OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:authenticated
(Results
76 - 100
of
567
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/libmicrohttpd/doc/examples/
tlsauthentication.c
160
int
authenticated
;
local
183
authenticated
=
188
return
authenticated
;
/external/scapy/scapy/layers/tls/crypto/
kx_algs.py
63
### Standard RSA-
authenticated
key exchange
101
### Standard ECDSA-
authenticated
key exchange
119
### Standard DSS-
authenticated
key exchange
/hardware/intel/common/libva/va/wayland/
wayland-drm-client-protocol.h
134
*
authenticated
-
authenticated
136
void (*
authenticated
)(void *data,
member in struct:wl_drm_listener
/device/linaro/bootloader/edk2/SecurityPkg/Library/AuthVariableLib/
AuthService.c
2
Implement authentication services for the
authenticated
variables.
925
//
authenticated
variable.
[
all
...]
AuthServiceInternal.h
175
Delete matching signer's certificates when deleting common
authenticated
177
"certdbv" according to
authenticated
variable attributes.
179
@param[in] VariableName Name of
authenticated
Variable.
180
@param[in] VendorGuid Vendor GUID of
authenticated
Variable.
181
@param[in] Attributes Attributes of
authenticated
variable.
197
Clean up signer's certificates for common
authenticated
variable
AuthVariableLib.c
2
Implement authentication services for the
authenticated
variables.
120
Initialization for
authenticated
varibale services.
130
@retval EFI_UNSUPPORTED Unsupported to process
authenticated
variable.
459
@retval EFI_UNSUPPORTED Unsupported to process
authenticated
variable.
AuthVariableLib.inf
2
# Provides
authenticated
variable services.
/external/kernel-headers/original/uapi/linux/
virtio_crypto.h
151
/* length of
authenticated
key */
171
/* length of the additional
authenticated
data (AAD) in bytes */
189
/*
Authenticated
hash (mac) */
200
/* length of the additional
authenticated
data (AAD) in bytes */
439
/* Maximum length of
authenticated
key */
/device/linaro/bootloader/arm-trusted-firmware/docs/
firmware-update.rst
16
enables
authenticated
firmware to update firmware images from external
91
authenticated
/executed in secure or non-secure memory.
126
-
AUTHENTICATED
: This is the state of an image when BL1 has successfully
127
authenticated
it.
285
sets the image state to
AUTHENTICATED
. If authentication fails then BL1 returns
306
if (image_id state is not
AUTHENTICATED
) return -EPERM
308
This SMC initiates execution of a previously
authenticated
image specified by
/external/wpa_supplicant_8/src/pae/
ieee802_1x_cp.c
26
enum connect_type { PENDING, UNAUTHENTICATED,
AUTHENTICATED
, SECURE };
168
SM_STATE(CP,
AUTHENTICATED
)
170
SM_ENTRY(CP,
AUTHENTICATED
);
352
else if (sm->connect ==
AUTHENTICATED
)
353
SM_ENTER(CP,
AUTHENTICATED
);
364
if (sm->connect !=
AUTHENTICATED
)
555
sm->connect =
AUTHENTICATED
;
/frameworks/base/core/java/android/net/
IpSecTransform.java
353
* <p>Encryption is mutually exclusive with
authenticated
encryption.
368
* <p>Authentication is mutually exclusive with
authenticated
encryption.
381
* Set the
authenticated
encryption algorithm.
383
* <p>The
Authenticated
Encryption (AE) class of algorithms are also known as
384
*
Authenticated
Encryption with Associated Data (AEAD) algorithms, or Combined mode
388
* <p>
Authenticated
encryption is mutually exclusive with encryption and authentication.
390
* @param algo {@link IpSecAlgorithm} specifying the
authenticated
encryption algorithm to
/external/libdrm/amdgpu/
amdgpu_device.c
105
* Get the
authenticated
form fd,
108
* \param auth - \c [out] Pointer to output the fd is
authenticated
or not
110
* A legacy fd, get the
authenticated
for compatibility root
/frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java
81
* @param auth require the remote device to be
authenticated
100
* @param auth require the remote device to be
authenticated
123
* @param auth require the remote device to be
authenticated
/compatibility/cdd/6_dev-tools-and-options/
6_1_developer_tools.md
17
adb. Secure adb enables adb on known
authenticated
hosts.
/developers/build/prebuilts/gradle/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
MainActivity.java
186
// If the user has
authenticated
with fingerprint, verify that using cryptography and
208
* only works if the user has just
authenticated
via fingerprint.
223
*
authenticated
with fingerprint.
302
// Set up the crypto object for later. The object will be
authenticated
by use
/developers/build/prebuilts/gradle/FingerprintDialog/kotlinApp/app/src/main/java/com/example/android/fingerprintdialog/
MainActivity.kt
196
// If the user
authenticated
with fingerprint, verify using cryptography and then show
220
* user just
authenticated
via fingerprint.
240
*
authenticated
with a fingerprint.
303
// Set up the crypto object for later, which will be
authenticated
by fingerprint usage.
/developers/samples/android/security/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
MainActivity.java
186
// If the user has
authenticated
with fingerprint, verify that using cryptography and
208
* only works if the user has just
authenticated
via fingerprint.
223
*
authenticated
with fingerprint.
302
// Set up the crypto object for later. The object will be
authenticated
by use
/developers/samples/android/security/FingerprintDialog/kotlinApp/app/src/main/java/com/example/android/fingerprintdialog/
MainActivity.kt
196
// If the user
authenticated
with fingerprint, verify using cryptography and then show
220
* user just
authenticated
via fingerprint.
240
*
authenticated
with a fingerprint.
303
// Set up the crypto object for later, which will be
authenticated
by fingerprint usage.
/development/samples/browseable/FingerprintDialog/src/com.example.android.fingerprintdialog/
MainActivity.java
184
// If the user has
authenticated
with fingerprint, verify that using cryptography and
206
* only works if the user has just
authenticated
via fingerprint.
221
*
authenticated
with fingerprint.
300
// Set up the crypto object for later. The object will be
authenticated
by use
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/
auth_mod.c
138
* If the image has no parent (NULL), it means it has to be
authenticated
using
296
* 0 = Image has parent, 1 = Image has no parent or parent is
authenticated
313
/* Check if the parent has already been
authenticated
*/
411
/* Mark image as
authenticated
*/
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
Supplicant.h
167
// Indicates
authenticated
, unassociated.
171
// Indicates
authenticated
and associated, but pending RSN authentication.
175
// Indicates
authenticated
and associated.
365
@retval EFI_NOT_READY Current supplicant state is NOT
Authenticated
.
/device/linaro/bootloader/edk2/SecurityPkg/Include/Guid/
AuthenticatedVariableFormat.h
3
implementation of UEFI
authenticated
variables.
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/
EsalVariableDxeSal.inf
2
# Provides
authenticated
variable service for IPF platform
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
network_WiFi_SimpleConnect.py
48
'Client de-
authenticated
during the test')
/external/boringssl/src/include/openssl/
cmac.h
60
// CMAC_Reset resets |ctx| so that a fresh message can be
authenticated
.
Completed in 1776 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>