/frameworks/base/docs/html/training/sync-adapters/ |
creating-sync-adapter.jd | 369 <a href="creating-authenticator.html#CreateAuthenticatorFile" 370 >Add the Authenticator Metadata File</a>. Now you have to set up this account type in the 474 as the account type value you provided when you created the authenticator metadata file, as 475 described in the section <a href="creating-authenticator.html#CreateAuthenticatorFile" 476 >Add the Authenticator Metadata File</a>. It's also the value you specified for the 551 special permission that allows your app to use the authenticator component you created 552 in the lesson <a href="creating-authenticator.html">Creating a Stub Authenticator</a>.
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
URLConnectionTest.java | 34 import java.net.Authenticator; 117 Authenticator.setDefault(null); [all...] |
/cts/tests/tests/accounts/src/android/accounts/cts/ |
AccountManagerTest.java | 154 // need to clean up the authenticator cached data 179 * On the second fetch the cache will be populated if we are using a authenticator with 180 * customTokens=false or we are using a scope that will cause the authenticator to set an 211 * Upon invalidating the token, the cache should be clear regardless of authenticator. 471 * Test addAccount() with no associated account authenticator 761 fail("should have found Authenticator type: " + ACCOUNT_TYPE); [all...] |
/external/wpa_supplicant_8/hostapd/ |
ChangeLog | 329 * Allow PMKSA caching to be disabled on the Authenticator. See [all...] |
/external/ppp/pppd/ |
chap_ms.c | 265 * <auth_string> is the Authenticator Response (mutual auth) 422 /* Authenticator Response did not match expected. */ 426 /* Authenticator Response matches. */ 919 * Authenticator Response. 924 u_char authResponse[], int authenticator) 944 /* Generate the Authenticator Response. */ 952 &response[MS_CHAP2_NTRESP], authenticator);
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 498 /* Save a copy of the last message for Authenticator derivation 983 wps_process_authenticator(wps, attr->authenticator, msg) || 1098 wps_process_authenticator(wps, attr->authenticator, msg) || 1153 wps_process_authenticator(wps, attr->authenticator, msg)) { [all...] |
wps_attr_parse.c | 306 wpa_printf(MSG_DEBUG, "WPS: Invalid Authenticator " 310 attr->authenticator = pos; 379 "Authenticator length %u", len);
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-javamail.jar | |
/frameworks/base/services/core/java/com/android/server/accounts/ |
AccountManagerService.java | 361 // Don't delete accounts when updating a authenticator's 566 // Get a list of stored authenticator type and UID 575 // Create a list of authenticator type whose previous uid no longer exists 594 * The authenticator is presently not cached and should only be triggered 595 * when we think an authenticator has been removed (or is being updated). 599 * A side effect of this is that an authenticator sharing a uid with 606 * uninstalled while the authenticator's package is being updated. 613 // The authenticator is not presently available to the cache. And the 632 // Add the newly registered authenticator to TABLE_META. If old authenticators have 658 + accountType + "'s registered authenticator no longer exist.") [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
HttpOverSpdyTest.java | 34 import java.net.Authenticator; 93 Authenticator.setDefault(null); 221 Authenticator.setDefault(new RecordingAuthenticator());
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 779 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator, 838 hdr->authenticator) < 0) { 839 RADIUS_DEBUG("Failed to add Message-Authenticator attribute"); 919 hdr->authenticator) < 0) { 920 RADIUS_DEBUG("Failed to add Message-Authenticator attribute"); 964 hdr->authenticator) < 966 RADIUS_DEBUG("Failed to add Message-Authenticator attribute"); 1038 radius_msg_get_hdr(msg)->authenticator, 16) == 0) { 1164 os_memcpy(sess->last_authenticator, hdr->authenticator, 16); [all...] |
radius_das.c | 238 wpa_printf(MSG_DEBUG, "DAS: Invalid authenticator in packet " 304 "Message-Authenticator attribute");
|
/packages/apps/Settings/src/com/android/settings/accounts/ |
ManageAccountsSettings.java | 490 * activity that doesn't share a uid with the authenticator. 499 "Refusing to launch authenticator intent because" 516 * authenticator supplying the intent.
|
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 34 import java.net.Authenticator; 436 Authenticator.setDefault(new Authenticator() { 543 Authenticator.setDefault(new Authenticator() { 581 * (Authenticator was not set up in the system). [all...] |
/packages/experimental/LoaderApp/src/com/android/loaderapp/model/ |
Sources.java | 203 // adapter, using the authenticator to find general resources. 242 throw new IllegalStateException("Couldn't find authenticator for specific account type");
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/ |
AndroidManifest.xml | 110 android:resource="@xml/authenticator" />
|
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
AccountCheckHostSideTest.java | 53 // This shouldn't be needed since we're uninstalling the authenticator,
|
/developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/ |
README.md | 24 created. Or alternatively you can fall back to server-side verified password as an authenticator.
|
/developers/build/prebuilts/gradle/BasicSyncAdapter/Application/src/main/ |
AndroidManifest.xml | 95 android:resource="@xml/authenticator" />
|
/developers/build/prebuilts/gradle/ConfirmCredential/Application/src/main/java/com/example/android/confirmcredential/ |
MainActivity.java | 63 * it can be considered as an authenticator.
|
/developers/build/prebuilts/gradle/FingerprintDialog/ |
README.md | 23 Or alternatively you can fall back to server-side verified password as an authenticator.
|
/developers/samples/android/connectivity/sync/BasicSyncAdapter/Application/src/main/ |
AndroidManifest.xml | 95 android:resource="@xml/authenticator" />
|
/developers/samples/android/security/AsymmetricFingerprintDialog/ |
template-params.xml | 97 created. Or alternatively you can fall back to server-side verified password as an authenticator.
|
/developers/samples/android/security/ConfirmCredential/Application/src/main/java/com/example/android/confirmcredential/ |
MainActivity.java | 63 * it can be considered as an authenticator.
|
/developers/samples/android/security/FingerprintDialog/ |
template-params.xml | 89 Or alternatively you can fall back to server-side verified password as an authenticator.
|