/aosp12/frameworks/proto_logging/stats/enums/wifi/ |
H A D | enums.proto | 53 * Wifi authentication type. 60 // WPA using EAP authentication. Generally used with an external authentication server. 62 // IEEE 802.1X using EAP authentication and (optionally) dynamically generated WEP keys. 68 // IEEE 802.11r Fast BSS Transition with PSK authentication. 70 // IEEE 802.11r Fast BSS Transition with EAP authentication. 80 // WPA using EAP authentication with stronger SHA256-based algorithms.
|
/aosp12/frameworks/base/core/java/android/service/autofill/ |
H A D | FillResponse.java | 311 @Nullable IntentSender authentication, @Nullable RemoteViews presentation) { in setAuthentication() argument 318 if (authentication == null ^ presentation == null) { in setAuthentication() 322 mAuthentication = authentication; in setAuthentication() 370 @Nullable IntentSender authentication, @Nullable RemoteViews presentation, in setAuthentication() argument 372 return setAuthentication(ids, authentication, presentation, inlinePresentation, null); in setAuthentication() 385 @Nullable IntentSender authentication, @Nullable RemoteViews presentation, in setAuthentication() argument 394 if (authentication == null ^ (presentation == null && inlinePresentation == null)) { in setAuthentication() 398 mAuthentication = authentication; in setAuthentication() 848 final IntentSender authentication = parcel.readParcelable(null); 853 builder.setAuthentication(authenticationIds, authentication, presentation,
|
H A D | Dataset.java | 407 public @NonNull Builder setAuthentication(@Nullable IntentSender authentication) { in setAuthentication() argument 409 mAuthentication = authentication; in setAuthentication() 932 final IntentSender authentication = parcel.readParcelable(null); 964 builder.setAuthentication(authentication);
|
/aosp12/hardware/interfaces/keymaster/3.0/ |
H A D | types.hal | 48 MIN_MAC_LENGTH = TagType:UINT | 8, /* Minimum length of MAC or AEAD authentication tag in 81 /** User authentication */ 87 NO_AUTH_REQUIRED = TagType:BOOL | 503, /** If key is usable without authentication. */ 92 AUTH_TIMEOUT = TagType:UINT | 505, /* Required freshness of user authentication for 94 * key operations require no authentication. If 95 * absent, authentication is required for every use. 98 ALLOW_WHILE_ON_BODY = TagType:BOOL | 506, /* Allow key to be used after authentication timeout 147 * authentication has been performed. Structure defined 149 MAC_LENGTH = TagType:UINT | 1003, /** MAC or AEAD authentication tag length in bits. */ 360 * Hardware authentication type, used by HardwareAuthTokens to specify the mechanism used to [all …]
|
/aosp12/hardware/interfaces/biometrics/fingerprint/2.2/ |
H A D | types.hal | 34 * authentication pipeline. It is expected to be used to measure latency. For 35 * example, in a camera-based authentication system it's expected to be sent 37 * authentication is restarted (see IBiometricsFace#userActivity).
|
H A D | IBiometricsFingerprint.hal | 22 * The HAL interface for biometric fingerprint authentication.
|
/aosp12/hardware/interfaces/biometrics/face/1.0/ |
H A D | types.hal | 63 * authentication. Note this is to accommodate people who have limited 129 * Face authentication is locked out due to too many unsuccessful attempts. 130 * This is a "soft" lockout, and authentication can be restarted after 141 * Face authentication is disabled until the user unlocks with strong 142 * authentication (PIN/Pattern/Password). 149 * or authentication operation. 333 * This message represents the earliest message sent at the beginning of the authentication 335 * authentication system it's expected to be sent prior to camera initialization. Note this 336 * should be sent whenever authentication is restarted (see IBiometricsFace#userActivity).
|
H A D | IBiometricsFaceClientCallback.hal | 42 * service that processed this authentication attempt. 43 * @param faceId The id of the face template that passed the authentication 46 * @param token The hardware authentication token associated with this 56 * authentication attempt, the HAL implementation must invoke this callback 69 * a message during authentication that is vendor-specific. The vendor
|
H A D | IBiometricsFace.hal | 22 * The HAL interface for biometric face authentication. 79 * gatekeeper after verifying a successful strong authentication attempt, 82 * by a user authentication (PIN/pattern/password) can proceed. 115 * after a successful strong authentication request. 236 * authentication, where the device is idle to conserve power while
|
/aosp12/hardware/interfaces/gatekeeper/1.0/ |
H A D | IGatekeeper.hal | 23 * or password, with the private key used only for enrolling authentication 63 * to attest to the recency of authentication. 72 * or for transactional password authentication. 82 * authentication token resulting from this verification is returned.
