Home
last modified time | relevance | path

Searched refs:authorization (Results 1 – 25 of 148) sorted by relevance

123456

/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
DAuthenticationHelperImpl.java229 AuthorizationHeader authorization = null; in handleChallenge() local
236 authorization = this.getAuthorization(reoriginatedRequest in handleChallenge()
250 authorization = this.getAuthorization(reoriginatedRequest in handleChallenge()
257 "Created authorization header: " + authorization.toString()); in handleChallenge()
261 authorization, cacheTime); in handleChallenge()
263 reoriginatedRequest.addHeader(authorization); in handleChallenge()
312 AuthorizationHeader authorization = null; in getAuthorization() local
315 authorization = headerFactory.createProxyAuthorizationHeader(authHeader in getAuthorization()
318 authorization = headerFactory.createAuthorizationHeader(authHeader.getScheme()); in getAuthorization()
321 authorization.setUsername(userCredentials.getUserName()); in getAuthorization()
[all …]
DCredentialsCache.java62 AuthorizationHeader authorization, int cacheTime) { in cacheAuthorizationHeader() argument
63 String user = authorization.getUsername(); in cacheAuthorizationHeader()
65 if ( authorization == null) throw new NullPointerException("Null authorization domain"); in cacheAuthorizationHeader()
72 String realm = authorization.getRealm(); in cacheAuthorizationHeader()
81 authHeaders.add(authorization); in cacheAuthorizationHeader()
/external/libchrome/base/mac/
Dscoped_authorizationref.h21 explicit ScopedAuthorizationRef(AuthorizationRef authorization = NULL)
22 : authorization_(authorization) { in authorization_() argument
31 void reset(AuthorizationRef authorization = NULL) {
32 if (authorization_ != authorization) {
36 authorization_ = authorization;
/external/autotest/client/site_tests/platform_Pkcs11ChangeAuthData/
Dcontrol7 PURPOSE = "Tests changing authorization data for a PKCS #11 token."
8 CRITERIA = "Fails if token does not correctly change authorization data."
17 This tests changing authorization data for a PKCS #11 token.
/external/chromium-trace/catapult/third_party/Paste/paste/auth/
Dbasic.py41 authorization = AUTHORIZATION(environ)
42 if not authorization:
44 (authmeth, auth) = authorization.split(' ', 1)
Ddigest.py138 authorization = AUTHORIZATION(environ)
139 if not authorization:
141 (authmeth, auth) = authorization.split(" ", 1)
/external/chromium-trace/catapult/third_party/webapp2/docs/tutorials/
Dauth.rst61 """Creates a new authorization token for a given user ID.
66 A string with the authorization token.
71 """Deletes a given authorization token.
76 A string with the authorization token.
/external/nist-sip/java/gov/nist/javax/sip/parser/
DAuthorizationParser.java47 public AuthorizationParser(String authorization) { in AuthorizationParser() argument
48 super(authorization); in AuthorizationParser()
/external/curl/tests/data/
Dtest204041 HTTP Basic authorization, then without authorization
Dtest10714 # authorization header, but using HTTP 1.0, not 1.1.
73 Downgraded HTTP PUT to HTTP 1.0 with authorization
Dtest6328 HTTP with proxy authorization set in environment
Dtest1631 HTTP with proxy authorization
/external/libweave/examples/daemon/
DREADME.md36 - "Step 2": Click "Exchange authorization code for tokens"
97 - "Step 2": Click "Exchange authorization code for tokens"
118 - "Step 2": Click "Exchange authorization code for tokens"
/external/tpm2/generator/
Dcommands.txt400 _COMMENT new authorization value
411 _COMMENT private area containing the new authorization value
840 _COMMENT authorization value for subsequent use of the sequence
865 _COMMENT authorization value for subsequent use of the sequence
912 _COMMENT authorization for the sequence Auth Index: 1 Auth Role: USER
946 _COMMENT authorization for the sequence Auth Index: 2 Auth Role: USER
1475 _COMMENT handle for a PCR that may have an authorization value set Auth Index: 1 Auth Role: USER
1478 _COMMENT the desired authorization value
1522 _COMMENT the policy nonce for the session If the nonce is not included in the authorization qualifi…
1525 _COMMENT digest of the command parameters to which this authorization is limited This is not the cp…
[all …]
Draw_commands_fixed.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization
1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization
1035 session. The authorization sessions associated with handles will occur in the session area in the
1037 audit will follow the handles used for authorization.
1060 USER and the handle is an Object, the type of authorization is determined by the setting of
1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization
[all …]
Draw_commands.txt975 indicates that an authorization session is required for use of the entity associated with the handl…
976 If a handle does not have this symbol, then an authorization session is not allowed.
996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization
1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization
1035 session. The authorization sessions associated with handles will occur in the session area in the
1037 audit will follow the handles used for authorization.
1060 USER and the handle is an Object, the type of authorization is determined by the setting of
1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If
1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to
1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization
[all …]
/external/chromium-trace/catapult/third_party/WebOb/docs/pycon2011/
Drequest_table.rst54 authorization authorization cached_property
/external/chromium-trace/catapult/third_party/gsutil/gslib/
Dgcs_json_media.py295 for authorization in self._auth_from_challenge(
297 authorization.request(method, request_uri, headers, body)
301 self.authorizations.append(authorization)
302 authorization.response(response, body)
/external/chromium-trace/catapult/third_party/webapp2/docs/api/webapp2_extras/
Dauth.rst7 Utilities for authentication and authorization.
/external/tpm2/
DFieldUpgradeStart_fp.h13 TPMI_RH_PLATFORM authorization; member
Dpart3.txt601 …indicates that an authorization session is required for use of the entity associated with the hand…
602 If a handle does not have this symbol, then an authorization session is not allowed.
613 …NOTE Any command that uses authorization may cause a write to NV if there is an authorizati…
634 …contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization
635 … session. The authorization sessions associated with handles will occur in the session area in the
637 audit will follow the handles used for authorization.
651 … If the handle has the Auth Role of USER and the handle is an Object, the type of authorization is
657 … If the Auth Role is ADMIN and the handle is an Object, the type of authorization is determined by
661 …If the DUP role is selected, authorization may only be with a policy session (DUP role only applies
665 … TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization
[all …]
DMarshal_FieldUpgradeStart.c16 target->authorization = request_handles[0]; in FieldUpgradeStart_In_Unmarshal()
/external/oauth/core/src/main/java/net/oauth/
DOAuthMessage.java360 public static List<OAuth.Parameter> decodeAuthorization(String authorization) { in decodeAuthorization() argument
362 if (authorization != null) { in decodeAuthorization()
363 Matcher m = AUTHORIZATION.matcher(authorization); in decodeAuthorization()
/external/selinux/policycoreutils/sepolicy/
Dorg.selinux.conf14 authorization is performed by PolicyKit -->
/external/curl/
DNOTICE21 in this Software without prior written authorization of the copyright holder.

123456