Home
last modified time | relevance | path

Searched refs:key_file (Results 1 – 25 of 27) sorted by relevance

12

/external/autotest/client/site_tests/login_UserPolicyKeys/
Dlogin_UserPolicyKeys.py38 def _verify_key_file(self, key_file): argument
40 if not os.path.isfile(key_file):
41 raise error.TestFail('%s does not exist!' % key_file)
45 info = os.stat(key_file)
47 raise error.TestFail('%s is not a regular file' % key_file)
50 (key_file, oct(info.st_mode)))
52 current = key_file
97 key_file = ownership.get_user_policy_key_filename(ownership.TESTUSER)
98 if os.path.exists(key_file):
100 key_file)
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/file/
Dkey.py78 key_file = self.fp
80 key_file = open(self.full_path, 'rb')
82 shutil.copyfileobj(key_file, fp)
84 key_file.close()
124 key_file = self.fp
128 key_file = open(self.full_path, 'wb')
130 shutil.copyfileobj(fp, key_file)
132 key_file.close()
/external/boringssl/src/tool/
Dserver.cc102 std::string key_file = "server.pem"; in Server() local
104 key_file = args_map["-key"]; in Server()
106 if (!SSL_CTX_use_PrivateKey_file(ctx, key_file.c_str(), SSL_FILETYPE_PEM)) { in Server()
107 fprintf(stderr, "Failed to load private key: %s\n", key_file.c_str()); in Server()
110 if (!SSL_CTX_use_certificate_chain_file(ctx, key_file.c_str())) { in Server()
111 fprintf(stderr, "Failed to load cert chain: %s\n", key_file.c_str()); in Server()
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mashups/
Dserver.py251 def get_ssh_client(self, key_file=None, host_key_file='~/.ssh/known_hosts', argument
258 if not key_file:
260 key_file = iobject.get_filename('Path to OpenSSH Key file')
261 self._pkey = paramiko.RSAKey.from_private_key_file(key_file)
285 def shell(self, key_file=None): argument
286 ssh_client = self.get_ssh_client(key_file)
290 def bundle_image(self, prefix, key_file, cert_file, size): argument
295 path, name = os.path.split(key_file)
297 self.put_file(key_file, remote_key_file)
339 def create_image(self, bucket=None, prefix=None, key_file=None, cert_file=None, size=None): argument
[all …]
/external/vboot_reference/host/lib/
Dsignature_digest.c41 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file, in SignatureBuf() argument
49 key_fp = fopen(key_file, "r"); in SignatureBuf()
51 VBDEBUG(("SignatureBuf(): Couldn't open key file: %s\n", key_file)); in SignatureBuf()
59 key_file)); in SignatureBuf()
Dhost_signature.c249 const char* key_file, in CalculateSignature_external() argument
292 key_file, /* Key file to use */ in CalculateSignature_external()
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/
Dhttps_connection.py91 def __init__(self, host, port=default_port, key_file=None, cert_file=None, argument
112 self.key_file = key_file
128 self.sock = ssl.wrap_socket(sock, keyfile=self.key_file,
Dconnection.py830 key_file = self.http_connection_kwargs.get('key_file', None)
832 sslSock = ssl.wrap_socket(sock, keyfile=key_file,
/external/autotest/client/deps/fakegudev/src/
Dfakegudev.c181 GKeyFile *key_file; in load_fake_devices_from_file() local
187 key_file = g_key_file_new(); in load_fake_devices_from_file()
188 if (!g_key_file_load_from_file (key_file, in load_fake_devices_from_file()
194 groups = g_key_file_get_groups(key_file, &num_groups); in load_fake_devices_from_file()
206 if (!g_key_file_has_key (key_file, group, k_prop_device_file, &error)) { in load_fake_devices_from_file()
214 if (!g_key_file_has_key (key_file, group, k_prop_sysfs_path, &error)) { in load_fake_devices_from_file()
224 id = g_key_file_get_string (key_file, group, k_prop_device_file, &error); in load_fake_devices_from_file()
234 id = g_key_file_get_string (key_file, group, k_prop_sysfs_path, &error); in load_fake_devices_from_file()
250 keys = g_key_file_get_keys (key_file, group, &num_keys, &error); in load_fake_devices_from_file()
256 value = g_key_file_get_string (key_file, group, key, &error); in load_fake_devices_from_file()
[all …]
/external/libbrillo/policy/tests/
Dlibpolicy_unittest.cc51 base::FilePath key_file(kKeyFile); in TEST() local
