HomeSort by relevance Sort by last modified time
    Searched full:authenticated (Results 76 - 100 of 323) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/stringprep/
NFS4StringPrep.java 88 "AUTHENTICATED",
TestStringPrep.java 43 "AUTHENTICATED" Any authenticated user (opposite of
60 "AUTHENTICATED@",
  /external/openssh/
auth-rh-rsa.c 98 * We have authenticated the user using .rhosts or /etc/hosts.equiv,
cipher-chachapoly.c 44 * to 'dest'. The ciphertext here is treated as additional authenticated
auth.c 274 auth_log(Authctxt *authctxt, int authenticated, int partial,
284 if (authenticated == 1 ||
295 authmsg = authenticated ? "Accepted" : "Failed";
312 if (authenticated == 0 && !authctxt->postponed &&
319 if (authenticated)
325 if (authenticated == 0 && !authctxt->postponed)
auth-rsa.c 307 * 0 if the client could not be authenticated, and 1 if authentication was
339 * authenticated. Note that we have not yet processed the
  /external/ppp/pppd/plugins/radius/etc/
radiusclient.conf 52 # program to call for a RADIUS authenticated login
radiusclient.conf.in 52 # program to call for a RADIUS authenticated login
  /external/wpa_supplicant_8/src/common/
wpa_common.h 226 * Authenticated Key Management Suite Count (2 octets, little endian)
228 * Authenticated Key Management Suite List (4 * n octets)
255 * Authenticated Key Management Suite Count (2 octets, little endian)
257 * Authenticated Key Management Suite List (4 * n octets)
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_kay.h 96 Boolean authenticated; member in struct:ieee802_1x_kay
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/security/
FingerprintBoundKeysTest.java 140 * authenticated with device credentials within the last X seconds.
169 * only works if the user has just authenticated via device credentials.
  /external/conscrypt/src/main/java/org/conscrypt/
PSKKeyManager.java 38 * handshake to succeed. Thus, both peers are implicitly authenticated by a successful handshake.
50 * Moreover, these data are received and processed prior to peer having been authenticated. Thus,
  /frameworks/base/keystore/java/android/security/keystore/
KeyProtection.java 143 * signature padding scheme with SHA-256 digest and only if the user has been authenticated within
162 * // authenticated within the last ten minutes.
364 * authenticated.
378 * user is successfully authenticated. This has effect only if user authentication is required
598 * Sets whether this key is authorized to be used only if the user has been authenticated.
601 * authenticated.
639 * user is successfully authenticated. This has effect if the key requires user
656 * authenticated to proceed. This situation can be resolved by the user unlocking the secure
    [all...]
KeyGenParameterSpec.java 80 * <li>operation without requiring the user to be authenticated (see
97 * authenticated within the last five minutes. The use of public key is unrestricted, thus
111 * // Only permit the private key to be used if the user authenticated
497 * authenticated.
511 * user is successfully authenticated. This has effect only if user authentication is required
    [all...]
  /frameworks/base/services/core/java/com/android/server/policy/keyguard/
KeyguardServiceDelegate.java 189 public void keyguardDone(boolean authenticated, boolean wakeup) {
191 mKeyguardService.keyguardDone(authenticated, wakeup);
  /hardware/intel/img/hwcomposer/moorefield_hdmi/common/devices/
ExternalDevice.cpp 178 // delay sending hotplug event until HDCP is authenticated
246 // delay sending hotplug event till HDCP is authenticated.
  /external/mesa3d/src/egl/drivers/dri2/
platform_wayland.c 632 dri2_dpy->authenticated = 0;
638 if (!dri2_dpy->authenticated)
641 /* reset authenticated */
642 dri2_dpy->authenticated = 1;
722 dri2_dpy->authenticated = 1;
792 if (roundtrip(dri2_dpy) < 0 || !dri2_dpy->authenticated)
  /frameworks/base/docs/html/training/articles/
keystore.jd 101 <li><em>user authentication</em>: the key can only be used if the user has been authenticated
196 is only authorized to be used if the user has been authenticated. The user is authenticated using a
201 cannot bypass the requirement for the user to be authenticated to use the key.
203 <p>When a key is authorized to be used only if the user has been authenticated, it is configured to
  /libcore/luni/src/main/java/javax/crypto/
CipherSpi.java 372 * Authenticated Additional Data (AAD). AAD may only be added after the
376 * This is only usable with cipher modes that support Authenticated
394 "This cipher does not support Authenticated Encryption with Additional Data");
400 * used for the Additional Authenticated Data (AAD). AAD may only be added
404 * This is only usable with cipher modes that support Authenticated
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
AuthenticationHelperImpl.java 247 // we haven't yet authenticated this realm since we were
285 * @param method method of the request being authenticated
352 * @param method method of the request being authenticated
  /cts/tests/tests/keystore/src/android/keystore/cts/
BlockCipherTestBase.java 174 // Authenticated ciphers do not return any output when decrypting until doFinal where
175 // ciphertext is authenticated.
261 // Non-stream authenticated ciphers not supported
264 // Authenticated stream cipher
777 // Authenticated cipher -- no output until doFinal where ciphertext is authenticated.
    [all...]
  /development/samples/Vault/src/com/example/android/vault/
EncryptedDocument.java 57 * Each section is encrypted using AES-128 with a random IV, and authenticated
58 * with SHA-256. Data encrypted and authenticated like this can be safely stored
  /docs/source.android.com/src/source/
downloading.jd 150 In that case, it is possible to use authenticated access, which then uses a separate quota
159 The second step is to force authenticated access, by using the following manifest URI:
  /external/mesa3d/src/glx/apple/
appledri.c 231 rep.authenticated = 0;
232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
  /frameworks/base/core/java/android/net/
PskKeyManager.java 38 * handshake to succeed. Thus, both peers are implicitly authenticated by a successful handshake.
50 * Moreover, these data are received and processed prior to peer having been authenticated. Thus,

Completed in 150 milliseconds

1 2 34 5 6 7 8 91011>>