OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:authenticated
(Results
201 - 225
of
567
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/frameworks/base/core/java/android/hardware/biometrics/
BiometricAuthenticator.java
88
* Obtain the userId for which this biometric was
authenticated
.
/frameworks/base/core/java/android/service/autofill/
FillRequest.java
136
* an
authenticated
request through the
/frameworks/base/core/java/com/android/internal/statusbar/
IStatusBar.aidl
145
// Used to hide the dialog when a finger is
authenticated
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
OsuNetworkConnection.java
157
* network is either open or OSEN (OSU Server-only
authenticated
layer 2 Encryption Network).
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
wpa.h
43
#define DOT11_RC_INVALID_AKMP 20 /* Invalid
authenticated
key management protocol */
/hardware/intel/common/libva/va/x11/
va_dri2str.h
126
CARD32
authenticated
B32;
/hardware/interfaces/biometrics/fingerprint/2.1/
types.hal
144
AUTHENTICATED
= 5,
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/nfsd/
nfsfh.h
50
* The auth_type field specifies how the filehandle can be
authenticated
/prebuilts/vndk/v27/arm/arch-arm-armv7-a-neon/shared/vndk-core/
android.hardware.biometrics.fingerprint@2.1.so
/prebuilts/vndk/v27/arm64/arch-arm-armv7-a-neon/shared/vndk-core/
android.hardware.biometrics.fingerprint@2.1.so
/system/bt/embdrv/sbc/decoder/include/
oi_bt_spec.h
141
OI_LINK_KEY_TYPE_AUTHENTICATED = 5, /*
Authenticated
*/
/external/cros/system_api/dbus/
service_constants.h
477
const char kFlagAuthenticatedSignedWrites[] = "
authenticated
-signed-writes";
483
const char kFlagEncryptAuthenticatedRead[] = "encrypt-
authenticated
-read";
484
const char kFlagEncryptAuthenticatedWrite[] = "encrypt-
authenticated
-write";
512
const char kFlagEncryptAuthenticatedRead[] = "encrypt-
authenticated
-read";
513
const char kFlagEncryptAuthenticatedWrite[] = "encrypt-
authenticated
-write";
[
all
...]
/external/selinux/policycoreutils/newrole/
newrole.c
20
* If USE_PAM is not set, users will be
authenticated
via direct
178
* 1 PAM thinks that the user
authenticated
themselves properly
188
int result = 0; /* set to 0 (not
authenticated
) by default */
214
result = 1; /* user
authenticated
OK! */
344
* 1 user
authenticated
themselves properly according to the
[
all
...]
/external/syslinux/core/lwip/src/netif/ppp/
auth.c
98
/* The name by which the peer
authenticated
itself to us. */
466
* treat it as though it
authenticated
with PAP using a username
585
* The peer has been successfully
authenticated
using `protocol'.
606
* Save the
authenticated
name of the peer for later.
648
* We have successfully
authenticated
ourselves with the peer using `protocol'.
[
all
...]
/device/linaro/bootloader/arm-trusted-firmware/common/
bl_common.c
334
* File has been successfully loaded and
authenticated
.
535
* File has been successfully loaded and
authenticated
.
/device/linaro/bootloader/edk2/SecurityPkg/UserIdentification/PwdCredentialProviderDxe/
PwdCredentialProvider.h
207
Return the user identifier associated with the currently
authenticated
user.
209
This function returns the user identifier of the user
authenticated
by this credential
/device/linaro/bootloader/edk2/SecurityPkg/UserIdentification/UsbCredentialProviderDxe/
UsbCredentialProvider.h
195
Return the user identifier associated with the currently
authenticated
user.
197
This function returns the user identifier of the user
authenticated
by this credential
/external/libdrm/tests/ttmtest/src/
xf86dri.c
246
rep.
authenticated
= 0;
247
if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.
authenticated
) {
/external/libvncserver/webclients/java-applet/ssl/
README
194
into an HTTPS website via password they are
authenticated
and
218
into an HTTPS website via password they are
authenticated
and
/external/ltp/testcases/network/stress/ipsec/
ipsec_lib.sh
24
#
Authenticated
encryption with associated data
47
echo "A x
Authenticated
encryption with associated data algorithm"
/external/mesa3d/src/glx/
XF86dri.c
243
rep.
authenticated
= 0;
244
if (!_XReply(dpy, (xReply *) & rep, 0, xFalse) || !rep.
authenticated
) {
/external/ppp/pppd/
session.c
307
* has not been
authenticated
using local UNIX system services.
379
* Enter the user in lastlog only if he has been
authenticated
using
/external/scapy/scapy/layers/tls/crypto/
cipher_aead.py
7
Authenticated
Encryption with Associated Data ciphers.
132
API. Additional data may be
authenticated
without encryption (as A).
/external/skia/infra/bots/assets/
asset_utils.py
57
"""Verify that we have the CIPD binary and that we're
authenticated
."""
64
raise Exception('CIPD not
authenticated
. You may need to run:\n\n'
/external/skqp/infra/bots/assets/
asset_utils.py
57
"""Verify that we have the CIPD binary and that we're
authenticated
."""
64
raise Exception('CIPD not
authenticated
. You may need to run:\n\n'
Completed in 2012 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>