/external/autotest/client/site_tests/platform_EncryptedStateful/ |
D | platform_EncryptedStateful.py | 124 keyfile = self.key 127 keyfile = self.needs_finalization 129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile)) 133 info = os.stat(keyfile) 135 "%s is regular file" % (keyfile)) 136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile)) 137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile)) 139 "%s is S_IRUSR | S_IWUSR" % (keyfile)) 140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
|
/external/libvncserver/libvncserver/ |
D | rfbssl_openssl.c | 42 char *keyfile; in rfbssl_init() local 50 keyfile = cl->screen->sslkeyfile; in rfbssl_init() 52 keyfile = cl->screen->sslcertfile; in rfbssl_init() 61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { in rfbssl_init() 62 rfbErr("Unable to load private key file %s\n", keyfile); in rfbssl_init()
|
D | rfbssl_gnutls.c | 123 char *keyfile; in rfbssl_init() local 124 if (!(keyfile = cl->screen->sslkeyfile)) in rfbssl_init() 125 keyfile = cl->screen->sslcertfile; in rfbssl_init() 127 if (NULL == (ctx = rfbssl_init_global(keyfile, cl->screen->sslcertfile))) { in rfbssl_init()
|
/external/libcups/cups/ |
D | tls-gnutls.c | 71 keyfile[1024]; /* Private key filename */ in cupsMakeServerCredentials() local 97 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); in cupsMakeServerCredentials() 123 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) in cupsMakeServerCredentials() 125 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); in cupsMakeServerCredentials() 131 …upsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))… in cupsMakeServerCredentials() 1333 keyfile[1024]; /* Private key file */ in _httpTLSStart() local 1378 http_gnutls_make_path(keyfile, sizeof(keyfile), tls_keypath, hostname, "key"); in _httpTLSStart() 1380 if (access(crtfile, R_OK) || access(keyfile, R_OK)) in _httpTLSStart() 1412 strlcpy(keyfile, cakeyfile, sizeof(keyfile)); in _httpTLSStart() 1416 have_creds = !access(crtfile, R_OK) && !access(keyfile, R_OK); in _httpTLSStart() [all …]
|
/external/autotest/client/cros/ |
D | ownership.py | 287 keyfile = scoped_tempfile.tempdir.name + '/private.key' 290 OPENSSLREQ, '/CN=me', keyfile, certfile) 292 return (keyfile, certfile) 304 keyfile = scoped_tempfile(keypath) 306 return (utils.read_file(keyfile.name), 310 def push_to_nss(keyfile, certfile, nssdb): argument 322 OPENSSLP12, certfile, keyfile, for_push.name)
|
D | httpd.py | 222 keyfile=key_path)
|
/external/libmicrohttpd/src/microspdy/ |
D | daemon.c | 172 const char *keyfile, in SPDYF_start_daemon_va() argument 230 if (NULL == keyfile in SPDYF_start_daemon_va() 231 || NULL == (daemon->keyfile = strdup (keyfile))) in SPDYF_start_daemon_va() 364 if(NULL != daemon->keyfile) in SPDYF_start_daemon_va() 365 free(daemon->keyfile); in SPDYF_start_daemon_va() 385 free(daemon->keyfile); in SPDYF_stop_daemon()
|
D | daemon.h | 63 const char *keyfile,
|
D | io_openssl.c | 108 if(1 != SSL_CTX_use_PrivateKey_file(daemon->io_context, daemon->keyfile, SSL_FILETYPE_PEM)) in SPDYF_openssl_init()
|
D | applicationlayer.c | 327 const char *keyfile, in SPDY_start_daemon() argument 360 keyfile, in SPDY_start_daemon()
|
D | structures.h | 897 char *keyfile; member
|
/external/openssh/ |
D | README.dns | 15 ssh-keygen -r hostname -f keyfile -g 17 where "hostname" is your fully qualified hostname and "keyfile" is the
|
D | ssh-keygen.0 | 9 ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile] 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 107 …tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/ca… 128 ….tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/ca… 144 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passi…
|
/external/chromium-trace/catapult/telemetry/third_party/websocket-client/websocket/ |
D | _http.py | 153 certfile, keyfile, password = sslopt['cert_chain'] 154 context.load_cert_chain(certfile, keyfile, password)
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-plainrsa | 9 # Racoon will look for a keyfile in this directory.
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
D | ant-jsch.jar | ... void setKeyfile (java.lang.String)
String keyfile
public void setPassphrase (java.lang.String) ... |
D | ant-nodeps.jar | META-INF/
META-INF/MANIFEST.MF
org/
org/apache/
org/ ... |
/external/libmicrohttpd/src/include/ |
D | microspdy.h | 882 const char *keyfile,
|
/external/libvpx/libvpx/vp8/encoder/ |
D | onyx_if.c | 94 FILE *keyfile; 2304 if (keyfile) in vp8_remove_compressor() 2305 fclose(keyfile); in vp8_remove_compressor()
|
/external/libvpx/libvpx/vp9/encoder/ |
D | vp9_encoder.c | 92 FILE *keyfile; 2491 if (keyfile) in vp9_remove_compressor() 2492 fclose(keyfile); in vp9_remove_compressor()
|
/external/libvncserver/ |
D | ChangeLog | 3544 cipher:keyfile, works with SSVNC. Make -remap work on MacOSX
|