HomeSort by relevance Sort by last modified time
    Searched full:authenticated (Results 26 - 50 of 567) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/curl/tests/data/
test944 18 REPLY AUTH 235 Authenticated
test945 18 REPLY AUTH 235 Authenticated
test906 18 REPLY TlRMTVNTUAADAAAAGAAYAEAAAACeAJ4AWAAAAAAAAAD2AAAACAAIAPYAAAAIAAgA/gAAAAAAAAAAAAAABoKBAMOv20GsURsat8gdH/RfnYI0MzIxNTMyMeCdd8AzFZLZ/N1ujmilmCcBAQAAAAAAAACAPtXesZ0BNDMyMTUzMjEAAAAAAgAEAEMAQwABABIARQBMAEkAUwBBAEIARQBUAEgABAAYAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAMALABlAGwAaQBzAGEAYgBlAHQAaAAuAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAAAAAAAAAAAdGVzdHVzZXJjdXJsaG9zdA== 235 Authenticated
test921 18 REPLY TlRMTVNTUAADAAAAGAAYAEAAAACeAJ4AWAAAAAAAAAD2AAAACAAIAPYAAAAIAAgA/gAAAAAAAAAAAAAABoKBAMOv20GsURsat8gdH/RfnYI0MzIxNTMyMeCdd8AzFZLZ/N1ujmilmCcBAQAAAAAAAACAPtXesZ0BNDMyMTUzMjEAAAAAAgAEAEMAQwABABIARQBMAEkAUwBBAEIARQBUAEgABAAYAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAMALABlAGwAaQBzAGEAYgBlAHQAaAAuAGMAYwAuAGkAYwBlAGQAZQB2AC4AbgB1AAAAAAAAAAAAdGVzdHVzZXJjdXJsaG9zdA== 235 Authenticated
test935 22 REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
test936 22 REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
test937 22 REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
test946 19 REPLY dXNlcj11c2VyAWhvc3Q9MTI3LjAuMC4xAXBvcnQ9OTAwNQFhdXRoPUJlYXJlciBtRl85LkI1Zi00LjFKcU0BAQ== 235 Authenticated
test947 19 REPLY AUTH 235 Authenticated
  /system/security/keystore/
keystore_client.proto 19 // Holds encrypted, authenticated data.
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/
BaseCryptLibRuntimeCryptProtocol.uni 4 // This instance will be only used by the Authenticated Variable driver for IPF.
28 #string STR_MODULE_DESCRIPTION #language en-US "This instance will be only used by the Authenticated Variable driver for IPF. Note: MD4/MD5/SHA1 Digest functions, HMAC-MD5 functions, HMAC-SHA1 functions, AES/TDES/ARC4 functions, RSA external functions, PKCS#7 SignedData sign/verify functions, Diffie-Hellman functions, X.509 certificate handler functions, authenticode signature verification functions, PEM handler functions, pseudorandom number generator functions, and Sha256Duplicate() are not supported in this instance."
  /hardware/interfaces/biometrics/fingerprint/2.1/default/
BiometricsFingerprint.cpp 314 if (msg->data.authenticated.finger.fid != 0) {
316 msg->data.authenticated.finger.fid,
317 msg->data.authenticated.finger.gid);
319 reinterpret_cast<const uint8_t *>(&msg->data.authenticated.hat);
321 std::vector<uint8_t>(hat, hat + sizeof(msg->data.authenticated.hat)));
323 msg->data.authenticated.finger.fid,
324 msg->data.authenticated.finger.gid,
331 msg->data.authenticated.finger.fid,
332 msg->data.authenticated.finger.gid,
  /development/samples/browseable/ConfirmCredential/src/com.example.android.confirmcredential/
MainActivity.java 96 * only works if the user has just authenticated via device credentials.
107 // Try encrypting something, it will only work if the user authenticated within
112 // If the user has recently authenticated, you will reach here.
116 // User is not authenticated, let's authenticate with device credentials.
135 * authenticated with device credentials within the last X seconds.
  /external/curl/lib/vauth/
ntlm.h 50 /* Specifies that authenticated communication between the client and server
54 /* Specifies that authenticated communication between the client and server
62 sealing authenticated communications. */
90 /* Indicates that authenticated communication between the client and server
108 protecting authenticated communications. */
  /device/linaro/bootloader/edk2/SignedCapsulePkg/Library/EdkiiSystemCapsuleLib/
EdkiiSystemCapsuleLib.c 260 Extract the driver FV from an authenticated image.
262 @param[in] AuthenticatedImage The authenticated capsule image.
263 @param[in] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
302 Extract the config image from an authenticated image.
304 @param[in] AuthenticatedImage The authenticated capsule image.
305 @param[in] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
344 Extract the authenticated image from an FMP capsule image.
351 @param[out] AuthenticatedImage The authenticated capsule image, excluding EFI_FIRMWARE_IMAGE_AUTHENTICATION.
352 @param[out] AuthenticatedImageSize The size of the authenticated capsule image in bytes.
354 @retval TRUE The authenticated image is extracted.
    [all...]
  /external/iw/
reason.c 10 [6] = "Class 2 frame received from non-authenticated station",
11 [7] = "Class 3 frame received from non-authenticated station",
13 [9] = "Station requesting (re)association is not authenticated with responding station",
  /hardware/interfaces/biometrics/fingerprint/2.1/
IBiometricsFingerprintClientCallback.hal 42 * Sent when a fingerprint is authenticated
44 * @param fingerId the fingerprint templetate that was authenticated
45 * @param groupId the groupid for the template that was authenticated
  /device/linaro/bootloader/edk2/MdeModulePkg/Universal/Variable/RuntimeDxe/
VariableSmmRuntimeDxe.inf 2 # Runtime DXE part corresponding to SMM authenticated variable module.
5 # variable service. This module need work together with SMM authenticated variable module.
  /external/autotest/server/cros/
gsutil_wrapper.py 16 authenticated. The Test server is already authenticated, so copy to the test
  /external/selinux/policycoreutils/run_init/
run_init.c 18 * If USE_PAM is not set, users will be authenticated via direct
98 * 1 PAM thinks that the user authenticated themselves properly
110 int result = 0; /* our result, set to 0 (not authenticated) by default */
132 result = 1; /* user authenticated OK! */
173 * 1 user authenticated themselves properly according to the
214 /* Return 1 (authenticated) iff the encrypted version of the user's *
280 /* If we reach here, then we have authenticated the user. */
282 printf("You are authenticated!\n");
  /frameworks/base/packages/SystemUI/src/com/android/keyguard/
ViewMediatorCallback.java 32 * @param strongAuth whether the user has authenticated with strong authentication like
52 * @param strongAuth whether the user has authenticated with strong authentication like