HomeSort by relevance Sort by last modified time
    Searched refs:authenticated (Results 1 - 25 of 55) sorted by null

1 2 3

  /hardware/interfaces/biometrics/fingerprint/2.1/default/
BiometricsFingerprint.cpp 314 if (msg->data.authenticated.finger.fid != 0) {
316 msg->data.authenticated.finger.fid,
317 msg->data.authenticated.finger.gid);
319 reinterpret_cast<const uint8_t *>(&msg->data.authenticated.hat);
321 std::vector<uint8_t>(hat, hat + sizeof(msg->data.authenticated.hat)));
323 msg->data.authenticated.finger.fid,
324 msg->data.authenticated.finger.gid,
331 msg->data.authenticated.finger.fid,
332 msg->data.authenticated.finger.gid,
  /frameworks/base/services/core/java/com/android/server/fingerprint/
AuthenticationClient.java 83 * This method is called when a fingerprint is authenticated or authentication is stopped
157 boolean authenticated = fingerId != 0;
162 if (authenticated) {
169 Slog.e(TAG, "Failed to notify Authenticated:", e);
177 authenticated); local
178 if (!authenticated) {
191 Slog.w(TAG, "Failed to notify Authenticated:", e);
197 if (!authenticated) {
  /frameworks/base/packages/SystemUI/src/com/android/keyguard/
KeyguardSecurityContainer.java 59 public boolean dismiss(boolean authenticated, int targetUserId);
64 * @param strongAuth wheher the user has authenticated with strong authentication like
314 * @param authenticated true if the user entered the correct authentication
319 boolean showNextSecurityScreenOrFinish(boolean authenticated, int targetUserId) {
320 if (DEBUG) Log.d(TAG, "showNextSecurityScreenOrFinish(" + authenticated + ")");
332 } else if (authenticated) {
423 public void dismiss(boolean authenticated, int targetId) {
424 mSecurityCallback.dismiss(authenticated, targetId);
507 public void dismiss(boolean authenticated, int targetUserId) {
508 mCallback.dismiss(authenticated, targetUserId)
    [all...]
KeyguardHostView.java 92 dismiss(false /* authenticated */, userId);
208 public boolean dismiss(boolean authenticated, int targetUserId) {
209 return mSecurityContainer.showNextSecurityScreenOrFinish(authenticated, targetUserId);
216 * @param strongAuth whether the user has authenticated with strong authentication like
  /external/ppp/pppd/plugins/
winbind.c 60 #define AUTHENTICATED 1
260 int authenticated = NOT_AUTHENTICATED; /* not auth */ local
404 } else if (strcasecmp(message, "Authenticated") == 0) {
406 authenticated = AUTHENTICATED;
409 authenticated = NOT_AUTHENTICATED;
421 authenticated = NOT_AUTHENTICATED;
425 authenticated = NOT_AUTHENTICATED;
448 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key)
    [all...]
  /external/apache-harmony/support/src/test/java/tests/support/
Support_HttpServer.java 220 boolean authenticated = false, contentLength = false, chunked = false;
236 authenticated = true;
270 authenticateTest(authenticated);
336 private void authenticateTest(boolean authenticated) {
346 if (!authenticated) {
  /frameworks/base/services/core/jni/
com_android_server_fingerprint_FingerprintService.cpp 101 arg1 = msg.data.authenticated.finger.fid;
102 arg2 = msg.data.authenticated.finger.gid;
104 notifyKeystore(reinterpret_cast<uint8_t *>(&msg.data.authenticated.hat),
105 sizeof(msg.data.authenticated.hat));
  /hardware/libhardware/include/hardware/
fingerprint.h 117 fingerprint_authenticated_t authenticated; member in union:fingerprint_msg::__anon48129
  /external/libmicrohttpd/doc/examples/
tlsauthentication.c 160 int authenticated; local
183 authenticated =
188 return authenticated;
  /device/generic/goldfish/fingerprint/
fingerprint.c 579 // authenticated message
582 auth_msg.data.authenticated.finger.fid = is_valid_fid(qdev, fid) ? fid : 0;
583 auth_msg.data.authenticated.finger.gid = 0; // unused
584 auth_msg.data.authenticated.hat.version = HW_AUTH_TOKEN_VERSION;
585 auth_msg.data.authenticated.hat.authenticator_type =
587 auth_msg.data.authenticated.hat.challenge = qdev->op_id;
588 auth_msg.data.authenticated.hat.authenticator_id = qdev->authenticator_id;
589 auth_msg.data.authenticated.hat.user_id = qdev->secure_user_id;
592 auth_msg.data.authenticated.hat.timestamp =
  /hardware/intel/common/libva/va/wayland/
wayland-drm-client-protocol.h 134 * authenticated - authenticated
136 void (*authenticated)(void *data, member in struct:wl_drm_listener
  /compatibility/cdd/6_dev-tools-and-options/
6_1_developer_tools.md 17 adb. Secure adb enables adb on known authenticated hosts.
  /prebuilts/go/darwin-x86/src/crypto/cipher/
example_test.go 110 // critical to note that ciphertexts must be authenticated (i.e. by
150 // It's important to remember that ciphertexts must be authenticated
210 // It's important to remember that ciphertexts must be authenticated
240 // It's important to remember that ciphertexts must be authenticated
279 // It's important to remember that ciphertexts must be authenticated
  /prebuilts/go/linux-x86/src/crypto/cipher/
example_test.go 110 // critical to note that ciphertexts must be authenticated (i.e. by
150 // It's important to remember that ciphertexts must be authenticated
210 // It's important to remember that ciphertexts must be authenticated
240 // It's important to remember that ciphertexts must be authenticated
279 // It's important to remember that ciphertexts must be authenticated
  /external/mesa3d/src/glx/apple/
appledri.c 231 rep.authenticated = 0;
232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
appledristr.h 116 CARD32 authenticated B32;
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_kay.h 173 Boolean authenticated; member in struct:ieee802_1x_kay
  /hardware/intel/common/libva/va/x11/
va_dri2str.h 126 CARD32 authenticated B32;
  /external/mesa3d/src/egl/drivers/dri2/
platform_wayland.c 886 dri2_dpy->authenticated = 0;
892 if (!dri2_dpy->authenticated)
895 /* reset authenticated */
896 dri2_dpy->authenticated = 1;
919 dri2_dpy->authenticated = 1;
957 dri2_dpy->authenticated = 1;
963 .authenticated = drm_handle_authenticated,
    [all...]
  /external/google-breakpad/src/testing/gtest/scripts/
upload.py 145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
    [all...]
  /external/google-breakpad/src/testing/scripts/
upload.py 145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
    [all...]
  /external/googletest/googlemock/scripts/
upload.py 145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
    [all...]
  /external/googletest/googletest/scripts/
upload.py 145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
    [all...]
  /external/v8/testing/gmock/scripts/
upload.py 145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
    [all...]
  /external/v8/testing/gtest/scripts/
upload.py 145 self.authenticated = False
237 self.authenticated = True
310 if not self.authenticated:
373 self.authenticated = True
490 server.authenticated = True
    [all...]

Completed in 2007 milliseconds

1 2 3