/external/libchrome/sandbox/linux/services/ |
credentials_unittest.cc | 5 #include "sandbox/linux/services/credentials.h" 64 SANDBOX_TEST(Credentials, DropAllCaps) { 65 CHECK(Credentials::DropAllCapabilities()); 66 CHECK(!Credentials::HasAnyCapability()); 69 SANDBOX_TEST(Credentials, MoveToNewUserNS) { 70 CHECK(Credentials::DropAllCapabilities()); 71 bool moved_to_new_ns = Credentials::MoveToNewUserNS(); 82 CHECK(Credentials::HasAnyCapability()); 83 CHECK(Credentials::DropAllCapabilities()); 84 CHECK(!Credentials::HasAnyCapability()) [all...] |
credentials.h | 24 // This class should be used to manipulate the current process' credentials. 27 class SANDBOX_EXPORT Credentials { 101 DISALLOW_IMPLICIT_CONSTRUCTORS(Credentials);
|
credentials.cc | 5 #include "sandbox/linux/services/credentials.h" 141 int CapabilityToKernelValue(Credentials::Capability cap) { 143 case Credentials::Capability::SYS_CHROOT: 145 case Credentials::Capability::SYS_ADMIN: 156 bool Credentials::DropAllCapabilities(int proc_fd) { 166 bool Credentials::DropAllCapabilities() { 168 return Credentials::DropAllCapabilities(proc_fd.get()); 172 bool Credentials::DropAllCapabilitiesOnCurrentThread() { 177 bool Credentials::SetCapabilitiesOnCurrentThread( 197 bool Credentials::SetCapabilities(int proc_fd [all...] |
namespace_sandbox_unittest.cc | 22 #include "sandbox/linux/services/credentials.h" 50 if (!Credentials::CanCreateProcessInNewUserNS()) { 114 CHECK(sandbox::Credentials::MoveToNewUserNS()); 115 CHECK(sandbox::Credentials::DropFileSystemAccess(ProcUtil::OpenProc().get())); 152 if (!Credentials::CanCreateProcessInNewUserNS()) { 156 CHECK(sandbox::Credentials::MoveToNewUserNS()); 174 if (!Credentials::CanCreateProcessInNewUserNS()) { 178 CHECK(sandbox::Credentials::MoveToNewUserNS()); 185 CHECK(!Credentials::HasAnyCapability()); 196 if (!Credentials::CanCreateProcessInNewUserNS()) [all...] |
namespace_utils_unittest.cc | 15 #include "sandbox/linux/services/credentials.h" 24 const bool can_create_user_ns = Credentials::CanCreateProcessInNewUserNS(); 36 if (!Credentials::CanCreateProcessInNewUserNS()) {
|
/external/apache-http/src/org/apache/http/client/ |
CredentialsProvider.java | 34 import org.apache.http.auth.Credentials; 37 * Abstract credentials provider. 51 * Sets the {@link Credentials credentials} for the given authentication 52 * scope. Any previous credentials for the given scope will be overwritten. 55 * @param credentials the authentication {@link Credentials credentials} 60 void setCredentials(AuthScope authscope, Credentials credentials); [all...] |
/external/apache-http/src/org/apache/http/auth/ |
Credentials.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/Credentials.java $ 36 * User name and password based authentication credentials. 48 public interface Credentials {
|
AuthState.java | 55 /** Credentials selected for authentication */ 56 private Credentials credentials; field in class:AuthState 72 this.credentials = null; 103 * Returns user {@link Credentials} selected for authentication if available 105 * @return user credentials if available, <code>null</code otherwise 107 public Credentials getCredentials() { 108 return this.credentials; 113 * Sets user {@link Credentials} to be used for authentication 115 * @param credentials User credential [all...] |
AuthScheme.java | 51 * <li>Generate authorization string for the given set of credentials, 133 * Produces an authorization string for the given set of {@link Credentials}. 135 * @param credentials The set of credentials to be used for athentication 142 Header authenticate(Credentials credentials, HttpRequest request)
|
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-credentials/0.3.0/ |
google-auth-library-credentials-0.3.0.jar | |
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-credentials/0.4.0/ |
google-auth-library-credentials-0.4.0.jar | |
/external/apache-http/src/org/apache/http/impl/client/ |
BasicCredentialsProvider.java | 36 import org.apache.http.auth.Credentials; 60 private final HashMap<AuthScope, Credentials> credMap; 67 this.credMap = new HashMap<AuthScope, Credentials>(); 71 * Sets the {@link Credentials credentials} for the given authentication 72 * scope. Any previous credentials for the given scope will be overwritten. 75 * @param credentials the authentication {@link Credentials credentials} 82 final Credentials credentials) [all...] |
/frameworks/base/core/java/android/net/ |
Credentials.java | 20 * A class for representing UNIX credentials passed via ancillary data 23 public class Credentials { 31 public Credentials (int pid, int uid, int gid) {
|
/cts/tests/tests/net/src/android/net/cts/ |
CredentialsTest.java | 19 import android.net.Credentials; 25 // new the Credentials instance 27 Credentials cred = new Credentials(0, 0, 0); 33 cred = new Credentials(Integer.MAX_VALUE, Integer.MAX_VALUE, Integer.MAX_VALUE); 39 cred = new Credentials(Integer.MIN_VALUE, Integer.MIN_VALUE, Integer.MIN_VALUE);
