HomeSort by relevance Sort by last modified time
    Searched full:key_file (Results 1 - 25 of 63) sorted by null

1 2 3

  /external/autotest/site_utils/
hwid_lib.py 26 def get_hwid_info(hwid, info_type, key_file):
31 @param key_file: Filename that holds the key for authentication.
35 @raises HwIdException: If hwid/info_type/key_file is invalid or there's an
40 # the key_file name as the indicator for that.
41 if key_file == KEY_FILENAME_NO_HWID:
51 with open(key_file) as f:
78 def get_all_possible_dut_labels(key_file):
86 @param key_file: Filename that holds the key for authentication.
90 return get_hwid_info('dummy_hwid', HWID_INFO_LABEL, key_file).get(
hwid_lib_unittest.py 159 key_file = hwid_lib.KEY_FILENAME_NO_HWID
160 self.assertEqual(hwid_lib.get_hwid_info(hwid, info_type, key_file), {})
  /external/autotest/client/site_tests/login_UserPolicyKeys/
login_UserPolicyKeys.py 38 def _verify_key_file(self, key_file):
40 if not os.path.isfile(key_file):
41 raise error.TestFail('%s does not exist!' % key_file)
45 info = os.stat(key_file)
47 raise error.TestFail('%s is not a regular file' % key_file)
50 (key_file, oct(info.st_mode)))
52 current = key_file
96 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER)
97 if os.path.exists(key_file):
99 key_file)
    [all...]
  /external/vboot_reference/host/lib/
signature_digest.c 41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
49 key_fp = fopen(key_file, "r");
51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file));
59 key_file));
host_signature.c 249 const char* key_file,
292 key_file, /* Key file to use */
  /external/vboot_reference/host/lib/include/
signature_digest.h 29 * the private RSA key file from [key_file] and signature algorithm
34 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
host_signature.h 59 const char* key_file,
  /system/extras/verity/
generate_verity_key.c 61 static int convert_x509(const char *pem_file, const char *key_file)
69 if (!pem_file || !key_file) {
97 if (write_public_keyfile(rsa, key_file) < 0) {
  /external/autotest/client/deps/fakegudev/src/
fakegudev.c 181 GKeyFile *key_file; local
187 key_file = g_key_file_new();
188 if (!g_key_file_load_from_file (key_file,
194 groups = g_key_file_get_groups(key_file, &num_groups);
206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) {
214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) {
224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error);
234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error);
250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error);
256 value = g_key_file_get_string (key_file, group, key, &error)
    [all...]
  /external/libbrillo/policy/tests/
libpolicy_unittest.cc 42 base::FilePath key_file(kKeyFile);
46 policy_file, key_file, false));
168 base::FilePath key_file(kKeyFile);
173 policy_file, key_file, false));
  /external/libmicrohttpd/src/testcurl/https/
test_https_sni.c 63 const char *KEY_FILE)
96 ret = gnutls_load_file (KEY_FILE, &data);
101 KEY_FILE);
  /external/python/cpython3/Lib/test/
make_ssl_certs.py 96 req_file, cert_file, key_file = tempnames
102 '-newkey', 'rsa:1024', '-keyout', key_file,
122 with open(key_file, 'r') as f:
  /bootable/recovery/tests/component/
verifier_test.cpp 169 TemporaryFile key_file; local
170 ASSERT_TRUE(android::base::WriteStringToFile(testkey_v3, key_file.path));
172 ASSERT_TRUE(load_keys(key_file.path, certs));
  /external/python/cpython2/Lib/test/
make_ssl_certs.py 97 req_file, cert_file, key_file = tempnames
103 '-newkey', 'rsa:1024', '-keyout', key_file,
123 with open(key_file, 'r') as f:
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/PyMod-2.7.2/Modules/
socketmodule.h 177 &key_file, &cert_file))
211 &key_file, &cert_file))
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Modules/
socketmodule.h 178 &key_file, &cert_file))
212 &key_file, &cert_file))
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/
socketmodule.h 177 &key_file, &cert_file))
211 &key_file, &cert_file))
_ssl.c 264 newPySSLObject(PySocketSockObject *Sock, char *key_file, char *cert_file,
289 if ((key_file && !cert_file) || (!key_file && cert_file)) {
296 ((key_file == NULL) || (cert_file == NULL))) {
345 if (key_file) {
347 ret = SSL_CTX_use_PrivateKey_file(self->ctx, key_file,
424 char *key_file = NULL; local
433 &key_file, &cert_file,
442 server_side, key_file, cert_file, verification_mode,
446 return (PyObject *) newPySSLObject(Sock, key_file, cert_file,
    [all...]
  /external/python/cpython2/Modules/
socketmodule.h 178 &key_file, &cert_file))
212 &key_file, &cert_file))
  /external/tensorflow/tensorflow/tools/dist_test/
remote_test.sh 136 KEY_FILE=${TF_DIST_GCLOUD_KEY_FILE:-"${HOME}/gcloud-secrets/tensorflow-testing.json"}
138 docker run --rm -v ${KEY_FILE}:/var/gcloud/secrets/tensorflow-testing.json \
  /external/v8/tools/release/
check_clusterfuzz.py 198 assert options.key_file
199 with open(options.key_file) as f:
  /external/libbrillo/policy/
device_policy_impl.cc 31 // Reads the public key used to sign the policy from |key_file| and stores it
33 bool ReadPublicKeyFromFile(const base::FilePath& key_file,
35 if (!base::PathExists(key_file))
38 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) {
  /external/strace/xlat/
evdev_keycode.in 148 KEY_FILE
  /external/libmicrohttpd/doc/chapters/
tlsauthentication.inc 430 const char *KEY_FILE)
461 ret = gnutls_load_file (KEY_FILE, &data);
466 KEY_FILE);
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
httplib.py     [all...]

Completed in 407 milliseconds

1 2 3