HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 101 - 125 of 684) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium/chrome/browser/chromeos/cros/
login_library.h 52 // |signature| must by a SHA1 with RSA encryption signature over the string
62 // |signature| must by a SHA1 with RSA encryption signature over |email|
72 // |signature| must by a SHA1 with RSA encryption signature over |email|
  /external/srtp/crypto/include/
cipher.h 58 * operation, i.e. encryption or decryption. For some ciphers, this
63 direction_encrypt, /**< encryption (convert plaintext to ciphertext) */
65 direction_any /**< encryption or decryption */
  /external/wpa_supplicant/
eap_testing.txt 85 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
86 encryption", during key derivation (requires phase1="peaplabel=1" in the
138 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
165 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
187 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
254 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
330 - uses label "client EAP encryption"
336 - uses label "client EAP encryption"
342 - uses label "client PEAP encryption"
347 - uses label "client PEAP encryption"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eap_testing.txt 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 2 * PKCS #5 (Password-based Encryption)
72 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf);
75 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption "
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_background.sgml 47 hardware. It still uses RC4 for the encryption like WEP, but with
60 Group Key Handshake) for generating and exchanging data encryption
75 support for more robust encryption algorithm (CCMP: AES in Counter
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
    [all...]
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/
key_prot.x 33 * The keyserver is a public key storage/encryption/decryption service
34 * The encryption method used is based on the Diffie-Hellman exponential
90 KEY_SYSTEMERR /* system error (out of memory, encryption failure) */
  /external/chromium/third_party/libjingle/source/talk/session/phone/
mediasessionclient.cc 501 // Parse the first encryption element found with a matching 'usage'
505 // Return false if there was an encryption element and it could not be
511 for (const buzz::XmlElement* encryption = desc->FirstNamed(QN_ENCRYPTION);
512 encryption != NULL;
513 encryption = encryption->NextNamed(QN_ENCRYPTION)) {
514 if (encryption->FirstNamed(usage) != NULL) {
516 GetXmlAttr(encryption, QN_ENCRYPTION_REQUIRED, false));
517 for (const buzz::XmlElement* crypto = encryption->FirstNamed(QN_CRYPTO);
624 // Parse the first encryption element found
630 const buzz::XmlElement* encryption = local
    [all...]
  /libcore/luni/src/main/java/javax/crypto/
CipherSpi.java 160 * encryption, decryption, key wrapping or key unwrapping) depending on
193 * encryption, decryption, key wrapping or key unwrapping) depending on
231 * encryption, decryption, key wrapping or key unwrapping) depending on
265 * Continues a multi-part transformation (encryption or decryption). The
277 * if this cipher instance is not initialized for encryption or
287 * Continues a multi-part transformation (encryption or decryption). The
314 * Continues a multi-part transformation (encryption or decryption). The
371 * Finishes a multi-part transformation (encryption or decryption).
394 * Finishes a multi-part transformation (encryption or decryption).
425 * Finishes a multi-part transformation (encryption or decryption)
    [all...]
  /packages/apps/Settings/src/com/android/settings/
CryptKeeper.java 58 * encryption flows everytime. It should be noted that starting the activity in this manner
89 /** When encryption is detected, this flag indivates whether or not we've checked for erros. */
163 Log.d(TAG, "Validating encryption state.");
166 Log.w(TAG, "Unexpectedly in CryptKeeper even though there is no encryption.");
171 Log.w(TAG, "Unable to get encryption state properly");
180 Log.w(TAG, "Incomplete, or corrupted encryption detected. Prompting user to wipe.");
183 Log.d(TAG, "Encryption state validated. Proceeding to configure UI");
269 * Initializes the UI based on the current state of encryption.
330 Log.d(TAG, "Encryption progress screen initializing.");
345 // Hide the encryption-bot to make room for the "factory reset" butto
    [all...]
