/external/libchrome/sandbox/linux/services/ |
credentials_unittest.cc | 5 #include "sandbox/linux/services/credentials.h" 64 SANDBOX_TEST(Credentials, DropAllCaps) { 65 CHECK(Credentials::DropAllCapabilities()); 66 CHECK(!Credentials::HasAnyCapability()); 69 SANDBOX_TEST(Credentials, MoveToNewUserNS) { 70 CHECK(Credentials::DropAllCapabilities()); 71 bool moved_to_new_ns = Credentials::MoveToNewUserNS(); 82 CHECK(Credentials::HasAnyCapability()); 83 CHECK(Credentials::DropAllCapabilities()); 84 CHECK(!Credentials::HasAnyCapability()) [all...] |
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-credentials/0.3.0/ |
google-auth-library-credentials-0.3.0-sources.jar | |
google-auth-library-credentials-0.3.0.jar | |
BUILD | 6 jars = ["google-auth-library-credentials-0.3.0.jar"], 14 source = "google-auth-library-credentials-0.3.0.pom",
|
/external/libcups/cups/ |
tls.c | 53 httpCopyCredentials(http_t *http, cups_array_t **credentials) 56 if (credentials) 57 *credentials = NULL; 61 httpCredentialsAreValidForName(cups_array_t *credentials, const char *common_name) 63 (void)credentials; 68 httpCredentialsGetExpiration(cups_array_t *credentials) 70 (void)credentials; 74 httpCredentialsGetTrust(cups_array_t *credentials, const char *common_name) 76 (void)credentials; 81 httpCredentialsString(cups_array_t *credentials, char *buffer, size_t bufsize [all...] |
tls-gnutls.c | 221 DEBUG_puts("1cupsMakeServerCredentials: Successfully created credentials."); 228 * 'cupsSetServerCredentials()' - Set the default server credentials. 230 * Note: The server credentials are used by all threads in the running process. 291 * 'httpCopyCredentials()' - Copy the credentials associated with the peer in 300 cups_array_t **credentials) /* O - Array of credentials */ 306 DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials)); 308 if (credentials) 309 *credentials = NULL 1243 gnutls_certificate_credentials_t *credentials; local [all...] |
/external/autotest/client/site_tests/platform_CryptohomeTestAuth/ |
control | 7 PURPOSE = "Verify that cryptohome can verify credentials." 8 CRITERIA = "This test will fail if cryptohome fails to validate credentials." 16 This test checks that cryptohome can verify credentials.
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AccountManager.java | 8 * Returns the user credentials for a given SIP Domain. 10 * to retrieve the credentials. 15 * @return -- the user credentials associated with the domain.
|
SecureAccountManager.java | 7 * Returns the user credentials for a given SIP Domain. 9 * to retrieve the credentials. 14 * @return -- the user credentials associated with the domain.
|
UserCredentials.java | 4 * The class is used whenever user credentials for a particular realm (site 16 * Returns the name of the user that these credentials relate to. 23 * Returns a password associated with this set of credentials. 25 * @return a password associated with this set of credentials.
|
/external/apache-http/src/org/apache/http/client/ |
CredentialsProvider.java | 34 import org.apache.http.auth.Credentials; 37 * Abstract credentials provider. 51 * Sets the {@link Credentials credentials} for the given authentication 52 * scope. Any previous credentials for the given scope will be overwritten. 55 * @param credentials the authentication {@link Credentials credentials} 60 void setCredentials(AuthScope authscope, Credentials credentials); [all...] |
/external/apache-http/src/org/apache/http/impl/client/ |
BasicCredentialsProvider.java | 36 import org.apache.http.auth.Credentials; 60 private final HashMap<AuthScope, Credentials> credMap; 67 this.credMap = new HashMap<AuthScope, Credentials>(); 71 * Sets the {@link Credentials credentials} for the given authentication 72 * scope. Any previous credentials for the given scope will be overwritten. 75 * @param credentials the authentication {@link Credentials credentials} 82 final Credentials credentials) [all...] |
/external/syslinux/gpxe/src/hci/commands/ |
login_cmd.c | 13 "Prompt for login credentials\n", argv[0] ); 18 printf ( "Could not set credentials: %s\n",
|
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-credentials/0.4.0/ |
google-auth-library-credentials-0.4.0.jar | |
BUILD | 6 jars = ["google-auth-library-credentials-0.4.0.jar"], 14 source = "google-auth-library-credentials-0.4.0.pom",
|
/cts/tests/tests/net/src/android/net/cts/ |
CredentialsTest.java | 19 import android.net.Credentials; 25 // new the Credentials instance 27 Credentials cred = new Credentials(0, 0, 0); 33 cred = new Credentials(Integer.MAX_VALUE, Integer.MAX_VALUE, Integer.MAX_VALUE); 39 cred = new Credentials(Integer.MIN_VALUE, Integer.MIN_VALUE, Integer.MIN_VALUE);
|
/hardware/qcom/gps/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8084/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8909/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8960/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8994/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/hardware/qcom/gps/msm8996/core/ |
gps_extended.h | 45 char credentials[14]; member in struct:LocPosMode 53 memset(credentials, 0, sizeof(credentials)); 56 memcpy(credentials, cred, sizeof(credentials)-1); 68 memset(credentials, 0, sizeof(credentials)); 79 !strncmp(anotherMode.credentials, credentials, sizeof(credentials)-1) & [all...] |
/external/autotest/client/cros/scripts/ |
wifi | 69 def connect(ssid, security, credentials, save_credentials, timeout=15): 77 @param credentials dict of service properties that includes credentials 79 @param save_credentials bool True if credentials should be saved. 86 credentials, 125 def parse_security_from_credentials(credentials): 126 """Parses SERVICE_PROPERTY_SECURITY from credentials. 128 @param credentials dict of service properties that includes credentials 130 @return SERVICE_PROPERTY_SECURITY value from credentials, [all...] |
/external/autotest/client/site_tests/enterprise_RemoraRequisition/ |
control | 17 You need a credentials.txt file with user_id:password in this directory for 18 this test to succeed. The credentials are used to enroll the device as a Remora
|
/external/autotest/server/cros/ap_configurators/basic_auth_extension/ |
background.js | 6 // hardcoded credentials back. 17 bkg.console.log("Calling back with credentials");
|