HomeSort by relevance Sort by last modified time
    Searched refs:key_file (Results 1 - 25 of 37) sorted by null

1 2

  /external/autotest/client/site_tests/login_UserPolicyKeys/
login_UserPolicyKeys.py 38 def _verify_key_file(self, key_file):
40 if not os.path.isfile(key_file):
41 raise error.TestFail('%s does not exist!' % key_file)
45 info = os.stat(key_file)
47 raise error.TestFail('%s is not a regular file' % key_file)
50 (key_file, oct(info.st_mode)))
52 current = key_file
97 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER)
98 if os.path.exists(key_file):
100 key_file)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/file/
key.py 78 key_file = self.fp
80 key_file = open(self.full_path, 'rb')
82 shutil.copyfileobj(key_file, fp)
84 key_file.close()
124 key_file = self.fp
128 key_file = open(self.full_path, 'wb')
130 shutil.copyfileobj(fp, key_file)
132 key_file.close()
  /external/vboot_reference/host/lib/include/
signature_digest.h 29 * the private RSA key file from [key_file] and signature algorithm
34 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
host_signature.h 59 const char* key_file,
  /external/boringssl/src/tool/
server.cc 102 std::string key_file = "server.pem"; local
104 key_file = args_map["-key"];
106 if (!SSL_CTX_use_PrivateKey_file(ctx, key_file.c_str(), SSL_FILETYPE_PEM)) {
107 fprintf(stderr, "Failed to load private key: %s\n", key_file.c_str());
110 if (!SSL_CTX_use_certificate_chain_file(ctx, key_file.c_str())) {
111 fprintf(stderr, "Failed to load cert chain: %s\n", key_file.c_str());
  /external/vboot_reference/host/lib/
signature_digest.c 41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
49 key_fp = fopen(key_file, "r");
51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file));
59 key_file));
host_signature.c 249 const char* key_file,
292 key_file, /* Key file to use */
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/
https_connection.py 91 def __init__(self, host, port=default_port, key_file=None, cert_file=None,
98 key_file: A file containing the client's private key
112 self.key_file = key_file
128 self.sock = ssl.wrap_socket(sock, keyfile=self.key_file,
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/
bundle_image 10 parser.add_option("-k", "--key", help="Private Key File", dest="key_file", default=None)
27 b.bundle(bucket=options.bucket,prefix=options.prefix,key_file=options.key_file,cert_file=options.cert_file,size=int(options.size),ssh_key=options.ssh_key)
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mashups/
server.py 251 def get_ssh_client(self, key_file=None, host_key_file='~/.ssh/known_hosts',
258 if not key_file:
260 key_file = iobject.get_filename('Path to OpenSSH Key file')
261 self._pkey = paramiko.RSAKey.from_private_key_file(key_file)
285 def shell(self, key_file=None):
286 ssh_client = self.get_ssh_client(key_file)
290 def bundle_image(self, prefix, key_file, cert_file, size):
295 path, name = os.path.split(key_file)
297 self.put_file(key_file, remote_key_file)
339 def create_image(self, bucket=None, prefix=None, key_file=None, cert_file=None, size=None)
    [all...]
  /system/webservd/webservd/
server.cc 61 brillo::SecureBlob LoadAndValidatePrivateKey(const base::FilePath& key_file,
64 if (!base::ReadFileToString(key_file, &encrypted_key_data))
178 const base::FilePath key_file{kKeyFile};
182 LoadAndValidatePrivateKey(key_file, encryptor_);
213 base::WriteFile(key_file, encrypted_key.data(), encrypted_key.size());
  /external/v8/tools/release/
check_clusterfuzz.py 180 assert options.key_file
181 with open(options.key_file) as f:
  /external/autotest/client/deps/fakegudev/src/
fakegudev.c 181 GKeyFile *key_file; local
187 key_file = g_key_file_new();
188 if (!g_key_file_load_from_file (key_file,
194 groups = g_key_file_get_groups(key_file, &num_groups);
206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) {
214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) {
224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error);
234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error);
250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error);
256 value = g_key_file_get_string (key_file, group, key, &error)
    [all...]
  /external/libbrillo/policy/tests/
libpolicy_unittest.cc 51 base::FilePath key_file(kKeyFile);
53 new MockDevicePolicyImpl(policy_file, key_file, false);
161 base::FilePath key_file(kKeyFile);
163 new MockDevicePolicyImpl(policy_file, key_file, false);
  /external/boringssl/src/ssl/test/
test_config.h 28 std::string key_file; member in struct:TestConfig
test_config.cc 105 { "-key-file", &TestConfig::key_file },
  /system/extras/verity/
generate_verity_key.c 114 static int convert_x509(const char *pem_file, const char *key_file)
122 if (!pem_file || !key_file) {
150 if (write_public_keyfile(rsa, key_file) < 0) {
  /external/libbrillo/policy/
device_policy_impl.cc 25 // Reads the public key used to sign the policy from |key_file| and stores it
27 bool ReadPublicKeyFromFile(const base::FilePath& key_file,
29 if (!base::PathExists(key_file))
32 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) {
  /prebuilts/gdb/darwin-x86/lib/python2.7/
httplib.py     [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/
httplib.py     [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
httplib.py     [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
httplib.py     [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/
__init__.py 70 def _ssl_wrap_socket(sock, key_file, cert_file,
79 return ssl.wrap_socket(sock, keyfile=key_file, certfile=cert_file,
83 def _ssl_wrap_socket(sock, key_file, cert_file,
90 ssl_sock = socket.ssl(sock, key_file, cert_file)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/manage/
server.py 51 def copy_x509(self, key_file, cert_file):
54 path, name = os.path.split(key_file)
56 self.ssh_client.put_file(key_file, self.remote_key_file)
89 def bundle(self, bucket=None, prefix=None, key_file=None, cert_file=None,
96 if not key_file:
97 key_file = iobject.get_filename('Path to RSA private key file')
104 self.copy_x509(key_file, cert_file)
  /external/vboot_reference/scripts/image_signing/
sign_official_build.sh 460 local key_size key_file="${key_dir}/update_key.pem"
470 key_size=$(openssl rsa -text -noout -in "${key_file}" | \
478 openssl rsautl -sign -pkcs -inkey "${key_file}" -out "${output}"

Completed in 993 milliseconds

1 2