/external/openssl/apps/ |
H A D | smime.c | 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 265 if (!keyfile) 266 keyfile = signerfile; 269 sk_OPENSSL_STRING_push(skkeys, keyfile); 270 keyfile = NULL; 297 if (keyfile) 310 sk_OPENSSL_STRING_push(skkeys, keyfile); 312 keyfile = *++args; 384 if (keyfile && !signerfile) 396 if (!keyfile) [all...] |
H A D | cms.c | 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 402 if (!keyfile) 403 keyfile = signerfile; 406 sk_OPENSSL_STRING_push(skkeys, keyfile); 407 keyfile = NULL; 440 if (keyfile) 453 sk_OPENSSL_STRING_push(skkeys, keyfile); 455 keyfile = *++args; 543 if (keyfile && !signerfile) 556 if (!keyfile) [all...] |
H A D | dgst.c | 118 const char *outfile = NULL, *keyfile = NULL; local 174 keyfile=*(++argv); 185 keyfile=*(++argv); 192 keyfile=*(++argv); 316 if(keyfile) 345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1) 351 if(keyfile) 354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
H A D | rsautl.c | 93 char *keyfile = NULL; local 135 keyfile = *(++argv); 201 pkey = load_key(bio_err, keyfile, keyform, 0, 206 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 211 x = load_cert(bio_err, keyfile, keyform,
|
H A D | spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 130 keyfile= *(++argv); 195 if(keyfile) { 197 strcmp(keyfile, "-") ? keyfile : NULL,
|
H A D | pkeyutl.c | 76 char *keyfile, int keyform, int key_type, 414 char *keyfile, int keyform, int key_type, 437 pkey = load_key(bio_err, keyfile, keyform, 0, 442 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 447 x = load_cert(bio_err, keyfile, keyform, 413 init_ctx(int *pkeysize, char *keyfile, int keyform, int key_type, char *passargin, int pkey_op, ENGINE *e) argument
|
H A D | CA.sh | 133 -keyfile ${CATOP}/private/$CAKEY -selfsign \
|
H A D | ocsp.c | 133 char *signfile = NULL, *keyfile = NULL; local 403 keyfile = *args; 719 if (!keyfile) keyfile = signfile; 733 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
|
H A D | x509.c | 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 323 keyfile= *(++argv); 961 keyfile, keyformat, 0, 994 if (keyfile == NULL) 1002 keyfile, keyformat, 0,
|
H A D | req.c | 175 char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL; local 247 keyfile= *(++argv); 619 if (keyfile != NULL) 621 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e,
|
H A D | ca.c | 162 " -keyfile arg - private key file\n", 269 char *keyfile=NULL; local 400 else if (strcmp(*argv,"-keyfile") == 0) 403 keyfile= *(++argv); 746 if ((keyfile == NULL) && ((keyfile=NCONF_get_string(conf, 761 pkey = load_key(bio_err, keyfile, keyform, 0, key, e,
|
/external/chromium_org/third_party/skia/platform_tools/barelinux/bin/ |
H A D | arm64_download | 76 local keyfile='CLEAN_AND_CONFIGURED_key' 92 try cp "${working_dir}/${keyfile}" "${working_dir}/key" || return
|
/external/skia/platform_tools/barelinux/bin/ |
H A D | arm64_download | 76 local keyfile='CLEAN_AND_CONFIGURED_key' 92 try cp "${working_dir}/${keyfile}" "${working_dir}/key" || return
|
/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | setup.sh | 28 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 47 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate" 61 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -keyfile demoCA/private/cakey.pem -passin pass:$PASS -in ocsp.csr -out ocsp.pem -days 730 -extensions v3_OCSP
|
/external/chromium_org/native_client_sdk/src/build_tools/sdk_tools/third_party/fancy_urllib/ |
H A D | __init__.py | 148 keyfile=self.key_file, 161 keyfile=self.key_file,
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-jsch.jar | ... password
public void setKeyfile (java.lang.String) String keyfile
public void setPassphrase (java.lang.String) String passphrase ... |
H A D | ant-nodeps.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ... |
/external/chromium-trace/trace-viewer/examples/stream_server/ |
H A D | standalone.py | 338 keyfile=self.websocket_server_options.private_key,
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
H A D | standalone.py | 334 keyfile=self.websocket_server_options.private_key,
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
H A D | standalone.py | 470 keyfile=server_options.private_key,
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp9/encoder/ |
H A D | vp9_encoder.c | 76 FILE *keyfile; 1185 if (keyfile) 1186 fclose(keyfile);
|
/external/libvpx/libvpx/vp9/encoder/ |
H A D | vp9_onyx_if.c | 81 FILE *keyfile; 1561 if (keyfile) 1562 fclose(keyfile);
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/encoder/ |
H A D | onyx_if.c | 108 FILE *keyfile; 2467 if (keyfile) 2468 fclose(keyfile);
|
/external/libvpx/libvpx/vp8/encoder/ |
H A D | onyx_if.c | 105 FILE *keyfile; 2413 if (keyfile) 2414 fclose(keyfile);
|