/external/autotest/site_utils/ |
hwid_lib.py | 26 def get_hwid_info(hwid, info_type, key_file): 31 @param key_file: Filename that holds the key for authentication. 35 @raises HwIdException: If hwid/info_type/key_file is invalid or there's an 40 # the key_file name as the indicator for that. 41 if key_file == KEY_FILENAME_NO_HWID: 51 with open(key_file) as f: 78 def get_all_possible_dut_labels(key_file): 86 @param key_file: Filename that holds the key for authentication. 90 return get_hwid_info('dummy_hwid', HWID_INFO_LABEL, key_file).get(
|
hwid_lib_unittest.py | 159 key_file = hwid_lib.KEY_FILENAME_NO_HWID 160 self.assertEqual(hwid_lib.get_hwid_info(hwid, info_type, key_file), {})
|
/external/autotest/client/site_tests/login_UserPolicyKeys/ |
login_UserPolicyKeys.py | 38 def _verify_key_file(self, key_file): 40 if not os.path.isfile(key_file): 41 raise error.TestFail('%s does not exist!' % key_file) 45 info = os.stat(key_file) 47 raise error.TestFail('%s is not a regular file' % key_file) 50 (key_file, oct(info.st_mode))) 52 current = key_file 96 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER) 97 if os.path.exists(key_file): 99 key_file) [all...] |
/external/vboot_reference/host/lib/ |
signature_digest.c | 41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file, 49 key_fp = fopen(key_file, "r"); 51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file)); 59 key_file));
|
host_signature.c | 249 const char* key_file, 292 key_file, /* Key file to use */
|
/external/vboot_reference/host/lib/include/ |
signature_digest.h | 29 * the private RSA key file from [key_file] and signature algorithm 34 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
|
host_signature.h | 59 const char* key_file,
|
/system/extras/verity/ |
generate_verity_key.c | 61 static int convert_x509(const char *pem_file, const char *key_file) 69 if (!pem_file || !key_file) { 97 if (write_public_keyfile(rsa, key_file) < 0) {
|
/external/autotest/client/deps/fakegudev/src/ |
fakegudev.c | 181 GKeyFile *key_file; local 187 key_file = g_key_file_new(); 188 if (!g_key_file_load_from_file (key_file, 194 groups = g_key_file_get_groups(key_file, &num_groups); 206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) { 214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) { 224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error); 234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error); 250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error); 256 value = g_key_file_get_string (key_file, group, key, &error) [all...] |
/external/libbrillo/policy/tests/ |
libpolicy_unittest.cc | 42 base::FilePath key_file(kKeyFile); 46 policy_file, key_file, false)); 168 base::FilePath key_file(kKeyFile); 173 policy_file, key_file, false));
|
/external/libmicrohttpd/src/testcurl/https/ |
test_https_sni.c | 63 const char *KEY_FILE) 96 ret = gnutls_load_file (KEY_FILE, &data); 101 KEY_FILE);
|
/external/python/cpython3/Lib/test/ |
make_ssl_certs.py | 96 req_file, cert_file, key_file = tempnames 102 '-newkey', 'rsa:1024', '-keyout', key_file, 122 with open(key_file, 'r') as f:
|
/bootable/recovery/tests/component/ |
verifier_test.cpp | 169 TemporaryFile key_file; local 170 ASSERT_TRUE(android::base::WriteStringToFile(testkey_v3, key_file.path)); 172 ASSERT_TRUE(load_keys(key_file.path, certs));
|
/external/python/cpython2/Lib/test/ |
make_ssl_certs.py | 97 req_file, cert_file, key_file = tempnames 103 '-newkey', 'rsa:1024', '-keyout', key_file, 123 with open(key_file, 'r') as f:
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/PyMod-2.7.2/Modules/ |
socketmodule.h | 177 &key_file, &cert_file))
211 &key_file, &cert_file))
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Modules/ |
socketmodule.h | 178 &key_file, &cert_file))
212 &key_file, &cert_file))
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
socketmodule.h | 177 &key_file, &cert_file))
211 &key_file, &cert_file))
|
_ssl.c | 264 newPySSLObject(PySocketSockObject *Sock, char *key_file, char *cert_file,
289 if ((key_file && !cert_file) || (!key_file && cert_file)) {
296 ((key_file == NULL) || (cert_file == NULL))) {
345 if (key_file) {
347 ret = SSL_CTX_use_PrivateKey_file(self->ctx, key_file,
424 char *key_file = NULL;
local 433 &key_file, &cert_file,
442 server_side, key_file, cert_file, verification_mode,
446 return (PyObject *) newPySSLObject(Sock, key_file, cert_file, [all...] |
/external/python/cpython2/Modules/ |
socketmodule.h | 178 &key_file, &cert_file)) 212 &key_file, &cert_file))
|
/external/tensorflow/tensorflow/tools/dist_test/ |
remote_test.sh | 136 KEY_FILE=${TF_DIST_GCLOUD_KEY_FILE:-"${HOME}/gcloud-secrets/tensorflow-testing.json"} 138 docker run --rm -v ${KEY_FILE}:/var/gcloud/secrets/tensorflow-testing.json \
|
/external/v8/tools/release/ |
check_clusterfuzz.py | 198 assert options.key_file 199 with open(options.key_file) as f:
|
/external/libbrillo/policy/ |
device_policy_impl.cc | 31 // Reads the public key used to sign the policy from |key_file| and stores it 33 bool ReadPublicKeyFromFile(const base::FilePath& key_file, 35 if (!base::PathExists(key_file)) 38 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) {
|
/external/strace/xlat/ |
evdev_keycode.in | 148 KEY_FILE
|
/external/libmicrohttpd/doc/chapters/ |
tlsauthentication.inc | 430 const char *KEY_FILE) 461 ret = gnutls_load_file (KEY_FILE, &data); 466 KEY_FILE);
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
httplib.py | [all...] |