/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/ |
D | glacier | 85 def connect(region, debug_level=0, access_key=None, secret_key=None): argument 89 aws_secret_access_key=secret_key, 97 def list_vaults(region, access_key=None, secret_key=None): argument 98 layer2 = connect(region, access_key = access_key, secret_key = secret_key) 103 def list_jobs(vault_name, region, access_key=None, secret_key=None): argument 104 layer2 = connect(region, access_key = access_key, secret_key = secret_key) 108 def upload_files(vault_name, filenames, region, access_key=None, secret_key=None): argument 109 layer2 = connect(region, access_key = access_key, secret_key = secret_key) 138 access_key = secret_key = None 144 secret_key = value [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/provider/ |
D | test_provider.py | 87 self.assertEqual(p.secret_key, 'secret_key') 95 self.assertEqual(p.secret_key, 'env_secret_key') 104 self.assertEqual(p.secret_key, 'env_secret_key') 115 self.assertEqual(p.secret_key, provider.NO_CREDENTIALS_PROVIDED) 137 self.assertEqual(p.secret_key, 'prod_secret_key') 140 self.assertEqual(p.secret_key, 'prod_secret_key') 144 self.assertEqual(q.secret_key, 'dev_secret_key') 172 self.assertEqual(p.secret_key, 'cfg_secret_key') 185 self.assertEqual(p.secret_key, 'cfg_secret_key') 209 self.assertEqual(p.secret_key, 'testcfg_access_keypw') [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ |
D | provider.py | 180 def __init__(self, name, access_key=None, secret_key=None, argument 186 self.secret_key = secret_key 200 self.get_credentials(access_key, secret_key, security_token, profile_name) 233 secret_key = property(get_secret_key, set_secret_key) variable in Provider 264 def get_credentials(self, access_key=None, secret_key=None, argument 304 if secret_key is not None: 305 self.secret_key = secret_key 308 self.secret_key = os.environ[secret_key_name.upper()] 312 self.secret_key = shared.get(profile_name, secret_key_name) 316 self.secret_key = config.get("profile %s" % profile_name, [all …]
|
D | auth.py | 68 if provider.access_key is None or provider.secret_key is None: 75 self._hmac = hmac.new(self._provider.secret_key.encode('utf-8'), 78 self._hmac_256 = hmac.new(self._provider.secret_key.encode('utf-8'), 94 return hmac.new(self._provider.secret_key.encode('utf-8'), 485 key = self._provider.secret_key
|
D | __init__.py | 604 secret_key = config.get('Credentials', 'ia_secret_access_key', 607 return S3Connection(access_key, secret_key,
|
D | connection.py | 608 return self.provider.secret_key 611 secret_key = aws_secret_access_key variable in AWSAuthConnection
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/ |
D | securecookie.py | 27 def __init__(self, secret_key): argument 34 self.secret_key = secret_key 102 signature = hmac.new(self.secret_key, digestmod=hashlib.sha1)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/sts/ |
D | test_session_token.py | 51 assert token_copy.secret_key == token.secret_key 62 aws_secret_access_key=token.secret_key,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/sts/ |
D | test_connection.py | 77 self.assertEqual(response.credentials.secret_key, 'secretkey') 98 self.assertEqual(response.credentials.secret_key, 'secretkey') 171 response.credentials.secret_key.strip(), 237 self.assertEqual(response.credentials.secret_key, 'secretkey')
|
D | test_credentials.py | 28 creds.secret_key = 'crypto'
|
/external/libvpx/libvpx/test/ |
D | vp8_boolcoder_test.cc | 33 const uint8_t secret_key[16] = { variable 40 buffer[i] ^= secret_key[i & 15]; in encrypt_buffer() 48 output[i] = input[i] ^ secret_key[(offset + i) & 15]; in test_decrypt_cb()
|
/external/chromium-trace/catapult/third_party/webapp2/docs/guide/ |
D | extras.rst | 18 All configuration keys are optional, except ``secret_key`` that must be set 19 for :ref:`api.webapp2_extras.sessions`. Here is an example that sets the ``secret_key`` 53 'secret_key': 'some-secret-key',
|
D | app.rst | 45 'secret_key': 'something-very-very-secret',
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/ |
D | credentials.py | 42 self.secret_key = None 84 self.secret_key = value 100 'secret_key': self.secret_key,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/ |
D | notification.py | 74 def verify(self, secret_key): argument 86 h = hmac.new(key=secret_key, digestmod=sha)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/auth/ |
D | test_stsanon.py | 34 self.provider.secret_key = 'secret_key'
|
D | test_sigv4.py | 41 self.provider.secret_key = 'secret_key' 244 secret_key='secret_key') 270 self.provider.secret_key = 'secret_key'
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/roboto/ |
D | awsqueryrequest.py | 356 if options.secret_key: 357 self.args['aws_secret_access_key'] = options.secret_key
|
/external/chromium-trace/catapult/third_party/webapp2/docs/ |
D | todo.rst | 105 'secret_key': ...,
|
/external/chromium-trace/catapult/third_party/webapp2/ |
D | CHANGES | 259 `secret_key` key config for sessions, if not defined, will result in an
|