Searched
full:authenticated (Results
376 -
400 of
567) sorted by null
<<11121314151617181920>>
/libcore/ojluni/src/main/java/javax/net/ssl/ |
SSLSocket.java | 46 * peer authentication. Servers are usually authenticated, 47 * and clients may be authenticated as requested by servers. [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
SmartCardEdge.h | 377 If Smart Card found the PIN code correct the user is considered authenticated
|
/external/autotest/client/cros/ |
cryptohome.py | 330 return 'Key authenticated.' in out
|
/external/boringssl/src/ssl/ |
handshake.cc | 317 // certificate. Since we only authenticated the previous one, copy other
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerInformation.java | 262 NOT be a signed attribute, an authenticated attribute, an
|
/external/curl/lib/ |
socks.c | 558 /* Everything is good so far, user was authenticated! */
|
socks_sspi.c | 316 /* Everything is good so far, user was authenticated! */
|
strerror.c | 222 return "Peer certificate cannot be authenticated with given CA "
|
/external/kernel-headers/original/uapi/drm/ |
drm.h | 238 int auth; /**< Is client authenticated? */
|
/external/libcups/cups/ |
cups.h | 245 * NOT_SHARED | AUTHENTICATED |
|
/external/libdrm/include/drm/ |
drm.h | 232 int auth; /**< Is client authenticated? */
|
/external/libdrm/man/ |
drm-memory.xml | 264 DRM device and is authenticated via
|
/external/libese/apps/boot/card/src/com/android/verifiedboot/storage/ |
CarrierLock.java | 402 * the transitions are either one-way (lock) or authenticated. It is required
|
Storage.java | 142 // but can be unlocked any time authenticated data is provided.
|
/external/python/cpython3/Lib/urllib/ |
request.py | 913 self.authenticated = {} [all...] |
/external/scapy/scapy/contrib/ |
ikev2.py | 680 name = "IKEv2 Encrypted and Authenticated"
|
macsec.uts | 219 assert(not "This packet shouldn't have been authenticated as correct")
|
/external/scapy/scapy/layers/ |
eap.py | 324 Security Authenticated Protocol Version 0 (EAP-TTLSv0)"
|
/external/scapy/scapy/layers/tls/ |
automaton_srv.py | 51 server authenticated handshake.
|
/external/syslinux/com32/cmenu/ |
MANUAL | 16 * Authenticated users
|
/external/valgrind/include/vki/ |
vki-linux-drm.h | 111 int auth; /**< Is client authenticated? */
|
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 91 /* both anonymous and authenticated provisioning */
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 26 /* RFC 5297, A.1. Deterministic Authenticated Encryption Example */ 48 /* RFC 5297, A.2. Nonce-Based Authenticated Encryption Example */ 92 /* RFC 5297, A.1. Deterministic Authenticated Encryption Example */ 118 /* RFC 5297, A.2. Nonce-Based Authenticated Encryption Example */ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | [all...] |
/frameworks/base/core/java/android/preference/ |
PreferenceManager.java | 415 * <em>before and after</em> the user has authenticated with their [all...] |
Completed in 2208 milliseconds
<<11121314151617181920>>