Home
last modified time | relevance | path

Searched refs:key_file (Results 1 – 25 of 37) sorted by relevance

12

/external/autotest/client/site_tests/login_UserPolicyKeys/
Dlogin_UserPolicyKeys.py38 def _verify_key_file(self, key_file): argument
40 if not os.path.isfile(key_file):
41 raise error.TestFail('%s does not exist!' % key_file)
45 info = os.stat(key_file)
47 raise error.TestFail('%s is not a regular file' % key_file)
50 (key_file, oct(info.st_mode)))
52 current = key_file
94 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER)
95 if os.path.exists(key_file):
97 key_file)
[all …]
/external/autotest/site_utils/
Dhwid_lib.py26 def get_hwid_info(hwid, info_type, key_file): argument
41 if key_file == KEY_FILENAME_NO_HWID:
51 with open(key_file) as f:
78 def get_all_possible_dut_labels(key_file): argument
90 return get_hwid_info('dummy_hwid', HWID_INFO_LABEL, key_file).get(
Dhwid_lib_unittest.py159 key_file = hwid_lib.KEY_FILENAME_NO_HWID
160 self.assertEqual(hwid_lib.get_hwid_info(hwid, info_type, key_file), {})
/external/libbrillo/policy/tests/
Dlibpolicy_unittest.cc48 base::FilePath key_file(kKeyFile); in TEST() local
53 policy_file, key_file, false)); in TEST()
207 base::FilePath key_file(kKeyFile); in TEST() local
213 policy_file, key_file, false)); in TEST()
265 base::FilePath key_file(kNonExistingFile); in TEST() local
270 policy_file, key_file, true)); in TEST()
281 base::FilePath key_file(kNonExistingFile); in TEST() local
286 policy_file, key_file, false)); in TEST()
297 base::FilePath key_file(kNonExistingFile); in TEST() local
303 policy_file, key_file, false)); in TEST()
[all …]
/external/vboot_reference/host/lib/
Dsignature_digest.c41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file, in SignatureBuf() argument
49 key_fp = fopen(key_file, "r"); in SignatureBuf()
51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file)); in SignatureBuf()
59 key_file)); in SignatureBuf()
Dhost_signature.c249 const char* key_file, in CalculateSignature_external() argument
292 key_file, /* Key file to use */ in CalculateSignature_external()
/external/autotest/client/deps/fakegudev/src/
Dfakegudev.c181 GKeyFile *key_file; in load_fake_devices_from_file() local
187 key_file = g_key_file_new(); in load_fake_devices_from_file()
188 if (!g_key_file_load_from_file (key_file, in load_fake_devices_from_file()
194 groups = g_key_file_get_groups(key_file, &num_groups); in load_fake_devices_from_file()
206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) { in load_fake_devices_from_file()
214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) { in load_fake_devices_from_file()
224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error); in load_fake_devices_from_file()
234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error); in load_fake_devices_from_file()
250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error); in load_fake_devices_from_file()
256 value = g_key_file_get_string (key_file, group, key, &error); in load_fake_devices_from_file()
[all …]
/external/python/cpython2/Lib/test/
Dmake_ssl_certs.py97 req_file, cert_file, key_file = tempnames
103 '-newkey', 'rsa:1024', '-keyout', key_file,
123 with open(key_file, 'r') as f:
/external/python/cpython3/Lib/test/
Dmake_ssl_certs.py117 req_file, cert_file, key_file = tempnames
123 '-newkey', key, '-keyout', key_file,
151 with open(key_file, 'r') as f:
/external/python/httplib2/tests/
Dtest_external.py49 assert http.connections["https:bitworking.org"].key_file == "akeyfile"
58 assert http.connections["https:notthere.bitworking.org"].key_file is None
/external/python/cpython2/Lib/
Dhttplib.py1239 def __init__(self, host, port=None, key_file=None, cert_file=None, argument
1244 self.key_file = key_file
1248 if key_file or cert_file:
1249 context.load_cert_chain(cert_file, key_file)
1277 def __init__(self, host='', port=None, key_file=None, cert_file=None, argument
1284 self._setup(self._connection_class(host, port, key_file,
1290 self.key_file = key_file
/external/v8/tools/release/
Dcheck_clusterfuzz.py198 assert options.key_file
199 with open(options.key_file) as f:
/external/python/pyasn1/docs/source/
Dexample-use-case.rst100 with open open('.ssh/id_rsa') as key_file:
101 b64_serialisation = ''.join(key_file.readlines()[1:-1])
191 with open('.ssh/id_rsa.new', 'w') as key_file:
192 key_file.write(b64_serialisation)
/external/python/httplib2/python2/httplib2/
D__init__.py79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname argument
93 context.load_cert_chain(cert_file, key_file)
100 keyfile=key_file,
109 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname argument
117 ssl_sock = socket.ssl(sock, key_file, cert_file)
1248 key_file=None, argument
1258 self, host, port=port, key_file=key_file, cert_file=cert_file, strict=strict
1363 self.key_file,
1485 key_file=None, argument
1510 key_file=None, argument
[all …]
/external/autotest/server/hosts/
Dcros_label.py529 self.key_file = global_config.global_config.get_config_value(
537 self.key_file).get('labels', [])
562 self.key_file)
564 logging.error('Can not open key file: %s', self.key_file)
/external/vboot_reference/host/lib/include/
Dsignature_digest.h34 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
Dhost_signature.h59 const char* key_file,
/external/python/cpython3/Lib/http/
Dclient.py1352 def __init__(self, host, port=None, key_file=None, cert_file=None, argument
1359 if (key_file is not None or cert_file is not None or
1365 self.key_file = key_file
1375 if key_file or cert_file:
1376 context.load_cert_chain(cert_file, key_file)
/external/vboot_reference/scripts/image_signing/
Dsign_official_build.sh460 local key_size key_file="${key_dir}/update_key.pem"
470 key_size=$(openssl rsa -text -noout -in "${key_file}" | \
478 openssl rsautl -sign -pkcs -inkey "${key_file}" -out "${output}"
/external/libbrillo/policy/
Ddevice_policy_impl.cc41 bool ReadPublicKeyFromFile(const base::FilePath& key_file, in ReadPublicKeyFromFile() argument
43 if (!base::PathExists(key_file)) in ReadPublicKeyFromFile()
46 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) { in ReadPublicKeyFromFile()
/external/python/httplib2/python3/httplib2/
D__init__.py178 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None argument
197 context.load_cert_chain(cert_file, key_file)
1223 key_file=None, argument
1239 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file
1244 key_file=key_file,
1750 key_file=certs[0][0],
/external/curl/lib/vtls/
Dnss.c659 char *key_file) in nss_load_key() argument
669 result = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE); in nss_load_key()
708 char *cert_file, char *key_file) in cert_stuff() argument
726 if(key_file || (is_file(cert_file))) { in cert_stuff()
727 if(key_file) in cert_stuff()
728 result = nss_load_key(conn, sockindex, key_file); in cert_stuff()
734 if(!display_error(conn, err, key_file)) { in cert_stuff()
/external/openssh/regress/unittests/hostkeys/
Dtest_iterate.c26 const char *key_file; /* Path for key, NULL for none */ member
151 if (expected[i].key_file == NULL) in prepare_expected()
162 test_data_file(expected[i].key_file), &expected[i].l.key, in prepare_expected()
/external/boringssl/src/ssl/test/
Dtest_config.h37 std::string key_file; member
/external/python/apitools/apitools/base/py/
Dcredentials_lib.py190 with open(private_key_filename) as key_file:
192 service_account_name, key_file.read(), scopes,

12