/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/ |
security.py | 7 keyfile = env['PYTHON_KEYFILE']
9 keyfile = '.python_keyfile'
11 keyfile = os.path.join(env['HOME'], keyfile)
12 if not os.path.exists(keyfile):
15 kf = os.path.join(dir, keyfile)
17 keyfile = kf
20 self._key = eval(open(keyfile).readline())
22 raise IOError, "python keyfile %s: cannot open" % keyfile
[all...] |
/external/python/cpython2/Demo/pdist/ |
security.py | 7 keyfile = env['PYTHON_KEYFILE'] 9 keyfile = '.python_keyfile' 11 keyfile = os.path.join(env['HOME'], keyfile) 12 if not os.path.exists(keyfile): 15 kf = os.path.join(dir, keyfile) 17 keyfile = kf 20 self._key = eval(open(keyfile).readline()) 22 raise IOError, "python keyfile %s: cannot open" % keyfile [all...] |
/external/epid-sdk/tools/extractgrps/src/ |
main.c | 65 struct arg_file* keyfile = local 78 argtable[0] = keyfile; 129 if (!FileExists(keyfile->filename[0])) { 130 log_error("cannot access '%s'", keyfile->filename[0]); 135 keyfile_size = GetFileSize(keyfile->filename[0]); 140 keyfile->filename[0]); 153 file = fopen(keyfile->filename[0], "rb"); 155 log_error("failed read from '%s'", keyfile->filename[0]); 168 keyfile->filename[0]); 177 keyfile->filename[0]) [all...] |
/external/u-boot/tools/ |
fit_check_sign.c | 43 char *keyfile = NULL; local 57 keyfile = optarg; 68 if (!keyfile) { 76 kfd = mmap_fdt(cmdname, keyfile, 0, &key_blob, &ksbuf, false);
|
/external/epid-sdk/tools/extractkeys/src/ |
main.c | 83 struct arg_file* keyfile = local 98 argtable[0] = keyfile; 150 if (!FileExists(keyfile->filename[0])) { 151 log_error("cannot access '%s'", keyfile->filename[0]); 156 keyfile_size = GetFileSize(keyfile->filename[0]); 171 keyfile->filename[0]); 184 file = fopen(keyfile->filename[0], "rb"); 186 log_error("failed read from '%s'", keyfile->filename[0]); 199 keyfile->filename[0]); 211 keyfile->filename[0]) [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
ssl.py | 100 def __init__(self, sock, keyfile=None, certfile=None,
115 if certfile and not keyfile:
116 keyfile = certfile
130 keyfile, certfile,
135 self.keyfile = keyfile
303 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
337 keyfile=self.keyfile,
361 def wrap_socket(sock, keyfile=None, certfile=None, [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
smtplib.py | 607 def starttls(self, keyfile=None, certfile=None):
614 session. If you provide the keyfile and certfile parameters,
631 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
755 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
763 keyfile=None, certfile=None,
765 self.keyfile = keyfile
773 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
platform_EncryptedStateful.py | 124 keyfile = self.key 127 keyfile = self.needs_finalization 129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile)) 133 info = os.stat(keyfile) 135 "%s is regular file" % (keyfile)) 136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile)) 137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile)) 139 "%s is S_IRUSR | S_IWUSR" % (keyfile)) 140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile)) [all...] |
/external/python/rsa/rsa/ |
key.py | 61 def _load_pkcs1_pem(cls, keyfile): 64 :param keyfile: contents of a PEM-encoded file that contains 66 :type keyfile: bytes 73 def _load_pkcs1_der(cls, keyfile): 76 :param keyfile: contents of a DER-encoded file that contains 78 :type keyfile: bytes 99 def load_pkcs1(cls, keyfile, format='PEM'): 102 :param keyfile: contents of a DER- or PEM-encoded file that contains 104 :type keyfile: bytes 118 return method(keyfile) [all...] |
/external/tensorflow/tensorflow/contrib/ignite/kernels/client/ |
ignite_ssl_wrapper.h | 27 SslWrapper(std::shared_ptr<Client> client, string certfile, string keyfile,
|
ignite_ssl_wrapper.cc | 33 string keyfile, string cert_password, bool big_endian) 37 keyfile_(std::move(keyfile)),
|
/external/python/cpython3/Lib/ |
