/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/file/ |
bucket.py | 43 def delete_key(self, key_name, headers=None, 48 :type key_name: string 49 :param key_name: The key name to delete 57 os.remove(key_name) 71 def get_key(self, key_name, headers=None, version_id=None, 77 :type key_name: string 78 :param key_name: The name of the key to retrieve 89 if key_name == '-': 92 fp = open(key_name, 'rb') 93 return Key(self.name, key_name, fp [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/s3/ |
test_multipart.py | 60 key_name = u"???" 61 mpu = self.bucket.initiate_multipart_upload(key_name) 65 key_name = "test" 66 mpu = self.bucket.initiate_multipart_upload(key_name) 71 self.assertEqual(cmpu.key_name, key_name) 75 key_name = u"???" 76 mpu = self.bucket.initiate_multipart_upload(key_name) 81 self.assertEqual(cmpu.key_name, key_name) [all...] |
mock_storage_service.py | 244 new_key = self.new_key(key_name=new_key_name) 263 def get_acl(self, key_name='', headers=NOT_IMPL, version_id=NOT_IMPL): 264 if key_name: 266 return self.acls[key_name] 271 def get_def_acl(self, key_name=NOT_IMPL, headers=NOT_IMPL, 276 def get_subresource(self, subresource, key_name=NOT_IMPL, headers=NOT_IMPL, 283 def new_key(self, key_name=None): 284 mock_key = MockKey(self, key_name) 285 self.keys[key_name] = mock_key 286 self.acls[key_name] = MockAcl( [all...] |
/system/security/keystore/ |
keystore_client_impl.cpp | 76 bool KeystoreClientImpl::encryptWithAuthentication(const std::string& key_name, 83 std::string encryption_key_name = key_name + kEncryptSuffix; 87 std::string authentication_key_name = key_name + kAuthenticateSuffix; 131 bool KeystoreClientImpl::decryptWithAuthentication(const std::string& key_name, 139 std::string authentication_key_name = key_name + kAuthenticateSuffix; 150 std::string encryption_key_name = key_name + kEncryptSuffix; 165 bool KeystoreClientImpl::oneShotOperation(keymaster_purpose_t purpose, const std::string& key_name, 173 beginOperation(purpose, key_name, input_parameters, output_parameters, &handle); 200 int32_t KeystoreClientImpl::generateKey(const std::string& key_name, 204 String16 key_name16(key_name.data(), key_name.size()) [all...] |
/external/webrtc/webrtc/base/ |
win32regkey.cc | 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { 40 key_name, 48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { 49 return Open(parent_key, key_name, KEY_ALL_ACCESS); 221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { 222 ASSERT(key_name != NULL); 225 LONG res = ::RegDeleteKey(h_key_, key_name); 257 const wchar_t* key_name, 263 ASSERT(key_name != NULL); 268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options [all...] |
win32regkey.h | 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name); 48 const wchar_t* key_name, 56 HRESULT Open(HKEY parent_key, const wchar_t* key_name); 58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired); 80 bool HasSubkey(const wchar_t* key_name) const; 91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name); 245 HRESULT DeleteSubKey(const wchar_t* key_name); 248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name); 282 static bool SafeKeyNameForDeletion(const wchar_t* key_name); 307 static std::wstring GetParentKeyInfo(std::wstring* key_name); [all...] |
/system/security/keystore/include/keystore/ |
keystore_client.h | 57 // decryption. If a key identified by |key_name| does not already exist it 60 // have |key_name| as a prefix. 61 virtual bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 65 // EncryptWithAuthentication using the key(s) identified by |key_name|. On 67 virtual bool decryptWithAuthentication(const std::string& key_name, 72 // |key_name|, |input_parameters|, and |output_parameters| are as in 76 virtual bool oneShotOperation(keymaster_purpose_t purpose, const std::string& key_name, 88 // the given |key_name|. The [hardware|software]_enforced_characteristics of 92 virtual int32_t generateKey(const std::string& key_name, 98 // identified by |key_name|. Returns KM_ERROR_OK on success and a Keystor [all...] |
