HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 576 - 600 of 980) sorted by null

<<21222324252627282930>>

  /external/wpa_supplicant_8/src/wps/
wps_module_tests.c 146 /* Encryption Type */
wps.h 38 * @encr_type: Encryption Type (WPS_ENCR_NONE, .. flags)
662 * encr_types - Enabled encryption types (bit field of WPS_ENCR_*)
672 * encr_types - Current AP encryption type (WPS_ENCR_*)
  /frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/
FwdLockConv.h 145 /// Key encryption failed.
  /frameworks/base/docs/html/google/play/billing/
billing_best_practices.jd 53 sure to encrypt the content and use a device-specific encryption key.</p>
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreKeyGeneratorSpi.java 192 "Randomized encryption (IND-CPA) required but may be violated"
  /libcore/luni/src/main/java/javax/crypto/spec/
DESKeySpec.java 39 // GUIDELINES FOR IMPLEMENTING AND USING THE NBS DATA ENCRYPTION STANDARD
  /packages/apps/Email/provider_src/com/android/email/
SecurityPolicy.java 114 * encryption take the max (logical or)
264 sb.append("encryption ");
290 * Return bits from isActive: Encryption has not be enabled
450 // encryption required
    [all...]
  /packages/inputmethods/LatinIME/tools/dicttool/tests/com/android/inputmethod/latin/dicttool/
BinaryDictOffdeviceUtilsTests.java 202 assertEquals("raw" + (crypt ? " > encryption" : "") + (compress ? " > compression" : ""),
  /system/bt/btif/src/
btif_gatt_util.c 303 BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __FUNCTION__, result);
  /system/bt/embdrv/sbc/decoder/include/
oi_status.h 357 OI_SECMGR_DEVICE_ENCRYPT_FAIL = 1407, /**< SECMGR: l2cap access denied - failed to start encryption */
361 OI_SECMGR_UNKNOWN_ENCRYPT_VALUE = 1411, /**< SECMGR: got EncryptionChange event, unknown encryption enable value */
364 OI_SECMGR_ENCRYPTION_FAILED = 1414, /**< SECMGR: device encryption failed */
371 OI_SECMGR_SSP_NOT_ENCRYPTED = 1421, /**< SECMGR: ssp required encryption on incoming link */
    [all...]
  /external/boringssl/src/include/openssl/
cipher.h 118 * An |EVP_CIPHER_CTX| represents the state of an encryption or decryption in
144 /* EVP_CipherInit_ex configures |ctx| for a fresh encryption (or decryption, if
203 /* EVP_Cipher performs a one-shot encryption/decryption operation. No partial
rsa.h 71 /* rsa.h contains functions for handling encryption and signature using RSA. */
104 /* Encryption / Decryption */
106 /* Padding types for encryption. */
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
BlowfishEngine.java 10 * A class that provides Blowfish key encryption operations,
323 * @param encrypting whether or not we are for encryption.
402 * apply the encryption cycle to each value pair in the table.
  /external/libvpx/libvpx/third_party/libwebm/
mkvparser.hpp 254 // size in bytes of the ContentEncAESSettings payload. |encryption| is
268 // bytes of the ContentEncryption payload. |encryption| is where the parsed
271 IMkvReader* pReader, ContentEncryption* encryption);
  /external/libvpx/libwebm/
mkvparser.hpp 254 // size in bytes of the ContentEncAESSettings payload. |encryption| is
268 // bytes of the ContentEncryption payload. |encryption| is where the parsed
271 IMkvReader* pReader, ContentEncryption* encryption);
  /frameworks/base/core/tests/coretests/src/android/os/storage/
StorageManagerBaseTest.java 300 * @param key (optional) The key to use to unencrypt the OBB; pass null for no encryption
309 * Mounts an OBB file with default options (no encryption, mounting succeeds)
380 * @param key (optional) The key to use to unencrypt the OBB; pass null for no encryption
  /hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/third_party/libwebm/
mkvparser.hpp 280 // size in bytes of the ContentEncAESSettings payload. |encryption| is
296 // bytes of the ContentEncryption payload. |encryption| is where the parsed
301 ContentEncryption* encryption);
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/
MessageParser.java 116 * A typical use case would be the {@link BootReminder} sending the intent after device encryption
484 // If we are restarted after an encryption reboot, use stored (trusted) value for this.
526 // a stored Nfc bump intent after encryption reboot, which is a trusted intent.
  /packages/apps/Settings/src/com/android/settings/
SecuritySettings.java 209 // Add options for device encryption
228 // This device supports encryption but isn't encrypted.
    [all...]
  /system/bt/bta/include/
bta_gatt_api.h 130 #define BTA_GATTC_ENC_CMPL_CB_EVT 17 /* encryption complete callback event */
255 #define BTA_GATT_AUTH_REQ_NO_MITM GATT_AUTH_REQ_NO_MITM /* unauthenticated encryption */
256 #define BTA_GATT_AUTH_REQ_MITM GATT_AUTH_REQ_MITM /* authenticated encryption */
    [all...]
  /system/bt/stack/include/
gatt_api.h 303 #define GATT_AUTH_REQ_NO_MITM 1 /* unauthenticated encryption */
304 #define GATT_AUTH_REQ_MITM 2 /* authenticated encryption */
580 /* Define a callback function when encryption is established. */
    [all...]
btm_api.h 60 BTM_DELAY_CHECK, /* 15 delay the check on encryption */
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
CipherTest.java 259 // Decryption may need additional parameters. Initializing a Cipher for encryption
493 + ", encryption provider: " + encryptionProvider,
    [all...]
  /external/ipsec-tools/src/racoon/
oakley.c     [all...]
  /external/libpcap/doc/
pcap.xml 113 <t>Encryption Marker Block: TODO</t>
    [all...]

Completed in 643 milliseconds

<<21222324252627282930>>