/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
D | AuthenticationHelperImpl.java | 229 AuthorizationHeader authorization = null; in handleChallenge() local 236 authorization = this.getAuthorization(reoriginatedRequest in handleChallenge() 250 authorization = this.getAuthorization(reoriginatedRequest in handleChallenge() 257 "Created authorization header: " + authorization.toString()); in handleChallenge() 261 authorization, cacheTime); in handleChallenge() 263 reoriginatedRequest.addHeader(authorization); in handleChallenge() 312 AuthorizationHeader authorization = null; in getAuthorization() local 315 authorization = headerFactory.createProxyAuthorizationHeader(authHeader in getAuthorization() 318 authorization = headerFactory.createAuthorizationHeader(authHeader.getScheme()); in getAuthorization() 321 authorization.setUsername(userCredentials.getUserName()); in getAuthorization() [all …]
|
D | CredentialsCache.java | 62 AuthorizationHeader authorization, int cacheTime) { in cacheAuthorizationHeader() argument 63 String user = authorization.getUsername(); in cacheAuthorizationHeader() 65 if ( authorization == null) throw new NullPointerException("Null authorization domain"); in cacheAuthorizationHeader() 72 String realm = authorization.getRealm(); in cacheAuthorizationHeader() 81 authHeaders.add(authorization); in cacheAuthorizationHeader()
|
/external/libchrome/base/mac/ |
D | scoped_authorizationref.h | 21 explicit ScopedAuthorizationRef(AuthorizationRef authorization = NULL) 22 : authorization_(authorization) { in authorization_() argument 31 void reset(AuthorizationRef authorization = NULL) { 32 if (authorization_ != authorization) { 36 authorization_ = authorization;
|
/external/autotest/client/site_tests/platform_Pkcs11ChangeAuthData/ |
D | control | 7 PURPOSE = "Tests changing authorization data for a PKCS #11 token." 8 CRITERIA = "Fails if token does not correctly change authorization data." 17 This tests changing authorization data for a PKCS #11 token.
|
/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
D | basic.py | 41 authorization = AUTHORIZATION(environ) 42 if not authorization: 44 (authmeth, auth) = authorization.split(' ', 1)
|
D | digest.py | 138 authorization = AUTHORIZATION(environ) 139 if not authorization: 141 (authmeth, auth) = authorization.split(" ", 1)
|
/external/chromium-trace/catapult/third_party/webapp2/docs/tutorials/ |
D | auth.rst | 61 """Creates a new authorization token for a given user ID. 66 A string with the authorization token. 71 """Deletes a given authorization token. 76 A string with the authorization token.
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AuthorizationParser.java | 47 public AuthorizationParser(String authorization) { in AuthorizationParser() argument 48 super(authorization); in AuthorizationParser()
|
/external/curl/tests/data/ |
D | test2040 | 41 HTTP Basic authorization, then without authorization
|
D | test1071 | 4 # authorization header, but using HTTP 1.0, not 1.1. 73 Downgraded HTTP PUT to HTTP 1.0 with authorization
|
D | test63 | 28 HTTP with proxy authorization set in environment
|
D | test16 | 31 HTTP with proxy authorization
|
/external/libweave/examples/daemon/ |
D | README.md | 36 - "Step 2": Click "Exchange authorization code for tokens" 97 - "Step 2": Click "Exchange authorization code for tokens" 118 - "Step 2": Click "Exchange authorization code for tokens"
|
/external/tpm2/generator/ |
D | commands.txt | 400 _COMMENT new authorization value 411 _COMMENT private area containing the new authorization value 840 _COMMENT authorization value for subsequent use of the sequence 865 _COMMENT authorization value for subsequent use of the sequence 912 _COMMENT authorization for the sequence Auth Index: 1 Auth Role: USER 946 _COMMENT authorization for the sequence Auth Index: 2 Auth Role: USER 1475 _COMMENT handle for a PCR that may have an authorization value set Auth Index: 1 Auth Role: USER 1478 _COMMENT the desired authorization value 1522 _COMMENT the policy nonce for the session If the nonce is not included in the authorization qualifi… 1525 _COMMENT digest of the command parameters to which this authorization is limited This is not the cp… [all …]
|
D | raw_commands_fixed.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization 1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization 1035 session. The authorization sessions associated with handles will occur in the session area in the 1037 audit will follow the handles used for authorization. 1060 USER and the handle is an Object, the type of authorization is determined by the setting of 1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization [all …]
|
D | raw_commands.txt | 975 indicates that an authorization session is required for use of the entity associated with the handl… 976 If a handle does not have this symbol, then an authorization session is not allowed. 996 NOTE Any command that uses authorization may cause a write to NV if there is an authorization 1034 contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization 1035 session. The authorization sessions associated with handles will occur in the session area in the 1037 audit will follow the handles used for authorization. 1060 USER and the handle is an Object, the type of authorization is determined by the setting of 1062 type of authorization is determined by the setting of adminWithPolicy in the Object's attributes. If 1063 the DUP role is selected, authorization may only be with a policy session (DUP role only applies to 1068 TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization [all …]
|
/external/chromium-trace/catapult/third_party/WebOb/docs/pycon2011/ |
D | request_table.rst | 54 authorization authorization cached_property
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
D | gcs_json_media.py | 295 for authorization in self._auth_from_challenge( 297 authorization.request(method, request_uri, headers, body) 301 self.authorizations.append(authorization) 302 authorization.response(response, body)
|
/external/chromium-trace/catapult/third_party/webapp2/docs/api/webapp2_extras/ |
D | auth.rst | 7 Utilities for authentication and authorization.
|
/external/tpm2/ |
D | FieldUpgradeStart_fp.h | 13 TPMI_RH_PLATFORM authorization; member
|
D | part3.txt | 601 …indicates that an authorization session is required for use of the entity associated with the hand… 602 If a handle does not have this symbol, then an authorization session is not allowed. 613 …NOTE Any command that uses authorization may cause a write to NV if there is an authorizati… 634 …contain an “Auth Index:” entry for the handle. This entry indicates the number of the authorization 635 … session. The authorization sessions associated with handles will occur in the session area in the 637 audit will follow the handles used for authorization. 651 … If the handle has the Auth Role of USER and the handle is an Object, the type of authorization is 657 … If the Auth Role is ADMIN and the handle is an Object, the type of authorization is determined by 661 …If the DUP role is selected, authorization may only be with a policy session (DUP role only applies 665 … TPM2_Certify requires the ADMIN role for the first handle (objectHandle). The policy authorization [all …]
|
D | Marshal_FieldUpgradeStart.c | 16 target->authorization = request_handles[0]; in FieldUpgradeStart_In_Unmarshal()
|
/external/oauth/core/src/main/java/net/oauth/ |
D | OAuthMessage.java | 360 public static List<OAuth.Parameter> decodeAuthorization(String authorization) { in decodeAuthorization() argument 362 if (authorization != null) { in decodeAuthorization() 363 Matcher m = AUTHORIZATION.matcher(authorization); in decodeAuthorization()
|
/external/selinux/policycoreutils/sepolicy/ |
D | org.selinux.conf | 14 authorization is performed by PolicyKit -->
|
/external/curl/ |
D | NOTICE | 21 in this Software without prior written authorization of the copyright holder.
|