HomeSort by relevance Sort by last modified time
    Searched full:authenticated (Results 201 - 225 of 567) sorted by null

1 2 3 4 5 6 7 891011>>

  /frameworks/base/core/java/android/hardware/biometrics/
BiometricAuthenticator.java 88 * Obtain the userId for which this biometric was authenticated.
  /frameworks/base/core/java/android/service/autofill/
FillRequest.java 136 * an authenticated request through the
  /frameworks/base/core/java/com/android/internal/statusbar/
IStatusBar.aidl 145 // Used to hide the dialog when a finger is authenticated
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
OsuNetworkConnection.java 157 * network is either open or OSEN (OSU Server-only authenticated layer 2 Encryption Network).
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
wpa.h 43 #define DOT11_RC_INVALID_AKMP 20 /* Invalid authenticated key management protocol */
  /hardware/intel/common/libva/va/x11/
va_dri2str.h 126 CARD32 authenticated B32;
  /hardware/interfaces/biometrics/fingerprint/2.1/
types.hal 144 AUTHENTICATED = 5,
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/nfsd/
nfsfh.h 50 * The auth_type field specifies how the filehandle can be authenticated
  /prebuilts/vndk/v27/arm/arch-arm-armv7-a-neon/shared/vndk-core/
android.hardware.biometrics.fingerprint@2.1.so 
  /prebuilts/vndk/v27/arm64/arch-arm-armv7-a-neon/shared/vndk-core/
android.hardware.biometrics.fingerprint@2.1.so 
  /system/bt/embdrv/sbc/decoder/include/
oi_bt_spec.h 141 OI_LINK_KEY_TYPE_AUTHENTICATED = 5, /* Authenticated */
  /external/cros/system_api/dbus/
service_constants.h 477 const char kFlagAuthenticatedSignedWrites[] = "authenticated-signed-writes";
483 const char kFlagEncryptAuthenticatedRead[] = "encrypt-authenticated-read";
484 const char kFlagEncryptAuthenticatedWrite[] = "encrypt-authenticated-write";
512 const char kFlagEncryptAuthenticatedRead[] = "encrypt-authenticated-read";
513 const char kFlagEncryptAuthenticatedWrite[] = "encrypt-authenticated-write";
    [all...]
  /external/selinux/policycoreutils/newrole/
newrole.c 20 * If USE_PAM is not set, users will be authenticated via direct
178 * 1 PAM thinks that the user authenticated themselves properly
188 int result = 0; /* set to 0 (not authenticated) by default */
214 result = 1; /* user authenticated OK! */
344 * 1 user authenticated themselves properly according to the
    [all...]
  /external/syslinux/core/lwip/src/netif/ppp/
auth.c 98 /* The name by which the peer authenticated itself to us. */
466 * treat it as though it authenticated with PAP using a username
585 * The peer has been successfully authenticated using `protocol'.
606 * Save the authenticated name of the peer for later.
648 * We have successfully authenticated ourselves with the peer using `protocol'.
    [all...]
  /device/linaro/bootloader/arm-trusted-firmware/common/
bl_common.c 334 * File has been successfully loaded and authenticated.
535 * File has been successfully loaded and authenticated.
  /device/linaro/bootloader/edk2/SecurityPkg/UserIdentification/PwdCredentialProviderDxe/
PwdCredentialProvider.h 207 Return the user identifier associated with the currently authenticated user.
209 This function returns the user identifier of the user authenticated by this credential
  /device/linaro/bootloader/edk2/SecurityPkg/UserIdentification/UsbCredentialProviderDxe/
UsbCredentialProvider.h 195 Return the user identifier associated with the currently authenticated user.
197 This function returns the user identifier of the user authenticated by this credential
  /external/libdrm/tests/ttmtest/src/
xf86dri.c 246 rep.authenticated = 0;
247 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
  /external/libvncserver/webclients/java-applet/ssl/
README 194 into an HTTPS website via password they are authenticated and
218 into an HTTPS website via password they are authenticated and
  /external/ltp/testcases/network/stress/ipsec/
ipsec_lib.sh 24 # Authenticated encryption with associated data
47 echo "A x Authenticated encryption with associated data algorithm"
  /external/mesa3d/src/glx/
XF86dri.c 243 rep.authenticated = 0;
244 if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.authenticated) {
  /external/ppp/pppd/
session.c 307 * has not been authenticated using local UNIX system services.
379 * Enter the user in lastlog only if he has been authenticated using
  /external/scapy/scapy/layers/tls/crypto/
cipher_aead.py 7 Authenticated Encryption with Associated Data ciphers.
132 API. Additional data may be authenticated without encryption (as A).
  /external/skia/infra/bots/assets/
asset_utils.py 57 """Verify that we have the CIPD binary and that we're authenticated."""
64 raise Exception('CIPD not authenticated. You may need to run:\n\n'
  /external/skqp/infra/bots/assets/
asset_utils.py 57 """Verify that we have the CIPD binary and that we're authenticated."""
64 raise Exception('CIPD not authenticated. You may need to run:\n\n'

Completed in 2012 milliseconds

1 2 3 4 5 6 7 891011>>