/external/chromium/chrome/browser/chromeos/cros/ |
login_library.h | 52 // |signature| must by a SHA1 with RSA encryption signature over the string 62 // |signature| must by a SHA1 with RSA encryption signature over |email| 72 // |signature| must by a SHA1 with RSA encryption signature over |email|
|
/external/srtp/crypto/include/ |
cipher.h | 58 * operation, i.e. encryption or decryption. For some ciphers, this 63 direction_encrypt, /**< encryption (convert plaintext to ciphertext) */ 65 direction_any /**< encryption or decryption */
|
/external/wpa_supplicant/ |
eap_testing.txt | 85 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 86 encryption", during key derivation (requires phase1="peaplabel=1" in the 138 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 165 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 187 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 254 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 330 - uses label "client EAP encryption" 336 - uses label "client EAP encryption" 342 - uses label "client PEAP encryption" 347 - uses label "client PEAP encryption" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 2 * PKCS #5 (Password-based Encryption) 72 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); 75 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption "
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_background.sgml | 47 hardware. It still uses RC4 for the encryption like WEP, but with 60 Group Key Handshake) for generating and exchanging data encryption 75 support for more robust encryption algorithm (CCMP: AES in Counter
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all...] |
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
key_prot.x | 33 * The keyserver is a public key storage/encryption/decryption service 34 * The encryption method used is based on the Diffie-Hellman exponential 90 KEY_SYSTEMERR /* system error (out of memory, encryption failure) */
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
mediasessionclient.cc | 501 // Parse the first encryption element found with a matching 'usage' 505 // Return false if there was an encryption element and it could not be 511 for (const buzz::XmlElement* encryption = desc->FirstNamed(QN_ENCRYPTION); 512 encryption != NULL; 513 encryption = encryption->NextNamed(QN_ENCRYPTION)) { 514 if (encryption->FirstNamed(usage) != NULL) { 516 GetXmlAttr(encryption, QN_ENCRYPTION_REQUIRED, false)); 517 for (const buzz::XmlElement* crypto = encryption->FirstNamed(QN_CRYPTO); 624 // Parse the first encryption element found 630 const buzz::XmlElement* encryption = local [all...] |
/libcore/luni/src/main/java/javax/crypto/ |
CipherSpi.java | 160 * encryption, decryption, key wrapping or key unwrapping) depending on 193 * encryption, decryption, key wrapping or key unwrapping) depending on 231 * encryption, decryption, key wrapping or key unwrapping) depending on 265 * Continues a multi-part transformation (encryption or decryption). The 277 * if this cipher instance is not initialized for encryption or 287 * Continues a multi-part transformation (encryption or decryption). The 314 * Continues a multi-part transformation (encryption or decryption). The 371 * Finishes a multi-part transformation (encryption or decryption). 394 * Finishes a multi-part transformation (encryption or decryption). 425 * Finishes a multi-part transformation (encryption or decryption) [all...] |
/packages/apps/Settings/src/com/android/settings/ |
CryptKeeper.java | 58 * encryption flows everytime. It should be noted that starting the activity in this manner 89 /** When encryption is detected, this flag indivates whether or not we've checked for erros. */ 163 Log.d(TAG, "Validating encryption state."); 166 Log.w(TAG, "Unexpectedly in CryptKeeper even though there is no encryption."); 171 Log.w(TAG, "Unable to get encryption state properly"); 180 Log.w(TAG, "Incomplete, or corrupted encryption detected. Prompting user to wipe."); 183 Log.d(TAG, "Encryption state validated. Proceeding to configure UI"); 269 * Initializes the UI based on the current state of encryption. 330 Log.d(TAG, "Encryption progress screen initializing."); 345 // Hide the encryption-bot to make room for the "factory reset" butto [all...] |
