HomeSort by relevance Sort by last modified time
    Searched refs:keyfile (Results 1 - 25 of 63) sorted by null

1 2 3

  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/pdist/
security.py 7 keyfile = env['PYTHON_KEYFILE']
9 keyfile = '.python_keyfile'
11 keyfile = os.path.join(env['HOME'], keyfile)
12 if not os.path.exists(keyfile):
15 kf = os.path.join(dir, keyfile)
17 keyfile = kf
20 self._key = eval(open(keyfile).readline())
22 raise IOError, "python keyfile %s: cannot open" % keyfile
    [all...]
  /external/python/cpython2/Demo/pdist/
security.py 7 keyfile = env['PYTHON_KEYFILE']
9 keyfile = '.python_keyfile'
11 keyfile = os.path.join(env['HOME'], keyfile)
12 if not os.path.exists(keyfile):
15 kf = os.path.join(dir, keyfile)
17 keyfile = kf
20 self._key = eval(open(keyfile).readline())
22 raise IOError, "python keyfile %s: cannot open" % keyfile
    [all...]
  /external/epid-sdk/tools/extractgrps/src/
main.c 65 struct arg_file* keyfile = local
78 argtable[0] = keyfile;
129 if (!FileExists(keyfile->filename[0])) {
130 log_error("cannot access '%s'", keyfile->filename[0]);
135 keyfile_size = GetFileSize(keyfile->filename[0]);
140 keyfile->filename[0]);
153 file = fopen(keyfile->filename[0], "rb");
155 log_error("failed read from '%s'", keyfile->filename[0]);
168 keyfile->filename[0]);
177 keyfile->filename[0])
    [all...]
  /external/u-boot/tools/
fit_check_sign.c 43 char *keyfile = NULL; local
57 keyfile = optarg;
68 if (!keyfile) {
76 kfd = mmap_fdt(cmdname, keyfile, 0, &key_blob, &ksbuf, false);
  /external/epid-sdk/tools/extractkeys/src/
main.c 83 struct arg_file* keyfile = local
98 argtable[0] = keyfile;
150 if (!FileExists(keyfile->filename[0])) {
151 log_error("cannot access '%s'", keyfile->filename[0]);
156 keyfile_size = GetFileSize(keyfile->filename[0]);
171 keyfile->filename[0]);
184 file = fopen(keyfile->filename[0], "rb");
186 log_error("failed read from '%s'", keyfile->filename[0]);
199 keyfile->filename[0]);
211 keyfile->filename[0])
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
ssl.py 100 def __init__(self, sock, keyfile=None, certfile=None,
115 if certfile and not keyfile:
116 keyfile = certfile
130 keyfile, certfile,
135 self.keyfile = keyfile
303 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
337 keyfile=self.keyfile,
361 def wrap_socket(sock, keyfile=None, certfile=None,
    [all...]
poplib.py 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
324 keyfile - PEM formatted file that countains your private key
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
333 self.keyfile = keyfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
smtplib.py 607 def starttls(self, keyfile=None, certfile=None):
614 session. If you provide the keyfile and certfile parameters,
631 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
755 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
763 keyfile=None, certfile=None,
765 self.keyfile = keyfile
773 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
  /external/autotest/client/site_tests/platform_EncryptedStateful/
platform_EncryptedStateful.py 124 keyfile = self.key
127 keyfile = self.needs_finalization
129 chk.check(os.path.exists(keyfile), "%s exists" % (keyfile))
133 info = os.stat(keyfile)
135 "%s is regular file" % (keyfile))
136 chk.check(info.st_uid == 0, "%s is owned by root" % (keyfile))
137 chk.check(info.st_gid == 0, "%s has group root" % (keyfile))
139 "%s is S_IRUSR | S_IWUSR" % (keyfile))
140 chk.check(info.st_size == 48, "%s is 48 bytes" % (keyfile))
    [all...]
  /external/python/rsa/rsa/
key.py 61 def _load_pkcs1_pem(cls, keyfile):
64 :param keyfile: contents of a PEM-encoded file that contains
66 :type keyfile: bytes
73 def _load_pkcs1_der(cls, keyfile):
76 :param keyfile: contents of a DER-encoded file that contains
78 :type keyfile: bytes
99 def load_pkcs1(cls, keyfile, format='PEM'):
102 :param keyfile: contents of a DER- or PEM-encoded file that contains
104 :type keyfile: bytes
118 return method(keyfile)
    [all...]
  /external/tensorflow/tensorflow/contrib/ignite/kernels/client/
ignite_ssl_wrapper.h 27 SslWrapper(std::shared_ptr<Client> client, string certfile, string keyfile,
