/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreAuthenticatedAESCipherSpi.java | 47 * Base class for Android Keystore authenticated AES {@link CipherSpi} implementations. 184 // plaintext before ciphertext is authenticated by KeyStore.finish.
|
KeymasterUtils.java | 124 // authenticated. Whatever unlocks the secure lock screen should authorize this key.
|
/packages/apps/Email/src/com/android/email/mail/transport/ |
SmtpSender.java | 280 // S: 235 2.0.0 OK Authenticated 290 // S: 235 2.0.0 OK Authenticated
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothDevice.java | 257 * communication can be authenticated and encrypted. [all...] |
/external/apache-http/src/org/apache/http/auth/ |
AuthScheme.java | 136 * @param request The request being authenticated
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
form.py | 71 authenticated.
|
cookie.py | 202 This middleware uses cookies to stash-away a previously authenticated 331 authenticated user (and perhaps other variables) so that
|
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
LoginAuthenticator.java | 87 //if we should renew sessions, and there is an existing session that may have been seen by non-authenticated users
|
/external/kernel-headers/original/uapi/linux/ |
sctp.h | 643 * 7.1.18. Add a chunk that must be authenticated (SCTP_AUTH_CHUNK) 646 * received only in an authenticated way. Changes to the list of chunks 788 * 7.2.3. Get the list of chunks the peer requires to be authenticated 792 * the peer requires to be received authenticated only.
|
/external/libdrm/man/ |
drm.xml | 78 are. Other DRM users can be authenticated to the DRM-Master via
|
/external/mesa3d/src/egl/drivers/dri2/ |
egl_dri2.h | 129 int authenticated; member in struct:dri2_egl_display
|
/external/mesa3d/src/glx/apple/ |
appledristr.h | 116 CARD32 authenticated B32;
|
/external/openssh/ |
sftp-server.0 | 27 home directory of the user being authenticated, and %u is
|
sftp-server.8 | 70 %d is replaced by the home directory of the user being authenticated,
|
sshd_config.5 | 235 being authenticated, and should produce on standard output zero or 265 %h is replaced by the home directory of the user being authenticated, and 292 %h is replaced by the home directory of the user being authenticated, and 342 the connecting user has been authenticated: %% is replaced by a literal '%', 343 %h is replaced by the home directory of the user being authenticated, and 471 the user has authenticated successfully. [all...] |
/external/toybox/toys/other/ |
login.c | 180 if (f_flag) break; // Pre-authenticated
|
/external/wpa_supplicant_8/src/ap/ |
sta_info.h | 182 /* Number of seconds to keep STA entry with Authenticated flag after it has
|
/frameworks/av/media/libstagefright/ |
SurfaceUtils.cpp | 71 ALOGE("native window could not be authenticated");
|
/frameworks/base/packages/Keyguard/src/com/android/keyguard/ |
KeyguardUpdateMonitorCallback.java | 180 * @param userId the user id for which the fingerprint was authenticated
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
wpa.h | 43 #define DOT11_RC_INVALID_AKMP 20 /* Invalid authenticated key management protocol */
|
/hardware/intel/common/libva/va/x11/ |
va_dri2str.h | 126 CARD32 authenticated B32;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/nfsd/ |
nfsfh.h | 48 * The auth_type field specifies how the filehandle can be authenticated
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/nfsd/ |
nfsfh.h | 50 * The auth_type field specifies how the filehandle can be authenticated
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
SecurityHandler.java | 210 * @return True if forwards to welcome files are authenticated 220 * authenticated 310 //if current request is authenticated, then as we have just created the session, mark it as secure, as it has not yet been returned to a user 667 * authenticated request. It can be used by Authenticators such as 669 * authenticated URI tree.
|
/external/selinux/policycoreutils/newrole/ |
newrole.c | 20 * If USE_PAM is not set, users will be authenticated via direct 178 * 1 PAM thinks that the user authenticated themselves properly 188 int result = 0; /* set to 0 (not authenticated) by default */ 214 result = 1; /* user authenticated OK! */ 348 * 1 user authenticated themselves properly according to the [all...] |