Searched
full:encryption (Results
426 -
450 of
684) sorted by null
<<11121314151617181920>>
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui/ |
networkconfig.ui | 130 <string>Encryption</string>
|
wpagui.ui | 91 <string>Encryption:</string>
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.ui | 103 <string>Encryption</string>
|
wpagui.ui | 84 <string>Encryption:</string>
|
/frameworks/base/core/java/android/app/backup/ |
IBackupManager.aidl | 186 * full-device encryption password in order to perform a backup. If a password is
|
/frameworks/base/docs/html/guide/topics/admin/ |
device-admin.jd | 206 <td>Require storage encryption</td> 710 <h4 id=storage">Storage encryption</h4> [all...] |
/libcore/luni/src/main/java/javax/crypto/ |
SealedObject.java | 100 // should be initialized for encryption
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
DESKeySpecTest.java | 42 // GUIDELINES FOR IMPLEMENTING AND USING THE NBS DATA ENCRYPTION STANDARD
|
/packages/apps/Settings/res/values-en-rGB/ |
strings.xml | 303 <string name="crypt_keeper_settings_title" msgid="4219233835490520414">"Encryption"</string> [all...] |
/packages/apps/Settings/src/com/android/settings/ |
ChooseLockGeneric.java | 199 * Mix in "encryption minimums" to any given quality value. This prevents users
|
/external/bluetooth/bluez/attrib/ |
att.c | 62 return "Encryption Key Size is insufficient"; 68 return "Encryption required before read/write";
|
/external/chromium/chrome/browser/sync/engine/ |
apply_updates_command_unittest.cc | 383 // Create unsynced bookmarks without encryption. 477 // Create unsynced bookmarks without encryption.
|
syncapi.cc | 222 // Passwords have their own legacy encryption structure. 437 DCHECK_NE(type, syncable::PASSWORDS); // Passwords use their own encryption. 443 // This datatype does not require encryption. 565 // nothing to do here. Because each encryption is seeded with a different 566 // random value, checking for equivalence post-encryption doesn't suffice. [all...] |
/external/chromium/chrome/browser/sync/protocol/ |
sync.proto | 17 import "encryption.proto"; 34 // Note that currently passwords employ their own legacy encryption scheme and
|
/external/chromium/chrome/browser/sync/resources/ |
configure.html | 134 #sync-encryption-instructions { 142 #encryption-tab-contents > .sync_item_show {
|
/external/libpcap/doc/ |
pcap.html | 164 Encryption Block (experimental)<br /> 258 <li>Encryption Marker Block: TODO [all...] |
pcap.txt | 80 5.3 Encryption Block (experimental) . . . . . . . . . . . . . . . 23 258 8. Encryption Marker Block: TODO [all...] |
/external/openssl/apps/ |
pkcs12.c | 314 BIO_printf (bio_err, "-noiter don't use encryption iteration\n"); 318 BIO_printf (bio_err, "-twopass separate MAC, encryption passwords\n");
|
/external/openssl/ssl/ |
s2_pkt.c | 264 * encryption was not turned on yet due to an error */ 524 /* first check if there is data from an encryption waiting to
|
ssl_stat.c | 104 case SSL2_ST_CLIENT_START_ENCRYPTION: str="SSLv2 client start encryption"; break; 105 case SSL2_ST_SERVER_START_ENCRYPTION: str="SSLv2 server start encryption"; break;
|
/external/ppp/pppd/ |
pppd.8 | [all...] |
/external/qemu/ |
Changelog | 127 - TLS encryption is now supported in VNC 286 - New 'qcow' growable disk image support with AES encryption and
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_config.h | 316 * encryption", to be used during key derivation when PEAPv1 or newer. 319 * "client EAP encryption", and wpa_supplicant is now using that as the
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 325 * encryption", to be used during key derivation when PEAPv1 or newer. 328 * "client EAP encryption", and wpa_supplicant is now using that as the
|
/external/wpa_supplicant_8/src/wps/ |
wps.h | 42 * @encr_type: Encryption Type (WPS_ENCR_NONE, .. flags) 646 * encr_types - Enabled encryption types (bit field of WPS_ENCR_*)
|
Completed in 611 milliseconds
<<11121314151617181920>>