/external/dbus/dbus/ |
H A D | dbus-credentials.c | 2 /* dbus-credentials.c Credentials provable through authentication 25 #include "dbus-credentials.h" 34 * authenticate. The main credentials right now are a unix user 43 * Private details of credentials code. 65 * Creates a new credentials object. 89 * Creates a new object with credentials (user ID and process ID) from the current process. 111 * Increment refcount on credentials. 113 * @param credentials the object 116 _dbus_credentials_ref (DBusCredentials *credentials) argument 118 _dbus_assert (credentials 128 _dbus_credentials_unref(DBusCredentials *credentials) argument 149 _dbus_credentials_add_unix_pid(DBusCredentials *credentials, dbus_pid_t pid) argument 164 _dbus_credentials_add_unix_uid(DBusCredentials *credentials, dbus_uid_t uid) argument 180 _dbus_credentials_add_windows_sid(DBusCredentials *credentials, const char *windows_sid) argument 204 _dbus_credentials_add_adt_audit_data(DBusCredentials *credentials, void *audit_data, dbus_int32_t size) argument 228 _dbus_credentials_include(DBusCredentials *credentials, DBusCredentialType type) argument 255 _dbus_credentials_get_unix_pid(DBusCredentials *credentials) argument 268 _dbus_credentials_get_unix_uid(DBusCredentials *credentials) argument 281 _dbus_credentials_get_windows_sid(DBusCredentials *credentials) argument 294 _dbus_credentials_get_adt_audit_data(DBusCredentials *credentials) argument 307 _dbus_credentials_get_adt_audit_data_size(DBusCredentials *credentials) argument 321 _dbus_credentials_are_superset(DBusCredentials *credentials, DBusCredentials *possible_subset) argument 345 _dbus_credentials_are_empty(DBusCredentials *credentials) argument 361 _dbus_credentials_are_anonymous(DBusCredentials *credentials) argument 377 _dbus_credentials_add_credentials(DBusCredentials *credentials, DBusCredentials *other_credentials) argument 408 _dbus_credentials_add_credential(DBusCredentials *credentials, DBusCredentialType which, DBusCredentials *other_credentials) argument 446 _dbus_credentials_clear(DBusCredentials *credentials) argument 464 _dbus_credentials_copy(DBusCredentials *credentials) argument 493 _dbus_credentials_same_user(DBusCredentials *credentials, DBusCredentials *other_credentials) argument 514 _dbus_credentials_to_string_append(DBusCredentials *credentials, DBusString *string) argument [all...] |
H A D | dbus-credentials.h | 2 /* dbus-credentials.h Credentials provable through authentication 42 void _dbus_credentials_ref (DBusCredentials *credentials); 43 void _dbus_credentials_unref (DBusCredentials *credentials); 44 dbus_bool_t _dbus_credentials_add_unix_pid (DBusCredentials *credentials, 46 dbus_bool_t _dbus_credentials_add_unix_uid (DBusCredentials *credentials, 48 dbus_bool_t _dbus_credentials_add_windows_sid (DBusCredentials *credentials, 50 dbus_bool_t _dbus_credentials_add_adt_audit_data (DBusCredentials *credentials, 53 dbus_bool_t _dbus_credentials_include (DBusCredentials *credentials, 55 dbus_pid_t _dbus_credentials_get_unix_pid (DBusCredentials *credentials); 56 dbus_uid_t _dbus_credentials_get_unix_uid (DBusCredentials *credentials); [all...] |
H A D | dbus-keyring.h | 29 #include <dbus/dbus-credentials.h> 35 DBusKeyring* _dbus_keyring_new_for_credentials (DBusCredentials *credentials, 44 DBusCredentials *credentials);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/samples/ |
H A D | call_compute_service.py | 13 credentials = GoogleCredentials.get_application_default() variable 14 service = build('compute', 'v1', credentials=credentials)
|
H A D | oauth2_for_devices.py | 24 # Step 2: get credentials 26 credentials = flow.step2_exchange(device_flow_info=flow_info) variable 27 print("Access token: {0}".format(credentials.access_token)) 28 print("Refresh token: {0}".format(credentials.refresh_token)) 32 youtube = build("youtube", "v3", http=credentials.authorize(httplib2.Http()))
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | AuthState.java | 56 private Credentials credentials; field in class:AuthState 72 this.credentials = null; 105 * @return user credentials if available, <code>null</code otherwise 108 return this.credentials; 115 * @param credentials User credentials 117 public void setCredentials(final Credentials credentials) { argument 118 this.credentials = credentials; 146 buffer.append("]; credentials se [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
