/system/bt/embdrv/sbc/decoder/include/ |
oi_bt_spec.h | 158 OI_LINK_KEY_TYPE_AUTHENTICATED = 5, /**< Authenticated */
|
/system/media/audio/include/system/ |
sound_trigger.h | 38 authenticated */
|
/external/icu/icu4c/source/test/cintltst/ |
spreptst.c | 368 "AUTHENTICATED" Any authenticated user (opposite of 385 "AUTHENTICATED@",
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 403 * 2 = allow authenticated provisioning, 404 * 3 = allow both unauthenticated and authenticated provisioning 430 * not need to be authenticated.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 622 "for now-authenticated peer " MACSTR, MAC2STR(peer->addr)); 773 "authenticated", MAC2STR(peer->addr)); 809 /* assume the peer is authenticated already */
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothSocket.java | 155 * @param auth require the remote device to be authenticated 172 * @param auth require the remote device to be authenticated 256 * @param auth require the remote device to be authenticated
|
BluetoothAdapter.java | [all...] |
/frameworks/base/keystore/java/android/security/ |
KeyStore.java | 675 // One of the key's SIDs is the current root SID -- user can be authenticated 684 // authenticated against that SID. 688 // None of the key's SIDs can ever be authenticated
|
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
FingerprintService.java | 574 boolean authenticated = fpId != 0; 577 if (!authenticated) { 585 Slog.w(TAG, "Failed to notify Authenticated:", e); [all...] |
/external/openssh/ |
sshd_config.0 | 127 username being authenticated, and should produce on standard 149 home directory of the user being authenticated, and %u is 168 the home directory of the user being authenticated, and %u is 201 at runtime once the connecting user has been authenticated: %% is 203 of the user being authenticated, and %u is replaced by the 281 user has authenticated successfully. The argument must be M-bM-^@M-^\yesM-bM-^@M-^], [all...] |
gss-serv.c | 189 * we flag the user as also having been authenticated
|
/external/ppp/pppd/ |
auth.c | 126 /* The name by which the peer authenticated itself to us. */ 198 /* A notifier for when the peer has authenticated itself, 753 * otherwise treat it as though it authenticated with PAP using 929 * The peer has been successfully authenticated using `protocol'. 968 * Save the authenticated name of the peer for later. 1007 * We have successfully authenticated ourselves with the peer using `protocol'. [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 304 SM_STATE(SUPP_PAE, AUTHENTICATED) 306 SM_ENTRY(SUPP_PAE, AUTHENTICATED); 369 SM_ENTER(SUPP_PAE, AUTHENTICATED); 391 SM_ENTER(SUPP_PAE, AUTHENTICATED); 982 return "AUTHENTICATED"; [all...] |
eapol_supp_sm.h | 37 * marking connection authenticated. This is a bit field of
|
/libcore/luni/src/main/java/javax/crypto/ |
Cipher.java | [all...] |
/external/boringssl/src/include/openssl/ |
modes.h | 111 /* CRYPTO_gcm128_aad sets the authenticated data for an instance of GCM. This
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
digest.py | 134 the request returning authenticated user or error.
|
/external/jetty/src/java/org/eclipse/jetty/server/ |
ShutdownMonitor.java | 36 * This thread listens on the port specified by the STOP.PORT system parameter (defaults to -1 for not listening) for request authenticated with the key given
|
/external/mesa3d/src/gallium/auxiliary/vl/ |
vl_winsys_dri.c | 357 if (authenticate == NULL || !authenticate->authenticated)
|
/external/srtp/doc/ |
rfc3711.txt | 319 +- Encrypted Portion* Authenticated Portion ---+ 373 data. The Authenticated Portion of an SRTP packet 430 Section 3.3.1 for its handling), which SHOULD be authenticated 440 indices of recently received and authenticated SRTP packets, 621 Authenticated Portion of the packet, as described in Section 4.2. [all...] |
/external/vboot_reference/firmware/lib/tpm_lite/include/ |
tpm_error_messages.h | 225 "Migration destination not authenticated" },
|
/frameworks/base/core/java/android/security/keymaster/ |
KeymasterDefs.java | 230 sErrorCodeToString.put(KM_ERROR_KEY_USER_NOT_AUTHENTICATED, "Key user not authenticated");
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/ |
StatusBarKeyguardViewManager.java | 484 * Notifies that the user has authenticated by other means than using the bouncer, for example,
|
/hardware/libhardware/include/hardware/ |
fingerprint.h | 105 fingerprint_authenticated_t authenticated; member in union:fingerprint_msg::__anon24775
|
/bionic/libc/include/arpa/ |
nameser.h | 255 * This structure is used for TSIG authenticated messages 265 * This structure is used for TSIG authenticated TCP messages
|