/external/autotest/client/site_tests/login_UserPolicyKeys/ |
D | login_UserPolicyKeys.py | 38 def _verify_key_file(self, key_file): argument 40 if not os.path.isfile(key_file): 41 raise error.TestFail('%s does not exist!' % key_file) 45 info = os.stat(key_file) 47 raise error.TestFail('%s is not a regular file' % key_file) 50 (key_file, oct(info.st_mode))) 52 current = key_file 94 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER) 95 if os.path.exists(key_file): 97 key_file) [all …]
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_serialization.py | 140 key_file = os.path.join("asymmetric", *key_path) 145 key_file, 183 key_file = os.path.join("asymmetric", *key_path) 188 key_file, 203 key_file = os.path.join("asymmetric", *key_path) 208 key_file, 226 key_file = os.path.join("asymmetric", *key_path) 230 key_file, 310 def test_load_der_rsa_public_key(self, key_file, backend): argument 312 key_file, [all …]
|
/external/autotest/site_utils/ |
D | hwid_lib.py | 30 def get_hwid_info(hwid, info_type, key_file): argument 45 if key_file == KEY_FILENAME_NO_HWID: 61 with open(key_file) as f: 72 def get_all_possible_dut_labels(key_file): argument 84 return get_hwid_info('dummy_hwid', HWID_INFO_LABEL, key_file).get(
|
D | hwid_lib_unittest.py | 159 key_file = hwid_lib.KEY_FILENAME_NO_HWID 160 self.assertEqual(hwid_lib.get_hwid_info(hwid, info_type, key_file), {})
|
/external/libbrillo/policy/tests/ |
D | libpolicy_unittest.cc | 48 base::FilePath key_file(kKeyFile); in TEST() local 53 policy_file, key_file, false)); in TEST() 207 base::FilePath key_file(kKeyFile); in TEST() local 213 policy_file, key_file, false)); in TEST() 265 base::FilePath key_file(kNonExistingFile); in TEST() local 270 policy_file, key_file, true)); in TEST() 281 base::FilePath key_file(kNonExistingFile); in TEST() local 286 policy_file, key_file, false)); in TEST() 297 base::FilePath key_file(kNonExistingFile); in TEST() local 303 policy_file, key_file, false)); in TEST() [all …]
|
/external/vboot_reference/host/lib/ |
D | signature_digest.c | 41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file, in SignatureBuf() argument 49 key_fp = fopen(key_file, "r"); in SignatureBuf() 51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file)); in SignatureBuf() 59 key_file)); in SignatureBuf()
|
D | host_signature.c | 249 const char* key_file, in CalculateSignature_external() argument 292 key_file, /* Key file to use */ in CalculateSignature_external()
|
/external/igt-gpu-tools/prebuilt-intermediates/ |
D | glib.h | 13 static inline int g_key_file_get_integer(GKeyFile *key_file, in g_key_file_get_integer() argument 15 static inline char *g_key_file_get_string(GKeyFile *key_file, in g_key_file_get_string() argument 17 static inline bool g_key_file_load_from_file(GKeyFile *key_file, in g_key_file_load_from_file() argument
|
/external/autotest/client/deps/fakegudev/src/ |
D | fakegudev.c | 181 GKeyFile *key_file; in load_fake_devices_from_file() local 187 key_file = g_key_file_new(); in load_fake_devices_from_file() 188 if (!g_key_file_load_from_file (key_file, in load_fake_devices_from_file() 194 groups = g_key_file_get_groups(key_file, &num_groups); in load_fake_devices_from_file() 206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) { in load_fake_devices_from_file() 214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) { in load_fake_devices_from_file() 224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error); in load_fake_devices_from_file() 234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error); in load_fake_devices_from_file() 250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error); in load_fake_devices_from_file() 256 value = g_key_file_get_string (key_file, group, key, &error); in load_fake_devices_from_file() [all …]
|
/external/python/cpython2/Lib/test/ |
D | make_ssl_certs.py | 97 req_file, cert_file, key_file = tempnames 103 '-newkey', 'rsa:1024', '-keyout', key_file, 123 with open(key_file, 'r') as f:
|
/external/python/cpython3/Lib/test/ |