H A D | test_file.py | 77 credentials = OAuth2Credentials( 81 return credentials 85 credentials = s.get() 86 self.assertEquals(None, credentials) 103 credentials = self.create_test_credentials() 106 pickle.dump(credentials, f) 110 # read and write credentials as pickled objects has been removed. 116 s.put(credentials) 126 credentials = self.create_test_credentials(expiration=expiration) 129 s.put(credentials) [all...] |
H A D | test_service_account.py | 20 Unit tests for service account credentials implemented using RSA. 48 self.credentials = _ServiceAccountCredentials(self.service_account_id, 55 private_key_id, signature = self.credentials.sign_blob('Google') 77 self.credentials.service_account_email) 80 self.assertTrue(self.credentials.create_scoped_required()) 83 self.credentials = _ServiceAccountCredentials(self.service_account_id, 88 self.assertFalse(self.credentials.create_scoped_required()) 91 new_credentials = self.credentials.create_scoped(self.scopes) 92 self.assertNotEqual(self.credentials, new_credentials) 105 token = self.credentials [all...] |
H A D | test_gce.py | 70 credentials = AppAssertionCredentials([]) 71 self.assertTrue(credentials.create_scoped_required()) 74 credentials = AppAssertionCredentials(['dummy_scope']) 75 self.assertFalse(credentials.create_scoped_required()) 78 credentials = AppAssertionCredentials([]) 79 new_credentials = credentials.create_scoped(['dummy_scope']) 80 self.assertNotEqual(credentials, new_credentials) 90 credentials = AppAssertionCredentials(['dummy_scope']) 91 token = credentials.get_access_token(http=http) 104 credentials [all...] |
H A D | test_keyring.py | 41 credentials = s.get() 42 self.assertEquals(None, credentials) 50 credentials = s.get() 51 self.assertEquals(None, credentials) 62 credentials = OAuth2Credentials( 79 s.put(credentials) 82 'my_unit_test', 'me', credentials.to_json()) 86 return_value=credentials.to_json(),
|
H A D | test_oauth2client.py | 127 credentials = Credentials() 128 json = credentials.to_json() 190 def validate_service_account_credentials(self, credentials): 191 self.assertTrue(isinstance(credentials, _ServiceAccountCredentials)) 192 self.assertEqual('123', credentials._service_account_id) 193 self.assertEqual('dummy@google.com', credentials._service_account_email) 194 self.assertEqual('ABCDEF', credentials._private_key_id) 195 self.assertEqual('', credentials._scopes) 197 def validate_google_credentials(self, credentials): 198 self.assertTrue(isinstance(credentials, GoogleCredential [all...] |
H A D | test_appengine.py | 162 credentials = AppAssertionCredentials(scope) 164 self.assertRaises(AccessTokenRefreshError, credentials.refresh, http) 177 credentials = AppAssertionCredentials(scope) 179 credentials.refresh(http) 180 self.assertEqual('a_token_123', credentials.access_token) 182 json = credentials.to_json() 183 credentials = Credentials.new_from_json(json) 186 credentials.scope) 189 credentials = AppAssertionCredentials(scope) 191 credentials [all...] |
H A D | test_crypt.py | 52 credentials = self._make_signed_jwt_creds() 53 pem_contents = crypt.pkcs12_key_as_pem(credentials.private_key, 54 credentials.private_key_password) 83 credentials = self._make_signed_jwt_creds(private_key=b'NOT_A_KEY') 85 credentials.private_key, credentials.private_key_password)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
H A D | keyring_storage.py | 47 credentials = s.get() 55 service_name: string, The name of the service under which the credentials 57 user_name: string, The name of the user to store credentials for. 83 credentials = None 88 credentials = Credentials.new_from_json(content) 89 credentials.set_store(self) 93 return credentials 95 def locked_put(self, credentials): 99 credentials: Credentials, the credentials t [all...] |
H A D | file.py | 18 credentials. 69 credentials = None 76 return credentials 79 credentials = Credentials.new_from_json(content) 80 credentials.set_store(self) 84 return credentials 99 def locked_put(self, credentials): 103 credentials: Credentials, the credentials to store. 112 f.write(credentials [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
H A D | Credential.java | 32 * checking authentication credentials. A credential instance either represents 54 * @param credentials The credential to check against. This may either be 57 * @return True if the credentials indicated that the shared secret is known 60 public abstract boolean check(Object credentials); argument 97 public boolean check(Object credentials) argument 99 if (credentials instanceof char[]) 100 credentials=new String((char[])credentials); 101 if (!(credentials instanceof String) && !(credentials instanceo 145 check(Object credentials) argument [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/samples/googleappengine/ |
