HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 276 - 300 of 684) sorted by null

<<11121314151617181920>>

  /prebuilt/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-arm/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /prebuilt/ndk/android-ndk-r5/platforms/android-3/arch-arm/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /prebuilt/ndk/android-ndk-r6/platforms/android-3/arch-arm/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /prebuilt/ndk/android-ndk-r6/platforms/android-3/arch-x86/usr/include/sys/
limits.h 148 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
  /external/ppp/pppd/plugins/radius/
radius.c 707 /* Set/modify allowed encryption types. */
721 * req_info -- radius request information used for encryption
725 * Decrypt the "key" provided by the RADIUS server for MPPE encryption.
775 * req_info -- radius request information used for encryption
779 * Decrypt the key provided by the RADIUS server for MPPE encryption.
    [all...]
  /external/srtp/include/
srtp.h 505 * Counter Mode encryption and HMAC-SHA1 authentication, with an
533 * policy structure to an encryption-only policy
570 * use no encryption. This policy is NOT RECOMMENDED for SRTP unless
571 * there is a requirement to forego encryption.
580 * requirement to forego encryption.
  /external/qemu/
vnc-android.c 967 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled
969 * NB, it is theoretically possible to have 2 layers of encryption,
971 * though, since SASL encryption will typically be a no-op if TLS
1001 * using any SASL SSF encryption layers. Will write as much data
1044 * SASL SSF layers are enabled (thus requiring encryption calls)
1072 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1074 * NB, it is theoretically possible to have 2 layers of encryption,
1076 * though, since SASL encryption will typically be a no-op if TLS
1106 * when not using any SASL SSF encryption layers. Will read as much
    [all...]
vnc.c 961 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled
963 * NB, it is theoretically possible to have 2 layers of encryption,
965 * though, since SASL encryption will typically be a no-op if TLS
995 * using any SASL SSF encryption layers. Will write as much data
1038 * SASL SSF layers are enabled (thus requiring encryption calls)
1066 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1068 * NB, it is theoretically possible to have 2 layers of encryption,
1070 * though, since SASL encryption will typically be a no-op if TLS
1100 * when not using any SASL SSF encryption layers. Will read as much
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_registrar.c 1031 wpa_printf(MSG_DEBUG, "WPS: * Encryption Type (0x%x)",
1090 /* Select the best authentication and encryption type */
1113 wpa_printf(MSG_DEBUG, "WPS: No suitable encryption "
1123 wpa_printf(MSG_DEBUG, "WPS: No suitable encryption "
    [all...]
  /frameworks/base/services/java/com/android/server/
DevicePolicyManagerService.java 275 out.startTag(null, "encryption-requested");
277 out.endTag(null, "encryption-requested");
346 } else if ("encryption-requested".equals(tag)) {
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex 431 \subsection{ECB Encryption and Decryption}
495 \subsection{Simple Encryption Demonstration}
643 in the middle (e.g. rijndael\_enc\_desc) are related to an implementation of Rijndael with only the encryption routine
647 The \textit{encrypt only} descriptors are useful for applications that only use the encryption function of the cipher. Algorithms such
648 as EAX, PMAC and OMAC only require the encryption function. So far this \textit{encrypt only} functionality has only been implemented for
653 fact used for the purposes of encryption. My suggestion is just to use random 8/24 byte keys instead of trying to make a 8/24
    [all...]
  /bionic/libc/include/net/
ethertypes.h 167 #define ETHERTYPE_ENCRYPT 0x803D /* DEC Ethernet Encryption */
266 /* 0x823E - 0x8240 Advanced Encryption Systems */
  /development/ndk/platforms/android-3/include/net/
ethertypes.h 167 #define ETHERTYPE_ENCRYPT 0x803D /* DEC Ethernet Encryption */
266 /* 0x823E - 0x8240 Advanced Encryption Systems */
  /external/bluetooth/bluez/lib/
hci.c 350 { "Set Connection Encryption", 16 },
410 { "Read Encryption Mode", 70 },
411 { "Write Encryption Mode", 71 },
487 { "Refresh Encryption Key", 138 },
516 { "Read Encryption Key Size", 164 },
584 { "LE Start Encryption", 224 },
680 { "<encryption>", LMP_ENCRYPT }, /* Bit 2 */
732 { "<pause encryption>", LMP_PAUSE_ENC }, /* Bit 2 */
    [all...]
  /external/bluetooth/hcidump/parser/
att.c 202 return "Insufficient encryption key size";
208 return "Insufficient encryption";
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/
RC2Engine.java 11 * "A Description of the RC2(r) Encryption Algorithm" R. Rivest.
114 * @param encrypting whether or not we are for encryption.
  /external/chromium/chrome/browser/sync/
profile_sync_service_harness.cc 255 // Encryption is complete for the type we are waiting on.
612 std::string reason = "Waiting for encryption.";
  /external/dropbear/
keyimport.c 535 * Derive encryption key from passphrase and iv/salt:
540 * - encryption key is the first N bytes of A || B
1035 * Finally, the encryption. The cipher-type string appears to be
    [all...]
packet.c 247 /* decrypt if encryption is set, memcpy otherwise */
474 /* do the actual encryption */
  /external/ipsec-tools/
setup.c 294 int auth, int hash, int encryption, int length)
299 p->enctype = encryption;
  /external/openssl/crypto/rsa/
rsa.h 328 * inside PKCS#1 padded RSA encryption */
335 * object inside PKCS#1 padded RSA encryption */

Completed in 1211 milliseconds

<<11121314151617181920>>