  /external/srtp/crypto/ae_xfm/
xfm.c 51 /* derive encryption and authentication keys from the input key */
63 /* perform encryption and authentication */
128 /* derive encryption and authentication keys from the input key */
139 /* perform encryption and authentication */
216 /* derive encryption and authentication keys from the input key */
228 /* perform encryption and authentication */
329 /* derive encryption and authentication keys from the input key */
  /external/srtp/doc/
rfc3711.txt 65 4.1. Encryption . . . . . . . . . . . . . . . . . . . . . . . 19
76 5.1. Encryption: AES-CM and NULL. . . . . . . . . . . . . . . 29
134 SRTP provides a framework for encryption and message authentication
145 encryption, a keyed-hash based function for message authentication,
178 The word "encryption" includes also use of the NULL algorithm (which
324 The "Encrypted Portion" of an SRTP packet consists of the encryption
330 None of the pre-defined encryption transforms uses any padding; for
339 their padding. It is important to note that encryption transforms
351 new encryption transform needs to carefully consider and describe the
375 Portion of the SRTP packet. Thus, if both encryption an
    [all...]
  /external/openssl/crypto/rc2/
rrc2.doc 25 the paper "The RC5 Encryption Algorithm" (RC5 is a trademark of RSADSI), using
47 *encryption* algorithm, and a *decryption* algorithm.
97 Encryption
123 The decryption operation is simply the inverse of the encryption operation.
214 A non-US based programmer who has never seen any encryption code before will
216 knowledge of any other encryption algorithms. Stand by.
  /packages/apps/Email/src/com/android/email/activity/setup/
AccountSecurity.java 49 * 6. If necessary, request for user to activate device encryption
168 * steps a few times. It may go as far as step 5 (password) or step 6 (encryption), but it
251 // Step 6. If encryption is needed, try to have the user set it
255 Log.d(TAG, "Encryption needed; repost notification");
261 Log.d(TAG, "Encryption needed; request it via DPM");
264 // launch the activity to start up encryption.
  /external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
SealedObjectTest.java 129 * encryption algorithm and specified parameters can be retrieved by
156 * with encryption algorithm and specified parameters can be retrieved by
188 * object sealed with encryption algorithm can be retrieved by specifying
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ralink.h 268 ULONG Privacy; // WEP encryption requirement
290 UINT Privacy; // WEP encryption requirement
314 // Added new encryption types
  /external/wpa_supplicant_8/src/drivers/
driver_ralink.h 269 ULONG Privacy; // WEP encryption requirement
291 UINT Privacy; // WEP encryption requirement
315 // Added new encryption types
  /frameworks/base/tools/obbtool/
mkobb.sh 110 hidden_prompt " Encryption key: " key
117 hidden_prompt "Encryption key (again): " key2
120 echo "ERROR: Encryption keys do not match!"
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
SealedObjectTest.java 167 * encryption algorithm and specified parameters can be retrieved by
203 * with encryption algorithm and specified parameters can be retrieved by
242 * object sealed with encryption algorithm can be retrieved by specifying
  /bionic/libc/include/arpa/
telnet.h 116 #define TELOPT_ENCRYPT 38 /* Encryption option */
277 * ENCRYPTion suboptions
279 #define ENCRYPT_IS 0 /* I pick encryption type ... */
280 #define ENCRYPT_SUPPORT 1 /* I support encryption types ... */
  /development/ndk/platforms/android-9/include/arpa/
telnet.h 116 #define TELOPT_ENCRYPT 38 /* Encryption option */
277 * ENCRYPTion suboptions
279 #define ENCRYPT_IS 0 /* I pick encryption type ... */
280 #define ENCRYPT_SUPPORT 1 /* I support encryption types ... */
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/
StreamBlockCipher.java 35 * @param forEncryption true if we are setting up for encryption, false otherwise.
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/
DESedeEngine.java 31 * @param encrypting whether or not we are for encryption.
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_v1_5_encode.c 52 if (block_type == LTC_PKCS_1_EME) { /* encryption padding, we need a valid PRNG */

Completed in 1208 milliseconds

1 2 3 45 6 7 8 91011>>