OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:authorized
(Results
26 - 50
of
1767
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/cros/system_api/dbus/cryptohome/
key.proto
49
// is
authorized
as per KeyAuthorizationData.
94
// was
authorized
in the AuthorizationRequest. Making |secret| required would
/external/autotest/client/site_tests/firmware_TouchMTB/public/
.chromeos.gestures.untrusted.write.boto
17
# The following OAuth2 token is
authorized
for scope(s):
/external/netperf/
COPYING
8
limitations, you are hereby
authorized
to (i) use, reproduce, and
MODULE_LICENSE_HP
8
limitations, you are hereby
authorized
to (i) use, reproduce, and
NOTICE
8
limitations, you are hereby
authorized
to (i) use, reproduce, and
/external/wpa_supplicant_8/src/ap/
ieee802_1x.h
28
struct sta_info *sta, int
authorized
);
/frameworks/base/keystore/java/android/security/keystore/
KeyPermanentlyInvalidatedException.java
24
* <p>This only occurs for keys which are
authorized
to be used only if the user has been
KeyGenParameterSpec.java
42
* system</a>. The spec determines
authorized
uses of the key, such as whether user authentication
43
* is required for using the key, what operations are
authorized
(e.g., signing, but not
75
* <p>NOTE: If a private key is not
authorized
to sign the self-signed certificate, then the
78
* the certificate the key needs to be
authorized
for all of the following:
106
* in the Android KeyStore system under alias {@code key1} where the private key is
authorized
to be
140
* alias {@code key1}
authorized
to be used only for signing using the RSA-PSS signature padding
166
* alias {@code key1} where the private key is
authorized
to be used only for decryption using RSA
193
* alias {@code key2}
authorized
to be used only for encryption/decryption in GCM mode with no
218
* {@code key2}
authorized
to be used only for generating an HMAC using SHA-256.
530
* Returns {@code true} if the key is
authorized
to be used only if the user has bee
[
all
...]
AndroidKeyStoreKeyPairGeneratorSpi.java
225
//
Authorized
to be used with any digest (including no digest).
242
//
Authorized
to be used with any digest (including no digest).
251
//
Authorized
to be used with any encryption and signature padding
[
all
...]
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/
nis_callback.h
5
* may copy or modify Sun RPC without charge, but are not
authorized
nis_callback.x
5
% * may copy or modify Sun RPC without charge, but are not
authorized
ypupd.h
5
* may copy or modify Sun RPC without charge, but are not
authorized
/external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h
14
typedef enum { Unauthorized,
Authorized
} PortStatus;
240
* port_cb - Set port
authorized
/unauthorized callback (optional)
242
* @
authorized
: Whether the supplicant port is now in
authorized
state
244
void (*port_cb)(void *ctx, int
authorized
);
/device/asus/fugu/self-extractors/broadcom/
LICENSE
25
c. The term "
Authorized
Android Enabled Device" means only the device
28
libraries in object code form, designed for use on the
Authorized
31
d. The term "
Authorized
Android Enabled Device Software" means a
32
packaged build for
Authorized
Android Enabled Devices, consisting
33
of files suitable for installation on an
Authorized
Android Enabled
43
Documentation for non-commercial use on an
Authorized
Android
44
Enabled Device and non-commercial redistribution of the
Authorized
/device/asus/fugu/self-extractors/google/
LICENSE
25
c. The term "
Authorized
Android Enabled Device" means only the device
28
libraries in object code form, designed for use on the
Authorized
31
d. The term "
Authorized
Android Enabled Device Software" means a
32
packaged build for
Authorized
Android Enabled Devices, consisting
33
of files suitable for installation on an
Authorized
Android Enabled
43
Documentation for non-commercial use on an
Authorized
Android
44
Enabled Device and non-commercial redistribution of the
Authorized
/device/asus/fugu/self-extractors/widevine/
LICENSE
25
c. The term "
Authorized
Android Enabled Device" means only the device
28
libraries in object code form, designed for use on the
Authorized
31
d. The term "
Authorized
Android Enabled Device Software" means a
32
packaged build for
Authorized
Android Enabled Devices, consisting
33
of files suitable for installation on an
Authorized
Android Enabled
43
Documentation for non-commercial use on an
Authorized
Android
44
Enabled Device and non-commercial redistribution of the
Authorized
/device/moto/shamu/self-extractors/broadcom/
LICENSE
25
c. The term "
Authorized
Android Enabled Device" means only the device
28
libraries in object code form, designed for use on the
Authorized
31
d. The term "
Authorized
Android Enabled Device Software" means a
32
packaged build for
Authorized
Android Enabled Devices, consisting
33
of files suitable for installation on an
Authorized
Android Enabled
43
Documentation for non-commercial use on an
Authorized
Android
44
Enabled Device and non-commercial redistribution of the
Authorized
/external/chromium-trace/catapult/dashboard/dashboard/
buildbucket_service.py
46
# account is
authorized
for buildbucket.
/external/chromium-trace/catapult/firefighter/
README.md
24
1. Ensure you are
authorized
to run gcloud commands.
/external/crcalc/src/com/hp/creals/
StringFloatRep.java
16
//
AUTHORIZED
HEREUNDER EXCEPT UNDER THIS DISCLAIMER.
/external/opencv3/3rdparty/libjasper/
LICENSE
26
LICENSE. NO USE OF THE SOFTWARE IS
AUTHORIZED
HEREUNDER EXCEPT UNDER
/external/selinux/libselinux/man/man3/
get_ordered_context_list.3
84
authorized
contexts could not be obtained. Caller must free via
/external/tcpdump/
rpc_auth.h
5
* may copy or modify Sun RPC without charge, but are not
authorized
/external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h
75
void (*set_port_authorized)(void *ctx, void *sta_ctx, int
authorized
);
/frameworks/base/docs/html/training/articles/
keystore.jd
60
specify
authorized
uses of their keys and then enforcing these restrictions outside of the apps'
79
modes, padding schemes, and digests with which the key is
authorized
to be used. To check whether
89
authorized
uses of their keys when generating or importing the keys. Once a key is generated or
97
<li><em>cryptography</em>:
authorized
key algorithm, operations or purposes (encrypt, decrypt, sign,
99
<li><em>temporal validity interval</em>: interval of time during which the key is
authorized
for
198
is only
authorized
to be used if the user has been authenticated. The user is authenticated using a
205
<p>When a key is
authorized
to be used only if the user has been authenticated, it is configured to
209
authorized
for use as soon as the user unlocks the secure lock screen or confirms their secure
220
this mode, each operation involving such a key must be individually
authorized
by the user.
Completed in 474 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>