/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 260 "client EAP encryption", 283 "client EAP encryption",
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreUnauthenticatedAESCipherSpi.java | 243 // IV is being reused for encryption: this violates security best practices. 245 "IV has already been used. Reusing IV in encryption mode violates security best"
|
AndroidKeyStoreCipherSpiBase.java | 708 * Returns {@code true} if this cipher is initialized for encryption, {@code false} if this 808 * consuming any entropy. For encryption, the value combined with 812 * encryption with an explicitly provided IV the return value should be {@code 0}, whereas for 820 * {@code finish} operation. This amount of entropy is typically what's consumed by encryption 824 * consuming any entropy. For encryption, the value combined with [all...] |
AndroidKeyStoreKeyPairGeneratorSpi.java | 242 // Authorized to be used with any encryption and signature padding 251 // Disable randomized encryption requirement to support encryption 315 "Randomized encryption (IND-CPA) required but may be violated" 443 "Encryption at rest using secure lock screen credential requested for key pair" [all...] |
AndroidKeyStoreSpi.java | 319 // Authorized to be used with any encryption and signature padding 328 // Disable randomized encryption requirement to support encryption 487 "Randomized encryption (IND-CPA) required but is violated by" 488 + " encryption padding mode: " 675 "Randomized encryption (IND-CPA) required but may be violated by" [all...] |
/hardware/qcom/media/mm-core/inc/ |
QOMX_FileFormatExtensions.h | 141 /**QOMX_ENCRYPT_TYPE indicates the type of encryption */ 152 QOMX_ENCRYPT_TYPE nType; /** type of Encryption */
|
/system/bt/stack/smp/ |
smp_utils.c | 65 SMP_ENC_INFO_SIZE, /* 0x06: encryption information */ 93 smp_command_has_valid_fixed_length, /* 0x06: encryption information */ 119 smp_parameter_unconditionally_valid, /* 0x06: encryption information */ 157 smp_build_encrypt_info_cmd, /* 0x06: encryption information */ 820 ** Description This function is called to mask off the encryption key based 821 ** on the maximum encryption key size. [all...] |
smp_act.c | 344 ** Description send encryption information command. [all...] |
/external/ipsec-tools/src/racoon/ |
strnames.c | 520 { IPSECDOI_ATTR_ENC_MODE, "Encryption Mode", s_ipsecdoi_encmode }, 636 { OAKLEY_ATTR_ENC_ALG, "Encryption Algorithm", s_attr_isakmp_enc }, 712 { OAKLEY_ATTR_AUTH_METHOD_RSAENC, "Encryption with RSA", NULL }, 713 { OAKLEY_ATTR_AUTH_METHOD_RSAREV, "Revised encryption with RSA", NULL }, 714 { OAKLEY_ATTR_AUTH_METHOD_EGENC, "Encryption with El-Gamal", NULL }, 715 { OAKLEY_ATTR_AUTH_METHOD_EGREV, "Revised encryption with El-Gamal", NULL },
|
/external/openssh/ |
sshconnect1.c | 433 logit("WARNING: Encryption is disabled! " 468 logit("WARNING: Encryption is disabled! Password will be transmitted in clear text."); 560 * Generate an encryption key for the session. The key is a 256 bit 643 debug("Encryption type: %.100s", cipher_name(options.cipher)); 653 /* Send and destroy the encrypted encryption key integer. */ 666 /* Set the encryption key. */
|
/external/wpa_supplicant_8/hostapd/ |
README | 270 hardware. It still uses RC4 for the encryption like WEP, but with 282 Handshake) for generating and exchanging data encryption keys between 297 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 336 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 340 # Group cipher suite (encryption algorithm for broadcast and multicast frames) 346 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
|
/packages/apps/Email/provider_src/com/android/email/activity/setup/ |
AccountSecurity.java | 57 * 6. If necessary, request for user to activate device encryption 370 * steps a few times. It may go as far as step 5 (password) or step 6 (encryption), but it 454 // Step 6. If encryption is needed, try to have the user set it 458 LogUtils.d(TAG, "Encryption needed; repost notification"); 464 LogUtils.d(TAG, "Encryption needed; request it via DPM"); 467 // launch the activity to start up encryption.
|
/external/srtp/srtp/ |
srtp.c | 369 /* generate encryption key */ 383 /* generate encryption salt, put after encryption key */ 418 /* generate encryption key */ 432 /* generate encryption salt, put after encryption key */ 687 * find starting point for encryption and length of data to be [all...] |
/external/srtp/doc/ |
intro.txt | 274 for encryption by only a single sender. In other words, the key is 375 @section ISMAcryp ISMA Encryption Support 379 is an alternative to SRTP encryption, which is potentially 384 libSRTP provides the encryption and decryption functions needed for ISMAcryp 392 streams while using ISMAcryp encryption to protect the media itself.
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.sgml | 37 Link-layer encryption can be used to provide a layer of security for 39 included a simple encryption mechanism, WEP. However, that proved to 43 security issues due to the use of WEP for encryption. Wi-Fi Protected 46 enabled networks that are using CCMP (encryption mechanism based on strong 122 <para><command>wpa_supplicant</command> configures encryption
|
/system/bt/stack/gatt/ |
gatt_db.c | 202 ** key_size: encryption key size. 316 ** key_size: encryption key size. 628 ** key_size: encryption key size 686 ** key_size: encryption key size 732 ** key_size: encryption key size [all...] |
/system/core/rootdir/ |
init.rc | 263 # Make sure we have the device encryption key 347 # and get proper encryption policy installed 628 # encryption) or trigger_restart_min_framework (other encryption) 635 # encryption)
|
/external/boringssl/src/include/openssl/ |
aead.h | 25 /* Authenticated Encryption with Additional Data. 49 * authenticity for authenticated encryption. For formal definitions see 50 * Bellare and Namprempre, "Authenticated encryption: relations among notions
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 81 * GroupKey and PeerKey require encryption, otherwise, encryption is optional. 211 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 201 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); 451 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); 550 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
|
/hardware/libhardware/include/hardware/ |
keymaster_defs.h | 150 /* Unauthenticated modes, usable only for encryption/decryption and not generally recommended 156 /* Authenticated modes, usable for encryption/decryption and signing/verification. Recommended 162 * Padding modes that may be applied to plaintext for encryption operations. This list includes
|
/system/bt/stack/btm/ |
btm_acl.c | 665 /* some devices do not support switch while encryption is on */ 673 /* bypass turning off encryption if change link key is already doing it */ 715 ** Description This function is when encryption of the connection is 742 /* if encryption turn off failed we still will try to switch role */ 769 /* Finished enabling Encryption after role switch */ [all...] |
btm_ble.c | 198 ** Description Local local identity key, encryption root or sign counter. 234 ** Description This function is called to read the local device encryption 913 (*p_enc_cplt_cback)(¶ms); /* Call the Encryption complete callback function */ [all...] |
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/ |
README | 44 SSH encryption tunnelling is provided. 74 - VeNCrypt SSL/TLS VNC encryption support (used by VeNCrypt, 77 - ANONTLS SSL/TLS VNC encryption support (used by Vino) 159 - Support for UltraVNC DSM Encryption Plugin mode. (ARC4 and 168 - Support for symmetric encryption (including blowfish and 3des 170 encryption method will work, e.g.: x11vnc -enc blowfish:./my.key
|
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 91 * aes_encrypt_init - Initialize AES for encryption 92 * @key: Encryption key 107 * aes_encrypt_deinit - Deinitialize AES encryption 282 * @passwd: Key encryption password or %NULL if key is not encrypted 311 * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5) 448 * encryption/decryption.
|