/prebuilts/go/darwin-x86/src/syscall/ |
sockcmsg_linux.go | 11 // UnixCredentials encodes credentials into a socket control message 25 // credentials in a Ucred structure. To receive such a message, the
|
/prebuilts/go/linux-x86/src/syscall/ |
sockcmsg_linux.go | 11 // UnixCredentials encodes credentials into a socket control message 25 // credentials in a Ucred structure. To receive such a message, the
|
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-credentials/0.3.0/ |
google-auth-library-credentials-0.3.0.pom | 12 <artifactId>google-auth-library-credentials</artifactId> 13 <name>Google Auth Library for Java - Credentials</name>
|
/prebuilts/tools/common/m2/repository/com/google/auth/google-auth-library-credentials/0.4.0/ |
google-auth-library-credentials-0.4.0.pom | 12 <artifactId>google-auth-library-credentials</artifactId> 13 <name>Google Auth Library for Java - Credentials</name>
|
/system/core/logd/ |
LogListener.h | 25 // out-of-band socket credentials if the OS fails to find one available. 28 // no socket credentials are supplied.
|
/developers/build/prebuilts/gradle/ConfirmCredential/ |
README.md | 5 A sample that demonstrates how to use device credentials (PIN, Pattern, Password) in your app 10 This sample demonstrates how you can use device credentials (PIN, Pattern, Password) in your app 15 with their device credentials and pass [KeyGenParameterSpec][2]. 19 user as authenticated if the user has been authenticated with the device credentials 23 to confirm device credentials to the user.
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 41 import org.apache.http.auth.Credentials; 212 * {@link Credentials}, method name and URI. 214 * @param credentials A set of credentials to be used for athentication 217 * @throws org.apache.http.auth.InvalidCredentialsException if authentication credentials 225 final Credentials credentials, 228 if (credentials == null) { 229 throw new IllegalArgumentException("Credentials may not be null"); 243 String digest = createDigest(credentials); [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Credentials.java | 33 * Credentials that are used in authentication and authorization headers. 38 public class Credentials extends SIPObject { 64 public Credentials() { 130 Credentials retval = (Credentials) super.clone();
|
/frameworks/base/core/java/android/accounts/ |
IAccountAuthenticator.aidl | 35 * prompts the user for the credentials of the account 75 * Returns a Bundle containing the required credentials to copy the account across users. 81 * Uses the Bundle containing credentials from another instance of the authenticator to create 102 * startUpdateCredentialsSession(...) by adding account to or updating local credentials 109 * Checks if the credentials of the provided account should be updated.
|
/packages/apps/Settings/src/com/android/settings/ |
CredentialStorage.java | 34 import android.security.Credentials; 100 public static final String ACTION_UNLOCK = "com.android.credentials.UNLOCK"; 101 public static final String ACTION_INSTALL = "com.android.credentials.INSTALL"; 102 public static final String ACTION_RESET = "com.android.credentials.RESET"; 114 * When non-null, the bundle containing credentials to install. 145 // credentials store. 232 * Install credentials if available, otherwise do nothing. 242 final int uid = bundle.getInt(Credentials.EXTRA_INSTALL_AS_UID, KeyStore.UID_SELF); 250 Log.e(TAG, "Failed to install credentials as uid " + uid + ": cross-user installs" 262 if (bundle.containsKey(Credentials.EXTRA_USER_PRIVATE_KEY_NAME)) [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiKeyStore.java | 22 import android.security.Credentials; 86 String privKeyName = Credentials.USER_PRIVATE_KEY + name; 87 String userCertName = Credentials.USER_CERTIFICATE + name; 127 ret = putCertInKeyStore(Credentials.CA_CERTIFICATE + alias, caCertificates[i]); 136 mKeyStore.delete(Credentials.CA_CERTIFICATE + addedAlias, Process.WIFI_UID); 146 mKeyStore.delete(Credentials.CA_CERTIFICATE + oldAlias, Process.WIFI_UID); 182 byte[] certData = Credentials.convertToPem(certs); 227 mKeyStore.delete(Credentials.USER_PRIVATE_KEY + client, Process.WIFI_UID); 228 mKeyStore.delete(Credentials.USER_CERTIFICATE + client, Process.WIFI_UID); 237 mKeyStore.delete(Credentials.CA_CERTIFICATE + ca, Process.WIFI_UID) [all...] |
/external/curl/lib/vauth/ |
digest_sspi.c | 99 CredHandle credentials; local 175 /* Acquire our credentials handle */ 180 &credentials, &expiry); 208 status = s_pSecFn->InitializeSecurityContext(&credentials, NULL, spn, 215 s_pSecFn->CompleteAuthToken(&credentials, &resp_desc); 217 s_pSecFn->FreeCredentialsHandle(&credentials); 232 s_pSecFn->FreeCredentialsHandle(&credentials); 339 provided bad credentials in the previous request. */ 382 CredHandle credentials; local 428 /* Acquire our credentials handle * [all...] |
