/external/ppp/pppd/plugins/radius/etc/ |
radiusclient.conf.in | 52 # program to call for a RADIUS authenticated login
|
/external/selinux/libsepol/include/sepol/policydb/ |
context.h | 30 * A security context consists of an authenticated user
|
/external/syslinux/bios/com32/cmenu/ |
complex.c32 | |
/external/syslinux/efi32/com32/cmenu/ |
complex.c32 | |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 238 * Authenticated Key Management Suite Count (2 octets, little endian) 240 * Authenticated Key Management Suite List (4 * n octets) 267 * Authenticated Key Management Suite Count (2 octets, little endian) 269 * Authenticated Key Management Suite List (4 * n octets)
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothDevice.java | 294 * communication can be authenticated and encrypted. [all...] |
/frameworks/base/core/java/android/service/autofill/ |
SaveRequest.java | 68 * an authenticated request through the
|
/frameworks/base/core/java/com/android/internal/statusbar/ |
IStatusBarService.aidl | 95 // Used to hide the dialog when a finger is authenticated
|
/frameworks/base/keystore/java/android/security/keystore/ |
WrappedKeyEntry.java | 64 * representation of keyDescription provided as additional authenticated data.
|
KeyProtection.java | 155 * signature padding scheme with SHA-256 digest and only if the user has been authenticated within 173 * // authenticated within the last ten minutes. 399 * authenticated. 420 * authenticated. 433 * user is successfully authenticated. This has effect only if user authentication is required [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
SecureBox.java | 160 * <p>Note that {@code header} will be authenticated (but not encrypted) together with {@code 167 * @param header the data that will be authenticated with {@code payload} but not encrypted, or 219 * authenticated (but not encrypted) together with {@code payload}; otherwise, an {@code 226 * @param header the data that was authenticated with the original payload but not encrypted, or
|
/tools/acloud/internal/proto/ |
internal_config.proto | 69 // the home directory if the user is authenticated via Oauth2 method.
|
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
auth-framework.rst | 161 image until either an authenticated image or the ROT is reached. Then the 170 #. Specifying the CoT for each image that needs to be authenticated. Details of 613 by the ``parent`` field. Those nodes with no parent must be authenticated using 677 be checked to consider an image authenticated. Each method consists of a 703 must be extracted from an image once it has been authenticated. Each 826 The Trusted Key certificate is authenticated by checking its digital signature [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/Uefi/ |
UefiMultiPhase.h | 170 /// Attributes of Authenticated Variable
181 /// authenticated access, then the Data buffer should begin with an
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
PSKKeyManager.java | 38 * handshake to succeed. Thus, both peers are implicitly authenticated by a successful handshake. 50 * Moreover, these data are received and processed prior to peer having been authenticated. Thus,
|
/frameworks/base/core/java/android/app/trust/ |
TrustManager.java | 199 * Should only be called if user authenticated via fingerprint and bouncer can be skipped. 212 * Clears authenticated fingerprints for all users.
|
/frameworks/base/core/java/android/net/ |
IpSecConfig.java | 56 // Authenticated Encryption Algorithm 102 /** Set the authenticated encryption algorithm */
|
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
KeyguardUpdateMonitorCallback.java | 224 * Called when a fingerprint couldn't be authenticated. 230 * @param userId the user id for which the fingerprint was authenticated
|
/frameworks/base/telephony/java/android/telephony/ims/ |
ImsConferenceState.java | 55 * but the endpoint is not yet in the roster (probably being authenticated). 57 * (probably being authenticated).
|
/hardware/intel/img/hwcomposer/moorefield_hdmi/common/devices/ |
ExternalDevice.cpp | 178 // delay sending hotplug event until HDCP is authenticated 246 // delay sending hotplug event till HDCP is authenticated.
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/ |
CryptPkcs7Verify.c | 5 This library will have external input - signature (e.g. UEFI Authenticated
10 WrapPkcs7Data(), Pkcs7GetSigners(), Pkcs7Verify() will get UEFI Authenticated
38 UEFI Authenticated Variable is external input, so this function will do basic
235 UEFI Authenticated Variable is external input, so this function will do basic
729 UEFI Authenticated Variable is external input, so this function will do basic
|
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/ |
IpSecCryptIo.c | 427 @param[in] InDataFragment The list contains all data to be authenticated.
430 For out, the buffer contains the authenticated data.
548 @param[in] InDataFragment A list contains all data to be authenticated.
551 For out, the buffer contains the authenticated data.
555 @retval EFI_SUCCESS Authenticated the payload successfully.
|
IpSecCryptIo.h | 585 @param[in] InDataFragment The list contains all data to be authenticated.
588 For out, the buffer contains the authenticated data.
617 @param[in] InDataFragment A list contains all data to be authenticated.
620 For out, the buffer contains the authenticated data.
624 @retval EFI_SUCCESS Authenticated the payload successfully.
|
/external/autotest/client/common_lib/cros/network/ |
iw_runner_unittest.py | 189 ' authenticated: yes\n' 216 ' authenticated: yes\n' 237 ' authenticated: yes\n'
|
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/stringprep/ |
TestStringPrep.java | 50 "AUTHENTICATED" Any authenticated user (opposite of 67 "AUTHENTICATED@",
|