/external/icu/android_icu4j/src/main/java/android/icu/impl/ |
Trie.java | 147 // Magic number to authenticate the data. 403 * Constant number to authenticate the byte block 440 // Magic number to authenticate the data.
|
UBiDiProps.java | 88 // implement ICUBinary.Authenticate 89 private final static class IsAcceptable implements ICUBinary.Authenticate {
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
Trie.java | 146 // Magic number to authenticate the data. 402 * Constant number to authenticate the byte block 439 // Magic number to authenticate the data.
|
UBiDiProps.java | 84 // implement ICUBinary.Authenticate 85 private final static class IsAcceptable implements ICUBinary.Authenticate {
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
Constraint.java | 160 * @param authenticate True if users must be authenticated 162 public void setAuthenticate(boolean authenticate) 164 _authenticate = authenticate;
|
/external/libmicrohttpd/doc/chapters/ |
tlsauthentication.inc | 15 will later be able to authenticate itself to the client---preventing anyone else 41 it is the client's turn to authenticate itself. But this has already been implemented in the basic 135 You can also use MHD to authenticate the client via SSL/TLS certificates
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
HttpOverSpdyTest.java | 215 @Test public void authenticate() throws Exception { method in class:HttpOverSpdyTest 217 .addHeader("www-authenticate: Basic realm=\"protected area\"") 218 .setBody("Please authenticate."));
|
/external/ppp/pppd/plugins/ |
winbind.c | 462 * Tells pppd that we will try to authenticate the peer, and not to 480 * 1 if we can authenticate, -1 if we cannot. 505 * AUTHENTICATED (1) if we can authenticate, NOT_AUTHENTICATED (0) if we cannot.
|
/external/srtp/crypto/ae_xfm/ |
xfm.c | 78 /* authenticate clear and opaque data */ 154 /* authenticate clear and opaque data */ 258 * authenticate clear and opaque data, then write the
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
SSLSocketFactory.java | 63 * server against a list of trusted certificates and to authenticate to 72 * authenticate itself with a non-trusted certificate. 85 * pair. The client secure socket will use the private key to authenticate
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
SOAPParser.java | 122 <xsd:documentation>Command to mobile to re-negotiate the TLS connection using a client certificate of the accepted type or Issuer to authenticate with the Subscription server.</xsd:documentation> 258 <xsd:documentation>Temporary userid used by an EST client to authenticate to the EST server using HTTP Digest authentication. This element must be used for initial certificate enrollment; its use is optional for certificate re-enrollment.</xsd:documentation> 268 <xsd:documentation>Temporary password used by an EST client to authenticate to the EST server using HTTP Digest authentication. This element must be used for initial certificate enrollment; its use is optional for certificate re-enrollment.</xsd:documentation>
|
/hardware/bsp/intel/peripheral/libupm/src/sm130/ |
sm130.h | 225 * @param block The block to authenticate for 230 bool authenticate(uint8_t block, KEY_TYPES_T keyType, std::string key=""); 288 * to authenticate().
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 69 * server against a list of trusted certificates and to authenticate to 78 * authenticate itself with a non-trusted certificate. 91 * pair. The client secure socket will use the private key to authenticate
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
AuthenticationBoundKeyTestActivity.java | 254 // User is not authenticated, let's authenticate with device credentials. 372 mFingerprintManager.authenticate(new FingerprintManager.CryptoObject(mFingerprintCipher),
|
/developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 313 * Enumeration to indicate which authentication method the user is trying to authenticate with.
|
/developers/samples/android/security/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 313 * Enumeration to indicate which authentication method the user is trying to authenticate with.
|
/development/samples/browseable/AsymmetricFingerprintDialog/src/com.example.android.asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 55 * A dialog which uses fingerprint APIs to authenticate the user, and falls back to password 313 * Enumeration to indicate which authentication method the user is trying to authenticate with.
|
/external/jetty/src/java/org/eclipse/jetty/http/ |
HttpHeaders.java | 96 PROXY_AUTHENTICATE= "Proxy-Authenticate", 101 WWW_AUTHENTICATE= "WWW-Authenticate";
|
/external/oauth/core/src/main/java/net/oauth/ |
OAuthMessage.java | 308 * Construct a WWW-Authenticate or Authentication header value, containing 356 * Parse the parameters from an OAuth Authorization or WWW-Authenticate
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
OkHeaders.java | 222 && !"Proxy-Authenticate".equalsIgnoreCase(fieldName) 285 : authenticator.authenticate(proxy, response);
|
/frameworks/base/core/java/android/net/ |
PskKeyManager.java | 30 * secure the TLS/SSL connection and mutually authenticate its peers. These cipher suites may be 33 * step) and requires both peers to authenticate each other. In such scenarios a symmetric key (PSK)
|
/frameworks/base/docs/html/training/id-auth/ |
custom_auth.jd | 7 previous.link=authenticate.html 171 accounts of your custom type will be able to enumerate and authenticate just as
|
/hardware/libhardware/include/hardware/ |
fingerprint.h | 197 * Cancel pending enroll or authenticate, sending FINGERPRINT_ERROR_CANCELED 251 int (*authenticate)(struct fingerprint_device *dev, uint64_t operation_id, uint32_t gid); member in struct:fingerprint_device
|
/libcore/ojluni/src/main/java/javax/crypto/ |
JceSecurity.java | 102 String msg = "JCE cannot authenticate the provider " + provider; 114 String msg = "JCE cannot authenticate the provider "
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
libnsl-2.11.1.so | |