/prebuilts/go/linux-x86/src/syscall/ |
syscall_linux_test.go | 111 Credential: &syscall.Credential{Uid: 99, Gid: 99},
|
exec_bsd.go | 16 Credential *Credential // Credential. 142 if cred := sys.Credential; cred != nil {
|
exec_solaris.go | 13 Credential *Credential // Credential. 139 if cred := sys.Credential; cred != nil {
|
/system/tpm/attestation/common/ |
crypto_utility.h | 73 // Encrypts a |credential| in a format compatible with TPM attestation key 78 const std::string& credential,
|
database.proto | 31 // A credential issued by the attestation server. 67 // The credential of the certified key in X.509 format.
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_GSSAPI_DELEGATION.3 | 32 unconditional GSSAPI credential delegation. The delegation is disabled by
|
/external/google-breakpad/ |
README | 33 You will be prompted for credential and a description.
|
/external/webrtc/webrtc/examples/androidapp/src/org/appspot/apprtc/ |
RoomParametersFetcher.java | 209 String credential = local 210 server.has("credential") ? server.getString("credential") : ""; 211 ret.add(new PeerConnection.IceServer(url, "", credential));
|
/prebuilts/go/darwin-x86/src/syscall/ |
exec_bsd.go | 16 Credential *Credential // Credential. 142 if cred := sys.Credential; cred != nil {
|
exec_solaris.go | 13 Credential *Credential // Credential. 139 if cred := sys.Credential; cred != nil {
|
/system/connectivity/shill/ethernet/ |
ethernet_eap_service.cc | 58 // to maintain consistent behavior by the EAP Credential Change
|
/packages/apps/CertInstaller/res/values-en-rAU/ |
strings.xml | 37 <string name="unable_to_save_cert" msgid="9178604087335389686">"Couldn\'t save the certificate. The credential storage isn\'t enabled or properly initialised."</string> 41 <string name="cert_is_added" msgid="6996557598167000500">"<xliff:g id="CREDENTIAL">%s</xliff:g> is installed."</string> 50 <string name="credential_usage_label" msgid="1513892208033156805">"Credential use:"</string>
|
/packages/apps/CertInstaller/res/values-en-rGB/ |
strings.xml | 37 <string name="unable_to_save_cert" msgid="9178604087335389686">"Couldn\'t save the certificate. The credential storage isn\'t enabled or properly initialised."</string> 41 <string name="cert_is_added" msgid="6996557598167000500">"<xliff:g id="CREDENTIAL">%s</xliff:g> is installed."</string> 50 <string name="credential_usage_label" msgid="1513892208033156805">"Credential use:"</string>
|
/packages/apps/CertInstaller/res/values-en-rIN/ |
strings.xml | 37 <string name="unable_to_save_cert" msgid="9178604087335389686">"Couldn\'t save the certificate. The credential storage isn\'t enabled or properly initialised."</string> 41 <string name="cert_is_added" msgid="6996557598167000500">"<xliff:g id="CREDENTIAL">%s</xliff:g> is installed."</string> 50 <string name="credential_usage_label" msgid="1513892208033156805">"Credential use:"</string>
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
PasspointManagementObjectManagerTest.java | 33 import com.android.server.wifi.hotspot2.pps.Credential; 101 Credential credential = new Credential(enterpriseConfig, keyStore, false); local 106 friendlyName, null, credential);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/ |
SupplicantBridge.java | 14 import com.android.server.wifi.hotspot2.pps.Credential; 279 Credential credential) { 283 EAPMethod eapMethod = credential.getEAPMethod(); 291 AuthParam authParam = credential.getEAPMethod().getAuthParam(); 299 netID, escapeString(credential.getUserName(), true))); 301 netID, escapeString(credential.getPassword(), true)));
|
/external/tpm2/ |
Object_spt.c | 99 // requires encrypting or decrypting of the sensitive area of an object or a credential blob 155 // is parent handle. For credential, it 217 // This function produces an inner integrity for regular private, credential or duplication blob It requires the 700 // handle. For credential, it is the handle [all...] |
Marshal_MakeCredential.c | 46 result = TPM2B_DIGEST_Unmarshal(&target->credential, buffer, size);
|
/docs/source.android.com/src/security/encryption/ |
file-based.jd | 60 <li>Credential Encrypted (CE) storage, which is the default storage location and 162 contents should reside in credential-encrypted storage rather than 298 stored in the keystore; their credential and devices storage locations are 472 <li>The stretched credential 479 correct auth token is supplied. If the user has no credential, then no auth 483 The <em>stretched credential</em> is the user credential after salting and 484 stretching with the <code>scrypt</code> algorithm. The credential is actually 488 <code>KM_TAG_APPLICATION_ID</code>. If the user has no credential, then no 489 stretched credential is used nor needed [all...] |
/external/chromium-trace/catapult/telemetry/docs/pydoc/ |
telemetry.internal.backends.google_credentials_backend.html | 80 RuntimeError: if could not get credential information.</tt></dd></dl> 104 <td colspan=2><tt>Google credential backend for google2 credential.<br> </tt></td></tr> 138 RuntimeError: if could not get credential information.</tt></dd></dl>
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
HashLoginService.java | 29 import org.eclipse.jetty.util.security.Credential; 166 public void update(String userName, Credential credential, String[] roleArray) 170 putUser(userName,credential,roleArray);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AuthenticationHelper.java | 62 * the credential cache and picks up any stored authentication headers
|
/frameworks/base/core/java/com/android/internal/widget/ |
VerifyCredentialResponse.java | 23 * Response object for a ILockSettings credential verification request.
|
/packages/apps/Dialer/src/com/android/dialer/compat/ |
UserManagerCompat.java | 56 * pattern or PIN), and credential-encrypted private app data storage is
|
/packages/apps/Settings/src/com/android/settings/ |
SaveChosenLockWorkerBase.java | 30 * verifies if a challenge is given) the chosen lock credential (pattern/pin/password).
|