HomeSort by relevance Sort by last modified time
    Searched refs:key_name (Results 1 - 25 of 81) sorted by null

1 2 3 4

  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/file/
bucket.py 43 def delete_key(self, key_name, headers=None,
48 :type key_name: string
49 :param key_name: The key name to delete
57 os.remove(key_name)
71 def get_key(self, key_name, headers=None, version_id=None,
77 :type key_name: string
78 :param key_name: The name of the key to retrieve
89 if key_name == '-':
92 fp = open(key_name, 'rb')
93 return Key(self.name, key_name, fp
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sqs/
bigmessage.py 61 bucket_name = key_name = None
72 key_name = s3_components[1]
76 return bucket_name, key_name
86 bucket_name, key_name = self._get_bucket_key(self.s3_url)
87 if bucket_name and key_name:
89 key_name = uuid.uuid4()
92 key = s3_bucket.new_key(key_name)
94 self.s3_url = 's3://%s/%s' % (bucket_name, key_name)
98 bucket_name, key_name = self._get_bucket_key(s3_url)
99 if bucket_name and key_name
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/s3/
test_multipart.py 60 key_name = u"???"
61 mpu = self.bucket.initiate_multipart_upload(key_name)
65 key_name = "test"
66 mpu = self.bucket.initiate_multipart_upload(key_name)
71 self.assertEqual(cmpu.key_name, key_name)
75 key_name = u"???"
76 mpu = self.bucket.initiate_multipart_upload(key_name)
81 self.assertEqual(cmpu.key_name, key_name)
    [all...]
  /system/security/keystore/include/keystore/
keystore_client.h 57 // decryption. If a key identified by |key_name| does not already exist it
60 // have |key_name| as a prefix.
61 virtual bool encryptWithAuthentication(const std::string& key_name, const std::string& data,
65 // EncryptWithAuthentication using the key(s) identified by |key_name|. On
67 virtual bool decryptWithAuthentication(const std::string& key_name,
72 // |key_name|, |input_parameters|, and |output_parameters| are as in
76 virtual bool oneShotOperation(keymaster_purpose_t purpose, const std::string& key_name,
88 // the given |key_name|. The [hardware|software]_enforced_characteristics of
92 virtual int32_t generateKey(const std::string& key_name,
98 // identified by |key_name|. Returns KM_ERROR_OK on success and a Keystor
    [all...]
keystore_client_mock.h 33 bool(const std::string& key_name, const std::string& data,
36 bool(const std::string& key_name, const std::string& encrypted_data,
39 bool(keymaster_purpose_t purpose, const std::string& key_name,
45 int32_t(const std::string& key_name,
50 int32_t(const std::string& key_name,
54 int32_t(const std::string& key_name,
60 const std::string& key_name, std::string* export_data));
61 MOCK_METHOD1(deleteKey, int32_t(const std::string& key_name));
63 MOCK_METHOD5(beginOperation, int32_t(keymaster_purpose_t purpose, const std::string& key_name,
78 MOCK_METHOD1(doesKeyExist, bool(const std::string& key_name));
    [all...]
keystore_client_impl.h 37 bool encryptWithAuthentication(const std::string& key_name, const std::string& data,
39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data,
41 bool oneShotOperation(keymaster_purpose_t purpose, const std::string& key_name,
47 int32_t generateKey(const std::string& key_name,
52 getKeyCharacteristics(const std::string& key_name,
55 int32_t importKey(const std::string& key_name,
60 int32_t exportKey(keymaster_key_format_t export_format, const std::string& key_name,
62 int32_t deleteKey(const std::string& key_name) override;
64 int32_t beginOperation(keymaster_purpose_t purpose, const std::string& key_name,
79 bool doesKeyExist(const std::string& key_name) override
    [all...]
  /system/tpm/attestation/server/
pkcs11_key_store.h 52 const std::string& key_name,
55 const std::string& key_name,
58 const std::string& key_name) override;
73 base::Callback<bool(const std::string& key_name,
79 const std::string& key_name);
95 std::string* key_name);
98 // object identified by |object_handle| if |key_name| matches |key_prefix|.