keystore_client_mock.h | 33 bool(const std::string& key_name, const std::string& data, 36 bool(const std::string& key_name, const std::string& encrypted_data, 39 bool(keymaster_purpose_t purpose, const std::string& key_name, 45 int32_t(const std::string& key_name, 50 int32_t(const std::string& key_name, 54 int32_t(const std::string& key_name, 60 const std::string& key_name, std::string* export_data)); 61 MOCK_METHOD1(deleteKey, int32_t(const std::string& key_name)); 63 MOCK_METHOD5(beginOperation, int32_t(keymaster_purpose_t purpose, const std::string& key_name, 78 MOCK_METHOD1(doesKeyExist, bool(const std::string& key_name)); [all...] |
keystore_client_impl.h | 37 bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data, 41 bool oneShotOperation(keymaster_purpose_t purpose, const std::string& key_name, 47 int32_t generateKey(const std::string& key_name, 52 getKeyCharacteristics(const std::string& key_name, 55 int32_t importKey(const std::string& key_name, 60 int32_t exportKey(keymaster_key_format_t export_format, const std::string& key_name, 62 int32_t deleteKey(const std::string& key_name) override; 64 int32_t beginOperation(keymaster_purpose_t purpose, const std::string& key_name, 79 bool doesKeyExist(const std::string& key_name) override [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sqs/ |
bigmessage.py | 61 bucket_name = key_name = None 72 key_name = s3_components[1] 76 return bucket_name, key_name 86 bucket_name, key_name = self._get_bucket_key(self.s3_url) 87 if bucket_name and key_name: 89 key_name = uuid.uuid4() 92 key = s3_bucket.new_key(key_name) 94 self.s3_url = 's3://%s/%s' % (bucket_name, key_name) 98 bucket_name, key_name = self._get_bucket_key(s3_url) 99 if bucket_name and key_name [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
django_orm.py | 89 def __init__(self, model_class, key_name, key_value, property_name): 94 key_name: string, key name for the entity that has the credentials 99 self.key_name = key_name 111 query = {self.key_name: self.key_value} 127 args = {self.key_name: self.key_value} 140 query = {self.key_name: self.key_value}
|
/external/autotest/client/site_tests/hardware_Keyboard/ |
hardware_Keyboard.py | 34 def _supported(self, event, key_name): 36 cmd += ' -s ' + key_name 39 logging.error('Unsupported Key : %s' % key_name) 41 logging.info('%s : %s' % (key_name, output)) 65 if not all(self._supported(high_key_event, key_name) 66 for key_name in hardware_Keyboard.supported_keys):
|
/external/chromium-trace/catapult/telemetry/telemetry/core/ |
discover.py | 155 key_name = camel_case.ToUnderscore(obj.__name__) 157 key_name = module.__name__.split('.')[-1] 160 if key_name in classes and index_by_class_name: 161 assert classes[key_name] is obj, ( 162 'Duplicate key_name with different objs detected: ' 163 'key=%s, obj1=%s, obj2=%s' % (key_name, classes[key_name], obj)) 165 classes[key_name] = obj
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/services/ |
service.py | 72 key_name = message['InputKey'] 74 boto.log.info('get_file: %s/%s to %s' % (bucket_name, key_name, file_name)) 76 key = bucket.new_key(key_name) 85 def put_file(self, bucket_name, file_path, key_name=None): 86 boto.log.info('putting file %s as %s.%s' % (file_path, bucket_name, key_name)) 88 key = bucket.new_key(key_name) 99 key_name = os.path.split(file)[1] 100 key = self.put_file(output_bucket, file, key_name)
|
submit.py | 35 key_name = fullpath[len(prefix):] 36 l = key_name.split(os.sep) 50 key_name = self.get_key_name(path, prefix) 51 k = self.input_bucket.new_key(key_name)
