Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 62) sorted by relevance

123

/aosp12/frameworks/proto_logging/stats/enums/wifi/
H A Denums.proto53 * Wifi authentication type.
60 // WPA using EAP authentication. Generally used with an external authentication server.
62 // IEEE 802.1X using EAP authentication and (optionally) dynamically generated WEP keys.
68 // IEEE 802.11r Fast BSS Transition with PSK authentication.
70 // IEEE 802.11r Fast BSS Transition with EAP authentication.
80 // WPA using EAP authentication with stronger SHA256-based algorithms.
/aosp12/frameworks/base/core/java/android/service/autofill/
H A DFillResponse.java311 @Nullable IntentSender authentication, @Nullable RemoteViews presentation) { in setAuthentication() argument
318 if (authentication == null ^ presentation == null) { in setAuthentication()
322 mAuthentication = authentication; in setAuthentication()
370 @Nullable IntentSender authentication, @Nullable RemoteViews presentation, in setAuthentication() argument
372 return setAuthentication(ids, authentication, presentation, inlinePresentation, null); in setAuthentication()
385 @Nullable IntentSender authentication, @Nullable RemoteViews presentation, in setAuthentication() argument
394 if (authentication == null ^ (presentation == null && inlinePresentation == null)) { in setAuthentication()
398 mAuthentication = authentication; in setAuthentication()
848 final IntentSender authentication = parcel.readParcelable(null);
853 builder.setAuthentication(authenticationIds, authentication, presentation,
H A DDataset.java407 public @NonNull Builder setAuthentication(@Nullable IntentSender authentication) { in setAuthentication() argument
409 mAuthentication = authentication; in setAuthentication()
932 final IntentSender authentication = parcel.readParcelable(null);
964 builder.setAuthentication(authentication);
/aosp12/hardware/interfaces/keymaster/3.0/
H A Dtypes.hal48 MIN_MAC_LENGTH = TagType:UINT | 8, /* Minimum length of MAC or AEAD authentication tag in
81 /** User authentication */
87 NO_AUTH_REQUIRED = TagType:BOOL | 503, /** If key is usable without authentication. */
92 AUTH_TIMEOUT = TagType:UINT | 505, /* Required freshness of user authentication for
94 * key operations require no authentication. If
95 * absent, authentication is required for every use.
98 ALLOW_WHILE_ON_BODY = TagType:BOOL | 506, /* Allow key to be used after authentication timeout
147 * authentication has been performed. Structure defined
149 MAC_LENGTH = TagType:UINT | 1003, /** MAC or AEAD authentication tag length in bits. */
360 * Hardware authentication type, used by HardwareAuthTokens to specify the mechanism used to
[all …]
/aosp12/hardware/interfaces/biometrics/fingerprint/2.2/
H A Dtypes.hal34 * authentication pipeline. It is expected to be used to measure latency. For
35 * example, in a camera-based authentication system it's expected to be sent
37 * authentication is restarted (see IBiometricsFace#userActivity).
H A DIBiometricsFingerprint.hal22 * The HAL interface for biometric fingerprint authentication.
/aosp12/hardware/interfaces/biometrics/face/1.0/
H A Dtypes.hal63 * authentication. Note this is to accommodate people who have limited
129 * Face authentication is locked out due to too many unsuccessful attempts.
130 * This is a "soft" lockout, and authentication can be restarted after
141 * Face authentication is disabled until the user unlocks with strong
142 * authentication (PIN/Pattern/Password).
149 * or authentication operation.
333 * This message represents the earliest message sent at the beginning of the authentication
335 * authentication system it's expected to be sent prior to camera initialization. Note this
336 * should be sent whenever authentication is restarted (see IBiometricsFace#userActivity).
H A DIBiometricsFaceClientCallback.hal42 * service that processed this authentication attempt.
43 * @param faceId The id of the face template that passed the authentication
46 * @param token The hardware authentication token associated with this
56 * authentication attempt, the HAL implementation must invoke this callback
69 * a message during authentication that is vendor-specific. The vendor
H A DIBiometricsFace.hal22 * The HAL interface for biometric face authentication.
