/hardware/qcom/gps/msm8909/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8960/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8994/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8996/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
django_orm.py | 45 if isinstance(value, oauth2client.client.Credentials): 84 This Storage helper presumes the Credentials 94 key_name: string, key name for the entity that has the credentials 95 key_value: string, key value for the entity that has the credentials 107 oauth2client.Credentials 119 def locked_put(self, credentials, overwrite=False): 120 """Write a Credentials to the datastore. 123 credentials: Credentials, the credentials to store [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_gce.py | 29 from oauth2client.client import Credentials 65 c2 = Credentials.new_from_json(json) 70 credentials = AppAssertionCredentials([]) 71 self.assertTrue(credentials.create_scoped_required()) 74 credentials = AppAssertionCredentials(['dummy_scope']) 75 self.assertFalse(credentials.create_scoped_required()) 78 credentials = AppAssertionCredentials([]) 79 new_credentials = credentials.create_scoped(['dummy_scope']) 80 self.assertNotEqual(credentials, new_credentials) 90 credentials = AppAssertionCredentials(['dummy_scope'] [all...] |
test_keyring.py | 41 credentials = s.get() 42 self.assertEquals(None, credentials) 50 credentials = s.get() 51 self.assertEquals(None, credentials) 62 credentials = OAuth2Credentials( 79 s.put(credentials) 82 'my_unit_test', 'me', credentials.to_json()) 86 return_value=credentials.to_json(),
|
test_oauth2client.py | 49 from oauth2client.client import Credentials 127 credentials = Credentials() 128 json = credentials.to_json() 129 restored = Credentials.new_from_json(json) 190 def validate_service_account_credentials(self, credentials): 191 self.assertTrue(isinstance(credentials, _ServiceAccountCredentials)) 192 self.assertEqual('123', credentials._service_account_id) 193 self.assertEqual('dummy@google.com', credentials._service_account_email) 194 self.assertEqual('ABCDEF', credentials._private_key_id [all...] |
/external/dbus/dbus/ |
dbus-credentials-util.c | 2 /* dbus-credentials-util.c Would be in dbus-credentials.c, but only used for tests/bus 27 #include "dbus-credentials.h" 46 DBusCredentials *credentials; local 48 credentials = _dbus_credentials_new (); 52 if (!_dbus_credentials_add_unix_uid (credentials, unix_uid)) 54 _dbus_credentials_unref (credentials); 61 if (!_dbus_credentials_add_unix_pid (credentials, unix_pid)) 63 _dbus_credentials_unref (credentials); 70 if (!_dbus_credentials_add_windows_sid (credentials, windows_sid) [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/scripts/ |
run_system_tests.py | 41 def _check_user_info(credentials, expected_email): 42 http = credentials.authorize(httplib2.Http()) 50 raise ValueError('User info email does not match credentials.') 57 credentials = service_account._ServiceAccountCredentials( 65 _check_user_info(credentials, client_credentials['client_email']) 72 credentials = client.SignedJwtAssertionCredentials( 78 _check_user_info(credentials, P12_KEY_EMAIL) 85 credentials = client.GoogleCredentials( 95 _check_user_info(credentials, USER_KEY_EMAIL)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/samples/ |
oauth2_for_devices.py | 24 # Step 2: get credentials 26 credentials = flow.step2_exchange(device_flow_info=flow_info) variable 27 print("Access token: {0}".format(credentials.access_token)) 28 print("Refresh token: {0}".format(credentials.refresh_token)) 32 youtube = build("youtube", "v3", http=credentials.authorize(httplib2.Http()))
|
call_compute_service.py | 13 credentials = GoogleCredentials.get_application_default() variable 14 service = build('compute', 'v1', credentials=credentials)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/ |
credentials.py | 30 class Credentials(object): 35 requests to use the temporary credentials 36 :ivar expiration: The timestamp for when the credentials will expire 55 previously saved Credentials object. 113 the credentials contained in the file, the permissions 145 :ivar credentials: A Credentials object containing the credentials. 146 :ivar federated_user_arn: ARN specifying federated user using credentials. 147 :ivar federated_user_id: The ID of the federated user using credentials [all...] |
