/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 41 import org.apache.http.auth.Credentials; 212 * {@link Credentials}, method name and URI. 214 * @param credentials A set of credentials to be used for athentication 217 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 225 final Credentials credentials, 228 if (credentials == null) { 229 throw new IllegalArgumentException("Credentials may not be null"); 243 String digest = createDigest(credentials); [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/ |
credentials.py | 30 class Credentials(object): 35 requests to use the temporary credentials 36 :ivar expiration: The timestamp for when the credentials will expire 55 previously saved Credentials object. 113 the credentials contained in the file, the permissions 145 :ivar credentials: A Credentials object containing the credentials. 146 :ivar federated_user_arn: ARN specifying federated user using credentials. 147 :ivar federated_user_id: The ID of the federated user using credentials [all...] |
connection.py | 27 from boto.sts.credentials import Credentials, FederationToken, AssumedRole 28 from boto.sts.credentials import DecodeAuthorizationMessage 41 to request temporary, limited-privilege credentials for AWS 47 `Using Temporary Security Credentials`_. 54 Temporary Security Credentials to Access AWS`_ in Using Temporary 55 Security Credentials . 79 Credentials or even search for AWS Credentials to make these 90 # If an anonymous request is sent, do not try to look for credentials [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSecretKeyFactorySpi.java | 19 import android.security.Credentials; 67 if (keyAliasInKeystore.startsWith(Credentials.USER_SECRET_KEY)) { 68 entryAlias = keyAliasInKeystore.substring(Credentials.USER_SECRET_KEY.length());
|
AndroidKeyStoreKeyPairGeneratorSpi.java | 20 import android.security.Credentials; 464 Credentials.deleteAllTypesForAlias(mKeyStore, mEntryAlias, mEntryUid); 465 final String privateKeyAlias = Credentials.USER_PRIVATE_KEY + mEntryAlias; 478 Credentials.deleteAllTypesForAlias(mKeyStore, mEntryAlias, mEntryUid); 554 Credentials.USER_CERTIFICATE, iter.next(), flags, "Failed to store certificate"); 566 storeCertificate(Credentials.CA_CERTIFICATE, certificateConcatenationStream.toByteArray(), [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyPairGeneratorTest.java | 19 import android.security.Credentials; 368 final byte[] userCertBytes = mAndroidKeyStore.get(Credentials.USER_CERTIFICATE + alias); 386 Credentials.USER_PRIVATE_KEY + alias, 411 final byte[] caCerts = mAndroidKeyStore.get(Credentials.CA_CERTIFICATE + alias); 415 Credentials.USER_PRIVATE_KEY + alias, KeymasterDefs.KM_KEY_FORMAT_X509, null, null);
|
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
VpnTests.java | 26 import android.security.Credentials; 186 privateKey = Credentials.USER_PRIVATE_KEY + profile.ipsecUserCert; 187 byte[] value = mKeyStore.get(Credentials.USER_CERTIFICATE + profile.ipsecUserCert); 191 byte[] value = mKeyStore.get(Credentials.CA_CERTIFICATE + profile.ipsecCaCert); 195 byte[] value = mKeyStore.get(Credentials.USER_CERTIFICATE + profile.ipsecServerCert);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
appengine.py | 46 from oauth2client.client import Credentials 142 """Credentials object for App Engine Assertion Grants 159 scope: string or iterable of strings, scope(s) of the credentials being 201 raise NotImplementedError('Cannot serialize credentials for AppEngine.') 270 """App Engine datastore Property for Credentials. 273 oath2client.Credentials 277 data_type = Credentials 298 credentials = Credentials.new_from_json(value) 300 credentials = Non 503 credentials = CredentialsProperty() variable in class:CredentialsModel 518 credentials = CredentialsNDBProperty() variable in class:.CredentialsNDBModel 603 credentials = property(get_credentials, set_credentials) variable in class:OAuth2Decorator [all...] |
