HomeSort by relevance Sort by last modified time
    Searched full:authorized (Results 26 - 50 of 1767) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/cros/system_api/dbus/cryptohome/
key.proto 49 // is authorized as per KeyAuthorizationData.
94 // was authorized in the AuthorizationRequest. Making |secret| required would
  /external/autotest/client/site_tests/firmware_TouchMTB/public/
.chromeos.gestures.untrusted.write.boto 17 # The following OAuth2 token is authorized for scope(s):
  /external/netperf/
COPYING 8 limitations, you are hereby authorized to (i) use, reproduce, and
MODULE_LICENSE_HP 8 limitations, you are hereby authorized to (i) use, reproduce, and
NOTICE 8 limitations, you are hereby authorized to (i) use, reproduce, and
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.h 28 struct sta_info *sta, int authorized);
  /frameworks/base/keystore/java/android/security/keystore/
KeyPermanentlyInvalidatedException.java 24 * <p>This only occurs for keys which are authorized to be used only if the user has been
KeyGenParameterSpec.java 42 * system</a>. The spec determines authorized uses of the key, such as whether user authentication
43 * is required for using the key, what operations are authorized (e.g., signing, but not
75 * <p>NOTE: If a private key is not authorized to sign the self-signed certificate, then the
78 * the certificate the key needs to be authorized for all of the following:
106 * in the Android KeyStore system under alias {@code key1} where the private key is authorized to be
140 * alias {@code key1} authorized to be used only for signing using the RSA-PSS signature padding
166 * alias {@code key1} where the private key is authorized to be used only for decryption using RSA
193 * alias {@code key2} authorized to be used only for encryption/decryption in GCM mode with no
218 * {@code key2} authorized to be used only for generating an HMAC using SHA-256.
530 * Returns {@code true} if the key is authorized to be used only if the user has bee
    [all...]
AndroidKeyStoreKeyPairGeneratorSpi.java 225 // Authorized to be used with any digest (including no digest).
242 // Authorized to be used with any digest (including no digest).
251 // Authorized to be used with any encryption and signature padding
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/
nis_callback.h 5 * may copy or modify Sun RPC without charge, but are not authorized
nis_callback.x 5 % * may copy or modify Sun RPC without charge, but are not authorized
ypupd.h 5 * may copy or modify Sun RPC without charge, but are not authorized
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 14 typedef enum { Unauthorized, Authorized } PortStatus;
240 * port_cb - Set port authorized/unauthorized callback (optional)
242 * @authorized: Whether the supplicant port is now in authorized state
244 void (*port_cb)(void *ctx, int authorized);
  /device/asus/fugu/self-extractors/broadcom/
LICENSE 25 c. The term "Authorized Android Enabled Device" means only the device
28 libraries in object code form, designed for use on the Authorized
31 d. The term "Authorized Android Enabled Device Software" means a
32 packaged build for Authorized Android Enabled Devices, consisting
33 of files suitable for installation on an Authorized Android Enabled
43 Documentation for non-commercial use on an Authorized Android
44 Enabled Device and non-commercial redistribution of the Authorized
  /device/asus/fugu/self-extractors/google/
LICENSE 25 c. The term "Authorized Android Enabled Device" means only the device
28 libraries in object code form, designed for use on the Authorized
31 d. The term "Authorized Android Enabled Device Software" means a
32 packaged build for Authorized Android Enabled Devices, consisting
33 of files suitable for installation on an Authorized Android Enabled
43 Documentation for non-commercial use on an Authorized Android
44 Enabled Device and non-commercial redistribution of the Authorized
  /device/asus/fugu/self-extractors/widevine/
LICENSE 25 c. The term "Authorized Android Enabled Device" means only the device
28 libraries in object code form, designed for use on the Authorized
31 d. The term "Authorized Android Enabled Device Software" means a
32 packaged build for Authorized Android Enabled Devices, consisting
33 of files suitable for installation on an Authorized Android Enabled
43 Documentation for non-commercial use on an Authorized Android
44 Enabled Device and non-commercial redistribution of the Authorized
  /device/moto/shamu/self-extractors/broadcom/
LICENSE 25 c. The term "Authorized Android Enabled Device" means only the device
28 libraries in object code form, designed for use on the Authorized
31 d. The term "Authorized Android Enabled Device Software" means a
32 packaged build for Authorized Android Enabled Devices, consisting
33 of files suitable for installation on an Authorized Android Enabled
43 Documentation for non-commercial use on an Authorized Android
44 Enabled Device and non-commercial redistribution of the Authorized
  /external/chromium-trace/catapult/dashboard/dashboard/
buildbucket_service.py 46 # account is authorized for buildbucket.
  /external/chromium-trace/catapult/firefighter/
README.md 24 1. Ensure you are authorized to run gcloud commands.
  /external/crcalc/src/com/hp/creals/
StringFloatRep.java 16 // AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.
  /external/opencv3/3rdparty/libjasper/
LICENSE 26 LICENSE. NO USE OF THE SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER
  /external/selinux/libselinux/man/man3/
get_ordered_context_list.3 84 authorized contexts could not be obtained. Caller must free via
  /external/tcpdump/
rpc_auth.h 5 * may copy or modify Sun RPC without charge, but are not authorized
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
  /frameworks/base/docs/html/training/articles/
keystore.jd 60 specify authorized uses of their keys and then enforcing these restrictions outside of the apps'
79 modes, padding schemes, and digests with which the key is authorized to be used. To check whether
89 authorized uses of their keys when generating or importing the keys. Once a key is generated or
97 <li><em>cryptography</em>: authorized key algorithm, operations or purposes (encrypt, decrypt, sign,
99 <li><em>temporal validity interval</em>: interval of time during which the key is authorized for
198 is only authorized to be used if the user has been authenticated. The user is authenticated using a
205 <p>When a key is authorized to be used only if the user has been authenticated, it is configured to
209 authorized for use as soon as the user unlocks the secure lock screen or confirms their secure
220 this mode, each operation involving such a key must be individually authorized by the user.

Completed in 474 milliseconds

12 3 4 5 6 7 8 91011>>