/hardware/interfaces/biometrics/fingerprint/2.1/default/ |
BiometricsFingerprint.cpp | 314 if (msg->data.authenticated.finger.fid != 0) { 316 msg->data.authenticated.finger.fid, 317 msg->data.authenticated.finger.gid); 319 reinterpret_cast<const uint8_t *>(&msg->data.authenticated.hat); 321 std::vector<uint8_t>(hat, hat + sizeof(msg->data.authenticated.hat))); 323 msg->data.authenticated.finger.fid, 324 msg->data.authenticated.finger.gid, 331 msg->data.authenticated.finger.fid, 332 msg->data.authenticated.finger.gid,
|
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
AuthenticationClient.java | 83 * This method is called when a fingerprint is authenticated or authentication is stopped 157 boolean authenticated = fingerId != 0; 162 if (authenticated) { 169 Slog.e(TAG, "Failed to notify Authenticated:", e); 177 authenticated); local 178 if (!authenticated) { 191 Slog.w(TAG, "Failed to notify Authenticated:", e); 197 if (!authenticated) {
|
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
KeyguardSecurityContainer.java | 59 public boolean dismiss(boolean authenticated, int targetUserId); 64 * @param strongAuth wheher the user has authenticated with strong authentication like 314 * @param authenticated true if the user entered the correct authentication 319 boolean showNextSecurityScreenOrFinish(boolean authenticated, int targetUserId) { 320 if (DEBUG) Log.d(TAG, "showNextSecurityScreenOrFinish(" + authenticated + ")"); 332 } else if (authenticated) { 423 public void dismiss(boolean authenticated, int targetId) { 424 mSecurityCallback.dismiss(authenticated, targetId); 507 public void dismiss(boolean authenticated, int targetUserId) { 508 mCallback.dismiss(authenticated, targetUserId) [all...] |
KeyguardHostView.java | 92 dismiss(false /* authenticated */, userId); 208 public boolean dismiss(boolean authenticated, int targetUserId) { 209 return mSecurityContainer.showNextSecurityScreenOrFinish(authenticated, targetUserId); 216 * @param strongAuth whether the user has authenticated with strong authentication like
|
/external/ppp/pppd/plugins/ |
winbind.c | 60 #define AUTHENTICATED 1 260 int authenticated = NOT_AUTHENTICATED; /* not auth */ local 404 } else if (strcasecmp(message, "Authenticated") == 0) { 406 authenticated = AUTHENTICATED; 409 authenticated = NOT_AUTHENTICATED; 421 authenticated = NOT_AUTHENTICATED; 425 authenticated = NOT_AUTHENTICATED; 448 if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) [all...] |
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_HttpServer.java | 220 boolean authenticated = false, contentLength = false, chunked = false; 236 authenticated = true; 270 authenticateTest(authenticated); 336 private void authenticateTest(boolean authenticated) { 346 if (!authenticated) {
|
/frameworks/base/services/core/jni/ |
com_android_server_fingerprint_FingerprintService.cpp | 101 arg1 = msg.data.authenticated.finger.fid; 102 arg2 = msg.data.authenticated.finger.gid; 104 notifyKeystore(reinterpret_cast<uint8_t *>(&msg.data.authenticated.hat), 105 sizeof(msg.data.authenticated.hat));
|
/hardware/libhardware/include/hardware/ |
fingerprint.h | 117 fingerprint_authenticated_t authenticated; member in union:fingerprint_msg::__anon48129
|
/external/libmicrohttpd/doc/examples/ |
tlsauthentication.c | 160 int authenticated; local 183 authenticated = 188 return authenticated;
|
/device/generic/goldfish/fingerprint/ |
fingerprint.c | 579 // authenticated message 582 auth_msg.data.authenticated.finger.fid = is_valid_fid(qdev, fid) ? fid : 0; 583 auth_msg.data.authenticated.finger.gid = 0; // unused 584 auth_msg.data.authenticated.hat.version = HW_AUTH_TOKEN_VERSION; 585 auth_msg.data.authenticated.hat.authenticator_type = 587 auth_msg.data.authenticated.hat.challenge = qdev->op_id; 588 auth_msg.data.authenticated.hat.authenticator_id = qdev->authenticator_id; 589 auth_msg.data.authenticated.hat.user_id = qdev->secure_user_id; 592 auth_msg.data.authenticated.hat.timestamp =
|
/hardware/intel/common/libva/va/wayland/ |
wayland-drm-client-protocol.h | 134 * authenticated - authenticated 136 void (*authenticated)(void *data, member in struct:wl_drm_listener
|
/compatibility/cdd/6_dev-tools-and-options/ |
6_1_developer_tools.md | 17 adb. Secure adb enables adb on known authenticated hosts.
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
example_test.go | 110 // critical to note that ciphertexts must be authenticated (i.e. by 150 // It's important to remember that ciphertexts must be authenticated 210 // It's important to remember that ciphertexts must be authenticated 240 // It's important to remember that ciphertexts must be authenticated 279 // It's important to remember that ciphertexts must be authenticated
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
example_test.go | 110 // critical to note that ciphertexts must be authenticated (i.e. by 150 // It's important to remember that ciphertexts must be authenticated 210 // It's important to remember that ciphertexts must be authenticated 240 // It's important to remember that ciphertexts must be authenticated 279 // It's important to remember that ciphertexts must be authenticated
|
/external/mesa3d/src/glx/apple/ |
appledri.c | 231 rep.authenticated = 0; 232 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
|
appledristr.h | 116 CARD32 authenticated B32;
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay.h | 173 Boolean authenticated; member in struct:ieee802_1x_kay
|
/hardware/intel/common/libva/va/x11/ |
va_dri2str.h | 126 CARD32 authenticated B32;
|
/external/mesa3d/src/egl/drivers/dri2/ |
platform_wayland.c | 886 dri2_dpy->authenticated = 0; 892 if (!dri2_dpy->authenticated) 895 /* reset authenticated */ 896 dri2_dpy->authenticated = 1; 919 dri2_dpy->authenticated = 1; 957 dri2_dpy->authenticated = 1; 963 .authenticated = drm_handle_authenticated, [all...] |
/external/google-breakpad/src/testing/gtest/scripts/ |
upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True [all...] |
/external/google-breakpad/src/testing/scripts/ |
upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True [all...] |
/external/googletest/googlemock/scripts/ |
upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True [all...] |
/external/googletest/googletest/scripts/ |
upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True [all...] |
/external/v8/testing/gmock/scripts/ |
upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True [all...] |
/external/v8/testing/gtest/scripts/ |
upload.py | 145 self.authenticated = False 237 self.authenticated = True 310 if not self.authenticated: 373 self.authenticated = True 490 server.authenticated = True [all...] |