client.py | 72 # The value representing user credentials. 75 # The value representing service account credentials. 79 # Application Default Credentials. 81 # The ~/.config subdirectory containing gcloud credentials. Intended 88 # Default Credentials. 90 'The Application Default Credentials are not available. They are available ' 93 ' must be defined pointing to a file defining the credentials. See ' 94 'https://developers.google.com/accounts/docs/application-default-credentials' # pylint:disable=line-too-long 144 """Error retrieving the Application Default Credentials.""" 175 class Credentials(object) [all...] |
django_orm.py | 45 if isinstance(value, oauth2client.client.Credentials): 84 This Storage helper presumes the Credentials 94 key_name: string, key name for the entity that has the credentials 95 key_value: string, key value for the entity that has the credentials 107 oauth2client.Credentials 119 def locked_put(self, credentials, overwrite=False): 120 """Write a Credentials to the datastore. 123 credentials: Credentials, the credentials to store [all...] |
multistore_file.py | 18 credentials can be stored in one file. That file supports locking 39 # JSON serialized Credentials. 55 from oauth2client.client import Credentials 81 filename: The JSON file storing a set of credentials 107 filename: The JSON file storing a set of credentials 130 filename: The JSON file storing a set of credentials 150 filename: The JSON file storing a set of credentials 156 get the actual credentials. 171 filename: The JSON file storing a set of credentials 188 """A file backed store for multiple credentials."" [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 21 import android.security.Credentials; 41 * and any associated credentials. 97 public static final String CA_CERT_PREFIX = KEYSTORE_URI + Credentials.CA_CERTIFICATE; 99 public static final String CLIENT_CERT_PREFIX = KEYSTORE_URI + Credentials.USER_CERTIFICATE; 613 sb.append(encodeCaCertificateAlias(Credentials.CA_CERTIFICATE + aliases[i])); 644 if (aliases[i].startsWith(Credentials.CA_CERTIFICATE)) { 645 aliases[i] = aliases[i].substring(Credentials.CA_CERTIFICATE.length()); 774 setFieldValue(PRIVATE_KEY_ID_KEY, alias, Credentials.USER_PRIVATE_KEY); [all...] |
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainActivity.java | 36 import android.security.Credentials; 121 this.startActivityForResult(new Intent(Credentials.UNLOCK_ACTION), 123 // Note that Credentials.unlock will start an 198 String[] aliasArray = mKeyStore.list(Credentials.USER_PRIVATE_KEY); 299 Credentials.EXTENSION_PFX, Credentials.EXTENSION_P12); 309 Credentials.getInstance().install(KeyChainActivity.this); 378 byte[] bytes = mKeyStore.get(Credentials.USER_CERTIFICATE + alias);
|
/external/apache-http/src/org/apache/http/auth/ |
NTCredentials.java | 38 /** {@link Credentials} specific to the Windows platform. 51 public class NTCredentials implements Credentials { 137 * @return String the domain these credentials are intended to authenticate with.
|
/frameworks/base/core/java/android/net/ |
LocalSocket.java | 307 * Retrieves the credentials of this socket's peer. Only valid on 310 * @return non-null; peer credentials 313 public Credentials getPeerCredentials() throws IOException {
|
LocalSocketImpl.java | 204 private native Credentials getPeerCredentials_native( 582 * Retrieves the credentials of this socket's peer. Only valid on 585 * @return non-null; peer credentials 588 public Credentials getPeerCredentials() throws IOException {
|
/cts/tests/tests/net/src/android/net/cts/ |
LocalSocketTest.java | 21 import android.net.Credentials; 49 Credentials credent = clientSocket.getPeerCredentials();
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiConfigStore.java | 29 import android.security.Credentials; 467 String privKeyName = Credentials.USER_PRIVATE_KEY + name; 468 String userCertName = Credentials.USER_CERTIFICATE + name; 507 ret = putCertInKeyStore(Credentials.CA_CERTIFICATE + alias, caCertificates[i]); 516 mKeyStore.delete(Credentials.CA_CERTIFICATE + addedAlias, Process.WIFI_UID); 526 mKeyStore.delete(Credentials.CA_CERTIFICATE + oldAlias, Process.WIFI_UID); 544 byte[] certData = Credentials.convertToPem(cert); 565 mKeyStore.delete(Credentials.USER_PRIVATE_KEY + client, Process.WIFI_UID); 566 mKeyStore.delete(Credentials.USER_CERTIFICATE + client, Process.WIFI_UID); 575 mKeyStore.delete(Credentials.CA_CERTIFICATE + ca, Process.WIFI_UID) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