/external/autotest/client/cros/scripts/ |
wifi | 69 def connect(ssid, security, credentials, save_credentials, timeout=15): 77 @param credentials dict of service properties that includes credentials 79 @param save_credentials bool True if credentials should be saved. 86 credentials, 125 def parse_security_from_credentials(credentials): 126 """Parses SERVICE_PROPERTY_SECURITY from credentials. 128 @param credentials dict of service properties that includes credentials 130 @return SERVICE_PROPERTY_SECURITY value from credentials, [all...] |
/external/chromium-trace/catapult/telemetry/telemetry/internal/browser/ |
browser_credentials.py | 45 'Unrecognized credentials type: %s', credentials_type) 53 'Unrecognized credentials type: %s', credentials_type) 59 'Unrecognized credentials type: %s', credentials_type) 97 credentials = {} 102 credentials = json.loads(f.read()) 105 homedir_credentials_path = os.path.expanduser('~/.telemetry-credentials') 110 logging.info("Found ~/.telemetry-credentials. Its contents will be used " 111 "when no other credentials can be found.") 116 all_keys = set(credentials.keys()).union( 121 if k in credentials [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/samples/googleappengine/ |
call_compute_service_from_gae.py | 12 credentials = GoogleCredentials.get_application_default() 13 service = build('compute', 'v1', credentials=credentials)
|
/external/autotest/client/site_tests/enterprise_RemoraRequisition/ |
control | 17 You need a credentials.txt file with user_id:password in this directory for 18 this test to succeed. The credentials are used to enroll the device as a Remora
|
/external/autotest/server/cros/ap_configurators/basic_auth_extension/ |
background.js | 6 // hardcoded credentials back. 17 bkg.console.log("Calling back with credentials");
|
manifest.json | 6 "description": "Send credentials to basic HTTP auth pages.",
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/sts/ |
test_connection.py | 55 <Credentials> 60 </Credentials> 76 self.assertEqual(response.credentials.access_key, 'accesskey') 77 self.assertEqual(response.credentials.secret_key, 'secretkey') 78 self.assertEqual(response.credentials.session_token, 'session_token') 97 self.assertEqual(response.credentials.access_key, 'accesskey') 98 self.assertEqual(response.credentials.secret_key, 'secretkey') 99 self.assertEqual(response.credentials.session_token, 'session_token') 125 <Credentials> 138 </Credentials> [all...] |
/external/apache-http/src/org/apache/http/auth/ |
AuthState.java | 55 /** Credentials selected for authentication */ 56 private Credentials credentials; field in class:AuthState 72 this.credentials = null; 103 * Returns user {@link Credentials} selected for authentication if available 105 * @return user credentials if available, <code>null</code otherwise 107 public Credentials getCredentials() { 108 return this.credentials; 113 * Sets user {@link Credentials} to be used for authentication 115 * @param credentials User credential [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
BasicScheme.java | 37 import org.apache.http.auth.Credentials; 124 * Produces basic authorization header for the given set of {@link Credentials}. 126 * @param credentials The set of credentials to be used for athentication 128 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 136 final Credentials credentials, 139 if (credentials == null) { 140 throw new IllegalArgumentException("Credentials may not be null"); 147 return authenticate(credentials, charset, isProxy()) [all...] |
/development/samples/browseable/ConfirmCredential/ |
_index.jd | 8 This sample demonstrates how you can use device credentials (PIN, Pattern, Password) in your app
|
/external/dbus/test/data/auth/ |
external-failed.auth-script | 1 ## this tests that auth of type EXTERNAL without credentials will fail
|
external-silly.auth-script | 1 ## this tests we can't auth if socket reports silly credentials but we ask for our own uid
|