/compatibility/cdd/9_security-model/ |
9_9_full-disk-encryption.md | 44 * [C-1-1] MUST boot up without challenging the user for credentials and 48 the user has unlocked the device by supplying their credentials 52 without the user-supplied credentials. 63 * [C-1-8] CE keys MUST be bound to a user's lock screen credentials. 65 not specified lock screen credentials. 91 credentials stretched using a slow stretching algorithm 95 screen credentials or has disabled use of the passcode for encryption and
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
HttpAuthHandlerTest.java | 115 // As we're providing incorrect credentials, the page should complete but at 127 // As we're providing no credentials, the page should complete but at 139 // As we're providing valid credentials, the page should complete and 181 // Try to login once with incorrect credentials. This should cause 183 // we don't yet know that the credentials we will use are invalid. 191 // Try to login twice with invalid credentials. This should cause 192 // useHttpAuthUsernamePassword to return false, as the credentials
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/keyguard/ |
WorkLockActivity.java | 44 * Bouncer between work activities and the activity used to confirm credentials before unlocking 48 * be blocking. Once focused, it switches to a screen to confirm credentials and auto-dismisses if 49 * credentials are accepted. 93 * Respond to focus events by showing the prompt to confirm credentials. 135 // Don't show the confirm credentials screen if we are already unlocked / unlocking. 148 // Bring this activity back to the foreground after confirming credentials. 165 // credentials activity into the entire foreground.
|
/development/samples/SampleSyncAdapter/ |
_index.html | 10 manager</a> allows sharing of credentials across multiple applications and 11 services. Users enter the credentials for each account only once — 14 pluggable component of account manager) requests credentials from the user,
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AuthenticationHelper.java | 29 * Uses securityAuthority to determinie a set of valid user credentials for 43 * will keep a reference to the generated credentials in a cache. 44 * If you specify -1, then the authentication credentials are cached
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 48 public class Credentials { 49 private static final String LOGTAG = "Credentials"; 51 public static final String INSTALL_ACTION = "android.credentials.INSTALL"; 53 public static final String INSTALL_AS_USER_ACTION = "android.credentials.INSTALL_AS_USER"; 55 public static final String UNLOCK_ACTION = "com.android.credentials.UNLOCK"; 171 private static Credentials singleton; 173 public static Credentials getInstance() { 175 singleton = new Credentials(); 262 return keystore.delete(Credentials.USER_CERTIFICATE + alias, uid) 263 & keystore.delete(Credentials.CA_CERTIFICATE + alias, uid) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/ |
auth_unix.h | 36 * credentials and only sends null verifiers. The server sends backs 38 * for the credentials. 59 * Unix style credentials.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpc/ |
auth_unix.h | 36 * credentials and only sends null verifiers. The server sends backs 38 * for the credentials. 59 * Unix style credentials.
|
/external/libcups/cups/ |
tls-sspi.c | 109 * 'cupsSetServerCredentials()' - Set the default server credentials. 111 * Note: The server credentials are used by all threads in the running process. 134 * 'httpCopyCredentials()' - Copy the credentials associated with the peer in 143 cups_array_t **credentials) /* O - Array of credentials */ 145 DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials)); 147 if (!http || !http->tls || !http->tls->remoteCert || !credentials) 149 if (credentials) 150 *credentials = NULL [all...] |
/developers/build/prebuilts/gradle/ConfirmCredential/Application/src/main/res/values/ |
base-strings.xml | 24 This sample demonstrates how you can use device credentials (PIN, Pattern, Password) in your app
|
/development/samples/browseable/ConfirmCredential/res/values/ |
base-strings.xml | 24 This sample demonstrates how you can use device credentials (PIN, Pattern, Password) in your app
|
/external/curl/tests/data/ |
test943 | 29 SMTP external authentication without credentials
|
test945 | 29 SMTP external authentication with initial response without credentials
|