H A D | call_compute_service_from_gae.py | 12 credentials = GoogleCredentials.get_application_default() 13 service = build('compute', 'v1', credentials=credentials)
|
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
H A D | BasicAuthenticator.java | 67 String credentials = request.getHeader(HttpHeaders.AUTHORIZATION); 74 if (credentials != null) 76 int space=credentials.indexOf(' '); 79 String method=credentials.substring(0,space); 82 credentials = credentials.substring(space+1); 83 credentials = B64Code.decode(credentials,StringUtil.__ISO_8859_1); 84 int i = credentials.indexOf(':'); 87 String username = credentials [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | BasicScheme.java | 126 * @param credentials The set of credentials to be used for athentication 128 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 136 final Credentials credentials, 139 if (credentials == null) { 147 return authenticate(credentials, charset, isProxy()); 154 * @param credentials The credentials to encode. 155 * @param charset The charset to use for encoding the credentials 160 final Credentials credentials, 135 authenticate( final Credentials credentials, final HttpRequest request) argument 159 authenticate( final Credentials credentials, final String charset, boolean proxy) argument [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/scripts/ |
H A D | run_system_tests.py | 41 def _check_user_info(credentials, expected_email): 42 http = credentials.authorize(httplib2.Http()) 50 raise ValueError('User info email does not match credentials.') 57 credentials = service_account._ServiceAccountCredentials( 65 _check_user_info(credentials, client_credentials['client_email']) 72 credentials = client.SignedJwtAssertionCredentials( 78 _check_user_info(credentials, P12_KEY_EMAIL) 85 credentials = client.GoogleCredentials( 95 _check_user_info(credentials, USER_KEY_EMAIL)
|
/external/chromium-trace/catapult/third_party/apiclient/googleapiclient/ |
H A D | sample_tools.py | 41 credentials are stored in a file named apiname.dat, and the 83 # Prepare credentials, and authorize HTTP object with them. 84 # If the credentials don't exist or are invalid run through the native client 86 # credentials will get written back to a file. 88 credentials = storage.get() 89 if credentials is None or credentials.invalid: 90 credentials = tools.run_flow(flow, storage, flags) 91 http = credentials.authorize(http = httplib2.Http())
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/sts/ |
H A D | test_connection.py | 76 self.assertEqual(response.credentials.access_key, 'accesskey') 77 self.assertEqual(response.credentials.secret_key, 'secretkey') 78 self.assertEqual(response.credentials.session_token, 'session_token') 97 self.assertEqual(response.credentials.access_key, 'accesskey') 98 self.assertEqual(response.credentials.secret_key, 'secretkey') 99 self.assertEqual(response.credentials.session_token, 'session_token') 167 response.credentials.access_key.strip(), 171 response.credentials.secret_key.strip(), 175 response.credentials.session_token.strip(), 236 self.assertEqual(response.credentials [all...] |
/external/autotest/client/cros/scripts/ |
H A D | wifi | 69 def connect(ssid, security, credentials, save_credentials, timeout=15): 77 @param credentials dict of service properties that includes credentials 79 @param save_credentials bool True if credentials should be saved. 86 credentials, 125 def parse_security_from_credentials(credentials): 126 """Parses SERVICE_PROPERTY_SECURITY from credentials. 128 @param credentials dict of service properties that includes credentials 130 @return SERVICE_PROPERTY_SECURITY value from credentials, [all...] |
/external/apache-http/src/org/apache/http/client/ |
H A D | CredentialsProvider.java | 37 * Abstract credentials provider. 51 * Sets the {@link Credentials credentials} for the given authentication 52 * scope. Any previous credentials for the given scope will be overwritten. 55 * @param credentials the authentication {@link Credentials credentials} 60 void setCredentials(AuthScope authscope, Credentials credentials); argument 63 * Get the {@link Credentials credentials} for the given authentication scope. 66 * @return the credentials 73 * Clears all credentials.
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | LoginService.java | 29 * to check credentials and to create a {@link UserIdentity} using the 44 * @param credentials The users credentials 45 * @return A UserIdentity if the credentials matched, otherwise null 47 UserIdentity login(String username,Object credentials); argument
|