/external/skia/tools/skp/page_sets/other/ |
POPUP-skia_mercurynews_nexus10.json | 17 credentials_path='data/credentials.json')
|
/external/skia/tools/skp/page_sets/ |
skia_carsvg_desktop.py | 18 credentials_path='data/credentials.json',
|
skia_chalkboard_desktop.py | 18 credentials_path='data/credentials.json',
|
skia_mapsvg_desktop.py | 18 credentials_path='data/credentials.json',
|
skia_wikipedia_desktop.py | 18 credentials_path='data/credentials.json',
|
skia_worldjournal_nexus10.py | 18 credentials_path='data/credentials.json',
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.h | 2 * TLSv1 credentials
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/commands/ |
BrowserURI.java | 11 https://subscription-server.r2-testbed-rks.wi-fi.org:8443/web/ruckuswireles/home/-/onlinesignup/subscriberDetails?Credentials=USERNAME_PASSWORD&SessionID=D74A7B03005645DAA516191DEE77B94F&RedirectURI=http://127.0.0.1:12345/index.htm&UpdateMethod=SPP-ClientInitiated
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
WifiCertManagerTest.java | 24 import android.security.Credentials; 78 String prefix = Credentials.USER_PRIVATE_KEY; 105 Credentials.USER_PRIVATE_KEY, UserHandle.myUserId()); 113 String prefix = Credentials.USER_PRIVATE_KEY;
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnUtils.java | 24 import android.security.Credentials; 41 final byte[] value = KeyStore.getInstance().get(Credentials.LOCKDOWN_VPN); 46 KeyStore.getInstance().delete(Credentials.LOCKDOWN_VPN); 52 KeyStore.getInstance().put(Credentials.LOCKDOWN_VPN, lockdownKey.getBytes(),
|
/external/autotest/client/site_tests/enterprise_RemoraRequisition/ |
enterprise_RemoraRequisition.py | 36 os.path.dirname(os.path.realpath(__file__)), 'credentials.txt')) 38 logging.warn('No credentials found - exiting test.')
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
Authenticate.java | 19 import com.squareup.okhttp.Credentials; 34 String credential = Credentials.basic("jesse", "password1");
|
/external/apache-http/src/org/apache/http/auth/ |
AuthScheme.java | 51 * <li>Generate authorization string for the given set of credentials, 133 * Produces an authorization string for the given set of {@link Credentials}. 135 * @param credentials The set of credentials to be used for athentication 142 Header authenticate(Credentials credentials, HttpRequest request)
|
Credentials.java | 2 * $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main/java/org/apache/http/auth/Credentials.java $ 36 * User name and password based authentication credentials. 48 public interface Credentials {
|
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMScheme.java | 37 import org.apache.http.auth.Credentials; 113 final Credentials credentials, 117 ntcredentials = (NTCredentials) credentials; 120 "Credentials cannot be used for NTLM authentication: " 121 + credentials.getClass().getName());
|
/external/curl/lib/vauth/ |
krb5_sspi.c | 137 if(!krb5->credentials) { 152 /* Allocate our credentials handle */ 153 krb5->credentials = malloc(sizeof(CredHandle)); 154 if(!krb5->credentials) 157 memset(krb5->credentials, 0, sizeof(CredHandle)); 159 /* Acquire our credentials handle */ 165 krb5->credentials, &expiry); 210 status = s_pSecFn->InitializeSecurityContext(krb5->credentials, 320 status = s_pSecFn->QueryCredentialsAttributes(krb5->credentials, 499 /* Free our credentials handle * [all...] |
/external/webrtc/webrtc/p2p/base/ |
turnport.h | 50 const RelayCredentials& credentials, 54 server_address, credentials, server_priority, origin); 66 const RelayCredentials& credentials, 70 username, password, server_address, credentials, 84 const RelayCredentials& credentials() const { return credentials_; } function in class:cricket::TurnPort 148 void set_credentials(RelayCredentials& credentials) { 149 credentials_ = credentials; 163 const RelayCredentials& credentials, 176 const RelayCredentials& credentials,
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
ScreenLockBoundKeysTest.java | 109 * authenticated with device credentials within the last X seconds. 112 // Generate a key to decrypt payment credentials, tokens, etc. 140 * only works if the user has just authenticated via device credentials. 157 // User is not authenticated, let's authenticate with device credentials. 175 // Create the Confirm Credentials screen. You can customize the title and description. Or
|
/development/samples/browseable/ConfirmCredential/src/com.example.android.confirmcredential/ |
MainActivity.java | 96 * only works if the user has just authenticated via device credentials. 116 // User is not authenticated, let's authenticate with device credentials. 135 * authenticated with device credentials within the last X seconds. 138 // Generate a key to decrypt payment credentials, tokens, etc. 165 // Create the Confirm Credentials screen. You can customize the title and description. Or
|
/external/autotest/site_utils/ |
gmail_lib.py | 103 credentials = storage.get() 104 if not credentials or credentials.invalid: 105 raise GmailApiException('Invalid credentials for Gmail API, ' 107 http = credentials.authorize(httplib2.Http())
|
/external/ipsec-tools/src/racoon/doc/ |
README.gssapi | 9 as root, and have no Kerberos 5 credentials, so racoon explicitly 10 needs to acquire its credentials. The usual method (already used 12 a set of special credentials to be used. For example, authentication 13 by daemons concerned with login credentials, uses 'host/fqdn' as 15 is being used. These special credentials need to be extracted into
|
/external/libchrome/sandbox/linux/services/ |
namespace_sandbox.h | 23 // using Credentials::CanCreateProcessInNewUserNS. 34 // 4. B chroots using Credentials::MoveToNewUserNS() and 35 // Credentials::DropFileSystemAccess() 37 // Credentials::DropAllCapabilities(). 55 // supported (use Credentials::CanCreateProcessInNewUserNS to check this).
|
/prebuilts/tools/common/m2/repository/io/grpc/grpc-auth/1.0.1/ |
grpc-auth-1.0.1.jar | |
/prebuilts/tools/common/m2/repository/io/grpc/grpc-auth/1.0.3/ |
grpc-auth-1.0.3.jar | |
/libcore/ojluni/src/main/java/javax/security/auth/ |
Subject.java | 63 * which are referred to as credentials. 64 * Sensitive credentials that require special protection, such as 66 * {@code Set}. Credentials intended to be shared, such as 73 * all the public or private credentials belonging to a {@code Subject}, 76 * To modify the returned {@code Set} of Principals and credentials, 91 * the credentials associated with the {@code Subject} are not. 118 * Subject's Credentials 140 * Sets of public and private credentials. 166 * Principals and credentials. 168 * <p> The Principals and credentials from the specified Set [all...] |