/external/dbus/dbus/ |
dbus-credentials.c | 2 /* dbus-credentials.c Credentials provable through authentication 25 #include "dbus-credentials.h" 29 * @defgroup DBusCredentials Credentials provable through authentication 33 * Credentials are what you have to prove you have in order to 34 * authenticate. The main credentials right now are a unix user 39 * @defgroup DBusCredentialsInternals Credentials implementation details 43 * Private details of credentials code. 65 * Creates a new credentials object. 89 * Creates a new object with credentials (user ID and process ID) from the current process [all...] |
dbus-credentials.h | 2 /* dbus-credentials.h Credentials provable through authentication 42 void _dbus_credentials_ref (DBusCredentials *credentials); 43 void _dbus_credentials_unref (DBusCredentials *credentials); 44 dbus_bool_t _dbus_credentials_add_unix_pid (DBusCredentials *credentials, 46 dbus_bool_t _dbus_credentials_add_unix_uid (DBusCredentials *credentials, 48 dbus_bool_t _dbus_credentials_add_windows_sid (DBusCredentials *credentials, 50 dbus_bool_t _dbus_credentials_add_adt_audit_data (DBusCredentials *credentials, 53 dbus_bool_t _dbus_credentials_include (DBusCredentials *credentials, 55 dbus_pid_t _dbus_credentials_get_unix_pid (DBusCredentials *credentials); [all...] |
/external/libchrome/sandbox/linux/services/ |
credentials_unittest.cc | 5 #include "sandbox/linux/services/credentials.h" 64 SANDBOX_TEST(Credentials, DropAllCaps) { 65 CHECK(Credentials::DropAllCapabilities()); 66 CHECK(!Credentials::HasAnyCapability()); 69 SANDBOX_TEST(Credentials, MoveToNewUserNS) { 70 CHECK(Credentials::DropAllCapabilities()); 71 bool moved_to_new_ns = Credentials::MoveToNewUserNS(); 82 CHECK(Credentials::HasAnyCapability()); 83 CHECK(Credentials::DropAllCapabilities()); 84 CHECK(!Credentials::HasAnyCapability()) [all...] |
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-credentials/0.3.0/ |
google-auth-library-credentials-0.3.0-sources.jar | |
google-auth-library-credentials-0.3.0.jar | |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_file.py | 77 credentials = OAuth2Credentials( 81 return credentials 85 credentials = s.get() 86 self.assertEquals(None, credentials) 103 credentials = self.create_test_credentials() 106 pickle.dump(credentials, f) 110 # read and write credentials as pickled objects has been removed. 116 s.put(credentials) 126 credentials = self.create_test_credentials(expiration=expiration) 129 s.put(credentials) [all...] |
test_service_account.py | 20 Unit tests for service account credentials implemented using RSA. 48 self.credentials = _ServiceAccountCredentials(self.service_account_id, 55 private_key_id, signature = self.credentials.sign_blob('Google') 77 self.credentials.service_account_email) 80 self.assertTrue(self.credentials.create_scoped_required()) 83 self.credentials = _ServiceAccountCredentials(self.service_account_id, 88 self.assertFalse(self.credentials.create_scoped_required()) 91 new_credentials = self.credentials.create_scoped(self.scopes) 92 self.assertNotEqual(self.credentials, new_credentials) 105 token = self.credentials.get_access_token(http=http [all...] |
test_appengine.py | 62 from oauth2client.client import Credentials 162 credentials = AppAssertionCredentials(scope) 164 self.assertRaises(AccessTokenRefreshError, credentials.refresh, http) 177 credentials = AppAssertionCredentials(scope) 179 credentials.refresh(http) 180 self.assertEqual('a_token_123', credentials.access_token) 182 json = credentials.to_json() 183 credentials = Credentials.new_from_json(json) 186 credentials.scope [all...] |
/external/chromium-trace/catapult/dashboard/dashboard/ |
buildbucket_service.py | 33 def __new__(cls, credentials): 34 if credentials and credentials != cls._singleton_credentials: 35 cls._singleton_credentials = credentials 36 cls._MakeSingleton(credentials) 45 # Uses rietveld credentials to authorize an http client. Note this same 49 credentials = override_credentials 51 credentials = utils.ServiceAccountCredentials() 53 # If we cannot pull the credentials from ndb we simply use the unauthorized 55 if credentials [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
keyring_storage.py | 17 A Storage for Credentials that uses the keyring module. 26 from oauth2client.client import Credentials 47 credentials = s.get() 55 service_name: string, The name of the service under which the credentials 57 user_name: string, The name of the user to store credentials for. 81 oauth2client.client.Credentials 83 credentials = None 88 credentials = Credentials.new_from_json(content) 89 credentials.set_store(self [all...] |
file.py | 18 credentials. 26 from oauth2client.client import Credentials 31 """Credentials files must not be symbolic links.""" 64 oauth2client.client.Credentials 69 credentials = None 76 return credentials 79 credentials = Credentials.new_from_json(content) 80 credentials.set_store(self) 84 return credentials [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/sts/ |
test_credentials.py | 3 from boto.sts.credentials import Credentials 11 self.creds = Credentials() 14 # This would fail miserably if ``Credentials.request_id`` hadn't been 26 creds = Credentials()
|
/external/autotest/client/site_tests/platform_CryptohomeTestAuth/ |
control | 7 PURPOSE = "Verify that cryptohome can verify credentials." 8 CRITERIA = "This test will fail if cryptohome fails to validate credentials." 17 This test checks that cryptohome can verify credentials.
