/external/chromium_org/sandbox/linux/services/ |
credentials.h | 22 // This class should be used to manipulate the current process' credentials. 25 class SANDBOX_EXPORT Credentials { 27 Credentials(); 28 ~Credentials(); 87 DISALLOW_COPY_AND_ASSIGN(Credentials);
|
credentials_unittest.cc | 5 #include "sandbox/linux/services/credentials.h" 52 TEST(Credentials, CreateAndDestroy) { 54 Credentials cred1; 57 scoped_ptr<Credentials> cred2(new Credentials); 60 TEST(Credentials, CountOpenFds) { 63 Credentials creds; 72 TEST(Credentials, HasOpenDirectory) { 73 Credentials creds; 85 TEST(Credentials, HasOpenDirectoryWithFD) [all...] |
credentials.cc | 5 #include "sandbox/linux/services/credentials.h" 170 Credentials::Credentials() { 173 Credentials::~Credentials() { 176 int Credentials::CountOpenFds(int proc_fd) { 205 bool Credentials::HasOpenDirectory(int proc_fd) { 256 bool Credentials::DropAllCapabilities() { 264 bool Credentials::HasAnyCapability() const { 272 scoped_ptr<std::string> Credentials::GetCurrentCapString() const [all...] |
/external/chromium_org/content/public/browser/android/ |
devtools_auth.h | 13 // Returns true if the given peer identified by the credentials is authorized 16 const net::UnixDomainServerSocket::Credentials& credentials);
|
/external/apache-http/src/org/apache/http/client/ |
CredentialsProvider.java | 34 import org.apache.http.auth.Credentials; 37 * Abstract credentials provider. 51 * Sets the {@link Credentials credentials} for the given authentication 52 * scope. Any previous credentials for the given scope will be overwritten. 55 * @param credentials the authentication {@link Credentials credentials} 60 void setCredentials(AuthScope authscope, Credentials credentials); [all...] |
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
crypto_verify_impl.h | 21 virtual void VerifyDestination(const Credentials& credentials, 26 const Credentials& credentials, 28 virtual void VerifyAndEncryptData(const Credentials& credentials,
|
crypto_verify_impl.cc | 14 bool VerifyCredentials(const CryptoVerifyImpl::Credentials& credentials) { 15 return networking_private_crypto::VerifyCredentials(credentials.certificate, 16 credentials.signed_data, 17 credentials.unsigned_data, 18 credentials.device_bssid); 37 void CryptoVerifyImpl::VerifyDestination(const Credentials& credentials, 40 *verified = VerifyCredentials(credentials); 45 const Credentials& credentials [all...] |
/external/apache-http/src/org/apache/http/auth/ |
Credentials.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/Credentials.java $ 36 * User name and password based authentication credentials. 48 public interface Credentials {
|
AuthState.java | 55 /** Credentials selected for authentication */ 56 private Credentials credentials; field in class:AuthState 72 this.credentials = null; 103 * Returns user {@link Credentials} selected for authentication if available 105 * @return user credentials if available, <code>null</code otherwise 107 public Credentials getCredentials() { 108 return this.credentials; 113 * Sets user {@link Credentials} to be used for authentication 115 * @param credentials User credential [all...] |
AuthScheme.java | 51 * <li>Generate authorization string for the given set of credentials, 133 * Produces an authorization string for the given set of {@link Credentials}. 135 * @param credentials The set of credentials to be used for athentication 142 Header authenticate(Credentials credentials, HttpRequest request)
|
/external/apache-http/src/org/apache/http/impl/client/ |
BasicCredentialsProvider.java | 36 import org.apache.http.auth.Credentials; 60 private final HashMap<AuthScope, Credentials> credMap; 67 this.credMap = new HashMap<AuthScope, Credentials>(); 71 * Sets the {@link Credentials credentials} for the given authentication 72 * scope. Any previous credentials for the given scope will be overwritten. 75 * @param credentials the authentication {@link Credentials credentials} 82 final Credentials credentials) [all...] |
/frameworks/base/core/java/android/net/ |
Credentials.java | 20 * A class for representing UNIX credentials passed via ancillary data 23 public class Credentials { 31 public Credentials (int pid, int uid, int gid) {
|
/cts/tests/tests/net/src/android/net/cts/ |
CredentialsTest.java | 19 import android.net.Credentials; 25 // new the Credentials instance 27 Credentials cred = new Credentials(0, 0, 0); 33 cred = new Credentials(Integer.MAX_VALUE, Integer.MAX_VALUE, Integer.MAX_VALUE); 39 cred = new Credentials(Integer.MIN_VALUE, Integer.MIN_VALUE, Integer.MIN_VALUE);
|
/frameworks/base/keystore/java/android/security/ |
AndroidKeyStore.java | 62 * PrivateKeyEntry will have a Credentials.USER_PRIVATE_KEY as the private key, 63 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 64 * that corresponds to the private key), and then a Credentials.CA_CERTIFICATE 67 * TrustedCertificateEntry will just have a Credentials.CA_CERTIFICATE entry 86 return engine.getPrivateKeyById(Credentials.USER_PRIVATE_KEY + alias); 107 final byte[] caBytes = mKeyStore.get(Credentials.CA_CERTIFICATE + alias); 133 byte[] certificate = mKeyStore.get(Credentials.USER_CERTIFICATE + alias); 138 certificate = mKeyStore.get(Credentials.CA_CERTIFICATE + alias); 184 Date d = getModificationDate(Credentials.USER_PRIVATE_KEY + alias); 189 d = getModificationDate(Credentials.USER_CERTIFICATE + alias) [all...] |
