HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 326 - 350 of 980) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 260 "client EAP encryption",
283 "client EAP encryption",
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreUnauthenticatedAESCipherSpi.java 243 // IV is being reused for encryption: this violates security best practices.
245 "IV has already been used. Reusing IV in encryption mode violates security best"
AndroidKeyStoreCipherSpiBase.java 708 * Returns {@code true} if this cipher is initialized for encryption, {@code false} if this
808 * consuming any entropy. For encryption, the value combined with
812 * encryption with an explicitly provided IV the return value should be {@code 0}, whereas for
820 * {@code finish} operation. This amount of entropy is typically what's consumed by encryption
824 * consuming any entropy. For encryption, the value combined with
    [all...]
AndroidKeyStoreKeyPairGeneratorSpi.java 242 // Authorized to be used with any encryption and signature padding
251 // Disable randomized encryption requirement to support encryption
315 "Randomized encryption (IND-CPA) required but may be violated"
443 "Encryption at rest using secure lock screen credential requested for key pair"
    [all...]
AndroidKeyStoreSpi.java 319 // Authorized to be used with any encryption and signature padding
328 // Disable randomized encryption requirement to support encryption
487 "Randomized encryption (IND-CPA) required but is violated by"
488 + " encryption padding mode: "
675 "Randomized encryption (IND-CPA) required but may be violated by"
    [all...]
  /hardware/qcom/media/mm-core/inc/
QOMX_FileFormatExtensions.h 141 /**QOMX_ENCRYPT_TYPE indicates the type of encryption */
152 QOMX_ENCRYPT_TYPE nType; /** type of Encryption */
  /system/bt/stack/smp/
smp_utils.c 65 SMP_ENC_INFO_SIZE, /* 0x06: encryption information */
93 smp_command_has_valid_fixed_length, /* 0x06: encryption information */
119 smp_parameter_unconditionally_valid, /* 0x06: encryption information */
157 smp_build_encrypt_info_cmd, /* 0x06: encryption information */
820 ** Description This function is called to mask off the encryption key based
821 ** on the maximum encryption key size.
    [all...]
smp_act.c 344 ** Description send encryption information command.
    [all...]
  /external/ipsec-tools/src/racoon/
strnames.c 520 { IPSECDOI_ATTR_ENC_MODE, "Encryption Mode", s_ipsecdoi_encmode },
636 { OAKLEY_ATTR_ENC_ALG, "Encryption Algorithm", s_attr_isakmp_enc },
712 { OAKLEY_ATTR_AUTH_METHOD_RSAENC, "Encryption with RSA", NULL },
713 { OAKLEY_ATTR_AUTH_METHOD_RSAREV, "Revised encryption with RSA", NULL },
714 { OAKLEY_ATTR_AUTH_METHOD_EGENC, "Encryption with El-Gamal", NULL },
715 { OAKLEY_ATTR_AUTH_METHOD_EGREV, "Revised encryption with El-Gamal", NULL },
  /external/openssh/
sshconnect1.c 433 logit("WARNING: Encryption is disabled! "
468 logit("WARNING: Encryption is disabled! Password will be transmitted in clear text.");
560 * Generate an encryption key for the session. The key is a 256 bit
643 debug("Encryption type: %.100s", cipher_name(options.cipher));
653 /* Send and destroy the encrypted encryption key integer. */
666 /* Set the encryption key. */
  /external/wpa_supplicant_8/hostapd/
README 270 hardware. It still uses RC4 for the encryption like WEP, but with
282 Handshake) for generating and exchanging data encryption keys between
297 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
336 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
340 # Group cipher suite (encryption algorithm for broadcast and multicast frames)
346 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
  /packages/apps/Email/provider_src/com/android/email/activity/setup/
AccountSecurity.java 57 * 6. If necessary, request for user to activate device encryption
370 * steps a few times. It may go as far as step 5 (password) or step 6 (encryption), but it
454 // Step 6. If encryption is needed, try to have the user set it
458 LogUtils.d(TAG, "Encryption needed; repost notification");
464 LogUtils.d(TAG, "Encryption needed; request it via DPM");
467 // launch the activity to start up encryption.
