HomeSort by relevance Sort by last modified time
    Searched full:authenticated (Results 76 - 100 of 567) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/libmicrohttpd/doc/examples/
tlsauthentication.c 160 int authenticated; local
183 authenticated =
188 return authenticated;
  /external/scapy/scapy/layers/tls/crypto/
kx_algs.py 63 ### Standard RSA-authenticated key exchange
101 ### Standard ECDSA-authenticated key exchange
119 ### Standard DSS-authenticated key exchange
  /hardware/intel/common/libva/va/wayland/
wayland-drm-client-protocol.h 134 * authenticated - authenticated
136 void (*authenticated)(void *data, member in struct:wl_drm_listener
  /device/linaro/bootloader/edk2/SecurityPkg/Library/AuthVariableLib/
AuthService.c 2 Implement authentication services for the authenticated variables.
925 // authenticated variable.
    [all...]
AuthServiceInternal.h 175 Delete matching signer's certificates when deleting common authenticated
177 "certdbv" according to authenticated variable attributes.
179 @param[in] VariableName Name of authenticated Variable.
180 @param[in] VendorGuid Vendor GUID of authenticated Variable.
181 @param[in] Attributes Attributes of authenticated variable.
197 Clean up signer's certificates for common authenticated variable
AuthVariableLib.c 2 Implement authentication services for the authenticated variables.
120 Initialization for authenticated varibale services.
130 @retval EFI_UNSUPPORTED Unsupported to process authenticated variable.
459 @retval EFI_UNSUPPORTED Unsupported to process authenticated variable.
AuthVariableLib.inf 2 # Provides authenticated variable services.
  /external/kernel-headers/original/uapi/linux/
virtio_crypto.h 151 /* length of authenticated key */
171 /* length of the additional authenticated data (AAD) in bytes */
189 /* Authenticated hash (mac) */
200 /* length of the additional authenticated data (AAD) in bytes */
439 /* Maximum length of authenticated key */
  /device/linaro/bootloader/arm-trusted-firmware/docs/
firmware-update.rst 16 enables authenticated firmware to update firmware images from external
91 authenticated/executed in secure or non-secure memory.
126 - AUTHENTICATED: This is the state of an image when BL1 has successfully
127 authenticated it.
285 sets the image state to AUTHENTICATED. If authentication fails then BL1 returns
306 if (image_id state is not AUTHENTICATED) return -EPERM
308 This SMC initiates execution of a previously authenticated image specified by
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_cp.c 26 enum connect_type { PENDING, UNAUTHENTICATED, AUTHENTICATED, SECURE };
168 SM_STATE(CP, AUTHENTICATED)
170 SM_ENTRY(CP, AUTHENTICATED);
352 else if (sm->connect == AUTHENTICATED)
353 SM_ENTER(CP, AUTHENTICATED);
364 if (sm->connect != AUTHENTICATED)
555 sm->connect = AUTHENTICATED;
  /frameworks/base/core/java/android/net/
IpSecTransform.java 353 * <p>Encryption is mutually exclusive with authenticated encryption.
368 * <p>Authentication is mutually exclusive with authenticated encryption.
381 * Set the authenticated encryption algorithm.
383 * <p>The Authenticated Encryption (AE) class of algorithms are also known as
384 * Authenticated Encryption with Associated Data (AEAD) algorithms, or Combined mode
388 * <p>Authenticated encryption is mutually exclusive with encryption and authentication.
390 * @param algo {@link IpSecAlgorithm} specifying the authenticated encryption algorithm to
  /external/libdrm/amdgpu/
amdgpu_device.c 105 * Get the authenticated form fd,
108 * \param auth - \c [out] Pointer to output the fd is authenticated or not
110 * A legacy fd, get the authenticated for compatibility root
  /frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java 81 * @param auth require the remote device to be authenticated
100 * @param auth require the remote device to be authenticated
123 * @param auth require the remote device to be authenticated
  /compatibility/cdd/6_dev-tools-and-options/
6_1_developer_tools.md 17 adb. Secure adb enables adb on known authenticated hosts.
  /developers/build/prebuilts/gradle/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
MainActivity.java 186 // If the user has authenticated with fingerprint, verify that using cryptography and
208 * only works if the user has just authenticated via fingerprint.
223 * authenticated with fingerprint.
302 // Set up the crypto object for later. The object will be authenticated by use
  /developers/build/prebuilts/gradle/FingerprintDialog/kotlinApp/app/src/main/java/com/example/android/fingerprintdialog/
MainActivity.kt 196 // If the user authenticated with fingerprint, verify using cryptography and then show
220 * user just authenticated via fingerprint.
240 * authenticated with a fingerprint.
303 // Set up the crypto object for later, which will be authenticated by fingerprint usage.
  /developers/samples/android/security/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/
MainActivity.java 186 // If the user has authenticated with fingerprint, verify that using cryptography and
208 * only works if the user has just authenticated via fingerprint.
223 * authenticated with fingerprint.
302 // Set up the crypto object for later. The object will be authenticated by use
  /developers/samples/android/security/FingerprintDialog/kotlinApp/app/src/main/java/com/example/android/fingerprintdialog/
MainActivity.kt 196 // If the user authenticated with fingerprint, verify using cryptography and then show
220 * user just authenticated via fingerprint.
240 * authenticated with a fingerprint.
303 // Set up the crypto object for later, which will be authenticated by fingerprint usage.
  /development/samples/browseable/FingerprintDialog/src/com.example.android.fingerprintdialog/
MainActivity.java 184 // If the user has authenticated with fingerprint, verify that using cryptography and
206 * only works if the user has just authenticated via fingerprint.
221 * authenticated with fingerprint.
300 // Set up the crypto object for later. The object will be authenticated by use
  /device/linaro/bootloader/arm-trusted-firmware/drivers/auth/
auth_mod.c 138 * If the image has no parent (NULL), it means it has to be authenticated using
296 * 0 = Image has parent, 1 = Image has no parent or parent is authenticated
313 /* Check if the parent has already been authenticated */
411 /* Mark image as authenticated */
  /device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
Supplicant.h 167 // Indicates authenticated, unassociated.
171 // Indicates authenticated and associated, but pending RSN authentication.
175 // Indicates authenticated and associated.
365 @retval EFI_NOT_READY Current supplicant state is NOT Authenticated.
  /device/linaro/bootloader/edk2/SecurityPkg/Include/Guid/
AuthenticatedVariableFormat.h 3 implementation of UEFI authenticated variables.
  /device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/
EsalVariableDxeSal.inf 2 # Provides authenticated variable service for IPF platform
  /external/autotest/server/site_tests/network_WiFi_SimpleConnect/
network_WiFi_SimpleConnect.py 48 'Client de-authenticated during the test')
  /external/boringssl/src/include/openssl/
cmac.h 60 // CMAC_Reset resets |ctx| so that a fresh message can be authenticated.

Completed in 1776 milliseconds

1 2 34 5 6 7 8 91011>>