/prebuilt/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-arm/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/prebuilt/ndk/android-ndk-r5/platforms/android-3/arch-arm/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/prebuilt/ndk/android-ndk-r6/platforms/android-3/arch-arm/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/prebuilt/ndk/android-ndk-r6/platforms/android-3/arch-x86/usr/include/sys/ |
limits.h | 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 707 /* Set/modify allowed encryption types. */ 721 * req_info -- radius request information used for encryption 725 * Decrypt the "key" provided by the RADIUS server for MPPE encryption. 775 * req_info -- radius request information used for encryption 779 * Decrypt the key provided by the RADIUS server for MPPE encryption. [all...] |
/external/srtp/include/ |
srtp.h | 505 * Counter Mode encryption and HMAC-SHA1 authentication, with an 533 * policy structure to an encryption-only policy 570 * use no encryption. This policy is NOT RECOMMENDED for SRTP unless 571 * there is a requirement to forego encryption. 580 * requirement to forego encryption.
|
/external/qemu/ |
vnc-android.c | 967 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled 969 * NB, it is theoretically possible to have 2 layers of encryption, 971 * though, since SASL encryption will typically be a no-op if TLS 1001 * using any SASL SSF encryption layers. Will write as much data 1044 * SASL SSF layers are enabled (thus requiring encryption calls) 1072 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled 1074 * NB, it is theoretically possible to have 2 layers of encryption, 1076 * though, since SASL encryption will typically be a no-op if TLS 1106 * when not using any SASL SSF encryption layers. Will read as much [all...] |
vnc.c | 961 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled 963 * NB, it is theoretically possible to have 2 layers of encryption, 965 * though, since SASL encryption will typically be a no-op if TLS 995 * using any SASL SSF encryption layers. Will write as much data 1038 * SASL SSF layers are enabled (thus requiring encryption calls) 1066 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled 1068 * NB, it is theoretically possible to have 2 layers of encryption, 1070 * though, since SASL encryption will typically be a no-op if TLS 1100 * when not using any SASL SSF encryption layers. Will read as much [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_registrar.c | 1031 wpa_printf(MSG_DEBUG, "WPS: * Encryption Type (0x%x)", 1090 /* Select the best authentication and encryption type */ 1113 wpa_printf(MSG_DEBUG, "WPS: No suitable encryption " 1123 wpa_printf(MSG_DEBUG, "WPS: No suitable encryption " [all...] |
/frameworks/base/services/java/com/android/server/ |
DevicePolicyManagerService.java | 275 out.startTag(null, "encryption-requested"); 277 out.endTag(null, "encryption-requested"); 346 } else if ("encryption-requested".equals(tag)) { [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | 431 \subsection{ECB Encryption and Decryption} 495 \subsection{Simple Encryption Demonstration} 643 in the middle (e.g. rijndael\_enc\_desc) are related to an implementation of Rijndael with only the encryption routine 647 The \textit{encrypt only} descriptors are useful for applications that only use the encryption function of the cipher. Algorithms such 648 as EAX, PMAC and OMAC only require the encryption function. So far this \textit{encrypt only} functionality has only been implemented for 653 fact used for the purposes of encryption. My suggestion is just to use random 8/24 byte keys instead of trying to make a 8/24 [all...] |
/bionic/libc/include/net/ |
ethertypes.h | 167 #define ETHERTYPE_ENCRYPT 0x803D /* DEC Ethernet Encryption */ 266 /* 0x823E - 0x8240 Advanced Encryption Systems */
|
/development/ndk/platforms/android-3/include/net/ |
ethertypes.h | 167 #define ETHERTYPE_ENCRYPT 0x803D /* DEC Ethernet Encryption */ 266 /* 0x823E - 0x8240 Advanced Encryption Systems */
|
/external/bluetooth/bluez/lib/ |
hci.c | 350 { "Set Connection Encryption", 16 }, 410 { "Read Encryption Mode", 70 }, 411 { "Write Encryption Mode", 71 }, 487 { "Refresh Encryption Key", 138 }, 516 { "Read Encryption Key Size", 164 }, 584 { "LE Start Encryption", 224 }, 680 { "<encryption>", LMP_ENCRYPT }, /* Bit 2 */ 732 { "<pause encryption>", LMP_PAUSE_ENC }, /* Bit 2 */ [all...] |
/external/bluetooth/hcidump/parser/ |
att.c | 202 return "Insufficient encryption key size"; 208 return "Insufficient encryption";
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
RC2Engine.java | 11 * "A Description of the RC2(r) Encryption Algorithm" R. Rivest. 114 * @param encrypting whether or not we are for encryption.
|
/external/chromium/chrome/browser/sync/ |
profile_sync_service_harness.cc | 255 // Encryption is complete for the type we are waiting on. 612 std::string reason = "Waiting for encryption.";
|
/external/dropbear/ |
keyimport.c | 535 * Derive encryption key from passphrase and iv/salt: 540 * - encryption key is the first N bytes of A || B 1035 * Finally, the encryption. The cipher-type string appears to be [all...] |
packet.c | 247 /* decrypt if encryption is set, memcpy otherwise */ 474 /* do the actual encryption */
|
/external/ipsec-tools/ |
setup.c | 294 int auth, int hash, int encryption, int length) 299 p->enctype = encryption;
|
/external/openssl/crypto/rsa/ |
rsa.h | 328 * inside PKCS#1 padded RSA encryption */ 335 * object inside PKCS#1 padded RSA encryption */
|