poplib.py | 417 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None, 422 keyfile - PEM formatted file that contains your private key 429 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, 431 if context is not None and keyfile is not None: 432 raise ValueError("context and keyfile arguments are mutually " 437 if keyfile is not None or certfile is not None: 439 warnings.warn("keyfile and certfile are deprecated, use a " 441 self.keyfile = keyfile 445 keyfile=keyfile [all...] |
smtplib.py | 732 def starttls(self, keyfile=None, certfile=None, context=None): 739 session. If you provide the keyfile and certfile parameters, 757 if context is not None and keyfile is not None: 758 raise ValueError("context and keyfile arguments are mutually " 763 if keyfile is not None or certfile is not None: 765 warnings.warn("keyfile and certfile are deprecated, use a " 769 keyfile=keyfile) [all...] |
/external/autotest/client/cros/ |
ownership.py | 287 keyfile = scoped_tempfile.tempdir.name + '/private.key' 290 OPENSSLREQ, '/CN=me', keyfile, certfile) 292 return (keyfile, certfile) 304 keyfile = scoped_tempfile(keypath) 306 return (utils.read_file(keyfile.name), 310 def push_to_nss(keyfile, certfile, nssdb): 316 @param keyfile: path to PEM-formatted private key file. 322 OPENSSLP12, certfile, keyfile, for_push.name)
|
/external/libcups/cups/ |
tls-gnutls.c | 71 keyfile[1024]; /* Private key filename */ local 97 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key"); 123 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL) 125 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile)); 131 DEBUG_printf(("1cupsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno))); 1334 keyfile[1024]; \/* Private key file *\/ local [all...] |
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 74 -keyfile 'cakey.pem' \
|
/external/tensorflow/tensorflow/contrib/ignite/kernels/dataset/ |
ignite_dataset.cc | 24 string certfile, string keyfile, 39 keyfile_(std::move(keyfile)), 49 << "', certfile='" << certfile_ << "', keyfile='"
|
ignite_dataset.h | 28 string keyfile, string cert_password, std::vector<int32> schema,
|
ignite_dataset_ops.cc | 83 string keyfile = ""; variable 152 if (env_keyfile) keyfile = string(env_keyfile); 188 std::move(certfile), std::move(keyfile), std::move(cert_password),
|
/external/python/cpython2/Lib/ |
ssl.py | 466 certfile=None, keyfile=None, 489 if keyfile and not certfile: 491 if certfile or keyfile: 492 context.load_cert_chain(certfile, keyfile) 535 def __init__(self, sock=None, keyfile=None, certfile=None, 551 if keyfile and not certfile: 553 if certfile and not keyfile: 554 keyfile = certfile 560 self._context.load_cert_chain(certfile, keyfile) 565 self.keyfile = keyfil [all...] |
poplib.py | 328 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 332 keyfile - PEM formatted file that contains your private key 338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 341 self.keyfile = keyfile 360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
smtplib.py | 626 def starttls(self, keyfile=None, certfile=None): 633 session. If you provide the keyfile and certfile parameters, 650 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 789 SMTP class. keyfile and certfile are also optional - they can contain 798 keyfile=None, certfile=None, 800 self.keyfile = keyfile 808 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
/external/grpc-grpc/test/core/http/ |
test_server.py | 55 httpd.socket = ssl.wrap_socket(httpd.socket, certfile=_PEM, keyfile=_KEY, server_side=True)
|
/external/fsverity-utils/ |
sign.c | 40 static EVP_PKEY *read_private_key(const char *keyfile) 45 bio = BIO_new_file(keyfile, "r"); 47 error_msg_openssl("can't open '%s' for reading", keyfile); 55 keyfile); 375 * key in @keyfile, the certificate in @certfile, and the hash algorithm 380 const char *keyfile, const char *certfile, 389 pkey = read_private_key(keyfile);
|