HomeSort by relevance Sort by last modified time
    Searched refs:key_file (Results 1 - 25 of 37) sorted by null

1 2

  /external/autotest/site_utils/
hwid_lib.py 26 def get_hwid_info(hwid, info_type, key_file):
31 @param key_file: Filename that holds the key for authentication.
35 @raises HwIdException: If hwid/info_type/key_file is invalid or there's an
40 # the key_file name as the indicator for that.
41 if key_file == KEY_FILENAME_NO_HWID:
51 with open(key_file) as f:
78 def get_all_possible_dut_labels(key_file):
86 @param key_file: Filename that holds the key for authentication.
90 return get_hwid_info('dummy_hwid', HWID_INFO_LABEL, key_file).get(
hwid_lib_unittest.py 159 key_file = hwid_lib.KEY_FILENAME_NO_HWID
160 self.assertEqual(hwid_lib.get_hwid_info(hwid, info_type, key_file), {})
  /external/autotest/client/site_tests/login_UserPolicyKeys/
login_UserPolicyKeys.py 38 def _verify_key_file(self, key_file):
40 if not os.path.isfile(key_file):
41 raise error.TestFail('%s does not exist!' % key_file)
45 info = os.stat(key_file)
47 raise error.TestFail('%s is not a regular file' % key_file)
50 (key_file, oct(info.st_mode)))
52 current = key_file
96 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER)
97 if os.path.exists(key_file):
99 key_file)
    [all...]
  /external/vboot_reference/host/lib/include/
signature_digest.h 29 * the private RSA key file from [key_file] and signature algorithm
34 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
host_signature.h 59 const char* key_file,
  /external/vboot_reference/host/lib/
signature_digest.c 41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
49 key_fp = fopen(key_file, "r");
51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file));
59 key_file));
host_signature.c 249 const char* key_file,
292 key_file, /* Key file to use */
  /system/extras/verity/
generate_verity_key.c 61 static int convert_x509(const char *pem_file, const char *key_file)
69 if (!pem_file || !key_file) {
97 if (write_public_keyfile(rsa, key_file) < 0) {
  /external/python/cpython2/Lib/test/
make_ssl_certs.py 97 req_file, cert_file, key_file = tempnames
103 '-newkey', 'rsa:1024', '-keyout', key_file,
123 with open(key_file, 'r') as f:
  /external/python/cpython3/Lib/test/
make_ssl_certs.py 96 req_file, cert_file, key_file = tempnames
102 '-newkey', 'rsa:1024', '-keyout', key_file,
122 with open(key_file, 'r') as f:
  /external/v8/tools/release/
check_clusterfuzz.py 198 assert options.key_file
199 with open(options.key_file) as f:
  /external/autotest/client/deps/fakegudev/src/
fakegudev.c 181 GKeyFile *key_file; local
187 key_file = g_key_file_new();
188 if (!g_key_file_load_from_file (key_file,
194 groups = g_key_file_get_groups(key_file, &num_groups);
206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) {
214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) {
224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error);
234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error);
250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error);
256 value = g_key_file_get_string (key_file, group, key, &error)
    [all...]
  /external/libbrillo/policy/tests/
libpolicy_unittest.cc 42 base::FilePath key_file(kKeyFile);
46 policy_file, key_file, false));
168 base::FilePath key_file(kKeyFile);
173 policy_file, key_file, false));
  /bootable/recovery/tests/component/
verifier_test.cpp 169 TemporaryFile key_file; local
170 ASSERT_TRUE(android::base::WriteStringToFile(testkey_v3, key_file.path));
172 ASSERT_TRUE(load_keys(key_file.path, certs));
  /external/boringssl/src/ssl/test/
test_config.h 31 std::string key_file; member in struct:TestConfig
  /prebuilts/gdb/darwin-x86/lib/python2.7/
httplib.py     [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/
httplib.py     [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
httplib.py     [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
httplib.py     [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/
_ssl.c 264 newPySSLObject(PySocketSockObject *Sock, char *key_file, char *cert_file,
289 if ((key_file && !cert_file) || (!key_file && cert_file)) {
296 ((key_file == NULL) || (cert_file == NULL))) {
345 if (key_file) {
347 ret = SSL_CTX_use_PrivateKey_file(self->ctx, key_file,
424 char *key_file = NULL; local
433 &key_file, &cert_file,
442 server_side, key_file, cert_file, verification_mode,
446 return (PyObject *) newPySSLObject(Sock, key_file, cert_file,
    [all...]
  /external/python/cpython2/Lib/
httplib.py     [all...]
  /external/libbrillo/policy/
device_policy_impl.cc 31 // Reads the public key used to sign the policy from |key_file| and stores it
33 bool ReadPublicKeyFromFile(const base::FilePath& key_file,
35 if (!base::PathExists(key_file))
38 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) {
  /external/vboot_reference/scripts/image_signing/
sign_official_build.sh 460 local key_size key_file="${key_dir}/update_key.pem"
470 key_size=$(openssl rsa -text -noout -in "${key_file}" | \
478 openssl rsautl -sign -pkcs -inkey "${key_file}" -out "${output}"
  /external/autotest/server/hosts/
cros_label.py 552 self.key_file = global_config.global_config.get_config_value(
560 self.key_file).get('labels', [])
585 self.key_file)
587 logging.error('Can not open key file: %s', self.key_file)
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
httplib.py     [all...]

Completed in 1396 milliseconds

1 2