ntsecpkg.h | 39 typedef NTSTATUS (NTAPI LSA_ADD_CREDENTIAL)(PLUID LogonId,ULONG AuthenticationPackage,PLSA_STRING PrimaryKeyValue,PLSA_STRING Credentials); 40 typedef NTSTATUS (NTAPI LSA_GET_CREDENTIALS)(PLUID LogonId,ULONG AuthenticationPackage,PULONG QueryContext,BOOLEAN RetrieveAllCredentials,PLSA_STRING PrimaryKeyValue,PULONG PrimaryKeyLength,PLSA_STRING Credentials); 168 PUCHAR Credentials; 175 SECPKG_SUPPLEMENTAL_CRED Credentials[1]; 391 typedef NTSTATUS (NTAPI LSA_UPDATE_PRIMARY_CREDENTIALS)(PSECPKG_PRIMARY_CRED PrimaryCredentials,PSECPKG_SUPPLEMENTAL_CRED_ARRAY Credentials); 450 typedef VOID (NTAPI CredFreeCredentialsFn)(ULONG Count,PENCRYPTED_CREDENTIALW *Credentials); 574 typedef NTSTATUS (NTAPI SpSaveCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Credentials); 575 typedef NTSTATUS (NTAPI SpGetCredentialsFn)(LSA_SEC_HANDLE CredentialHandle,PSecBuffer Credentials); [all...] |
/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/ |
config.py | 63 The gsutil config command obtains access credentials for Google Cloud 65 credentials along with a number of other configuration-controllable values. 73 Because the boto configuration file contains your credentials you should 78 <B>CREDENTIALS</B> 79 By default gsutil config obtains OAuth2 credentials, and writes them 80 to the [Credentials] section of the configuration file. The -r, -w, 88 If you want to use credentials based on access key and secret (the older 93 forth between multiple providers) you can edit their credentials into the 94 [Credentials] section after creating the initial configuration file. 97 <B>CONFIGURING SERVICE ACCOUNT CREDENTIALS</B [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 25 import android.net.Credentials; 79 private final Credentials peer; 104 Log.e(TAG, "Cannot read peer credentials", ex); 610 * @param peer non-null; peer credentials 613 private static void applyUidSecurityPolicy(Arguments args, Credentials peer) 660 * Based on the credentials of the process issuing a zygote command: 668 * @param peer non-null; peer credentials 671 private static void applyInvokeWithSecurityPolicy(Arguments args, Credentials peer)
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CertInstaller.java | 31 import android.security.Credentials; 203 // Fail to confirm credentials. Let it finish 279 Credentials.getInstance().unlock(this); 291 byte[] privatekey = mCredentials.getData(Credentials.EXTRA_PRIVATE_KEY); 292 String key = Util.toMd5(mCredentials.getData(Credentials.EXTRA_PUBLIC_KEY));
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
ConfigDialog.java | 24 import android.security.Credentials; 44 * can be launched to either edit or prompt for credentials to connect 132 loadCertificates(mIpsecUserCert, Credentials.USER_PRIVATE_KEY, 0, mProfile.ipsecUserCert); 133 loadCertificates(mIpsecCaCert, Credentials.CA_CERTIFICATE, 135 loadCertificates(mIpsecServerCert, Credentials.USER_CERTIFICATE,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_jwt.py | 34 from oauth2client.client import Credentials 212 credentials = SignedJwtAssertionCredentials( 221 http = credentials.authorize(http) 227 credentials = SignedJwtAssertionCredentials( 232 json = credentials.to_json() 233 restored = Credentials.new_from_json(json) 234 self.assertEqual(credentials.private_key, restored.private_key) 235 self.assertEqual(credentials.private_key_password, 237 self.assertEqual(credentials.kwargs, restored.kwargs) 239 def _credentials_refresh(self, credentials) [all...] |
/frameworks/base/services/core/java/com/android/server/net/ |
LockdownVpnTracker.java | 41 import android.security.Credentials; 90 return KeyStore.getInstance().contains(Credentials.LOCKDOWN_VPN);
|