ignite_ssl_wrapper.cc 33 string keyfile, string cert_password, bool big_endian)
37 keyfile_(std::move(keyfile)),
  /external/python/cpython3/Lib/
poplib.py 417 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None,
422 keyfile - PEM formatted file that contains your private key
429 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None,
431 if context is not None and keyfile is not None:
432 raise ValueError("context and keyfile arguments are mutually "
437 if keyfile is not None or certfile is not None:
439 warnings.warn("keyfile and certfile are deprecated, use a "
441 self.keyfile = keyfile
445 keyfile=keyfile
    [all...]
smtplib.py 732 def starttls(self, keyfile=None, certfile=None, context=None):
739 session. If you provide the keyfile and certfile parameters,
757 if context is not None and keyfile is not None:
758 raise ValueError("context and keyfile arguments are mutually "
763 if keyfile is not None or certfile is not None:
765 warnings.warn("keyfile and certfile are deprecated, use a "
769 keyfile=keyfile)
    [all...]
  /external/autotest/client/cros/
ownership.py 287 keyfile = scoped_tempfile.tempdir.name + '/private.key'
290 OPENSSLREQ, '/CN=me', keyfile, certfile)
292 return (keyfile, certfile)
304 keyfile = scoped_tempfile(keypath)
306 return (utils.read_file(keyfile.name),
310 def push_to_nss(keyfile, certfile, nssdb):
316 @param keyfile: path to PEM-formatted private key file.
322 OPENSSLP12, certfile, keyfile, for_push.name)
  /external/libcups/cups/
tls-gnutls.c 71 keyfile[1024]; /* Private key filename */ local
97 http_gnutls_make_path(keyfile, sizeof(keyfile), path, common_name, "key");
123 else if ((fp = cupsFileOpen(keyfile, "w")) != NULL)
125 DEBUG_printf(("1cupsMakeServerCredentials: Writing private key to \"%s\".", keyfile));
131 DEBUG_printf(("1cupsMakeServerCredentials: Unable to create private key file \"%s\": %s", keyfile, strerror(errno)));
1334 keyfile[1024]; \/* Private key file *\/ local
    [all...]
  /cts/apps/CtsVerifier/
create_test_certs.sh 74 -keyfile 'cakey.pem' \
  /external/tensorflow/tensorflow/contrib/ignite/kernels/dataset/
ignite_dataset.cc 24 string certfile, string keyfile,
39 keyfile_(std::move(keyfile)),
49 << "', certfile='" << certfile_ << "', keyfile='"
ignite_dataset.h 28 string keyfile, string cert_password, std::vector<int32> schema,
ignite_dataset_ops.cc 83 string keyfile = ""; variable
152 if (env_keyfile) keyfile = string(env_keyfile);
188 std::move(certfile), std::move(keyfile), std::move(cert_password),
  /external/python/cpython2/Lib/
ssl.py 466 certfile=None, keyfile=None,
489 if keyfile and not certfile:
491 if certfile or keyfile:
492 context.load_cert_chain(certfile, keyfile)
535 def __init__(self, sock=None, keyfile=None, certfile=None,
551 if keyfile and not certfile:
553 if certfile and not keyfile:
554 keyfile = certfile
560 self._context.load_cert_chain(certfile, keyfile)
565 self.keyfile = keyfil
    [all...]
poplib.py 328 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
332 keyfile - PEM formatted file that contains your private key
338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
341 self.keyfile = keyfile
360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
smtplib.py 626 def starttls(self, keyfile=None, certfile=None):
633 session. If you provide the keyfile and certfile parameters,
650 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
789 SMTP class. keyfile and certfile are also optional - they can contain
798 keyfile=None, certfile=None,
800 self.keyfile = keyfile
808 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
  /external/grpc-grpc/test/core/http/
test_server.py 55 httpd.socket = ssl.wrap_socket(httpd.socket, certfile=_PEM, keyfile=_KEY, server_side=True)
  /external/fsverity-utils/
sign.c 40 static EVP_PKEY *read_private_key(const char *keyfile)
45 bio = BIO_new_file(keyfile, "r");
47 error_msg_openssl("can't open '%s' for reading", keyfile);
55 keyfile);
375 * key in @keyfile, the certificate in @certfile, and the hash algorithm
380 const char *keyfile, const char *certfile,
389 pkey = read_private_key(keyfile);

Completed in 665 milliseconds

1 2 3