53 new MockDevicePolicyImpl(policy_file, key_file, false); in TEST()
161 base::FilePath key_file(kKeyFile); in TEST() local
163 new MockDevicePolicyImpl(policy_file, key_file, false); in TEST()
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/
Dbundle_image27 …b.bundle(bucket=options.bucket,prefix=options.prefix,key_file=options.key_file,cert_file=options.c…
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/manage/
Dserver.py51 def copy_x509(self, key_file, cert_file): argument
54 path, name = os.path.split(key_file)
56 self.ssh_client.put_file(key_file, self.remote_key_file)
89 def bundle(self, bucket=None, prefix=None, key_file=None, cert_file=None, argument
96 if not key_file:
97 key_file = iobject.get_filename('Path to RSA private key file')
104 self.copy_x509(key_file, cert_file)
/external/v8/tools/release/
Dcheck_clusterfuzz.py180 assert options.key_file
181 with open(options.key_file) as f:
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/
D__init__.py70 def _ssl_wrap_socket(sock, key_file, cert_file, argument
79 return ssl.wrap_socket(sock, keyfile=key_file, certfile=cert_file,
83 def _ssl_wrap_socket(sock, key_file, cert_file, argument
90 ssl_sock = socket.ssl(sock, key_file, cert_file)
924 def __init__(self, host, port=None, key_file=None, cert_file=None, argument
928 key_file=key_file,
1020 sock, self.key_file, self.cert_file,
1098 def __init__(self, host, port=None, key_file=None, cert_file=None, argument
1106 def __init__(self, host, port=None, key_file=None, cert_file=None, argument
1110 key_file=key_file,
[all …]
/external/libbrillo/policy/
Ddevice_policy_impl.cc27 bool ReadPublicKeyFromFile(const base::FilePath& key_file, in ReadPublicKeyFromFile() argument
29 if (!base::PathExists(key_file)) in ReadPublicKeyFromFile()
32 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) { in ReadPublicKeyFromFile()
/external/vboot_reference/host/lib/include/
Dsignature_digest.h34 uint8_t* SignatureBuf(const uint8_t* buf, uint64_t len, const char* key_file,
Dhost_signature.h59 const char* key_file,
/external/vboot_reference/scripts/image_signing/
Dsign_official_build.sh460 local key_size key_file="${key_dir}/update_key.pem"
470 key_size=$(openssl rsa -text -noout -in "${key_file}" | \
478 openssl rsautl -sign -pkcs -inkey "${key_file}" -out "${output}"
/external/boringssl/src/ssl/test/
Dtest_config.h28 std::string key_file; member
Dtest_config.cc105 { "-key-file", &TestConfig::key_file },
Dbssl_shim.cc319 if (!config->key_file.empty()) { in InstallCertificate()
321 test_state->private_key = LoadPrivateKey(config->key_file.c_str()); in InstallCertificate()
326 } else if (!SSL_use_PrivateKey_file(ssl, config->key_file.c_str(), in InstallCertificate()
/external/curl/lib/vtls/
Dnss.c545 char *key_file) in nss_load_key() argument
554 result = nss_create_object(ssl, CKO_PRIVATE_KEY, key_file, FALSE); in nss_load_key()
592 char *cert_file, char *key_file) in cert_stuff() argument
610 if(key_file || (is_file(cert_file))) { in cert_stuff()
611 if(key_file) in cert_stuff()
612 result = nss_load_key(conn, sockindex, key_file); in cert_stuff()
618 if(!display_error(conn, err, key_file)) { in cert_stuff()
Dopenssl.c345 char *key_file, in cert_stuff() argument
549 if(!key_file) in cert_stuff()
551 key_file=cert_file; in cert_stuff()
553 if(SSL_CTX_use_PrivateKey_file(ctx, key_file, file_type) != 1) { in cert_stuff()
555 key_file, key_type?key_type:"PEM"); in cert_stuff()
578 ENGINE_load_private_key(data->state.engine, key_file, in cert_stuff()
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/httplib2/
D__init__.py810 def __init__(self, host, port=None, key_file=None, cert_file=None, argument
823 context.load_cert_chain(cert_file, key_file)
827 self, host, port=port, key_file=key_file,
1144 authority, key_file=certs[0][0],
/external/chromium-trace/catapult/third_party/gsutil/third_party/apitools/apitools/base/py/
Dcredentials_lib.py114 with open(private_key_filename) as key_file:
116 service_account_name, key_file.read(), scopes,

12