/third_party/node/deps/npm/node_modules/request/lib/ |
D | hawk.js | 21 exports.calculateMac = function (credentials, opts) { argument 41 var hmac = crypto.createHmac(credentials.algorithm, credentials.key).update(normalized) 48 var credentials = opts.credentials 49 if (!credentials || !credentials.id || !credentials.key || !credentials.algorithm) { 53 if (['sha1', 'sha256'].indexOf(credentials.algorithm) === -1) { 71 artifacts.hash = calculatePayloadHash(opts.payload, credentials.algorithm, opts.contentType) 74 var mac = exports.calculateMac(credentials, artifacts) 77 var header = 'Hawk id="' + credentials.id +
|
/third_party/node/deps/npm/test/tap/ |
D | config-credentials.js | 113 var credentials = { 119 conf.setCredentialsByURI(URI, credentials) 130 var credentials = { 136 conf.setCredentialsByURI(URI, credentials) 147 var credentials = { 153 conf.setCredentialsByURI(URI, credentials) 164 var credentials = { 171 conf.setCredentialsByURI(URI, credentials) 194 var credentials = { 201 conf.setCredentialsByURI(URI, credentials) [all …]
|
/third_party/cups/ |
D | ohos-add-openssl.patch | 253 + DEBUG_puts("1cupsMakeServerCredentials: Successfully created credentials."); 266 + * 'cupsSetServerCredentials()' - Set the default server credentials. 268 + * Note: The server credentials are used by all threads in the running process. 329 + * 'httpCopyCredentials()' - Copy the credentials associated with the peer in 338 + cups_array_t **credentials) // O - Array of credentials 343 + DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials)); 345 + if (credentials) 346 + *credentials = NULL; 348 + if (!http || !http->tls || !credentials) 351 + *credentials = cupsArrayNew(NULL, NULL); [all …]
|
/third_party/gstreamer/gstplugins_base/tests/check/libs/ |
D | rtsp.c | 692 GstRTSPAuthCredential **credentials; in GST_START_TEST() local 702 credentials = in GST_START_TEST() 705 fail_unless (credentials != NULL); in GST_START_TEST() 707 credential = credentials; in GST_START_TEST() 714 gst_rtsp_auth_credentials_free (credentials); in GST_START_TEST() 725 credentials = in GST_START_TEST() 728 fail_unless (credentials != NULL); in GST_START_TEST() 730 credential = credentials; in GST_START_TEST() 741 gst_rtsp_auth_credentials_free (credentials); in GST_START_TEST() 752 credentials = in GST_START_TEST() [all …]
|
/third_party/node/deps/npm/node_modules/aws4/ |
D | aws4.js | 27 function RequestSigner(request, credentials) { argument 35 this.credentials = credentials || this.defaultCredentials() 97 if (this.credentials.sessionToken) 98 query['X-Amz-Security-Token'] = this.credentials.sessionToken 109 query['X-Amz-Credential'] = this.credentials.accessKeyId + '/' + this.credentialString() 121 …if (this.credentials.sessionToken && !headers['X-Amz-Security-Token'] && !headers['x-amz-security-… 122 headers['X-Amz-Security-Token'] = this.credentials.sessionToken 171 'AWS4-HMAC-SHA256 Credential=' + this.credentials.accessKeyId + '/' + this.credentialString(), 179 cacheKey = [this.credentials.secretAccessKey, date, this.region, this.service].join(), 182 kDate = hmac('AWS4' + this.credentials.secretAccessKey, date) [all …]
|
D | README.md | 80 aws4.sign(opts) // assumes AWS credentials are available in process.env 108 // you can also pass AWS credentials in explicitly (otherwise taken from process.env) 451 ### aws4.sign(requestOptions, [credentials]) 475 Your AWS credentials (which can be found in your 500 with [IAM STS temporary credentials](http://docs.aws.amazon.com/STS/latest/UsingSTS/using-temp-cred…
|
/third_party/node/lib/internal/bootstrap/switches/ |
D | does_own_process_state.js | 3 const credentials = internalBinding('credentials'); constant 11 if (credentials.implementsPosixCredentials) { 12 const wrapped = wrapPosixCredentialSetters(credentials); 30 function wrapPosixCredentialSetters(credentials) { argument 51 } = credentials;
|
D | does_not_own_process_state.js | 3 const credentials = internalBinding('credentials'); constant 13 if (credentials.implementsPosixCredentials) {
|
/third_party/node/lib/internal/bootstrap/ |
D | node.js | 98 const credentials = internalBinding('credentials'); constant 99 if (credentials.implementsPosixCredentials) { 100 process.getuid = credentials.getuid; 101 process.geteuid = credentials.geteuid; 102 process.getgid = credentials.getgid; 103 process.getegid = credentials.getegid; 104 process.getgroups = credentials.getgroups;
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-sigv4/ |
D | README.md | 16 ## credentials section in lws minimal secure streams sigv4 17 credentials are read from ~/.aws/credentials, make sure you have valid keyid and 18 key. One need to call lws_ss_sigv4_set_aws_key() to plug in aws credentials into