  /external/srtp/srtp/
srtp.c 369 /* generate encryption key */
383 /* generate encryption salt, put after encryption key */
418 /* generate encryption key */
432 /* generate encryption salt, put after encryption key */
687 * find starting point for encryption and length of data to be
    [all...]
  /external/srtp/doc/
intro.txt 274 for encryption by only a single sender. In other words, the key is
375 @section ISMAcryp ISMA Encryption Support
379 is an alternative to SRTP encryption, which is potentially
384 libSRTP provides the encryption and decryption functions needed for ISMAcryp
392 streams while using ISMAcryp encryption to protect the media itself.
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.sgml 37 Link-layer encryption can be used to provide a layer of security for
39 included a simple encryption mechanism, WEP. However, that proved to
43 security issues due to the use of WEP for encryption. Wi-Fi Protected
46 enabled networks that are using CCMP (encryption mechanism based on strong
122 <para><command>wpa_supplicant</command> configures encryption
  /system/bt/stack/gatt/
gatt_db.c 202 ** key_size: encryption key size.
316 ** key_size: encryption key size.
628 ** key_size: encryption key size
686 ** key_size: encryption key size
732 ** key_size: encryption key size
    [all...]
  /system/core/rootdir/
init.rc 263 # Make sure we have the device encryption key
347 # and get proper encryption policy installed
628 # encryption) or trigger_restart_min_framework (other encryption)
635 # encryption)
  /external/boringssl/src/include/openssl/
aead.h 25 /* Authenticated Encryption with Additional Data.
49 * authenticity for authenticated encryption. For formal definitions see
50 * Bellare and Namprempre, "Authenticated encryption: relations among notions
  /external/wpa_supplicant_8/src/common/
wpa_common.h 81 * GroupKey and PeerKey require encryption, otherwise, encryption is optional.
211 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 201 wpa_printf(MSG_INFO, "IKEV2: Encryption failed");
451 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
550 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
  /hardware/libhardware/include/hardware/
keymaster_defs.h 150 /* Unauthenticated modes, usable only for encryption/decryption and not generally recommended
156 /* Authenticated modes, usable for encryption/decryption and signing/verification. Recommended
162 * Padding modes that may be applied to plaintext for encryption operations. This list includes
  /system/bt/stack/btm/
btm_acl.c 665 /* some devices do not support switch while encryption is on */
673 /* bypass turning off encryption if change link key is already doing it */
715 ** Description This function is when encryption of the connection is
742 /* if encryption turn off failed we still will try to switch role */
769 /* Finished enabling Encryption after role switch */
    [all...]
btm_ble.c 198 ** Description Local local identity key, encryption root or sign counter.
234 ** Description This function is called to read the local device encryption
913 (*p_enc_cplt_cback)(&params); /* Call the Encryption complete callback function */
    [all...]
  /external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/
README 44 SSH encryption tunnelling is provided.
74 - VeNCrypt SSL/TLS VNC encryption support (used by VeNCrypt,
77 - ANONTLS SSL/TLS VNC encryption support (used by Vino)
159 - Support for UltraVNC DSM Encryption Plugin mode. (ARC4 and
168 - Support for symmetric encryption (including blowfish and 3des
170 encryption method will work, e.g.: x11vnc -enc blowfish:./my.key
  /external/wpa_supplicant_8/src/crypto/
crypto.h 91 * aes_encrypt_init - Initialize AES for encryption
92 * @key: Encryption key
107 * aes_encrypt_deinit - Deinitialize AES encryption
282 * @passwd: Key encryption password or %NULL if key is not encrypted
311 * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5)
448 * encryption/decryption.

Completed in 614 milliseconds

<<11121314151617181920>>