HomeSort by relevance Sort by last modified time
    Searched full:authenticate (Results 276 - 300 of 907) sorted by null

<<11121314151617181920>>

  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/commands/
ClientCertInfo.java 12 <xsd:documentation>Command to mobile to re-negotiate the TLS connection using a client certificate of the accepted type or Issuer to authenticate with the Subscription server.</xsd:documentation>
  /hardware/intel/common/libva/va/drm/
va_drm_auth_x11.c 157 /* Try to authenticate the DRM connection with the supplied magic through X11 */
  /libcore/ojluni/src/main/java/javax/net/ssl/
X509TrustManager.java 32 * may be used to authenticate the remote side of a secure
  /libcore/ojluni/src/main/java/javax/security/auth/kerberos/
package.html 41 {@link javax.security.auth.spi.LoginModule LoginModule} to authenticate
  /libcore/ojluni/src/main/java/sun/net/www/protocol/http/
HttpAuthenticator.java 64 * <-- WWW-Authenticate: Basic realm="WallyWorld"
  /developers/build/prebuilts/gradle/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
FingerprintAuthenticationDialogFragment.java 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
256 * Enumeration to indicate which authentication method the user is trying to authenticate with.
  /developers/samples/android/security/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
FingerprintAuthenticationDialogFragment.java 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
256 * Enumeration to indicate which authentication method the user is trying to authenticate with.
  /development/samples/browseable/FingerprintDialog/src/com.example.android.fingerprintdialog/
FingerprintAuthenticationDialogFragment.java 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password
256 * Enumeration to indicate which authentication method the user is trying to authenticate with.
  /external/conscrypt/src/main/java/org/conscrypt/
PSKKeyManager.java 30 * secure the TLS/SSL connection and mutually authenticate its peers. These cipher suites may be
33 * step) and requires both peers to authenticate each other. In such scenarios a symmetric key (PSK)
  /external/libmicrohttpd/doc/chapters/
basicauthentication.inc 71 @emph{WWW-Authenticate} response header with the name of the @emph{realm} protected.
141 @emph{401 unauthorized} status code. If the client still does not authenticate correctly within the
  /external/mesa3d/src/egl/wayland/wayland-drm/
wayland-drm.xml 107 <request name="authenticate">
151 <!-- Raised if the authenticate request succeeded -->
  /external/mockito/src/org/mockito/
AdditionalAnswers.java 38 * <pre class="code"><code class="java">given(carKeyFob.authenticate(carKey)).will(returnsFirstArg());
39 * doAnswer(returnsFirstArg()).when(carKeyFob).authenticate(carKey)</code></pre>
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
MessageDigestAlgorithm.java 43 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "+
119 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "
  /external/nist-sip/java/gov/nist/javax/sip/parser/
ProxyAuthenticateParser.java 73 "Proxy-Authenticate: Digest realm=\"MCI WorldCom SIP\","+
77 "Proxy-Authenticate: Digest realm=\"MCI WorldCom SIP\","+
  /external/selinux/policycoreutils/newrole/
newrole.c 19 * Set the USE_PAM constant if you want to authenticate users via PAM.
26 * entry so that even root must re-authenticate to change roles.
181 * This function uses PAM to authenticate the user running this
205 /* Ask PAM to authenticate the user running this program */
412 * Determine the Linux user identity to re-authenticate.
1110 * Step 2: Authenticate the user.
1112 * Re-authenticate the user running this program.
1167 * Once we authenticate the user, we know that we want to proceed with
    [all...]
  /frameworks/base/core/java/android/hardware/fingerprint/
FingerprintManager.java 256 * Container for callback data from {@link FingerprintManager#authenticate(CryptoObject,
279 * @return crypto object provided to {@link FingerprintManager#authenticate(CryptoObject,
300 * Callback structure provided to {@link FingerprintManager#authenticate(CryptoObject,
302 * FingerprintManager#authenticate(CryptoObject, CancellationSignal,
436 public void authenticate(@Nullable CryptoObject crypto, @Nullable CancellationSignal cancel, method in class:FingerprintManager
438 authenticate(crypto, cancel, flags, callback, handler, UserHandle.myUserId()); method
458 public void authenticate(@Nullable CryptoObject crypto, @Nullable CancellationSignal cancel, method in class:FingerprintManager
478 mService.authenticate(mToken, sessionId, userId, mServiceReceiver, flags,
    [all...]
  /frameworks/base/docs/html/training/id-auth/
identify.jd 7 next.link=authenticate.html
135 The next lesson explains how to authenticate to existing online services. The lesson after that
  /hardware/intel/common/libva/va/wayland/protocol/
wayland-drm.xml 107 <request name="authenticate">
151 <!-- Raised if the authenticate request succeeded -->
  /external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/
__init__.py 198 HOP_BY_HOP = ['connection', 'keep-alive', 'proxy-authenticate', 'proxy-authorization', 'te', 'trailers', 'transfer-encoding', 'upgrade']
275 # Whether to use a strict mode to parse WWW-Authenticate headers
289 def _parse_www_authenticate(headers, headername='www-authenticate'):
296 authenticate = headers[headername].strip()
298 while authenticate:
301 (auth_scheme, the_rest) = ('digest', authenticate)
303 (auth_scheme, the_rest) = authenticate.split(" ", 1)
314 authenticate = the_rest.strip()
317 raise MalformedHeader("WWW-Authenticate")
515 challenge = _parse_www_authenticate(response, 'www-authenticate')
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/httplib2/
__init__.py 124 HOP_BY_HOP = ['connection', 'keep-alive', 'proxy-authenticate', 'proxy-authorization', 'te', 'trailers', 'transfer-encoding', 'upgrade']
206 # Whether to use a strict mode to parse WWW-Authenticate headers
220 def _parse_www_authenticate(headers, headername='www-authenticate'):
226 authenticate = headers[headername].strip()
228 while authenticate:
231 (auth_scheme, the_rest) = ('digest', authenticate)
233 (auth_scheme, the_rest) = authenticate.split(" ", 1)
244 authenticate = the_rest.strip()
246 raise MalformedHeader("WWW-Authenticate")
485 challenge = _parse_www_authenticate(response, 'www-authenticate')
    [all...]
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
URLConnectionTest.java     [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/
httplib2test.py     [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/
httplib2test.py     [all...]
  /libcore/ojluni/src/main/java/java/net/
SocksSocketImpl.java 138 private boolean authenticate(byte method, InputStream in, method in class:SocksSocketImpl
140 return authenticate(method, in, out, 0L);
143 private boolean authenticate(byte method, InputStream in, method in class:SocksSocketImpl
400 if (!authenticate(data[1], in, out, deadlineMillis)) {
717 if (!authenticate(data[1], in, out)) {
    [all...]
  /packages/apps/Email/provider_src/com/android/email/mail/store/
ImapConnection.java 116 mLoginPhrase = ImapConstants.AUTHENTICATE + " " + ImapConstants.XOAUTH2 + " " +
534 // Failed to authenticate. This may be just due to an expired token.
535 LogUtils.d(Logging.LOG_TAG, "failed to authenticate, retrying");
546 LogUtils.d(Logging.LOG_TAG, "failed to authenticate, giving up");
564 // it will send a continuation request is when we fail to authenticate. We need to

Completed in 4428 milliseconds

<<11121314151617181920>>