/external/curl/tests/data/ |
test944 | 18 REPLY AUTH 235 Authenticated
|
test945 | 18 REPLY AUTH 235 Authenticated
|
test906 | 18 REPLY TlRMTVNTUAADAAAAGAAYAEAAAACeAJ4AWAAAAAAAAAD2AAAACAAIAPYAAAAIAAgA/gAAAAAAAAAAAAAABoKBAMOv20GsURsat8gdH/RfnYI0MzIxNTMyMeCdd8AzFZLZ/N1ujmilmCcBAQAAAAAAAACAPtXesZ0BNDMyMTUzMjEAAAAAAgAEAEMAQwABABIARQBMAEkAUwBBAEIARQBUAEgABAAYAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAMALABlAGwAaQBzAGEAYgBlAHQAaAAuAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAAAAAAAAAAAdGVzdHVzZXJjdXJsaG9zdA== 235 Authenticated
|
test921 | 18 REPLY TlRMTVNTUAADAAAAGAAYAEAAAACeAJ4AWAAAAAAAAAD2AAAACAAIAPYAAAAIAAgA/gAAAAAAAAAAAAAABoKBAMOv20GsURsat8gdH/RfnYI0MzIxNTMyMeCdd8AzFZLZ/N1ujmilmCcBAQAAAAAAAACAPtXesZ0BNDMyMTUzMjEAAAAAAgAEAEMAQwABABIARQBMAEkAUwBBAEIARQBUAEgABAAYAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAMALABlAGwAaQBzAGEAYgBlAHQAaAAuAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAAAAAAAAAAAdGVzdHVzZXJjdXJsaG9zdA== 235 Authenticated
|
test935 | 22 REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
|
test936 | 22 REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
|
test937 | 22 REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
|
test946 | 19 REPLY dXNlcj11c2VyAWhvc3Q9MTI3LjAuMC4xAXBvcnQ9OTAwNQFhdXRoPUJlYXJlciBtRl85LkI1Zi00LjFKcU0BAQ== 235 Authenticated
|
test947 | 19 REPLY AUTH 235 Authenticated
|
/system/security/keystore/ |
keystore_client.proto | 19 // Holds encrypted, authenticated data.
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/ |
BaseCryptLibRuntimeCryptProtocol.uni | 4 // This instance will be only used by the Authenticated Variable driver for IPF.
28 #string STR_MODULE_DESCRIPTION #language en-US "This instance will be only used by the Authenticated Variable driver for IPF. Note: MD4/MD5/SHA1 Digest functions, HMAC-MD5 functions, HMAC-SHA1 functions, AES/TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign/verify functions, Diffie-Hellman functions, X.509 certificate handler functions, authenticode signature verification functions, PEM handler functions, pseudorandom number generator functions, and Sha256Duplicate() are not supported in this instance."
|
/hardware/interfaces/biometrics/fingerprint/2.1/default/ |
BiometricsFingerprint.cpp | 314 if (msg->data.authenticated.finger.fid != 0) { 316 msg->data.authenticated.finger.fid, 317 msg->data.authenticated.finger.gid); 319 reinterpret_cast<const uint8_t *>(&msg->data.authenticated.hat); 321 std::vector<uint8_t>(hat, hat + sizeof(msg->data.authenticated.hat))); 323 msg->data.authenticated.finger.fid, 324 msg->data.authenticated.finger.gid, 331 msg->data.authenticated.finger.fid, 332 msg->data.authenticated.finger.gid,
|
/development/samples/browseable/ConfirmCredential/src/com.example.android.confirmcredential/ |
MainActivity.java | 96 * only works if the user has just authenticated via device credentials. 107 // Try encrypting something, it will only work if the user authenticated within 112 // If the user has recently authenticated, you will reach here. 116 // User is not authenticated, let's authenticate with device credentials. 135 * authenticated with device credentials within the last X seconds.
|
/external/curl/lib/vauth/ |
ntlm.h | 50 /* Specifies that authenticated communication between the client and server 54 /* Specifies that authenticated communication between the client and server 62 sealing authenticated communications. */ 90 /* Indicates that authenticated communication between the client and server 108 protecting authenticated communications. */
|
/device/linaro/bootloader/edk2/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/ |
EdkiiSystemCapsuleLib.c | 260 Extract the driver FV from an authenticated image.
