Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 25 of 49) sorted by relevance

12

/external/python/cpython2/Demo/pdist/
Dsecurity.py7 keyfile = env['PYTHON_KEYFILE']
9 keyfile = '.python_keyfile'
11 keyfile = os.path.join(env['HOME'], keyfile)
12 if not os.path.exists(keyfile):
15 kf = os.path.join(dir, keyfile)
17 keyfile = kf
20 self._key = eval(open(keyfile).readline())
22 raise IOError, "python keyfile %s: cannot open" % keyfile
/external/autotest/client/site_tests/platform_EncryptedStateful/
Dplatform_EncryptedStateful.py124 keyfile = self.key
127 keyfile = self.needs_finalization
129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile))
133 info = os.stat(keyfile)
135 "%s is regular file" % (keyfile))
136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile))
137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile))
139 "%s is S_IRUSR | S_IWUSR" % (keyfile))
140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
/external/libvncserver/libvncserver/
Drfbssl_openssl.c42 char *keyfile; in rfbssl_init() local
50 keyfile = cl->screen->sslkeyfile; in rfbssl_init()
52 keyfile = cl->screen->sslcertfile; in rfbssl_init()
61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { in rfbssl_init()
62 rfbErr("Unable to load private key file %s\n", keyfile); in rfbssl_init()
Drfbssl_gnutls.c123 char *keyfile; in rfbssl_init() local
124 if (!(keyfile = cl->screen->sslkeyfile)) in rfbssl_init()
125 keyfile = cl->screen->sslcertfile; in rfbssl_init()
127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) { in rfbssl_init()
/external/devlib/devlib/utils/
Dssh.py49 def ssh_get_shell(host, username, password=None, keyfile=None, port=None, timeout=10, telnet=False,… argument
54 if keyfile:
61 if keyfile:
62 conn.login(host, username, ssh_key=keyfile, port=port, login_timeout=timeout)
124 def check_keyfile(keyfile): argument
133 actual_mask = os.stat(keyfile).st_mode & 0xFF
135 tmp_file = os.path.join(tempfile.gettempdir(), os.path.basename(keyfile))
136 shutil.copy(keyfile, tmp_file)
140 return keyfile
157 keyfile=None, argument
[all …]
/external/autotest/client/cros/
Downership.py287 keyfile = scoped_tempfile.tempdir.name + '/private.key'
290 OPENSSLREQ, '/CN=me', keyfile, certfile)
292 return (keyfile, certfile)
304 keyfile = scoped_tempfile(keypath)
306 return (utils.read_file(keyfile.name),
310 def push_to_nss(keyfile, certfile, nssdb): argument
322 OPENSSLP12, certfile, keyfile, for_push.name)
/external/libcups/cups/
Dtls-gnutls.c73 keyfile[1024]; /* Private key filename */ in cupsMakeServerCredentials() local
99 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); in cupsMakeServerCredentials()
125 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) in cupsMakeServerCredentials()
127 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); in cupsMakeServerCredentials()
133 …upsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))… in cupsMakeServerCredentials()
1352 keyfile[1024]; /* Private key file */ in _httpTLSStart() local
1397 http_gnutls_make_path(keyfile, sizeof(keyfile), tls_keypath, hostname, "key"); in _httpTLSStart()
1399 if (access(crtfile, R_OK) || access(keyfile, R_OK)) in _httpTLSStart()
1431 strlcpy(keyfile, cakeyfile, sizeof(keyfile)); in _httpTLSStart()
1435 have_creds = !access(crtfile, R_OK) && !access(keyfile, R_OK); in _httpTLSStart()
[all …]
/external/python/cpython2/Lib/
Dssl.py460 certfile=None, keyfile=None, argument
483 if keyfile and not certfile:
485 if certfile or keyfile:
486 context.load_cert_chain(certfile, keyfile)
529 def __init__(self, sock=None, keyfile=None, certfile=None, argument
545 if keyfile and not certfile:
547 if certfile and not keyfile:
548 keyfile = certfile
554 self._context.load_cert_chain(certfile, keyfile)
559 self.keyfile = keyfile
[all …]
Dpoplib.py338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): argument
341 self.keyfile = keyfile
360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
Dsmtplib.py625 def starttls(self, keyfile=None, certfile=None): argument
649 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
797 keyfile=None, certfile=None, argument
799 self.keyfile = keyfile
807 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
Dftplib.py648 def __init__(self, host='', user='', passwd='', acct='', keyfile=None, argument
651 if context is not None and keyfile is not None:
657 self.keyfile = keyfile
662 keyfile=keyfile)
Dsocket.py58 def ssl(sock, keyfile=None, certfile=None): argument
64 return _realssl.sslwrap_simple(sock, keyfile, certfile)
Dimaplib.py1163 def __init__(self, host = '', port = IMAP4_SSL_PORT, keyfile = None, certfile = None): argument
1164 self.keyfile = keyfile
1178 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
/external/libmicrohttpd/src/microspdy/
Ddaemon.c172 const char *keyfile, in SPDYF_start_daemon_va() argument
230 if (NULL == keyfile in SPDYF_start_daemon_va()
231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va()
364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va()
365 free(daemon->keyfile); in SPDYF_start_daemon_va()
385 free(daemon->keyfile); in SPDYF_stop_daemon()
Ddaemon.h63 const char *keyfile,
Dio_openssl.c108 if(1 != SSL_CTX_use_PrivateKey_file(daemon->io_context, daemon->keyfile, SSL_FILETYPE_PEM)) in SPDYF_openssl_init()
Dapplicationlayer.c327 const char *keyfile, in SPDY_start_daemon() argument
360 keyfile, in SPDY_start_daemon()
/external/lisa/
Dtarget.config33 /* You can specify either a password or keyfile */
35 // "keyfile" : "/complete/path/of/your/keyfile",
/external/openssh/
DREADME.dns15 ssh-keygen -r hostname -f keyfile -g
17 where "hostname" is your fully qualified hostname and "keyfile" is the
/external/wpa_supplicant_8/hs20/server/ca/
Dsetup.sh107 …tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/ca…
128 ….tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/ca…
144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi…
/external/python/cpython2/Lib/msilib/
D__init__.py261 …def start_component(self, component = None, feature = None, flags = None, keyfile = None, uuid=Non… argument
278 if keyfile:
279 keyid = self.cab.gen_id(self.absolute, keyfile)
280 self.keyfiles[keyfile] = keyid
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-plainrsa9 # Racoon will look for a keyfile in this directory.
/external/python/cpython2/Tools/msi/
Dmsilib.py456 …def start_component(self, component = None, feature = None, flags = None, keyfile = None, uuid=Non… argument
473 if keyfile:
474 keyid = self.cab.gen_id(self.absolute, keyfile)
475 self.keyfiles[keyfile] = keyid
Dmsi.py958 root.start_component("python.exe", keyfile="python.exe")
960 root.start_component("pythonw.exe", keyfile="pythonw.exe")
968 dlldir.start_component("DLLDIR", flags = 8, keyfile = pydll, uuid = pythondll_uuid)
1187 lib.start_component("pydocgui.pyw", tcltk, keyfile="pydocgui.pyw")
1192 lib.start_component("documentation", keyfile=docfile)
/external/lisa/ipynb/examples/utils/
Dtestenv_example.ipynb96 " - **keyfile** - you can either specify a password or a keyfile\n",
146 " # You can specify either a password or keyfile\n",
148 " # \"keyfile\" : \"/complete/path/of/your/keyfile\",\n",

12