/external/openssl/crypto/pkcs7/ |
pkcs7err.c | 127 {ERR_REASON(PKCS7_R_ENCRYPTION_CTRL_FAILURE),"encryption ctrl failure"}, 128 {ERR_REASON(PKCS7_R_ENCRYPTION_NOT_SUPPORTED_FOR_THIS_KEY_TYPE),"encryption not supported for this key type"},
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_process.c | 149 "Encryption Type"); 154 wpa_printf(MSG_DEBUG, "WPS: Encryption Type: 0x%x",
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_process.c | 149 "Encryption Type"); 154 wpa_printf(MSG_DEBUG, "WPS: Encryption Type: 0x%x",
|
/external/ipsec-tools/src/racoon/ |
strnames.c | 522 { IPSECDOI_ATTR_ENC_MODE, "Encryption Mode", s_ipsecdoi_encmode }, 638 { OAKLEY_ATTR_ENC_ALG, "Encryption Algorithm", s_attr_isakmp_enc }, 714 { OAKLEY_ATTR_AUTH_METHOD_RSAENC, "Encryption with RSA", NULL }, 715 { OAKLEY_ATTR_AUTH_METHOD_RSAREV, "Revised encryption with RSA", NULL }, 716 { OAKLEY_ATTR_AUTH_METHOD_EGENC, "Encryption with El-Gamal", NULL }, 717 { OAKLEY_ATTR_AUTH_METHOD_EGREV, "Revised encryption with El-Gamal", NULL },
|
/external/wpa_supplicant_8/hostapd/ |
README | 291 hardware. It still uses RC4 for the encryption like WEP, but with 303 Handshake) for generating and exchanging data encryption keys between 318 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 357 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 361 # Group cipher suite (encryption algorithm for broadcast and multicast frames) 367 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
|
/external/wpa_supplicant_8/src/ap/ |
hostapd.c | 148 "encryption keys (ifname=%s keyidx=%d)", 159 "default mgmt encryption keys " 186 wpa_printf(MSG_WARNING, "Could not set WEP encryption."); 208 "dynamic VLAN WEP encryption."); 324 "encryption."); 823 * Flushes old stations, sets the channel, encryption,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 112 * aes_encrypt_init - Initialize AES for encryption 113 * @key: Encryption key 128 * aes_encrypt_deinit - Deinitialize AES encryption 298 * @passwd: Key encryption password or %NULL if key is not encrypted 327 * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5) 464 * encryption/decryption.
|
/packages/apps/Email/src/com/android/email/ |
SecurityPolicy.java | 100 * encryption take the max (logical or) 236 // encryption (which requires low-level systems support). Other policies are fully 263 // encryption (which requires low-level systems support). Other policies are fully 304 sb.append("encryption "); 327 * Return bits from isActive: Encryption has not be enabled 471 // encryption required [all...] |
/external/openssl/crypto/des/asm/ |
des_enc.m4 | 142 ! parameter 6 1/2 for include encryption/decryption 293 ! parameter 6 optional address for key next encryption/decryption 514 ifelse($6,{}, {}, {ld [$6], out0}) ! key next encryption/decryption 537 ifelse($6,{}, {}, {ld [$6+4], out1}) ! key next encryption/decryption 1153 ! loads key next encryption/decryption first round from [in4] 1166 ! loads key next encryption/decryption first round from [in3] 1199 ! parameter 6 1/2 for include encryption/decryption 1216 ! parameter 6 1/2 for include encryption/decryption 1374 ! parameter 6 1/2 for include encryption/decryption 1419 ! parameter 6 1/2 for include encryption/decryptio [all...] |
/external/srtp/srtp/ |
srtp.c | 369 /* generate encryption key */ 383 /* generate encryption salt, put after encryption key */ 418 /* generate encryption key */ 432 /* generate encryption salt, put after encryption key */ 687 * find starting point for encryption and length of data to be [all...] |
/external/chromium/chrome/browser/sync/glue/ |
sync_backend_host.h | 87 // required only for encryption. 175 // Encrypts the specified datatypes and marks them as needing encryption on 238 // Whether or not we are syncing encryption keys. 469 // of new datatypes requiring encryption. 549 // Helpers to persist a token that can be used to bootstrap sync encryption
|
/external/srtp/doc/ |
intro.txt | 274 for encryption by only a single sender. In other words, the key is 375 @section ISMAcryp ISMA Encryption Support 379 is an alternative to SRTP encryption, which is potentially 384 libSRTP provides the encryption and decryption functions needed for ISMAcryp 392 streams while using ISMAcryp encryption to protect the media itself.
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.sgml | 37 Link-layer encryption can be used to provide a layer of security for 39 included a simple encryption mechanism, WEP. However, that proved to 43 security issues due to the use of WEP for encryption. Wi-Fi Protected 46 enabled networks that are using CCMP (encryption mechanism based on strong 122 <para><command>wpa_supplicant</command> configures encryption
|
/external/libvpx/examples/includes/geshi/geshi/ |
mysql.php | 223 // Encryption and Compression Functions 356 21 => 'color: #000099;', // encryption functions 416 21 => 'http://dev.mysql.com/doc/refman/5.1/en/encryption-functions.html',
|
/external/wpa_supplicant/tests/ |
test_aes.c | 76 printf("AES-128 EAX mode encryption failed\n"); 80 printf("AES-128 EAX mode encryption returned invalid cipher " 85 printf("AES-128 EAX mode encryption returned invalid tag\n");
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_aes.c | 76 printf("AES-128 EAX mode encryption failed\n"); 80 printf("AES-128 EAX mode encryption returned invalid cipher " 85 printf("AES-128 EAX mode encryption returned invalid tag\n");
|
/frameworks/base/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
FwdLockFile.c | 163 * Derives keys for encryption and signing from the encrypted session key. 185 // Encrypt the 16-byte value {0, 0, ..., 0} to produce the encryption key. 235 * encryption and decryption are performed using the same algorithm.
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionStateTLS.java | 32 * relating encryption/decryption functionality. 101 logger.println(" encryption alg name: " + algName); 288 new SSLProtocolException("Error during the encryption"));
|
/packages/apps/Exchange/src/com/android/exchange/adapter/ |
ProvisionParser.java | 202 // We may now support device (internal) encryption; we'll check this capability 220 // Note that DEVICE_ENCRYPTION_ENABLED refers to SD card encryption, which we do 320 // We can only determine whether encryption is supported on device by using isSupported here
|
/external/chromium/chrome/browser/ |
page_info_model.cc | 161 // We consider anything less than 80 bits encryption to be weak encryption.
|
/external/chromium/chrome/browser/sync/syncable/ |
model_type.cc | 204 return "Encryption keys"; 258 else if (model_type_string == "Encryption keys")
|
/external/chromium/chrome/browser/ui/webui/options/ |
sync_setup_handler.cc | 123 // Encryption settings. 217 { "encryption", IDS_SYNC_ENCRYPTION_TAB_NAME },
|
/external/chromium/third_party/libjingle/source/talk/examples/call/ |
call_main.cc | 224 "Disable or enable encryption: disable, enable, require."); 274 printf("Invalid encryption. Must be enable, disable, or require.\n");
|
/external/openssl/crypto/des/ |
des.h | 153 /* This is the DES encryption function that gets called by just about 160 DES_key_schedule to use. enc, is non zero specifies encryption,
|
/external/openssl/include/openssl/ |
des.h | 153 /* This is the DES encryption function that gets called by just about 160 DES_key_schedule to use. enc, is non zero specifies encryption,
|