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Credentials.java | 21 /** Factory for HTTP authorization credentials. */ 22 public final class Credentials { 23 private Credentials() {
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Credentials.java | 33 * Credentials that are used in authentication and authorization headers. 38 public class Credentials extends SIPObject { 64 public Credentials() { 130 Credentials retval = (Credentials) super.clone();
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 25 import android.security.Credentials; 156 String alias1Pkey = (Credentials.USER_PRIVATE_KEY + alias1); 157 String alias1Cert = (Credentials.USER_CERTIFICATE + alias1); 158 String alias1ICert = (Credentials.CA_CERTIFICATE + alias1Intermediate); 159 String alias1RCert = (Credentials.CA_CERTIFICATE + alias1Root); 167 String alias2Pkey = (Credentials.USER_PRIVATE_KEY + alias2); 168 String alias2Cert = (Credentials.USER_CERTIFICATE + alias2); 169 String alias2ICert = (Credentials.CA_CERTIFICATE + alias2Intermediate); 170 String alias2RCert = (Credentials.CA_CERTIFICATE + alias2Root); 178 Credentials.convertToPem(pke1.getCertificate()))) [all...] |
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 26 import android.security.Credentials; 92 mUid = bundle.getInt(Credentials.EXTRA_INSTALL_AS_UID, -1); 93 bundle.remove(Credentials.EXTRA_INSTALL_AS_UID); 108 outStates.putInt(Credentials.EXTRA_INSTALL_AS_UID, mUid); 110 outStates.putByteArray(Credentials.USER_PRIVATE_KEY, 129 mUid = savedStates.getInt(Credentials.EXTRA_INSTALL_AS_UID, -1); 130 byte[] bytes = savedStates.getByteArray(Credentials.USER_PRIVATE_KEY); 190 return mBundle.containsKey(Credentials.EXTRA_PUBLIC_KEY) 191 && mBundle.containsKey(Credentials.EXTRA_PRIVATE_KEY); 271 Intent intent = new Intent("com.android.credentials.INSTALL") [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 20 import android.security.Credentials; 73 * PrivateKeyEntry will have a Credentials.USER_PRIVATE_KEY as the private key, 74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 75 * that corresponds to the private key), and then a Credentials.CA_CERTIFICATE 78 * TrustedCertificateEntry will just have a Credentials.CA_CERTIFICATE entry 93 String privateKeyAlias = Credentials.USER_PRIVATE_KEY + alias; 97 String secretKeyAlias = Credentials.USER_SECRET_KEY + alias; 119 final byte[] caBytes = mKeyStore.get(Credentials.CA_CERTIFICATE + alias, mUid); 145 byte[] encodedCert = mKeyStore.get(Credentials.USER_CERTIFICATE + alias, mUid); 150 encodedCert = mKeyStore.get(Credentials.CA_CERTIFICATE + alias, mUid) [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiKeyStore.java | 22 import android.security.Credentials; 86 String privKeyName = Credentials.USER_PRIVATE_KEY + name; 87 String userCertName = Credentials.USER_CERTIFICATE + name; 127 ret = putCertInKeyStore(Credentials.CA_CERTIFICATE + alias, caCertificates[i]); 136 mKeyStore.delete(Credentials.CA_CERTIFICATE + addedAlias, Process.WIFI_UID); 146 mKeyStore.delete(Credentials.CA_CERTIFICATE + oldAlias, Process.WIFI_UID); 182 byte[] certData = Credentials.convertToPem(certs); 227 mKeyStore.delete(Credentials.USER_PRIVATE_KEY + client, Process.WIFI_UID); 228 mKeyStore.delete(Credentials.USER_CERTIFICATE + client, Process.WIFI_UID); 237 mKeyStore.delete(Credentials.CA_CERTIFICATE + ca, Process.WIFI_UID) [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
BasicScheme.java | 37 import org.apache.http.auth.Credentials; 124 * Produces basic authorization header for the given set of {@link Credentials}. 126 * @param credentials The set of credentials to be used for athentication 128 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 136 final Credentials credentials, 139 if (credentials == null) { 140 throw new IllegalArgumentException("Credentials may not be null"); 147 return authenticate(credentials, charset, isProxy()) [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
WifiCertManagerTest.java | 24 import android.security.Credentials; 78 String prefix = Credentials.USER_PRIVATE_KEY; 105 Credentials.USER_PRIVATE_KEY, UserHandle.myUserId()); 113 String prefix = Credentials.USER_PRIVATE_KEY;
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnUtils.java | 24 import android.security.Credentials; 41 final byte[] value = KeyStore.getInstance().get(Credentials.LOCKDOWN_VPN); 46 KeyStore.getInstance().delete(Credentials.LOCKDOWN_VPN); 52 KeyStore.getInstance().put(Credentials.LOCKDOWN_VPN, lockdownKey.getBytes(),
|
/external/apache-http/src/org/apache/http/client/protocol/ |
RequestProxyAuthentication.java | 45 import org.apache.http.auth.Credentials; 93 Credentials creds = authState.getCredentials(); 95 this.log.debug("User credentials not available");
|
RequestTargetAuthentication.java | 45 import org.apache.http.auth.Credentials; 93 Credentials creds = authState.getCredentials(); 95 this.log.debug("User credentials not available");
|