102 const std::string& key_name,
pkcs11_key_store.cc 99 const std::string& key_name,
111 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name);
113 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name;
121 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name;
129 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name;
137 const std::string& key_name,
140 if (!Delete(username, key_name)) {
153 std::string mutable_key_name(key_name);
186 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name;
193 const std::string& key_name) {
563 std::string key_name; local
    [all...]
  /external/autotest/client/site_tests/hardware_Keyboard/
hardware_Keyboard.py 34 def _supported(self, event, key_name):
36 cmd += ' -s ' + key_name
39 logging.error('Unsupported Key : %s' % key_name)
41 logging.info('%s : %s' % (key_name, output))
65 if not all(self._supported(high_key_event, key_name)
66 for key_name in hardware_Keyboard.supported_keys):
  /system/security/keystore/
keystore_client_impl.cpp 76 bool KeystoreClientImpl::encryptWithAuthentication(const std::string& key_name,
83 std::string encryption_key_name = key_name + kEncryptSuffix;
87 std::string authentication_key_name = key_name + kAuthenticateSuffix;
131 bool KeystoreClientImpl::decryptWithAuthentication(const std::string& key_name,
139 std::string authentication_key_name = key_name + kAuthenticateSuffix;
150 std::string encryption_key_name = key_name + kEncryptSuffix;
165 bool KeystoreClientImpl::oneShotOperation(keymaster_purpose_t purpose, const std::string& key_name,
173 beginOperation(purpose, key_name, input_parameters, output_parameters, &handle);
200 int32_t KeystoreClientImpl::generateKey(const std::string& key_name,
204 String16 key_name16(key_name.data(), key_name.size())
    [all...]
  /external/webrtc/webrtc/base/
win32regkey.cc 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) {
40 key_name,
48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) {
49 return Open(parent_key, key_name, KEY_ALL_ACCESS);
221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) {
222 ASSERT(key_name != NULL);
225 LONG res = ::RegDeleteKey(h_key_, key_name);
257 const wchar_t* key_name,
263 ASSERT(key_name != NULL);
268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options
    [all...]
win32regkey.h 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name);
48 const wchar_t* key_name,
56 HRESULT Open(HKEY parent_key, const wchar_t* key_name);
58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired);
80 bool HasSubkey(const wchar_t* key_name) const;
91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name);
245 HRESULT DeleteSubKey(const wchar_t* key_name);
248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name);
282 static bool SafeKeyNameForDeletion(const wchar_t* key_name);
307 static std::wstring GetParentKeyInfo(std::wstring* key_name);
    [all...]
  /external/boringssl/src/crypto/evp/
evp_test.cc 111 const std::string &key_name = t->GetParameter(); local
112 if (key_map->count(key_name) > 0) {
113 t->PrintLine("Duplicate key '%s'.", key_name.c_str());
126 (*key_map)[key_name] = pkey.release();
154 const std::string &key_name = t->GetParameter(); local
155 if (key_map->count(key_name) == 0) {
156 t->PrintLine("Could not find key '%s'.", key_name.c_str());
159 EVP_PKEY *key = (*key_map)[key_name];
  /external/autotest/client/tests/iozone/
iozone.py 96 key_name = "%d-%d-%s" % (fields[0], fields[1], l)
97 keylist[key_name] = v
121 key_name = '%s-%d-kids' % (section, w_count)
122 keylist[key_name] = match.group(3)
153 key_name = "%s-%d-%s" % (section, w_count, basekey)
154 keylist[key_name] = result
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
django_orm.py 89 def __init__(self, model_class, key_name, key_value, property_name):
94 key_name: string, key name for the entity that has the credentials
99 self.key_name = key_name
