Collaboration diagram for Security Configuration:Macros | |
| #define | ZAF_CONFIG_REQUEST_KEY_S0 0 |
| #define | ZAF_CONFIG_REQUEST_KEY_S2_UNAUTHENTICATED 0 |
| #define | ZAF_CONFIG_REQUEST_KEY_S2_AUTHENTICATED 0 |
| #define | ZAF_CONFIG_REQUEST_KEY_S2_ACCESS 0 |
| #define | ZAF_CONFIG_SECURE_ONLY 0 |
Security Configuration
| #define ZAF_CONFIG_REQUEST_KEY_S0 0 |
Request S0 network key
| #define ZAF_CONFIG_REQUEST_KEY_S2_ACCESS 0 |
Request S2 Access network key
| #define ZAF_CONFIG_REQUEST_KEY_S2_AUTHENTICATED 0 |
Request S2 Authenticated network key
| #define ZAF_CONFIG_REQUEST_KEY_S2_UNAUTHENTICATED 0 |
Request S2 Unauthenticated network key
| #define ZAF_CONFIG_SECURE_ONLY 0 |
Application can only be controlled when included securely