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/third_party/storage_apitools/ |
credentials_lib.py | 1 """Shim for backwards-compatibility for moving GCE credentials. 3 oauth2client loads credentials classes based on the module name where 11 # enough that old credentials are likely to be rare.
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AccountManager.java | 8 * Returns the user credentials for a given SIP Domain. 10 * to retrieve the credentials. 15 * @return -- the user credentials associated with the domain.
|
SecureAccountManager.java | 7 * Returns the user credentials for a given SIP Domain. 9 * to retrieve the credentials. 14 * @return -- the user credentials associated with the domain.
|
UserCredentials.java | 4 * The class is used whenever user credentials for a particular realm (site 16 * Returns the name of the user that these credentials relate to. 23 * Returns a password associated with this set of credentials. 25 * @return a password associated with this set of credentials.
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/ |
creds.py | 15 """Additional help about types of credentials and authentication.""" 23 gsutil currently supports several types of credentials/authentication, as 25 for more on anonymous access). Each of these type of credentials is discussed 27 credentials via either the Cloud SDK or standalone installations of gsutil. 30 <B>Configuring/Using Credentials via Cloud SDK Distribution of gsutil</B> 31 When gsutil is installed/used via the Cloud SDK ("gcloud"), credentials are 33 ~/.config/gcloud (any manipulation of credentials should be done via the 34 gcloud auth command). If you need to set up multiple credentials (e.g., one 36 gcloud auth command manages the credentials for you, and you switch between 37 credentials using the gcloud auth command as well (for more details se [all...] |
/external/apache-http/src/org/apache/http/client/ |
CredentialsProvider.java | 34 import org.apache.http.auth.Credentials; 37 * Abstract credentials provider. 51 * Sets the {@link Credentials credentials} for the given authentication 52 * scope. Any previous credentials for the given scope will be overwritten. 55 * @param credentials the authentication {@link Credentials credentials} 60 void setCredentials(AuthScope authscope, Credentials credentials); [all...] |
/external/apache-http/src/org/apache/http/impl/client/ |
BasicCredentialsProvider.java | 36 import org.apache.http.auth.Credentials; 60 private final HashMap<AuthScope, Credentials> credMap; 67 this.credMap = new HashMap<AuthScope, Credentials>(); 71 * Sets the {@link Credentials credentials} for the given authentication 72 * scope. Any previous credentials for the given scope will be overwritten. 75 * @param credentials the authentication {@link Credentials credentials} 82 final Credentials credentials) [all...] |
/external/dbus/test/data/auth/ |
external-root.auth-script | 1 ## this tests we can auth EXTERNAL as ourselves, with root credentials
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/tests/ |
test_creds_config.py | 15 """Tests for various combinations of configured credentials.""" 26 """Tests for various combinations of configured credentials.""" 35 ('Credentials', 'gs_oauth2_refresh_token', 'foo'), 36 ('Credentials', 'gs_service_client_id', 'bar'), 37 ('Credentials', 'gs_service_key_file', 'baz')]): 44 self.assertIn('types of configured credentials', msg) 50 ('Credentials', 'gs_oauth2_refresh_token', 'foo'), 51 ('Credentials', 'gs_service_client_id', None), 52 ('Credentials', 'gs_service_key_file', None)]): 60 self.assertIn('credentials are invalid', warning_messages[0] [all...] |
/cts/tests/tests/net/src/android/net/cts/ |
CredentialsTest.java | 19 import android.net.Credentials; 25 // new the Credentials instance 27 Credentials cred = new Credentials(0, 0, 0); 33 cred = new Credentials(Integer.MAX_VALUE, Integer.MAX_VALUE, Integer.MAX_VALUE); 39 cred = new Credentials(Integer.MIN_VALUE, Integer.MIN_VALUE, Integer.MIN_VALUE);
|
/hardware/qcom/gps/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8084/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |