/external/webkit/Source/WebKit/chromium/public/ |
WebDragData.h | 86 WEBKIT_API WebString plainText() const;
|
/external/wpa_supplicant/ |
aes_wrap.c | 38 * @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16 40 * @plain: Plaintext key to be wrapped, n * 64 bits 97 * @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16 100 * @plain: Plaintext key, n * 64 bits
|
driver_ndiswrapper.c | 145 * enabled AP to plaintext one seemed to fail since the driver 147 * that plaintext APs can be used in all cases.
|
wpa_supplicant.conf.orig | 189 # Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP) 213 # NONE = WPA is not used; plaintext or static WEP could be used 257 # cells, i.e., networks that use both plaintext and encryption in the same 630 # Plaintext connection (no WPA, no IEEE 802.1X) 632 # ssid="plaintext-test" 743 # Wildcard match for SSID (plaintext APs only). This example selects any
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
aes_wrap.c | 33 * @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16 35 * @plain: Plaintext key to be wrapped, n * 64 bits 94 * @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16 97 * @plain: Plaintext key, n * 64 bits
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_md5.c | 113 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 114 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
|
/frameworks/base/media/libdrm/mobile1/src/objmng/ |
drm_rights_manager.c | 631 /* Produce last 'len' bytes of plaintext by xoring with */ 644 /* Produce the last but one plaintext block by xoring with */ 649 /* Write decrypted plaintext blocks */ 654 /* Write the decrypted plaintext block */
|
/external/dropbear/libtomcrypt/src/ciphers/ |
xtea.c | 71 @param pt The input plaintext (8 bytes) 108 @param pt The output plaintext (8 bytes)
|
khazad.c | [all...] |
rc2.c | 121 * Encrypt an 8-byte block of plaintext using the given key. * 125 @param pt The input plaintext (8 bytes) 204 @param pt The output plaintext (8 bytes)
|
rc6.c | 118 @param pt The input plaintext (16 bytes) 173 @param pt The output plaintext (16 bytes) 299 printf("Plaintext: ");
|
noekeon.c | 107 @param pt The input plaintext (16 bytes) 162 @param pt The output plaintext (16 bytes)
|
rc5.c | 123 @param pt The input plaintext (8 bytes) 179 @param pt The output plaintext (8 bytes)
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 25 * plaintext attacks. 102 * plaintext attacks.
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ndiswrapper.c | 145 * enabled AP to plaintext one seemed to fail since the driver 147 * that plaintext APs can be used in all cases.
|
/external/srtp/crypto/cipher/ |
aes.c | [all...] |
/external/dbus/dbus/ |
dbus-transport.c | 992 DBusString plaintext; local 997 if (!_dbus_string_init (&plaintext)) 1004 encoded, &plaintext)) 1006 _dbus_string_free (&plaintext); 1015 if (!_dbus_string_move (&plaintext, 0, buffer, 1018 _dbus_string_free (&plaintext); 1033 _dbus_string_free (&plaintext); [all...] |
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
chrome_ex_oauthsimple.js | 217 /** set the signature method (currently only Plaintext or SHA-MAC1) 219 * @param method {string} Method of signing the transaction (only PLAINTEXT and SHA-MAC1 allowed for now) 225 //TODO: accept things other than PlainText or SHA-MAC1 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 444 if (this._parameters['oauth_signature_method'] == 'PLAINTEXT')
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
chrome_ex_oauthsimple.js | 217 /** set the signature method (currently only Plaintext or SHA-MAC1) 219 * @param method {string} Method of signing the transaction (only PLAINTEXT and SHA-MAC1 allowed for now) 225 //TODO: accept things other than PlainText or SHA-MAC1 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 444 if (this._parameters['oauth_signature_method'] == 'PLAINTEXT')
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/ |
chrome_ex_oauthsimple.js | 217 /** set the signature method (currently only Plaintext or SHA-MAC1) 219 * @param method {string} Method of signing the transaction (only PLAINTEXT and SHA-MAC1 allowed for now) 225 //TODO: accept things other than PlainText or SHA-MAC1 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 444 if (this._parameters['oauth_signature_method'] == 'PLAINTEXT')
|
/external/qemu/ |
d3des.c | 398 * Single-length key, single-length plaintext - 403 * Double-length key, single-length plaintext - 408 * Double-length key, double-length plaintext - 413 * Triple-length key, single-length plaintext - 418 * Triple-length key, double-length plaintext -
|
/external/chromium/crypto/ |
rsa_private_key.h | 181 // The created key is permanent and is not exportable in plaintext form. 195 // The created key is permanent and is not exportable in plaintext form.
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 30 @param pt [out] The plaintext 31 @param ptlen The length of the plaintext (octets)
|
/external/llvm/lib/CodeGen/SelectionDAG/ |
SelectionDAGPrinter.cpp | 131 GW.emitSimpleNode(0, "plaintext=circle", "GraphRoot"); 296 GW.emitSimpleNode(0, "plaintext=circle", "GraphRoot");
|