Searched
full:encryption (Results
251 -
275 of
684) sorted by null
<<11121314151617181920>>
/external/openssl/crypto/rsa/ |
rsa_oaep.c | 115 * Asymmetric Encryption Padding (OAEP) [...]", CRYPTO 2001),
|
/external/ppp/pppd/ |
eap.h | 109 u_char *ea_skey; /* Shared encryption key */
|
ecp.c | 2 * ecp.c - PPP Encryption Control Protocol.
|
/external/ppp/pppd/include/net/ |
ppp_defs.h | 90 #define PPP_ECP 0x8053 /* Encryption Control Protocol */
|
/external/srtp/include/ |
srtp_priv.h | 209 * an srtp_stream_t has its own SSRC, encryption key, authentication
|
/external/v8/benchmarks/ |
README.txt | 20 encryption stage as input. The result is checked against the original
|
revisions.html | 77 encryption stage as input. The result is checked against the original
|
run.html | 113 <li><b>Crypto</b><br>Encryption and decryption benchmark based on code by Tom Wu (<i>1698 lines</i>).</li>
|
/external/wpa_supplicant/ |
eap_peap.c | 716 * encryption" as the label. However, most existing 718 * label, "client EAP encryption", instead. Use the old 722 label = "client PEAP encryption"; 724 label = "client EAP encryption";
|
eap_tls.c | 126 "client EAP encryption",
|
wpa_i.h | 30 u8 kek[16]; /* EAPOL-Key Key Encryption Key (KEK) */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 240 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); 517 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); 616 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); 715 /* Uses encryption key length for SK_d; should be PRF length */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls.c | 128 "client EAP encryption",
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_build.c | 185 wpa_printf(MSG_DEBUG, "WPS: * Encryption Type Flags");
|
wps_defs.h | 166 /* Encryption Type Flags */
|
wps_i.h | 79 * encr_type - Available encryption types
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 241 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); 518 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); 617 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); 716 /* Uses encryption key length for SK_d; should be PRF length */
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 128 "client EAP encryption",
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 67 * pac_opaque_encr_key - PAC-Opaque encryption key for EAP-FAST
|
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 2 * PKCS #1 (RSA Encryption)
|
/external/zlib/ |
FAQ | 314 zlib doesn't support encryption. The original PKZIP encryption is very 316 encryption, use GnuPG, http://www.gnupg.org/ , which already includes zlib 317 compression. For PKZIP compatible "encryption", look at
|
/frameworks/base/core/java/com/android/internal/os/storage/ |
ExternalStorageFormatter.java | 155 // Remove encryption mapping if this is an unmount for a factory reset.
|
/packages/apps/Email/tests/src/com/android/email/ |
SecurityPolicyTests.java | 164 // encryption required - OR logic - will *not* change here because false 190 // encryption required - OR logic - will change here because true 493 // If encryption is unsupported, encryption policy bits are cleared
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
pfkeyv2.h | 293 /* Encryption algorithms */
|
/prebuilt/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
Completed in 463 milliseconds
<<11121314151617181920>>