D | make_ssl_certs.py | 117 req_file, cert_file, key_file = tempnames 123 '-newkey', key, '-keyout', key_file, 151 with open(key_file, 'r') as f:
|
/external/python/httplib2/python2/httplib2/ |
D | __init__.py | 79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument 94 context.load_cert_chain(cert_file, key_file, key_password) 96 context.load_cert_chain(cert_file, key_file) 105 keyfile=key_file, 114 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument 124 ssl_sock = socket.ssl(sock, key_file, cert_file) 1262 key_file=None, argument 1274 self._context.load_cert_chain(cert_file, key_file, key_password) 1275 self.key_file = key_file 1280 self, host, port=port, key_file=key_file, cert_file=cert_file, strict=strict [all …]
|
/external/python/cpython2/Lib/ |
D | httplib.py | 1239 def __init__(self, host, port=None, key_file=None, cert_file=None, argument 1244 self.key_file = key_file 1248 if key_file or cert_file: 1249 context.load_cert_chain(cert_file, key_file) 1277 def __init__(self, host='', port=None, key_file=None, cert_file=None, argument 1284 self._setup(self._connection_class(host, port, key_file, 1290 self.key_file = key_file
|
/external/python/pyasn1/docs/source/ |
D | example-use-case.rst | 100 with open('.ssh/id_rsa') as key_file: 101 b64_serialisation = ''.join(key_file.readlines()[1:-1]) 191 with open('.ssh/id_rsa.new', 'w') as key_file: 192 key_file.write(b64_serialisation)
|
/external/vboot_reference/host/lib/include/ |
D | signature_digest.h | 34 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
|
D | host_signature.h | 59 const char* key_file,
|
/external/autotest/server/hosts/ |
D | cros_label.py | 777 self.key_file = global_config.global_config.get_config_value( 842 key_file=self.key_file, 867 self.key_file) 869 logging.error('Can not open key file: %s', self.key_file)
|
/external/python/cpython3/Lib/http/ |
D | client.py | 1353 def __init__(self, host, port=None, key_file=None, cert_file=None, argument 1360 if (key_file is not None or cert_file is not None or 1366 self.key_file = key_file 1379 if key_file or cert_file: 1380 context.load_cert_chain(cert_file, key_file)
|
/external/vboot_reference/scripts/image_signing/ |
D | sign_official_build.sh | 460 local key_size key_file="${key_dir}/update_key.pem" 470 key_size=$(openssl rsa -text -noout -in "${key_file}" | \ 478 openssl rsautl -sign -pkcs -inkey "${key_file}" -out "${output}"
|
/external/libbrillo/policy/ |
D | device_policy_impl.cc | 41 bool ReadPublicKeyFromFile(const base::FilePath& key_file, in ReadPublicKeyFromFile() argument 43 if (!base::PathExists(key_file)) in ReadPublicKeyFromFile() 46 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) { in ReadPublicKeyFromFile()
|
/external/python/httplib2/python3/httplib2/ |
D | __init__.py | 177 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None, argument 210 context.load_cert_chain(cert_file, key_file, key_password) 1245 key_file=None, argument 1264 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file, 1274 self.key_file = key_file 1795 key_file=certs[0][0],
|
/external/curl/lib/vtls/ |
D | nss.c | 670 char *key_file) in nss_load_key() argument 680 result = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE); in nss_load_key() 722 char *cert_file, char *key_file) in cert_stuff() argument 740 if(key_file || (is_file(cert_file))) { in cert_stuff() 741 if(key_file) in cert_stuff() 742 result = nss_load_key(conn, sockindex, key_file); in cert_stuff() 748 if(!display_error(conn, err, key_file)) { in cert_stuff()
|
/external/openssh/regress/unittests/hostkeys/ |
D | test_iterate.c | 26 const char *key_file; /* Path for key, NULL for none */ member 151 if (expected[i].key_file == NULL) in prepare_expected() 162 test_data_file(expected[i].key_file), &expected[i].l.key, in prepare_expected()
|
/external/boringssl/src/ssl/test/ |
D | test_config.h | 37 std::string key_file; member
|
/external/avb/ |
D | aftltool_test.py | 741 key_file = 'transparency_log_pub_key.pem' 742 with open(key_file, 'w') as f: 748 self.assertTrue(entry.verify_icp(key_file)) 756 self.assertFalse(entry.verify_icp(key_file)) 758 os.remove(key_file)
|