/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/stringprep/ |
NFS4StringPrep.java | 88 "AUTHENTICATED",
|
TestStringPrep.java | 43 "AUTHENTICATED" Any authenticated user (opposite of 60 "AUTHENTICATED@",
|
/external/openssh/ |
auth-rh-rsa.c | 98 * We have authenticated the user using .rhosts or /etc/hosts.equiv,
|
cipher-chachapoly.c | 44 * to 'dest'. The ciphertext here is treated as additional authenticated
|
auth.c | 274 auth_log(Authctxt *authctxt, int authenticated, int partial, 284 if (authenticated == 1 || 295 authmsg = authenticated ? "Accepted" : "Failed"; 312 if (authenticated == 0 && !authctxt->postponed && 319 if (authenticated) 325 if (authenticated == 0 && !authctxt->postponed)
|
auth-rsa.c | 307 * 0 if the client could not be authenticated, and 1 if authentication was 339 * authenticated. Note that we have not yet processed the
|
/external/ppp/pppd/plugins/radius/etc/ |
radiusclient.conf | 52 # program to call for a RADIUS authenticated login
|
radiusclient.conf.in | 52 # program to call for a RADIUS authenticated login
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 226 * Authenticated Key Management Suite Count (2 octets, little endian) 228 * Authenticated Key Management Suite List (4 * n octets) 255 * Authenticated Key Management Suite Count (2 octets, little endian) 257 * Authenticated Key Management Suite List (4 * n octets)
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay.h | 96 Boolean authenticated; member in struct:ieee802_1x_kay
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
FingerprintBoundKeysTest.java | 140 * authenticated with device credentials within the last X seconds. 169 * only works if the user has just authenticated via device credentials.
|
/external/conscrypt/src/main/java/org/conscrypt/ |
PSKKeyManager.java | 38 * handshake to succeed. Thus, both peers are implicitly authenticated by a successful handshake. 50 * Moreover, these data are received and processed prior to peer having been authenticated. Thus,
|
/frameworks/base/keystore/java/android/security/keystore/ |
KeyProtection.java | 143 * signature padding scheme with SHA-256 digest and only if the user has been authenticated within 162 * // authenticated within the last ten minutes. 364 * authenticated. 378 * user is successfully authenticated. This has effect only if user authentication is required 598 * Sets whether this key is authorized to be used only if the user has been authenticated. 601 * authenticated. 639 * user is successfully authenticated. This has effect if the key requires user 656 * authenticated to proceed. This situation can be resolved by the user unlocking the secure [all...] |
KeyGenParameterSpec.java | 80 * <li>operation without requiring the user to be authenticated (see 97 * authenticated within the last five minutes. The use of public key is unrestricted, thus 111 * // Only permit the private key to be used if the user authenticated 497 * authenticated. 511 * user is successfully authenticated. This has effect only if user authentication is required [all...] |
/frameworks/base/services/core/java/com/android/server/policy/keyguard/ |
KeyguardServiceDelegate.java | 189 public void keyguardDone(boolean authenticated, boolean wakeup) { 191 mKeyguardService.keyguardDone(authenticated, wakeup);
|
/hardware/intel/img/hwcomposer/moorefield_hdmi/common/devices/ |
ExternalDevice.cpp | 178 // delay sending hotplug event until HDCP is authenticated 246 // delay sending hotplug event till HDCP is authenticated.
|
/external/mesa3d/src/egl/drivers/dri2/ |
platform_wayland.c | 632 dri2_dpy->authenticated = 0; 638 if (!dri2_dpy->authenticated) 641 /* reset authenticated */ 642 dri2_dpy->authenticated = 1; 722 dri2_dpy->authenticated = 1; 792 if (roundtrip(dri2_dpy) < 0 || !dri2_dpy->authenticated)
|
/frameworks/base/docs/html/training/articles/ |
keystore.jd | 101 <li><em>user authentication</em>: the key can only be used if the user has been authenticated 196 is only authorized to be used if the user has been authenticated. The user is authenticated using a 201 cannot bypass the requirement for the user to be authenticated to use the key. 203 <p>When a key is authorized to be used only if the user has been authenticated, it is configured to
|
/libcore/luni/src/main/java/javax/crypto/ |
CipherSpi.java | 372 * Authenticated Additional Data (AAD). AAD may only be added after the 376 * This is only usable with cipher modes that support Authenticated 394 "This cipher does not support Authenticated Encryption with Additional Data"); 400 * used for the Additional Authenticated Data (AAD). AAD may only be added 404 * This is only usable with cipher modes that support Authenticated
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
AuthenticationHelperImpl.java | 247 // we haven't yet authenticated this realm since we were 285 * @param method method of the request being authenticated 352 * @param method method of the request being authenticated
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
BlockCipherTestBase.java | 174 // Authenticated ciphers do not return any output when decrypting until doFinal where 175 // ciphertext is authenticated. 261 // Non-stream authenticated ciphers not supported 264 // Authenticated stream cipher 777 // Authenticated cipher -- no output until doFinal where ciphertext is authenticated. [all...] |
/development/samples/Vault/src/com/example/android/vault/ |
EncryptedDocument.java | 57 * Each section is encrypted using AES-128 with a random IV, and authenticated 58 * with SHA-256. Data encrypted and authenticated like this can be safely stored
|
/docs/source.android.com/src/source/ |
downloading.jd | 150 In that case, it is possible to use authenticated access, which then uses a separate quota 159 The second step is to force authenticated access, by using the following manifest URI:
|
/external/mesa3d/src/glx/apple/ |
appledri.c | 231 rep.authenticated = 0; 232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
|
/frameworks/base/core/java/android/net/ |
PskKeyManager.java | 38 * handshake to succeed. Thus, both peers are implicitly authenticated by a successful handshake. 50 * Moreover, these data are received and processed prior to peer having been authenticated. Thus,
|