/external/srtp/crypto/ae_xfm/ |
xfm.c | 51 /* derive encryption and authentication keys from the input key */ 63 /* perform encryption and authentication */ 128 /* derive encryption and authentication keys from the input key */ 139 /* perform encryption and authentication */ 216 /* derive encryption and authentication keys from the input key */ 228 /* perform encryption and authentication */ 329 /* derive encryption and authentication keys from the input key */
|
/external/srtp/doc/ |
rfc3711.txt | 65 4.1. Encryption . . . . . . . . . . . . . . . . . . . . . . . 19 76 5.1. Encryption: AES-CM and NULL. . . . . . . . . . . . . . . 29 134 SRTP provides a framework for encryption and message authentication 145 encryption, a keyed-hash based function for message authentication, 178 The word "encryption" includes also use of the NULL algorithm (which 324 The "Encrypted Portion" of an SRTP packet consists of the encryption 330 None of the pre-defined encryption transforms uses any padding; for 339 their padding. It is important to note that encryption transforms 351 new encryption transform needs to carefully consider and describe the 375 Portion of the SRTP packet. Thus, if both encryption an [all...] |
/external/openssl/crypto/rc2/ |
rrc2.doc | 25 the paper "The RC5 Encryption Algorithm" (RC5 is a trademark of RSADSI), using 47 *encryption* algorithm, and a *decryption* algorithm. 97 Encryption 123 The decryption operation is simply the inverse of the encryption operation. 214 A non-US based programmer who has never seen any encryption code before will 216 knowledge of any other encryption algorithms. Stand by.
|
/packages/apps/Email/src/com/android/email/activity/setup/ |
AccountSecurity.java | 49 * 6. If necessary, request for user to activate device encryption 168 * steps a few times. It may go as far as step 5 (password) or step 6 (encryption), but it 251 // Step 6. If encryption is needed, try to have the user set it 255 Log.d(TAG, "Encryption needed; repost notification"); 261 Log.d(TAG, "Encryption needed; request it via DPM"); 264 // launch the activity to start up encryption.
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
SealedObjectTest.java | 129 * encryption algorithm and specified parameters can be retrieved by 156 * with encryption algorithm and specified parameters can be retrieved by 188 * object sealed with encryption algorithm can be retrieved by specifying
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ralink.h | 268 ULONG Privacy; // WEP encryption requirement 290 UINT Privacy; // WEP encryption requirement 314 // Added new encryption types
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ralink.h | 269 ULONG Privacy; // WEP encryption requirement 291 UINT Privacy; // WEP encryption requirement 315 // Added new encryption types
|
/frameworks/base/tools/obbtool/ |
mkobb.sh | 110 hidden_prompt " Encryption key: " key 117 hidden_prompt "Encryption key (again): " key2 120 echo "ERROR: Encryption keys do not match!"
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 167 * encryption algorithm and specified parameters can be retrieved by 203 * with encryption algorithm and specified parameters can be retrieved by 242 * object sealed with encryption algorithm can be retrieved by specifying
|
/bionic/libc/include/arpa/ |
telnet.h | 116 #define TELOPT_ENCRYPT 38 /* Encryption option */ 277 * ENCRYPTion suboptions 279 #define ENCRYPT_IS 0 /* I pick encryption type ... */ 280 #define ENCRYPT_SUPPORT 1 /* I support encryption types ... */
|
/development/ndk/platforms/android-9/include/arpa/ |
telnet.h | 116 #define TELOPT_ENCRYPT 38 /* Encryption option */ 277 * ENCRYPTion suboptions 279 #define ENCRYPT_IS 0 /* I pick encryption type ... */ 280 #define ENCRYPT_SUPPORT 1 /* I support encryption types ... */
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
StreamBlockCipher.java | 35 * @param forEncryption true if we are setting up for encryption, false otherwise.
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
DESedeEngine.java | 31 * @param encrypting whether or not we are for encryption.
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_v1_5_encode.c | 52 if (block_type == LTC_PKCS_1_EME) { /* encryption padding, we need a valid PRNG */
|