Home
last modified time | relevance | path

Searched refs:credentials (Results 1 – 25 of 149) sorted by relevance

123456

/third_party/node/deps/npm/node_modules/request/lib/
Dhawk.js21 exports.calculateMac = function (credentials, opts) { argument
41 var hmac = crypto.createHmac(credentials.algorithm, credentials.key).update(normalized)
48 var credentials = opts.credentials
49 if (!credentials || !credentials.id || !credentials.key || !credentials.algorithm) {
53 if (['sha1', 'sha256'].indexOf(credentials.algorithm) === -1) {
71 artifacts.hash = calculatePayloadHash(opts.payload, credentials.algorithm, opts.contentType)
74 var mac = exports.calculateMac(credentials, artifacts)
77 var header = 'Hawk id="' + credentials.id +
/third_party/node/deps/npm/test/tap/
Dconfig-credentials.js113 var credentials = {
119 conf.setCredentialsByURI(URI, credentials)
130 var credentials = {
136 conf.setCredentialsByURI(URI, credentials)
147 var credentials = {
153 conf.setCredentialsByURI(URI, credentials)
164 var credentials = {
171 conf.setCredentialsByURI(URI, credentials)
194 var credentials = {
201 conf.setCredentialsByURI(URI, credentials)
[all …]
/third_party/cups/
Dohos-add-openssl.patch253 + DEBUG_puts("1cupsMakeServerCredentials: Successfully created credentials.");
266 + * 'cupsSetServerCredentials()' - Set the default server credentials.
268 + * Note: The server credentials are used by all threads in the running process.
329 + * 'httpCopyCredentials()' - Copy the credentials associated with the peer in
338 + cups_array_t **credentials) // O - Array of credentials
343 + DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials));
345 + if (credentials)
346 + *credentials = NULL;
348 + if (!http || !http->tls || !credentials)
351 + *credentials = cupsArrayNew(NULL, NULL);
[all …]
/third_party/gstreamer/gstplugins_base/tests/check/libs/
Drtsp.c692 GstRTSPAuthCredential **credentials; in GST_START_TEST() local
702 credentials = in GST_START_TEST()
705 fail_unless (credentials != NULL); in GST_START_TEST()
707 credential = credentials; in GST_START_TEST()
714 gst_rtsp_auth_credentials_free (credentials); in GST_START_TEST()
725 credentials = in GST_START_TEST()
728 fail_unless (credentials != NULL); in GST_START_TEST()
730 credential = credentials; in GST_START_TEST()
741 gst_rtsp_auth_credentials_free (credentials); in GST_START_TEST()
752 credentials = in GST_START_TEST()
[all …]
/third_party/node/deps/npm/node_modules/aws4/
Daws4.js27 function RequestSigner(request, credentials) { argument
35 this.credentials = credentials || this.defaultCredentials()
97 if (this.credentials.sessionToken)
98 query['X-Amz-Security-Token'] = this.credentials.sessionToken
109 query['X-Amz-Credential'] = this.credentials.accessKeyId + '/' + this.credentialString()
121 …if (this.credentials.sessionToken && !headers['X-Amz-Security-Token'] && !headers['x-amz-security-…
122 headers['X-Amz-Security-Token'] = this.credentials.sessionToken
171 'AWS4-HMAC-SHA256 Credential=' + this.credentials.accessKeyId + '/' + this.credentialString(),
179 cacheKey = [this.credentials.secretAccessKey, date, this.region, this.service].join(),
182 kDate = hmac('AWS4' + this.credentials.secretAccessKey, date)
[all …]
DREADME.md80 aws4.sign(opts) // assumes AWS credentials are available in process.env
108 // you can also pass AWS credentials in explicitly (otherwise taken from process.env)
451 ### aws4.sign(requestOptions, [credentials])
475 Your AWS credentials (which can be found in your
500 with [IAM STS temporary credentials](http://docs.aws.amazon.com/STS/latest/UsingSTS/using-temp-cred…
/third_party/node/lib/internal/bootstrap/switches/
Ddoes_own_process_state.js3 const credentials = internalBinding('credentials'); constant
11 if (credentials.implementsPosixCredentials) {
12 const wrapped = wrapPosixCredentialSetters(credentials);
30 function wrapPosixCredentialSetters(credentials) { argument
51 } = credentials;
Ddoes_not_own_process_state.js3 const credentials = internalBinding('credentials'); constant
13 if (credentials.implementsPosixCredentials) {
/third_party/node/lib/internal/bootstrap/
Dnode.js98 const credentials = internalBinding('credentials'); constant
99 if (credentials.implementsPosixCredentials) {
100 process.getuid = credentials.getuid;
101 process.geteuid = credentials.geteuid;
102 process.getgid = credentials.getgid;
103 process.getegid = credentials.getegid;
104 process.getgroups = credentials.getgroups;
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-sigv4/
DREADME.md16 ## credentials section in lws minimal secure streams sigv4
17 credentials are read from ~/.aws/credentials, make sure you have valid keyid and
