_keypath, hostname, "key"); in _httpTLSStart() 1399 if (access(crtfile, R_OK) || access(keyfile, R_OK)) in _httpTLSStart() 1431 strlcpy(keyfile, cakeyfile, sizeof(keyfile)); in _httpTLSStart() 1435 have_creds = !access(crtfile, R_OK) && !access(keyfile, R_OK); in _httpTLSStart() [all …]
|
/external/python/cpython2/Lib/ |
D | ssl.py | 460 certfile=None, keyfile=None, argument 483 if keyfile and not certfile: 485 if certfile or keyfile: 486 context.load_cert_chain(certfile, keyfile) 529 def __init__(self, sock=None, keyfile=None, certfile=None, argument 545 if keyfile and not certfile: 547 if certfile and not keyfile: 548 keyfile = certfile 554 self._context.load_cert_chain(certfile, keyfile) 559 self.keyfile = keyfile [all …]
|
D | poplib.py | 338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): argument 341 self.keyfile = keyfile 360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
D | smtplib.py | 625 def starttls(self, keyfile=None, certfile=None): argument 649 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 797 keyfile=None, certfile=None, argument 799 self.keyfile = keyfile 807 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
D | ftplib.py | 648 def __init__(self, host='', user='', passwd='', acct='', keyfile=None, argument 651 if context is not None and keyfile is not None: 657 self.keyfile = keyfile 662 keyfile=keyfile)
|
D | socket.py | 58 def ssl(sock, keyfile=None, certfile=None): argument 64 return _realssl.sslwrap_simple(sock, keyfile, certfile)
|
D | imaplib.py | 1163 def __init__(self, host = '', port = IMAP4_SSL_PORT, keyfile = None, certfile = None): argument 1164 self.keyfile = keyfile 1178 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
/external/libmicrohttpd/src/microspdy/ |
D | daemon.c | 172 const char *keyfile, in SPDYF_start_daemon_va() argument 230 if (NULL == keyfile in SPDYF_start_daemon_va() 231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va() 364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va() 365 free(daemon->keyfile); in SPDYF_start_daemon_va() 385 free(daemon->keyfile); in SPDYF_stop_daemon()
|
D | daemon.h | 63 const char *keyfile,
|
D | io_openssl.c | 108 if(1 != SSL_CTX_use_PrivateKey_file(daemon->io_context, daemon->keyfile, SSL_FILETYPE_PEM)) in SPDYF_openssl_init()
|
D | applicationlayer.c | 327 const char *keyfile, in SPDY_start_daemon() argument 360 keyfile, in SPDY_start_daemon()
|
/external/lisa/ |
D | target.config | 33 /* You can specify either a password or keyfile */ 35 // "keyfile" : "/complete/path/of/your/keyfile",
|
/external/openssh/ |
D | README.dns | 15 ssh-keygen -r hostname -f keyfile -g 17 where "hostname" is your fully qualified hostname and "keyfile" is the
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 107 …tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/ca… 128 ….tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/ca… 144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi…
|
/external/python/cpython2/Lib/msilib/ |
D | __init__.py | 261 …def start_component(self, component = None, feature = None, flags = None, keyfile = None, uuid=Non… argument 278 if keyfile: 279 keyid = self.cab.gen_id(self.absolute, keyfile) 280 self.keyfiles[keyfile] = keyid
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-plainrsa | 9 # Racoon will look for a keyfile in this directory.
|
/external/python/cpython2/Tools/msi/ |
D | msilib.py | 456 …def start_component(self, component = None, feature = None, flags = None, keyfile = None, uuid=Non… argument 473 if keyfile: 474 keyid = self.cab.gen_id(self.absolute, keyfile) 475 self.keyfiles[keyfile] = keyid
|
D | msi.py | 958 root.start_component("python.exe", keyfile="python.exe") 960 root.start_component("pythonw.exe", keyfile="pythonw.exe") 968 dlldir.start_component("DLLDIR", flags = 8, keyfile = pydll, uuid = pythondll_uuid) 1187 lib.start_component("pydocgui.pyw", tcltk, keyfile="pydocgui.pyw") 1192 lib.start_component("documentation", keyfile=docfile)
|
/external/lisa/ipynb/examples/utils/ |
D | testenv_example.ipynb | 96 " - **keyfile** - you can either specify a password or a keyfile\n", 146 " # You can specify either a password or keyfile\n", 148 " # \"keyfile\" : \"/complete/path/of/your/keyfile\",\n",
|