79 * gatekeeper after verifying a successful strong authentication attempt,
82 * by a user authentication (PIN/pattern/password) can proceed.
115 * after a successful strong authentication request.
236 * authentication, where the device is idle to conserve power while
/aosp12/hardware/interfaces/gatekeeper/1.0/
H A DIGatekeeper.hal23 * or password, with the private key used only for enrolling authentication
63 * to attest to the recency of authentication.
72 * or for transactional password authentication.
82 * authentication token resulting from this verification is returned.
/aosp12/hardware/interfaces/wifi/supplicant/1.0/
H A DISupplicantStaNetworkCallback.hal41 * Used to request EAP GSM SIM authentication for this particular network.
52 * Used to request EAP UMTS SIM authentication for this particular network.
H A DISupplicantStaIfaceCallback.hal73 * until the IEEE 802.1X/EAPOL authentication has been completed.
80 * when the IEEE 802.1X/EAPOL authentication has been completed.
91 * This state is entered when the full authentication process is
96 * the EAP authentication has been completed). With static WEP keys and
475 * Used to indicate the timeout of authentication to an AP.
482 * Used to indicate an EAP authentication failure.
/aosp12/hardware/interfaces/keymaster/4.0/
H A Dtypes.hal340 * authentication state. This tag is mutually exclusive with Tag::NO_AUTH_REQUIRED.
378 NO_AUTH_REQUIRED = TagType:BOOL | 503, /* If key is usable without authentication. */
401 * after user authentication. If
403 * every usage (see begin() for the details of the authentication-per-operation flow).
406 * authentication of the user specified by Tag::USER_SECURE_ID with the authentication method
433 * mechanism analogous to the authentication token is defined for communicating proof of
448 * password authentication.
1097 * Hardware authentication type, used by HardwareAuthTokens to specify the mechanism used to
1194 * challenge is a value that's used to enable authentication tokens to authorize specific
1196 * operation, for keys that require authentication per operation. See begin() for details.
[all …]
/aosp12/hardware/interfaces/wifi/supplicant/1.1/
H A DISupplicantStaNetwork.hal30 * EAP IMSI Identity to be used for authentication to EAP SIM networks.
50 * Encrypted EAP IMSI Identity to be used for authentication to EAP SIM
H A DISupplicantStaIfaceCallback.hal41 * Used to indicate an EAP authentication failure.
/aosp12/build/make/target/board/
H A Dgsi_system_ext.prop4 # GSI always disables adb authentication
/aosp12/system/core/rootdir/
H A Dadb_debug.prop5 # Disable adb authentication to allow test automation on user build GSI
/aosp12/hardware/interfaces/confirmationui/1.0/
H A DIConfirmationUI.hal66 * @param secureInputToken An authentication token as generated by Android authentication
/aosp12/hardware/interfaces/wifi/supplicant/1.3/
H A DISupplicantStaNetwork.hal48 * FILS shared key authentication with sha-256
52 * FILS shared key authentication with sha-384
281 * Enable Extensible Authentication (EAP) - Re-authentication Protocol (ERP) for this network.
H A DISupplicantStaIfaceCallback.hal194 * Indicates an EAP authentication failure.
195 * @param errorCode Error code for EAP authentication failure.
/aosp12/frameworks/base/core/java/android/net/
H A DIpSecConfig.java102 public void setAuthentication(IpSecAlgorithm authentication) { in setAuthentication() argument
103 mAuthentication = authentication; in setAuthentication()
/aosp12/hardware/interfaces/keymaster/4.1/
H A DIKeymasterDevice.hal47 * authentication token with a later timestamp is presented. If the `passwordOnly' argument is
48 * set to true the sufficiently-recent authentication token must indicate that the user
/aosp12/frameworks/base/packages/SystemUI/docs/keyguard/
H A Dbouncer.md7 …f controllers/views to render the user's security method and to manage the authentication attempts.
/aosp12/frameworks/base/packages/SystemUI/docs/
H A Dkeyguard.md5 1. Handling authentication to allow the user to unlock the device, via biometrics or [KeyguardBounc…
/aosp12/hardware/interfaces/biometrics/fingerprint/2.3/
H A DIBiometricsFingerprint.hal26 * The interface for biometric fingerprint authentication.

123