/external/wpa_supplicant_8/src/wps/ |
wps_module_tests.c | 146 /* Encryption Type */
|
wps.h | 38 * @encr_type: Encryption Type (WPS_ENCR_NONE, .. flags) 662 * encr_types - Enabled encryption types (bit field of WPS_ENCR_*) 672 * encr_types - Current AP encryption type (WPS_ENCR_*)
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/ |
FwdLockConv.h | 145 /// Key encryption failed.
|
/frameworks/base/docs/html/google/play/billing/ |
billing_best_practices.jd | 53 sure to encrypt the content and use a device-specific encryption key.</p>
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreKeyGeneratorSpi.java | 192 "Randomized encryption (IND-CPA) required but may be violated"
|
/libcore/luni/src/main/java/javax/crypto/spec/ |
DESKeySpec.java | 39 // GUIDELINES FOR IMPLEMENTING AND USING THE NBS DATA ENCRYPTION STANDARD
|
/packages/apps/Email/provider_src/com/android/email/ |
SecurityPolicy.java | 114 * encryption take the max (logical or) 264 sb.append("encryption "); 290 * Return bits from isActive: Encryption has not be enabled 450 // encryption required [all...] |
/packages/inputmethods/LatinIME/tools/dicttool/tests/com/android/inputmethod/latin/dicttool/ |
BinaryDictOffdeviceUtilsTests.java | 202 assertEquals("raw" + (crypt ? " > encryption" : "") + (compress ? " > compression" : ""),
|
/system/bt/btif/src/ |
btif_gatt_util.c | 303 BTIF_TRACE_WARNING("%s() - Encryption failed (%d)", __FUNCTION__, result);
|
/system/bt/embdrv/sbc/decoder/include/ |
oi_status.h | 357 OI_SECMGR_DEVICE_ENCRYPT_FAIL = 1407, /**< SECMGR: l2cap access denied - failed to start encryption */ 361 OI_SECMGR_UNKNOWN_ENCRYPT_VALUE = 1411, /**< SECMGR: got EncryptionChange event, unknown encryption enable value */ 364 OI_SECMGR_ENCRYPTION_FAILED = 1414, /**< SECMGR: device encryption failed */ 371 OI_SECMGR_SSP_NOT_ENCRYPTED = 1421, /**< SECMGR: ssp required encryption on incoming link */ [all...] |
/external/boringssl/src/include/openssl/ |
cipher.h | 118 * An |EVP_CIPHER_CTX| represents the state of an encryption or decryption in 144 /* EVP_CipherInit_ex configures |ctx| for a fresh encryption (or decryption, if 203 /* EVP_Cipher performs a one-shot encryption/decryption operation. No partial
|
rsa.h | 71 /* rsa.h contains functions for handling encryption and signature using RSA. */ 104 /* Encryption / Decryption */ 106 /* Padding types for encryption. */
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
BlowfishEngine.java | 10 * A class that provides Blowfish key encryption operations, 323 * @param encrypting whether or not we are for encryption. 402 * apply the encryption cycle to each value pair in the table.
|
/external/libvpx/libvpx/third_party/libwebm/ |
mkvparser.hpp | 254 // size in bytes of the ContentEncAESSettings payload. |encryption| is 268 // bytes of the ContentEncryption payload. |encryption| is where the parsed 271 IMkvReader* pReader, ContentEncryption* encryption);
|
/external/libvpx/libwebm/ |
mkvparser.hpp | 254 // size in bytes of the ContentEncAESSettings payload. |encryption| is 268 // bytes of the ContentEncryption payload. |encryption| is where the parsed 271 IMkvReader* pReader, ContentEncryption* encryption);
|
/frameworks/base/core/tests/coretests/src/android/os/storage/ |
StorageManagerBaseTest.java | 300 * @param key (optional) The key to use to unencrypt the OBB; pass null for no encryption 309 * Mounts an OBB file with default options (no encryption, mounting succeeds) 380 * @param key (optional) The key to use to unencrypt the OBB; pass null for no encryption
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/third_party/libwebm/ |
mkvparser.hpp | 280 // size in bytes of the ContentEncAESSettings payload. |encryption| is 296 // bytes of the ContentEncryption payload. |encryption| is where the parsed 301 ContentEncryption* encryption);
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/ |
MessageParser.java | 116 * A typical use case would be the {@link BootReminder} sending the intent after device encryption 484 // If we are restarted after an encryption reboot, use stored (trusted) value for this. 526 // a stored Nfc bump intent after encryption reboot, which is a trusted intent.
|
/packages/apps/Settings/src/com/android/settings/ |
SecuritySettings.java | 209 // Add options for device encryption 228 // This device supports encryption but isn't encrypted. [all...] |
/system/bt/bta/include/ |
bta_gatt_api.h | 130 #define BTA_GATTC_ENC_CMPL_CB_EVT 17 /* encryption complete callback event */ 255 #define BTA_GATT_AUTH_REQ_NO_MITM GATT_AUTH_REQ_NO_MITM /* unauthenticated encryption */ 256 #define BTA_GATT_AUTH_REQ_MITM GATT_AUTH_REQ_MITM /* authenticated encryption */ [all...] |
/system/bt/stack/include/ |
gatt_api.h | 303 #define GATT_AUTH_REQ_NO_MITM 1 /* unauthenticated encryption */ 304 #define GATT_AUTH_REQ_MITM 2 /* authenticated encryption */ 580 /* Define a callback function when encryption is established. */ [all...] |
btm_api.h | 60 BTM_DELAY_CHECK, /* 15 delay the check on encryption */ [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
CipherTest.java | 259 // Decryption may need additional parameters. Initializing a Cipher for encryption 493 + ", encryption provider: " + encryptionProvider, [all...] |
/external/ipsec-tools/src/racoon/ |
oakley.c | [all...] |
/external/libpcap/doc/ |
pcap.xml | 113 <t>Encryption Marker Block: TODO</t> [all...] |