111 query = {self.key_name: self.key_value}
127 args = {self.key_name: self.key_value}
140 query = {self.key_name: self.key_value}
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/
fetch_file 30 The URI can be either an HTTP URL, or "s3://bucket_name/key_name"
s3put 140 key_name = fullpath[len(prefix):]
142 key_name = fullpath
143 l = key_name.split(os.sep)
232 def singlepart_upload(bucket, key_name, fullpath, *kargs, **kwargs):
236 k = bucket.new_key(key_name)
403 key_name = get_key_name(fullpath, prefix, key_prefix)
405 existing_keys_to_check_against.append(key_name)
412 key_name = get_key_name(fullpath, prefix, key_prefix)
414 if no_overwrite and key_name in existing_keys_to_check_against:
415 if b.get_key(key_name)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/services/
submit.py 35 key_name = fullpath[len(prefix):]
36 l = key_name.split(os.sep)
50 key_name = self.get_key_name(path, prefix)
51 k = self.input_bucket.new_key(key_name)
service.py 72 key_name = message['InputKey']
74 boto.log.info('get_file: %s/%s to %s' % (bucket_name, key_name, file_name))
76 key = bucket.new_key(key_name)
85 def put_file(self, bucket_name, file_path, key_name=None):
86 boto.log.info('putting file %s as %s.%s' % (file_path, bucket_name, key_name))
88 key = bucket.new_key(key_name)
99 key_name = os.path.split(file)[1]
100 key = self.put_file(output_bucket, file, key_name)
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/s3/
multipart.py 39 * key_name - The name of the new, completed key
49 self.key_name = None
56 self.key_name)
67 self.key_name = value
136 self.key_name = None
149 return '<MultiPartUpload %s>' % self.key_name
181 self.key_name = value
220 self.key_name,
256 key = self.bucket.new_key(self.key_name)
301 return self.bucket.copy_key(self.key_name, src_bucket_name
    [all...]
bucket.py 104 def __contains__(self, key_name):
105 return not (self.get_key(key_name) is None)
132 def lookup(self, key_name, headers=None):
136 :type key_name: string
137 :param key_name: The name of the key to retrieve
142 return self.get_key(key_name, headers=headers)
144 def get_key(self, key_name, headers=None, version_id=None,
151 :param key_name: The name of the key to retrieve
152 :type key_name: string
183 return self.new_key(key_name)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/gs/
test_generation_conditionals.py 121 b.set_acl("public-read", key_name="foo")
133 b.set_acl("bucket-owner-full-control", key_name="foo",
137 b.set_acl("bucket-owner-full-control", key_name="foo",
141 b.set_acl("bucket-owner-full-control", key_name="foo",
144 b.set_acl("bucket-owner-full-control", key_name="foo", if_generation=g2)
152 b.set_acl("public-read", key_name="foo", if_generation=g3,
186 b.set_canned_acl("public-read", key_name="foo")
198 b.set_canned_acl("bucket-owner-full-control", key_name="foo",
202 b.set_canned_acl("bucket-owner-full-control", key_name="foo",
206 b.set_canned_acl("bucket-owner-full-control", key_name="foo"
    [all...]
test_basic.py 89 key_name = 'foobar'
90 k = bucket.new_key(key_name)
94 fpath = os.path.join(tmpdir, key_name)
104 url = self._conn.generate_url(900, 'GET', bucket=bucket.name, key=key_name)
187 key_name = k.name
203 k = bucket.lookup(key_name)
207 k = bucket.new_key(key_name)
281 key_name = 'foobar'
282 k1 = bucket1.new_key(key_name)
284 k1.name = key_name
    [all...]
  /external/chromium-trace/catapult/telemetry/telemetry/core/
discover.py 134 key_name = camel_case.ToUnderscore(obj.__name__)
136 key_name = module.__name__.split('.')[-1]
139 classes[key_name] = obj
  /external/autotest/frontend/migrations/
037_db_constraints.py 73 key_name = foreign_key_name(table, field)
76 (table, key_name, field, destination_table))
80 key_name = foreign_key_name(table, field)
81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))

Completed in 861 milliseconds

1 2 3 4