|
/third_party/ffmpeg/libavformat/ |
D | libamqp.c | 65 char hostname[STR_LEN], credentials[STR_LEN], path[STR_LEN]; in amqp_proto_open() local 78 av_url_split(NULL, 0, credentials, sizeof(credentials), in amqp_proto_open() 89 p = strchr(credentials, ':'); in amqp_proto_open() 102 user = credentials; in amqp_proto_open()
|
D | ftp.c | 666 char proto[10], path[MAX_URL_SIZE], credentials[MAX_URL_SIZE], hostname[MAX_URL_SIZE]; in ftp_connect() local 679 credentials, sizeof(credentials), in ftp_connect() 685 if (!*credentials) { in ftp_connect() 696 char *pass = strchr(credentials, ':'); in ftp_connect() 705 s->user = ff_urldecode(credentials, 0); in ftp_connect()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | README-MULTI-AP | 115 BSS credentials; instead, it should respond with the (potentially different) 116 backhaul BSS credentials. 121 credentials when hostapd receives a WPS M1 message with the Multi-AP IE. Only 123 to specify authentication or encryption options. For the backhaul credentials, 127 specify the backhaul credentials, since the backhaul and fronthaul credentials 140 multi_ap_backhaul_wpa_passphrase are set to the credentials of a backhaul BSS 150 7. AP sends M8 with backhaul instead of fronthaul credentials.
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | README-MULTI-AP | 115 BSS credentials; instead, it should respond with the (potentially different) 116 backhaul BSS credentials. 121 credentials when hostapd receives a WPS M1 message with the Multi-AP IE. Only 123 to specify authentication or encryption options. For the backhaul credentials, 127 specify the backhaul credentials, since the backhaul and fronthaul credentials 140 multi_ap_backhaul_wpa_passphrase are set to the credentials of a backhaul BSS 150 7. AP sends M8 with backhaul instead of fronthaul credentials.
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-deaddrop/ |
D | README.md | 6 The demo is protected by basic auth credentials defined in the file at 7 ./ba-passwords - by default the credentials are user: user1, password: password; 46 Give your browser "user1" and "password" as the credentials. For testing to
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/examples/ |
D | wpas-dbus-new-wps.py | 33 def credentials(cred): function 62 bus.add_signal_receiver(credentials,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/examples/ |
D | wpas-dbus-new-wps.py | 33 def credentials(cred): function 62 bus.add_signal_receiver(credentials,
|
/third_party/grpc/ |
D | BUILD.gn | 1214 "${GRPC_DIR}/src/core/lib/security/credentials/alts/alts_credentials.cc", 1215 "${GRPC_DIR}/src/core/lib/security/credentials/alts/alts_credentials.h", 1216 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment.cc", 1217 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment.h", 1218 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment_linux.cc", 1219 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment_no_op.cc", 1220 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment_windows.cc", 1221 "${GRPC_DIR}/src/core/lib/security/credentials/alts/grpc_alts_credentials_client_options.cc", 1222 "${GRPC_DIR}/src/core/lib/security/credentials/alts/grpc_alts_credentials_options.cc", 1223 "${GRPC_DIR}/src/core/lib/security/credentials/alts/grpc_alts_credentials_options.h", [all …]
|
/third_party/node/deps/npm/docs/content/cli-commands/ |
D | npm-logout.md | 24 clear the credentials in your user configuration. In this case, it will _only_ affect 27 If `--scope` is provided, this will find the credentials for the registry
|
D | npm-adduser.md | 22 save the credentials to the `.npmrc` file. If no registry is specified, 52 If specified, the user and login credentials given will be associated
|
/third_party/python/Lib/logging/ |
D | handlers.py | 1000 credentials=None, secure=None, timeout=5.0): argument 1022 if isinstance(credentials, (list, tuple)): 1023 self.username, self.password = credentials 1178 def __init__(self, host, url, method="GET", secure=False, credentials=None, argument 1195 self.credentials = credentials 1251 if self.credentials: 1253 s = ('%s:%s' % self.credentials).encode('utf-8')
|
/third_party/node/test/parallel/ |
D | test-crypto.js | 45 const credentials = tls.createSecureContext(); constant 46 const context = credentials.context;
|
D | test-tls-external-accessor.js | 18 const pctx = tls.createSecurePair().credentials.context;
|
/third_party/node/src/ |
D | node_credentials.cc | 33 namespace credentials { namespace 417 NODE_MODULE_CONTEXT_AWARE_INTERNAL(credentials, node::credentials::Initialize)
|
/third_party/skia/tools/skp/page_sets/other/ |
D | POPUP-skia_mercurynews_nexus10.json | 17 credentials_path='data/credentials.json')
|