18 key. One need to call lws_ss_sigv4_set_aws_key() to plug in aws credentials into
/third_party/ffmpeg/libavformat/
Dlibamqp.c65 char hostname[STR_LEN], credentials[STR_LEN], path[STR_LEN]; in amqp_proto_open() local
78 av_url_split(NULL, 0, credentials, sizeof(credentials), in amqp_proto_open()
89 p = strchr(credentials, ':'); in amqp_proto_open()
102 user = credentials; in amqp_proto_open()
Dftp.c666 char proto[10], path[MAX_URL_SIZE], credentials[MAX_URL_SIZE], hostname[MAX_URL_SIZE]; in ftp_connect() local
679 credentials, sizeof(credentials), in ftp_connect()
685 if (!*credentials) { in ftp_connect()
696 char *pass = strchr(credentials, ':'); in ftp_connect()
705 s->user = ff_urldecode(credentials, 0); in ftp_connect()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
DREADME-MULTI-AP115 BSS credentials; instead, it should respond with the (potentially different)
116 backhaul BSS credentials.
121 credentials when hostapd receives a WPS M1 message with the Multi-AP IE. Only
123 to specify authentication or encryption options. For the backhaul credentials,
127 specify the backhaul credentials, since the backhaul and fronthaul credentials
140 multi_ap_backhaul_wpa_passphrase are set to the credentials of a backhaul BSS
150 7. AP sends M8 with backhaul instead of fronthaul credentials.
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
DREADME-MULTI-AP115 BSS credentials; instead, it should respond with the (potentially different)
116 backhaul BSS credentials.
121 credentials when hostapd receives a WPS M1 message with the Multi-AP IE. Only
123 to specify authentication or encryption options. For the backhaul credentials,
127 specify the backhaul credentials, since the backhaul and fronthaul credentials
140 multi_ap_backhaul_wpa_passphrase are set to the credentials of a backhaul BSS
150 7. AP sends M8 with backhaul instead of fronthaul credentials.
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-deaddrop/
DREADME.md6 The demo is protected by basic auth credentials defined in the file at
7 ./ba-passwords - by default the credentials are user: user1, password: password;
46 Give your browser "user1" and "password" as the credentials. For testing to
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/examples/
Dwpas-dbus-new-wps.py33 def credentials(cred): function
62 bus.add_signal_receiver(credentials,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/examples/
Dwpas-dbus-new-wps.py33 def credentials(cred): function
62 bus.add_signal_receiver(credentials,
/third_party/grpc/
DBUILD.gn1214 "${GRPC_DIR}/src/core/lib/security/credentials/alts/alts_credentials.cc",
1215 "${GRPC_DIR}/src/core/lib/security/credentials/alts/alts_credentials.h",
1216 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment.cc",
1217 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment.h",
1218 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment_linux.cc",
1219 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment_no_op.cc",
1220 "${GRPC_DIR}/src/core/lib/security/credentials/alts/check_gcp_environment_windows.cc",
1221 "${GRPC_DIR}/src/core/lib/security/credentials/alts/grpc_alts_credentials_client_options.cc",
1222 "${GRPC_DIR}/src/core/lib/security/credentials/alts/grpc_alts_credentials_options.cc",
1223 "${GRPC_DIR}/src/core/lib/security/credentials/alts/grpc_alts_credentials_options.h",
[all …]
/third_party/node/deps/npm/docs/content/cli-commands/
Dnpm-logout.md24 clear the credentials in your user configuration. In this case, it will _only_ affect
27 If `--scope` is provided, this will find the credentials for the registry
Dnpm-adduser.md22 save the credentials to the `.npmrc` file. If no registry is specified,
52 If specified, the user and login credentials given will be associated
/third_party/python/Lib/logging/
Dhandlers.py1000 credentials=None, secure=None, timeout=5.0): argument
1022 if isinstance(credentials, (list, tuple)):
1023 self.username, self.password = credentials
1178 def __init__(self, host, url, method="GET", secure=False, credentials=None, argument
1195 self.credentials = credentials
1251 if self.credentials:
1253 s = ('%s:%s' % self.credentials).encode('utf-8')
/third_party/node/test/parallel/
Dtest-crypto.js45 const credentials = tls.createSecureContext(); constant
46 const context = credentials.context;
Dtest-tls-external-accessor.js18 const pctx = tls.createSecurePair().credentials.context;
/third_party/node/src/
Dnode_credentials.cc33 namespace credentials { namespace
417 NODE_MODULE_CONTEXT_AWARE_INTERNAL(credentials, node::credentials::Initialize)
/third_party/skia/tools/skp/page_sets/other/
DPOPUP-skia_mercurynews_nexus10.json17 credentials_path='data/credentials.json')

123456