/external/chromium-trace/catapult/firefighter/base/ |
bigquery.py | 179 credentials = client.GoogleCredentials.get_application_default() 180 if credentials.create_scoped_required(): 181 credentials = credentials.create_scoped( 183 return build('bigquery', 'v2', credentials=credentials)
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/ |
cros_unittest.py | 42 """Read username and password from credentials.txt. The file is a single 47 'credentials.txt') 87 """Tests gaia login. Use credentials in credentials.txt if it exists, 104 """Tests enterprise enrollment. Credentials are expected to be found in a 105 credentials.txt file. The account must be from an enterprise domain and
|
/external/dbus/dbus/ |
dbus-auth-script.c | 31 #include "dbus-credentials.h" 217 DBusCredentials *credentials; local 219 credentials = _dbus_credentials_new (); 220 if (credentials == NULL) 224 _dbus_credentials_add_unix_uid (credentials, uid); 226 _dbus_credentials_add_unix_pid (credentials, pid); 228 _dbus_auth_set_credentials (auth, credentials); 230 _dbus_credentials_unref (credentials); 383 _dbus_warn ("no memory for credentials\n"); 391 _dbus_warn ("no memory for setting credentials\n") [all...] |
/external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/ |
security.py | 15 """Additional help about types of credentials and authentication.""" 54 contain security-sensitive information, including credentials and proxy 59 credentials. 169 Google will never ask you to share your credentials, password, or other 182 The first and foremost precaution is: Never share your credentials. Each user 183 should have distinct credentials. 201 running on a host in your data center), use service account credentials rather 202 than individual user account credentials. These credentials were designed for
|
/external/webrtc/webrtc/p2p/base/ |
turnport.h | 50 const RelayCredentials& credentials, 54 server_address, credentials, server_priority, origin); 66 const RelayCredentials& credentials, 70 username, password, server_address, credentials, 84 const RelayCredentials& credentials() const { return credentials_; } function in class:cricket::TurnPort 148 void set_credentials(RelayCredentials& credentials) { 149 credentials_ = credentials; 163 const RelayCredentials& credentials, 176 const RelayCredentials& credentials,
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
ScreenLockBoundKeysTest.java | 109 * authenticated with device credentials within the last X seconds. 112 // Generate a key to decrypt payment credentials, tokens, etc. 140 * only works if the user has just authenticated via device credentials. 157 // User is not authenticated, let's authenticate with device credentials. 175 // Create the Confirm Credentials screen. You can customize the title and description. Or
|
/developers/build/prebuilts/gradle/ConfirmCredential/Application/src/main/java/com/example/android/confirmcredential/ |
MainActivity.java | 96 * only works if the user has just authenticated via device credentials. 116 // User is not authenticated, let's authenticate with device credentials. 135 * authenticated with device credentials within the last X seconds. 138 // Generate a key to decrypt payment credentials, tokens, etc. 165 // Create the Confirm Credentials screen. You can customize the title and description. Or
|
/developers/samples/android/security/ConfirmCredential/Application/src/main/java/com/example/android/confirmcredential/ |
MainActivity.java | 96 * only works if the user has just authenticated via device credentials. 116 // User is not authenticated, let's authenticate with device credentials. 135 * authenticated with device credentials within the last X seconds. 138 // Generate a key to decrypt payment credentials, tokens, etc. 165 // Create the Confirm Credentials screen. You can customize the title and description. Or
|
/development/samples/browseable/ConfirmCredential/src/com.example.android.confirmcredential/ |
MainActivity.java | 96 * only works if the user has just authenticated via device credentials. 116 // User is not authenticated, let's authenticate with device credentials. 135 * authenticated with device credentials within the last X seconds. 138 // Generate a key to decrypt payment credentials, tokens, etc. 165 // Create the Confirm Credentials screen. You can customize the title and description. Or
|
/external/autotest/site_utils/ |
gmail_lib.py | 95 credentials = storage.get() 96 if not credentials or credentials.invalid: 97 raise GmailApiException('Invalid credentials for Gmail API, ' 99 http = credentials.authorize(httplib2.Http())
|
/external/ipsec-tools/src/racoon/doc/ |
README.gssapi | 9 as root, and have no Kerberos 5 credentials, so racoon explicitly 10 needs to acquire its credentials. The usual method (already used 12 a set of special credentials to be used. For example, authentication 13 by daemons concerned with login credentials, uses 'host/fqdn' as 15 is being used. These special credentials need to be extracted into
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
LoginService.java | 29 * to check credentials and to create a {@link UserIdentity} using the 44 * @param credentials The users credentials 45 * @return A UserIdentity if the credentials matched, otherwise null 47 UserIdentity login(String username,Object credentials);
|
/external/libchrome/sandbox/linux/services/ |
namespace_sandbox.h | 23 // using Credentials::CanCreateProcessInNewUserNS. 34 // 4. B chroots using Credentials::MoveToNewUserNS() and 35 // Credentials::DropFileSystemAccess() 37 // Credentials::DropAllCapabilities(). 55 // supported (use Credentials::CanCreateProcessInNewUserNS to check this).