262 @param[in] AuthenticatedImage The authenticated capsule image.
263 @param[in] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
302 Extract the config image from an authenticated image.
304 @param[in] AuthenticatedImage The authenticated capsule image.
305 @param[in] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
344 Extract the authenticated image from an FMP capsule image.
351 @param[out] AuthenticatedImage The authenticated capsule image, excluding EFI_FIRMWARE_IMAGE_AUTHENTICATION.
352 @param[out] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
354 @retval TRUE The authenticated image is extracted. [all...] |
/external/iw/ |
reason.c | 10 [6] = "Class 2 frame received from non-authenticated station", 11 [7] = "Class 3 frame received from non-authenticated station", 13 [9] = "Station requesting (re)association is not authenticated with responding station",
|
/hardware/interfaces/biometrics/fingerprint/2.1/ |
IBiometricsFingerprintClientCallback.hal | 42 * Sent when a fingerprint is authenticated 44 * @param fingerId the fingerprint templetate that was authenticated 45 * @param groupId the groupid for the template that was authenticated
|
/device/linaro/bootloader/edk2/MdeModulePkg/Universal/Variable/RuntimeDxe/ |
VariableSmmRuntimeDxe.inf | 2 # Runtime DXE part corresponding to SMM authenticated variable module.
5 # variable service. This module need work together with SMM authenticated variable module.
|
/external/autotest/server/cros/ |
gsutil_wrapper.py | 16 authenticated. The Test server is already authenticated, so copy to the test
|
/external/selinux/policycoreutils/run_init/ |
run_init.c | 18 * If USE_PAM is not set, users will be authenticated via direct 98 * 1 PAM thinks that the user authenticated themselves properly 110 int result = 0; /* our result, set to 0 (not authenticated) by default */ 132 result = 1; /* user authenticated OK! */ 173 * 1 user authenticated themselves properly according to the 214 /* Return 1 (authenticated) iff the encrypted version of the user's * 280 /* If we reach here, then we have authenticated the user. */ 282 printf("You are authenticated!\n");
|
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
ViewMediatorCallback.java | 32 * @param strongAuth whether the user has authenticated with strong authentication like 52 * @param strongAuth whether the user has authenticated with strong authentication like
|
KeyguardSecurityContainer.java | 59 public boolean dismiss(boolean authenticated, int targetUserId); 64 * @param strongAuth wheher the user has authenticated with strong authentication like 314 * @param authenticated true if the user entered the correct authentication 319 boolean showNextSecurityScreenOrFinish(boolean authenticated, int targetUserId) { 320 if (DEBUG) Log.d(TAG, "showNextSecurityScreenOrFinish(" + authenticated + ")"); 332 } else if (authenticated) { 423 public void dismiss(boolean authenticated, int targetId) { 424 mSecurityCallback.dismiss(authenticated, targetId); 507 public void dismiss(boolean authenticated, int targetUserId) { 508 mCallback.dismiss(authenticated, targetUserId) [all...] |
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
AuthenticationClient.java | 83 * This method is called when a fingerprint is authenticated or authentication is stopped 157 boolean authenticated = fingerId != 0; 162 if (authenticated) { 169 Slog.e(TAG, "Failed to notify Authenticated:", e); 177 authenticated); local 178 if (!authenticated) { 191 Slog.w(TAG, "Failed to notify Authenticated:", e); 197 if (!authenticated) {
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
ScreenLockBoundKeysTest.java | 109 * authenticated with device credentials within the last X seconds. 140 * only works if the user has just authenticated via device credentials. 151 // Try encrypting something, it will only work if the user authenticated within 157 // User is not authenticated, let's authenticate with device credentials.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.h | 14 /* not authenticated */
|