AndroidKeyPairGenerator.java | 91 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 96 final String privateKeyAlias = Credentials.USER_PRIVATE_KEY + alias; 135 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 143 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 147 if (!mKeyStore.put(Credentials.USER_CERTIFICATE + alias, certBytes, KeyStore.UID_SELF, 149 Credentials.deleteAllTypesForAlias(mKeyStore, alias);
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Credentials.java | 33 * Credentials that are used in authentication and authorization headers. 38 public class Credentials extends SIPObject { 64 public Credentials() { 130 Credentials retval = (Credentials) super.clone();
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 25 import android.security.Credentials; 156 String alias1Pkey = (Credentials.USER_PRIVATE_KEY + alias1); 157 String alias1Cert = (Credentials.USER_CERTIFICATE + alias1); 158 String alias1ICert = (Credentials.CA_CERTIFICATE + alias1Intermediate); 159 String alias1RCert = (Credentials.CA_CERTIFICATE + alias1Root); 167 String alias2Pkey = (Credentials.USER_PRIVATE_KEY + alias2); 168 String alias2Cert = (Credentials.USER_CERTIFICATE + alias2); 169 String alias2ICert = (Credentials.CA_CERTIFICATE + alias2Intermediate); 170 String alias2RCert = (Credentials.CA_CERTIFICATE + alias2Root); 178 Credentials.convertToPem(pke1.getCertificate()))) [all...] |
/external/chromium_org/net/socket/ |
unix_domain_server_socket_posix.h | 28 // Credentials of a peer process connected to the socket. 29 struct NET_EXPORT Credentials { 41 // its credentials, is allowed to keep the connection open. Note that 43 typedef base::Callback<bool (const Credentials&)> AuthCallback; 49 // Gets credentials of peer to check permissions. 51 Credentials* credentials);
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 23 import android.security.Credentials; 87 mUid = bundle.getInt(Credentials.EXTRA_INSTALL_AS_UID, -1); 88 bundle.remove(Credentials.EXTRA_INSTALL_AS_UID); 104 outStates.putByteArray(Credentials.USER_PRIVATE_KEY, 123 byte[] bytes = savedStates.getByteArray(Credentials.USER_PRIVATE_KEY); 183 return mBundle.containsKey(Credentials.EXTRA_PUBLIC_KEY) 184 && mBundle.containsKey(Credentials.EXTRA_PRIVATE_KEY); 260 Intent intent = new Intent("com.android.credentials.INSTALL"); 264 intent.putExtra(Credentials.EXTRA_INSTALL_AS_UID, mUid); 267 intent.putExtra(Credentials.EXTRA_USER_PRIVATE_KEY_NAME [all...] |
CertInstallerMain.java | 26 import android.security.Credentials; 39 * to the public {@link Credentials#INSTALL_ACTION} intent. 73 if (Credentials.INSTALL_ACTION.equals(action) 74 || Credentials.INSTALL_AS_USER_ACTION.equals(action)) { 86 bundle.remove(Credentials.EXTRA_INSTALL_AS_UID); 89 // If bundle is empty of any actual credentials, ask user to open. 90 // Otherwise, pass extras to CertInstaller to install those credentials. 96 || bundle.containsKey(Credentials.EXTRA_INSTALL_AS_UID)))) {
|
/external/apache-http/src/org/apache/http/impl/auth/ |
BasicScheme.java | 37 import org.apache.http.auth.Credentials; 124 * Produces basic authorization header for the given set of {@link Credentials}. 126 * @param credentials The set of credentials to be used for athentication 128 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 136 final Credentials credentials, 139 if (credentials == null) { 140 throw new IllegalArgumentException("Credentials may not be null"); 147 return authenticate(credentials, charset, isProxy()) [all...] |
/external/chromium_org/content/browser/android/ |
devtools_auth.cc | 16 const net::UnixDomainServerSocket::Credentials& credentials) { 17 struct passwd* creds = getpwuid(credentials.user_id); 20 << credentials.user_id; 23 if (credentials.group_id == credentials.user_id && 28 credentials.user_id == getuid())) {
|
/external/chromium_org/third_party/WebKit/Source/modules/serviceworkers/ |
FetchRequestData.h | 31 enum Credentials { OmitCredentials, SameOriginCredentials, IncludeCredentials }; 79 void setCredentials(Credentials credentials) { m_credentials = credentials; } 80 Credentials credentials() const { return m_credentials; } function in class:blink::FINAL 108 Credentials m_credentials;
|
/external/apache-http/src/org/apache/http/client/protocol/ |
RequestProxyAuthentication.java | 45 import org.apache.http.auth.Credentials; 93 Credentials creds = authState.getCredentials(); 95 this.log.debug("User credentials not available");
|
RequestTargetAuthentication.java | 45 import org.apache.http.auth.Credentials; 93 Credentials creds = authState.getCredentials(); 95 this.log.debug("User credentials not available");
|