/external/wpa_supplicant/ |
eap_psk.c | 336 wpa_hexdump(MSG_DEBUG, "EAP-PSK: reply message (plaintext)",
|
driver.h | 291 * this the value need to set in associate handler to allow plaintext
|
events.c | 156 * plaintext or static WEP keys). */
|
tls.h | 329 * @in_data: Pointer to plaintext data to be encrypted
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 349 wpa_hexdump(MSG_DEBUG, "EAP-PSK: reply message (plaintext)",
|
eap.c | 524 * unauthenticated plaintext messages, so this should have minimal [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 465 wpa_printf(MSG_INFO, "EAP-PAX: Plaintext password not "
|
eap_ttls.c | 654 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: No plaintext user " 696 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: No plaintext user " [all...] |
/frameworks/base/tests/DumpRenderTree/src/com/android/dumprendertree/ |
FileFilter.java | 149 ignoreResultList.add("fast/forms/plaintext-mode-1.html"); // not implemented queryCommandEnabled:BackColor, Undo & Redo
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 97 /** WPA is not used; plaintext or static WEP could be used. */
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
saferp.c | 329 @param pt The input plaintext (16 bytes) 394 @param pt The output plaintext (16 bytes)
|
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 467 @param pt The input plaintext (16 bytes) 541 @param pt The output plaintext (16 bytes)
|
/external/webkit/WebCore/html/ |
HTMLElement.cpp | 702 return "plaintext-only"; 726 } else if (equalIgnoringCase(enabled, "plaintext-only")) { [all...] |
PreloadScanner.cpp | 829 m_contentModel = PLAINTEXT;
|
/external/wpa_supplicant_6/wpa_supplicant/ |
ChangeLog | [all...] |
/external/dropbear/ |
keyimport.c | 908 * equal to the number of padding bytes. So a plaintext that's 911 * plaintext one byte less than a multiple of the block size 916 * plaintext to the next layer: it looks at the final byte, and [all...] |
/dalvik/libcore/crypto/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 586 + index + ".plaintext"); 628 + ".plaintext"; [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
cast5.c | [all...] |
des.c | [all...] |
/external/webkit/WebCore/dom/ |
Element.cpp | [all...] |
/external/openssl/crypto/rc4/ |
rrc4.doc | 127 give identical results, at least with these key/plaintext pairs.
|
/external/openssl/include/openssl/ |
ssl3.h | 260 * will contain plaintext no larger than this value. */
|
/external/openssl/ssl/ |
ssl3.h | 260 * will contain plaintext no larger than this value. */
|
/external/webkit/WebCore/inspector/front-end/ |
SourceCSSTokenizer.re2js | 130 "push-button", "radio", "read-only", "read-write", "read-write-plaintext-only", "red", "relative", "repeat", "repeat-x",
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls.h | 346 * @in_data: Pointer to plaintext data to be encrypted
|