Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 22 of 22) sorted by relevance

/external/autotest/client/site_tests/platform_EncryptedStateful/
Dplatform_EncryptedStateful.py124 keyfile = self.key
127 keyfile = self.needs_finalization
129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile))
133 info = os.stat(keyfile)
135 "%s is regular file" % (keyfile))
136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile))
137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile))
139 "%s is S_IRUSR | S_IWUSR" % (keyfile))
140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
/external/libvncserver/libvncserver/
Drfbssl_openssl.c42 char *keyfile; in rfbssl_init() local
50 keyfile = cl->screen->sslkeyfile; in rfbssl_init()
52 keyfile = cl->screen->sslcertfile; in rfbssl_init()
61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { in rfbssl_init()
62 rfbErr("Unable to load private key file %s\n", keyfile); in rfbssl_init()
Drfbssl_gnutls.c123 char *keyfile; in rfbssl_init() local
124 if (!(keyfile = cl->screen->sslkeyfile)) in rfbssl_init()
125 keyfile = cl->screen->sslcertfile; in rfbssl_init()
127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) { in rfbssl_init()
/external/libcups/cups/
Dtls-gnutls.c71 keyfile[1024]; /* Private key filename */ in cupsMakeServerCredentials() local
97 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); in cupsMakeServerCredentials()
123 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) in cupsMakeServerCredentials()
125 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); in cupsMakeServerCredentials()
131 …upsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))… in cupsMakeServerCredentials()
1333 keyfile[1024]; /* Private key file */ in _httpTLSStart() local
1378 http_gnutls_make_path(keyfile, sizeof(keyfile), tls_keypath, hostname, "key"); in _httpTLSStart()
1380 if (access(crtfile, R_OK) || access(keyfile, R_OK)) in _httpTLSStart()
1412 strlcpy(keyfile, cakeyfile, sizeof(keyfile)); in _httpTLSStart()
1416 have_creds = !access(crtfile, R_OK) && !access(keyfile, R_OK); in _httpTLSStart()
[all …]
/external/autotest/client/cros/
Downership.py287 keyfile = scoped_tempfile.tempdir.name + '/private.key'
290 OPENSSLREQ, '/CN=me', keyfile, certfile)
292 return (keyfile, certfile)
304 keyfile = scoped_tempfile(keypath)
306 return (utils.read_file(keyfile.name),
310 def push_to_nss(keyfile, certfile, nssdb): argument
322 OPENSSLP12, certfile, keyfile, for_push.name)
Dhttpd.py222 keyfile=key_path)
/external/libmicrohttpd/src/microspdy/
Ddaemon.c172 const char *keyfile, in SPDYF_start_daemon_va() argument
230 if (NULL == keyfile in SPDYF_start_daemon_va()
231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va()
364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va()
365 free(daemon->keyfile); in SPDYF_start_daemon_va()
385 free(daemon->keyfile); in SPDYF_stop_daemon()
Ddaemon.h63 const char *keyfile,
Dio_openssl.c108 if(1 != SSL_CTX_use_PrivateKey_file(daemon->io_context, daemon->keyfile, SSL_FILETYPE_PEM)) in SPDYF_openssl_init()
Dapplicationlayer.c327 const char *keyfile, in SPDY_start_daemon() argument
360 keyfile, in SPDY_start_daemon()
Dstructures.h897 char *keyfile; member
/external/openssh/
DREADME.dns15 ssh-keygen -r hostname -f keyfile -g
17 where "hostname" is your fully qualified hostname and "keyfile" is the
Dssh-keygen.09 ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile]
13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
/external/wpa_supplicant_8/hs20/server/ca/
Dsetup.sh107 …tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/ca…
128 ….tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/ca…
144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi…
/external/chromium-trace/catapult/telemetry/third_party/websocket-client/websocket/
D_http.py153 certfile, keyfile, password = sslopt['cert_chain']
154 context.load_cert_chain(certfile, keyfile, password)
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-plainrsa9 # Racoon will look for a keyfile in this directory.
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
Dant-jsch.jar ... void setKeyfile (java.lang.String) String keyfile public void setPassphrase (java.lang.String) ...
Dant-nodeps.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/ ...
/external/libmicrohttpd/src/include/
Dmicrospdy.h882 const char *keyfile,
/external/libvpx/libvpx/vp8/encoder/
Donyx_if.c94 FILE *keyfile;
2304 if (keyfile) in vp8_remove_compressor()
2305 fclose(keyfile); in vp8_remove_compressor()
/external/libvpx/libvpx/vp9/encoder/
Dvp9_encoder.c92 FILE *keyfile;
2491 if (keyfile) in vp9_remove_compressor()
2492 fclose(keyfile); in vp9_remove_compressor()
/external/libvncserver/
DChangeLog3544 cipher:keyfile, works with SSVNC. Make -remap work on MacOSX