HomeSort by relevance Sort by last modified time
    Searched full:authenticated (Results 151 - 175 of 323) sorted by null

1 2 3 4 5 67 8 91011>>

  /system/bt/embdrv/sbc/decoder/include/
oi_bt_spec.h 158 OI_LINK_KEY_TYPE_AUTHENTICATED = 5, /**< Authenticated */
  /system/media/audio/include/system/
sound_trigger.h 38 authenticated */
  /external/icu/icu4c/source/test/cintltst/
spreptst.c 368 "AUTHENTICATED" Any authenticated user (opposite of
385 "AUTHENTICATED@",
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 403 * 2 = allow authenticated provisioning,
404 * 3 = allow both unauthenticated and authenticated provisioning
430 * not need to be authenticated.
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 622 "for now-authenticated peer " MACSTR, MAC2STR(peer->addr));
773 "authenticated", MAC2STR(peer->addr));
809 /* assume the peer is authenticated already */
  /frameworks/base/core/java/android/bluetooth/
BluetoothSocket.java 155 * @param auth require the remote device to be authenticated
172 * @param auth require the remote device to be authenticated
256 * @param auth require the remote device to be authenticated
BluetoothAdapter.java     [all...]
  /frameworks/base/keystore/java/android/security/
KeyStore.java 675 // One of the key's SIDs is the current root SID -- user can be authenticated
684 // authenticated against that SID.
688 // None of the key's SIDs can ever be authenticated
  /frameworks/base/services/core/java/com/android/server/fingerprint/
FingerprintService.java 574 boolean authenticated = fpId != 0;
577 if (!authenticated) {
585 Slog.w(TAG, "Failed to notify Authenticated:", e);
    [all...]
  /external/openssh/
sshd_config.0 127 username being authenticated, and should produce on standard
149 home directory of the user being authenticated, and %u is
168 the home directory of the user being authenticated, and %u is
201 at runtime once the connecting user has been authenticated: %% is
203 of the user being authenticated, and %u is replaced by the
281 user has authenticated successfully. The argument must be M-bM-^@M-^\yesM-bM-^@M-^],
    [all...]
gss-serv.c 189 * we flag the user as also having been authenticated
  /external/ppp/pppd/
auth.c 126 /* The name by which the peer authenticated itself to us. */
198 /* A notifier for when the peer has authenticated itself,
753 * otherwise treat it as though it authenticated with PAP using
929 * The peer has been successfully authenticated using `protocol'.
968 * Save the authenticated name of the peer for later.
1007 * We have successfully authenticated ourselves with the peer using `protocol'.
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 304 SM_STATE(SUPP_PAE, AUTHENTICATED)
306 SM_ENTRY(SUPP_PAE, AUTHENTICATED);
369 SM_ENTER(SUPP_PAE, AUTHENTICATED);
391 SM_ENTER(SUPP_PAE, AUTHENTICATED);
982 return "AUTHENTICATED";
    [all...]
eapol_supp_sm.h 37 * marking connection authenticated. This is a bit field of
  /libcore/luni/src/main/java/javax/crypto/
Cipher.java     [all...]
  /external/boringssl/src/include/openssl/
modes.h 111 /* CRYPTO_gcm128_aad sets the authenticated data for an instance of GCM. This
  /external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/
digest.py 134 the request returning authenticated user or error.
  /external/jetty/src/java/org/eclipse/jetty/server/
ShutdownMonitor.java 36 * This thread listens on the port specified by the STOP.PORT system parameter (defaults to -1 for not listening) for request authenticated with the key given
  /external/mesa3d/src/gallium/auxiliary/vl/
vl_winsys_dri.c 357 if (authenticate == NULL || !authenticate->authenticated)
  /external/srtp/doc/
rfc3711.txt 319 +- Encrypted Portion* Authenticated Portion ---+
373 data. The Authenticated Portion of an SRTP packet
430 Section 3.3.1 for its handling), which SHOULD be authenticated
440 indices of recently received and authenticated SRTP packets,
621 Authenticated Portion of the packet, as described in Section 4.2.
    [all...]
  /external/vboot_reference/firmware/lib/tpm_lite/include/
tpm_error_messages.h 225 "Migration destination not authenticated" },
  /frameworks/base/core/java/android/security/keymaster/
KeymasterDefs.java 230 sErrorCodeToString.put(KM_ERROR_KEY_USER_NOT_AUTHENTICATED, "Key user not authenticated");
  /frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/
StatusBarKeyguardViewManager.java 484 * Notifies that the user has authenticated by other means than using the bouncer, for example,
  /hardware/libhardware/include/hardware/
fingerprint.h 105 fingerprint_authenticated_t authenticated; member in union:fingerprint_msg::__anon24775
  /bionic/libc/include/arpa/
nameser.h 255 * This structure is used for TSIG authenticated messages
265 * This structure is used for TSIG authenticated TCP messages

Completed in 327 milliseconds

1 2 3 4 5 67 8 91011>>