/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/commands/ |
ClientCertInfo.java | 12 <xsd:documentation>Command to mobile to re-negotiate the TLS connection using a client certificate of the accepted type or Issuer to authenticate with the Subscription server.</xsd:documentation>
|
/hardware/intel/common/libva/va/drm/ |
va_drm_auth_x11.c | 157 /* Try to authenticate the DRM connection with the supplied magic through X11 */
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
X509TrustManager.java | 32 * may be used to authenticate the remote side of a secure
|
/libcore/ojluni/src/main/java/javax/security/auth/kerberos/ |
package.html | 41 {@link javax.security.auth.spi.LoginModule LoginModule} to authenticate
|
/libcore/ojluni/src/main/java/sun/net/www/protocol/http/ |
HttpAuthenticator.java | 64 * <-- WWW-Authenticate: Basic realm="WallyWorld"
|
/developers/build/prebuilts/gradle/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 256 * Enumeration to indicate which authentication method the user is trying to authenticate with.
|
/developers/samples/android/security/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 256 * Enumeration to indicate which authentication method the user is trying to authenticate with.
|
/development/samples/browseable/FingerprintDialog/src/com.example.android.fingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 38 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 256 * Enumeration to indicate which authentication method the user is trying to authenticate with.
|
/external/conscrypt/src/main/java/org/conscrypt/ |
PSKKeyManager.java | 30 * secure the TLS/SSL connection and mutually authenticate its peers. These cipher suites may be 33 * step) and requires both peers to authenticate each other. In such scenarios a symmetric key (PSK)
|
/external/libmicrohttpd/doc/chapters/ |
basicauthentication.inc | 71 @emph{WWW-Authenticate} response header with the name of the @emph{realm} protected. 141 @emph{401 unauthorized} status code. If the client still does not authenticate correctly within the
|
/external/mesa3d/src/egl/wayland/wayland-drm/ |
wayland-drm.xml | 107 <request name="authenticate"> 151 <!-- Raised if the authenticate request succeeded -->
|
/external/mockito/src/org/mockito/ |
AdditionalAnswers.java | 38 * <pre class="code"><code class="java">given(carKeyFob.authenticate(carKey)).will(returnsFirstArg()); 39 * doAnswer(returnsFirstArg()).when(carKeyFob).authenticate(carKey)</code></pre>
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 43 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "+ 119 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
ProxyAuthenticateParser.java | 73 "Proxy-Authenticate: Digest realm=\"MCI WorldCom SIP\","+ 77 "Proxy-Authenticate: Digest realm=\"MCI WorldCom SIP\","+
|
/external/selinux/policycoreutils/newrole/ |
newrole.c | 19 * Set the USE_PAM constant if you want to authenticate users via PAM. 26 * entry so that even root must re-authenticate to change roles. 181 * This function uses PAM to authenticate the user running this 205 /* Ask PAM to authenticate the user running this program */ 412 * Determine the Linux user identity to re-authenticate. 1110 * Step 2: Authenticate the user. 1112 * Re-authenticate the user running this program. 1167 * Once we authenticate the user, we know that we want to proceed with [all...] |
/frameworks/base/core/java/android/hardware/fingerprint/ |
FingerprintManager.java | 256 * Container for callback data from {@link FingerprintManager#authenticate(CryptoObject, 279 * @return crypto object provided to {@link FingerprintManager#authenticate(CryptoObject, 300 * Callback structure provided to {@link FingerprintManager#authenticate(CryptoObject, 302 * FingerprintManager#authenticate(CryptoObject, CancellationSignal, 436 public void authenticate(@Nullable CryptoObject crypto, @Nullable CancellationSignal cancel, method in class:FingerprintManager 438 authenticate(crypto, cancel, flags, callback, handler, UserHandle.myUserId()); method 458 public void authenticate(@Nullable CryptoObject crypto, @Nullable CancellationSignal cancel, method in class:FingerprintManager 478 mService.authenticate(mToken, sessionId, userId, mServiceReceiver, flags, [all...] |
/frameworks/base/docs/html/training/id-auth/ |
identify.jd | 7 next.link=authenticate.html 135 The next lesson explains how to authenticate to existing online services. The lesson after that
|
/hardware/intel/common/libva/va/wayland/protocol/ |
wayland-drm.xml | 107 <request name="authenticate"> 151 <!-- Raised if the authenticate request succeeded -->
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/ |
__init__.py | 198 HOP_BY_HOP = ['connection', 'keep-alive', 'proxy-authenticate', 'proxy-authorization', 'te', 'trailers', 'transfer-encoding', 'upgrade'] 275 # Whether to use a strict mode to parse WWW-Authenticate headers 289 def _parse_www_authenticate(headers, headername='www-authenticate'): 296 authenticate = headers[headername].strip() 298 while authenticate: 301 (auth_scheme, the_rest) = ('digest', authenticate) 303 (auth_scheme, the_rest) = authenticate.split(" ", 1) 314 authenticate = the_rest.strip() 317 raise MalformedHeader("WWW-Authenticate") 515 challenge = _parse_www_authenticate(response, 'www-authenticate') [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/httplib2/ |
__init__.py | 124 HOP_BY_HOP = ['connection', 'keep-alive', 'proxy-authenticate', 'proxy-authorization', 'te', 'trailers', 'transfer-encoding', 'upgrade'] 206 # Whether to use a strict mode to parse WWW-Authenticate headers 220 def _parse_www_authenticate(headers, headername='www-authenticate'): 226 authenticate = headers[headername].strip() 228 while authenticate: 231 (auth_scheme, the_rest) = ('digest', authenticate) 233 (auth_scheme, the_rest) = authenticate.split(" ", 1) 244 authenticate = the_rest.strip() 246 raise MalformedHeader("WWW-Authenticate") 485 challenge = _parse_www_authenticate(response, 'www-authenticate') [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
URLConnectionTest.java | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/ |
httplib2test.py | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/ |
httplib2test.py | [all...] |
/libcore/ojluni/src/main/java/java/net/ |
SocksSocketImpl.java | 138 private boolean authenticate(byte method, InputStream in, method in class:SocksSocketImpl 140 return authenticate(method, in, out, 0L); 143 private boolean authenticate(byte method, InputStream in, method in class:SocksSocketImpl 400 if (!authenticate(data[1], in, out, deadlineMillis)) { 717 if (!authenticate(data[1], in, out)) { [all...] |
/packages/apps/Email/provider_src/com/android/email/mail/store/ |
ImapConnection.java | 116 mLoginPhrase = ImapConstants.AUTHENTICATE + " " + ImapConstants.XOAUTH2 + " " + 534 // Failed to authenticate. This may be just due to an expired token. 535 LogUtils.d(Logging.LOG_TAG, "failed to authenticate, retrying"); 546 LogUtils.d(Logging.LOG_TAG, "failed to authenticate, giving up"); 564 // it will send a continuation request is when we fail to authenticate. We need to
|