|
/system/tpm/attestation/server/ |
pkcs11_key_store.h | 52 const std::string& key_name, 55 const std::string& key_name, 58 const std::string& key_name) override; 73 base::Callback<bool(const std::string& key_name, 79 const std::string& key_name); 95 std::string* key_name); 98 // object identified by |object_handle| if |key_name| matches |key_prefix|. 102 const std::string& key_name,
|
pkcs11_key_store.cc | 99 const std::string& key_name, 111 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); 113 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name; 121 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 129 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 137 const std::string& key_name, 140 if (!Delete(username, key_name)) { 153 std::string mutable_key_name(key_name); 186 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name; 193 const std::string& key_name) { 563 std::string key_name; local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/gs/ |
test_generation_conditionals.py | 121 b.set_acl("public-read", key_name="foo") 133 b.set_acl("bucket-owner-full-control", key_name="foo", 137 b.set_acl("bucket-owner-full-control", key_name="foo", 141 b.set_acl("bucket-owner-full-control", key_name="foo", 144 b.set_acl("bucket-owner-full-control", key_name="foo", if_generation=g2) 152 b.set_acl("public-read", key_name="foo", if_generation=g3, 186 b.set_canned_acl("public-read", key_name="foo") 198 b.set_canned_acl("bucket-owner-full-control", key_name="foo", 202 b.set_canned_acl("bucket-owner-full-control", key_name="foo", 206 b.set_canned_acl("bucket-owner-full-control", key_name="foo" [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/s3/ |
multipart.py | 39 * key_name - The name of the new, completed key 49 self.key_name = None 56 self.key_name) 67 self.key_name = value 136 self.key_name = None 149 return '<MultiPartUpload %s>' % self.key_name 181 self.key_name = value 220 self.key_name, 256 key = self.bucket.new_key(self.key_name) 301 return self.bucket.copy_key(self.key_name, src_bucket_name [all...] |
/frameworks/base/tests/RenderThreadTest/src/com/example/renderthread/ |
MainActivity.java | 24 static final String KEY_NAME = "name"; 29 ret.put(KEY_NAME, name); 49 R.layout.item_layout, new String[] { KEY_NAME },
|
/frameworks/ex/framesequence/samples/FrameSequenceSamples/src/com/android/framesequence/samples/ |
SamplesList.java | 32 static final String KEY_NAME = "name"; 38 ret.put(KEY_NAME, name); 54 android.R.layout.simple_list_item_1, new String[] { KEY_NAME },
|
/external/autotest/frontend/migrations/ |
037_db_constraints.py | 73 key_name = foreign_key_name(table, field) 76 (table, key_name, field, destination_table)) 80 key_name = foreign_key_name(table, field) 81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
|
/external/boringssl/src/crypto/evp/ |
evp_test.cc | 111 const std::string &key_name = t->GetParameter(); local 112 if (key_map->count(key_name) > 0) { 113 t->PrintLine("Duplicate key '%s'.", key_name.c_str()); 126 (*key_map)[key_name] = pkey.release(); 154 const std::string &key_name = t->GetParameter(); local 155 if (key_map->count(key_name) == 0) { 156 t->PrintLine("Could not find key '%s'.", key_name.c_str()); 159 EVP_PKEY *key = (*key_map)[key_name];
|
/packages/apps/EmergencyInfo/src/com/android/emergency/ |
PreferenceKeys.java | 30 public static final String KEY_NAME = "name"; 55 public static final String[] KEYS_EDIT_EMERGENCY_INFO = {KEY_NAME, KEY_ADDRESS,
|
/external/autotest/client/tests/iozone/ |
iozone.py | 96 key_name = "%d-%d-%s" % (fields[0], fields[1], l) 97 keylist[key_name] = v 121 key_name = '%s-%d-kids' % (section, w_count) 122 keylist[key_name] = match.group(3) 153 key_name = "%s-%d-%s" % (section, w_count, basekey) 154 keylist[key_name] = result
|