|
/aosp12/hardware/interfaces/wifi/supplicant/1.0/ |
H A D | ISupplicantStaNetworkCallback.hal | 41 * Used to request EAP GSM SIM authentication for this particular network. 52 * Used to request EAP UMTS SIM authentication for this particular network.
|
H A D | ISupplicantStaIfaceCallback.hal | 73 * until the IEEE 802.1X/EAPOL authentication has been completed. 80 * when the IEEE 802.1X/EAPOL authentication has been completed. 91 * This state is entered when the full authentication process is 96 * the EAP authentication has been completed). With static WEP keys and 475 * Used to indicate the timeout of authentication to an AP. 482 * Used to indicate an EAP authentication failure.
|
/aosp12/hardware/interfaces/keymaster/4.0/ |
H A D | types.hal | 340 * authentication state. This tag is mutually exclusive with Tag::NO_AUTH_REQUIRED. 378 NO_AUTH_REQUIRED = TagType:BOOL | 503, /* If key is usable without authentication. */ 401 * after user authentication. If 403 * every usage (see begin() for the details of the authentication-per-operation flow). 406 * authentication of the user specified by Tag::USER_SECURE_ID with the authentication method 433 * mechanism analogous to the authentication token is defined for communicating proof of 448 * password authentication. 1097 * Hardware authentication type, used by HardwareAuthTokens to specify the mechanism used to 1194 * challenge is a value that's used to enable authentication tokens to authorize specific 1196 * operation, for keys that require authentication per operation. See begin() for details. [all …]
|
/aosp12/hardware/interfaces/wifi/supplicant/1.1/ |
H A D | ISupplicantStaNetwork.hal | 30 * EAP IMSI Identity to be used for authentication to EAP SIM networks. 50 * Encrypted EAP IMSI Identity to be used for authentication to EAP SIM
|
H A D | ISupplicantStaIfaceCallback.hal | 41 * Used to indicate an EAP authentication failure.
|
/aosp12/build/make/target/board/ |
H A D | gsi_system_ext.prop | 4 # GSI always disables adb authentication
|
/aosp12/system/core/rootdir/ |
H A D | adb_debug.prop | 5 # Disable adb authentication to allow test automation on user build GSI
|
/aosp12/hardware/interfaces/confirmationui/1.0/ |
H A D | IConfirmationUI.hal | 66 * @param secureInputToken An authentication token as generated by Android authentication
|
/aosp12/hardware/interfaces/wifi/supplicant/1.3/ |
H A D | ISupplicantStaNetwork.hal | 48 * FILS shared key authentication with sha-256 52 * FILS shared key authentication with sha-384 281 * Enable Extensible Authentication (EAP) - Re-authentication Protocol (ERP) for this network.
|
H A D | ISupplicantStaIfaceCallback.hal | 194 * Indicates an EAP authentication failure. 195 * @param errorCode Error code for EAP authentication failure.
|
/aosp12/frameworks/base/core/java/android/net/ |
H A D | IpSecConfig.java | 102 public void setAuthentication(IpSecAlgorithm authentication) { in setAuthentication() argument 103 mAuthentication = authentication; in setAuthentication()
|
/aosp12/hardware/interfaces/keymaster/4.1/ |
H A D | IKeymasterDevice.hal | 47 * authentication token with a later timestamp is presented. If the `passwordOnly' argument is 48 * set to true the sufficiently-recent authentication token must indicate that the user
|
/aosp12/frameworks/base/packages/SystemUI/docs/keyguard/ |
H A D | bouncer.md | 7 …f controllers/views to render the user's security method and to manage the authentication attempts.
|
/aosp12/frameworks/base/packages/SystemUI/docs/ |
H A D | keyguard.md | 5 1. Handling authentication to allow the user to unlock the device, via biometrics or [KeyguardBounc…
|
/aosp12/hardware/interfaces/biometrics/fingerprint/2.3/ |
H A D | IBiometricsFingerprint.hal | 26 * The interface for biometric fingerprint authentication.
|