/external/ipsec-tools/src/racoon/ |
proposal.c | 676 "no encryption algorithm found\n"); 831 * If the peer does not specify encryption mode, use 1055 * decide the encryption mode of this SA bundle.
|
/external/openssl/crypto/x509/ |
x509.h | 558 /* Password based encryption structure */ 565 /* Password based encryption V2 structures */ 569 X509_ALGOR *encryption; member in struct:PBE2PARAM_st [all...] |
/external/openssl/include/openssl/ |
x509.h | 558 /* Password based encryption structure */ 565 /* Password based encryption V2 structures */ 569 X509_ALGOR *encryption; member in struct:PBE2PARAM_st [all...] |
evp.h | 126 * arbitrary encryption.... */ 402 /* Password based encryption function */ [all...] |
/external/ppp/pppd/ |
chap_ms.c | 275 * it as an error (reported incorrectly as an encryption error 905 * Disable undesirable encryption types. Note that we don't ENABLE 906 * any encryption types, to avoid overriding manual configuration.
|
/external/wpa_supplicant/ |
wpa_supplicant.conf.orig | 257 # cells, i.e., networks that use both plaintext and encryption in the same 364 # 'peaplabel=1' can be used to force new label, "client PEAP encryption", 367 # encryption", and wpa_supplicant is now using that as the default value.
|
/development/samples/ToyVpn/server/linux/ |
ToyVpnServer.cpp | 56 // authentication nor encryption. DO NOT USE IT IN PRODUCTION!
|
/development/samples/ToyVpn/src/com/example/android/toyvpn/ |
ToyVpnService.java | 258 // and exchange session keys for encryption. To keep things simple in
|
/device/sample/apps/SampleEmailPolicy/src/com/android/email/policy/ |
EmailPolicy.java | 127 * although link encryption is still required, "non-trusted" certificates may
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
DESKeySpecTest.java | 42 // GUIDELINES FOR IMPLEMENTING AND USING THE NBS DATA ENCRYPTION STANDARD
|
/external/bluetooth/hcidump/ |
ChangeLog | 80 Add decoding for pause encryption feature.
|
/external/bluetooth/hcidump/parser/ |
hci.c | 103 "Encryption Key Refresh Complete", 165 "Set Connection Encryption", 266 "Read Encryption Mode", 267 "Write Encryption Mode", 316 "Refresh Encryption Key", 369 "Read Encryption Key Size", 411 "LE Start Encryption", 459 "Encryption Mode Not Acceptable", 739 return "Link Layer supports LE Encryption"; [all...] |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.h | 670 ConnectionSecurity encryption() const { return encryption_; } function in class:chromeos::WifiNetwork 711 // Return a string representation of the encryption code. 728 void set_encryption(ConnectionSecurity encryption) { 729 encryption_ = encryption; [all...] |
/external/chromium/chrome/browser/sync/glue/ |
data_type_manager_impl.cc | 218 // things like encryption, which may still need to be sorted out before we
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
constants.cc | 126 const buzz::QName QN_ENCRYPTION(true, NS_JINGLE_RTP, "encryption");
|
/external/kernel-headers/original/linux/ |
capability.h | 236 /* Allow setting encryption key on loopback filesystem */
|
key.h | 116 * - disk encryption IDs
|
net.h | 175 short encryption; member in struct:net_proto_family
|
/external/openssl/apps/ |
pkcs8.c | 307 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
|
/external/openssl/crypto/asn1/ |
asn1_err.c | 308 {ERR_REASON(ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM),"unsupported encryption algorithm"},
|
/external/openssl/crypto/bf/ |
bf_enc.c | 63 * (From LECTURE NOTES IN COMPUTER SCIENCE 809, FAST SOFTWARE ENCRYPTION,
|
/external/openssl/crypto/evp/ |
evp.h | 126 * arbitrary encryption.... */ 402 /* Password based encryption function */ [all...] |
/external/openssl/crypto/pem/ |
pem_info.c | 353 /* we take the encryption data from the
|
/external/srtp/crypto/test/ |
cipher_driver.c | 310 /* advance pointer into buffer1 to reflect encryption */
|
/external/srtp/tables/ |
aes_tables.c | 190 * encryption and decryption are true inverses of each other, and
|