/external/wpa_supplicant_8/src/drivers/ |
driver_wext.c | [all...] |
nl80211_copy.h | 580 * 16 bytes encryption key followed by 8 bytes each for TX and RX MIC [all...] |
driver_atheros.c | 539 wpa_printf(MSG_DEBUG, "%s: Failed to get encryption data " [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | [all...] |
/frameworks/base/docs/html/sdk/ |
android-4.0-highlights.jd | [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
X509CertSelectorTest.java | [all...] |
/external/bluetooth/bluez/src/ |
attrib-server.c | 168 * to authentication and medium to encryption permission. */
|
/external/bluetooth/bluez/test/ |
l2test.c | 1094 "\t[-E] request encryption\n"
|
/external/bluetooth/hcidump/parser/ |
lmp.c | 470 printf("encryption mode %d\n", mode);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | [all...] |
/external/chromium/chrome/browser/sync/glue/ |
sync_backend_host.cc | 235 // If encryption is enabled and we've got a SetPassphrase [all...] |
/external/dbus/dbus/ |
dbus-transport.c | 57 * or encryption schemes. [all...] |
/external/ipsec-tools/src/racoon/ |
eaytest.c | 619 printf("%s encryption failed.\n", name);
|
pfkey.c | 745 /* default key length for encryption algorithm */ 764 /* default key length for encryption algorithm */ 775 "invalid encryption algorithm %u.\n", enctype); [all...] |
/external/openssl/apps/ |
cms.c | 644 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); [all...] |
/external/openssl/crypto/rc4/asm/ |
rc4-ia64.pl | 32 # for RC4 encryption. The basic algorithm looks like this:
|
/external/wpa_supplicant/ |
tls_gnutls.c | 1053 wpa_printf(MSG_INFO, "%s: Encryption failed: %s", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_gnutls.c | 1110 wpa_printf(MSG_INFO, "%s: Encryption failed: %s", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.c | 250 * @label: Label string for deriving the keys, e.g., "client EAP encryption"
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_enrollee.c | 249 wpa_printf(MSG_DEBUG, "WPS: * Encryption Type");
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 1134 wpa_printf(MSG_INFO, "%s: Encryption failed: %s", [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 254 * @label: Label string for deriving the keys, e.g., "client EAP encryption"
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 270 wpa_printf(MSG_DEBUG, "WPS: * Encryption Type"); [all...] |
/frameworks/base/docs/html/guide/publishing/ |
licensing.jd | [all...] |
/packages/apps/Email/res/xml/ |
providers.xml | 73 although link encryption is still required, "non-trusted" certificates may
|