|
credentials.h | 25 // This class should be used to manipulate the current process' credentials. 28 class SANDBOX_EXPORT Credentials { 102 DISALLOW_IMPLICIT_CONSTRUCTORS(Credentials);
|
/libcore/ojluni/src/main/java/javax/security/auth/ |
Subject.java | 63 * which are referred to as credentials. 64 * Sensitive credentials that require special protection, such as 66 * <code>Set</code>. Credentials intended to be shared, such as 73 * all the public or private credentials belonging to a <code>Subject</code>, 76 * To modify the returned <code>Set</code> of Principals and credentials, 91 * the credentials associated with the <code>Subject</code> are not. 118 * Subject's Credentials 140 * Sets of public and private credentials. 166 * Principals and credentials. 168 * <p> The Principals and credentials from the specified Set [all...] |
/external/apache-http/src/org/apache/http/auth/ |
Credentials.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/Credentials.java $ 36 * User name and password based authentication credentials. 48 public interface Credentials {
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
gcs_json_api.py | 138 credentials=None, debug=0, trace_token=None): 145 credentials: Credentials to be used for interacting with Google Cloud 155 if not credentials: 162 if isinstance(credentials, NoOpCredentials): 165 self.credentials = credentials or loaded_credentials 175 if self.credentials: 176 self.authorized_download_http = self.credentials.authorize( 178 self.authorized_upload_http = self.credentials.authorize(self.upload_http [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/apitools/apitools/base/py/testing/testclient/ |
fusiontables_v1_client.py | 28 def __init__(self, url='', credentials=None, 36 url, credentials=credentials,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/roboto/ |
awsqueryservice.py | 13 s = 'Unable to find credentials' 55 will be searched credentials. 56 Note that if credentials have been explicitelypassed
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/sts/ |
test_session_token.py | 31 from boto.sts.credentials import Credentials 49 token_copy = Credentials.load('token.json')
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
devshell.py | 93 """Credentials object for Google Developer Shell environment. 130 'Cannot load Developer Shell credentials from JSON.') 135 'Cannot serialize Developer Shell credentials.')
|
gce.py | 38 """Credentials object for Compute Engine Assertion Grants 55 scope: string or iterable of strings, scope(s) of the credentials being 99 'Cannot serialize credentials for GCE service accounts.')
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
AuthenticatorAdapter.java | 20 import com.squareup.okhttp.Credentials; 50 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword())); 74 String credential = Credentials.basic(auth.getUserName(), new String(auth.getPassword()));
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers_wps.c | 20 * wpas_dbus_iface_wps_pbc - Request credentials using WPS PBC method 118 * wpas_dbus_iface_wps_reg - Request credentials using the PIN of the AP 148 "Could not request credentials");
|
/frameworks/base/core/tests/coretests/src/android/net/ |
LocalSocketTest.java | 19 import android.net.Credentials; 51 // Test getting credentials 52 Credentials c = ls1.getPeerCredentials();
|