Searched
full:encryption (Results
626 -
650 of
980) sorted by null
<<21222324252627282930>>
/external/srtp/tables/ |
aes_tables.c | 190 * encryption and decryption are true inverses of each other, and
|
/external/tcpdump/ |
ieee802_11_radio.h | 258 * with WEP encryption
|
/external/valgrind/none/tests/amd64/ |
aes.c | 331 in "White Paper Intel Advanced Encryption Standard AES
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 265 * frames if encryption is enabled. */
|
eap_tls.c | 195 "client EAP encryption",
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 313 wpa_printf(MSG_DEBUG, "WPS: * Encryption Type Flags");
|
wps_registrar.c | [all...] |
wps_validate.c | 693 wpa_printf(MSG_INFO, "WPS-STRICT: Encryption Type " 701 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encryption Type " 715 wpa_printf(MSG_INFO, "WPS-STRICT: Encryption Type " 724 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encryption Type " [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
README | 224 hardware. It still uses RC4 for the encryption like WEP, but with 236 Handshake) for generating and exchanging data encryption keys between 252 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 285 - wpa_supplicant configures encryption keys for unicast and broadcast [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.ui | 103 <string>Encryption</string>
|
wpagui.ui | 84 <string>Encryption:</string>
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
ContainerEncryptionParamsTest.java | 68 fail("encryption parameters should be IvParameterSpec");
|
/frameworks/base/docs/html/guide/topics/admin/ |
device-admin.jd | 206 <td>Require storage encryption</td> 705 <h4 id="storage">Storage encryption</h4> [all...] |
/frameworks/base/docs/html/training/enterprise/ |
device-management-policy.jd | 48 cover screen-lock password strength, expiration timeout, encryption, etc.</p>
|
/frameworks/base/docs/html/training/id-auth/ |
custom_auth.jd | 75 <p>It's important to understand that {@link android.accounts.AccountManager} is not an encryption
|
/frameworks/base/keystore/java/android/security/keystore/ |
KeyInfo.java | 174 * Gets the time instant after which the key is no long valid for encryption and signing.
|
KeyStoreCryptoOperationChunkedStreamer.java | 318 * <p>For example, for an encryption operation, this is the stream through which plaintext is
|
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 40 * are designed to support the ISO/IEC 23001-7: Common Encryption standard, but 41 * may also be used to implement other encryption schemes. 43 * Encrypted content is prepared using an encryption server and stored in a content [all...] |
/hardware/libhardware/include/hardware/ |
bt_gatt_client.h | 114 BT_GATTC_DELAYED_ENCRYPTION_CHECK, /*12 Delayed encryption check */
|
/hardware/qcom/camera/mm-image-codec/qomx_core/ |
QOMX_JpegExtensions.h | 232 * meta data encryption key
|
/libcore/luni/src/main/java/javax/crypto/ |
SealedObject.java | 116 // should be initialized for encryption
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
DESKeySpecTest.java | 42 // GUIDELINES FOR IMPLEMENTING AND USING THE NBS DATA ENCRYPTION STANDARD
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/ |
DeviceOwnerPreProvisioningActivity.java | 276 ProvisionLogger.loge("User canceled device encryption.");
|
/packages/apps/Settings/src/com/android/settings/ |
MasterClear.java | 157 // a force wipe due to encryption.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
capability.h | 261 /* Allow setting encryption key on loopback filesystem */
|
Completed in 199 milliseconds
<<21222324252627282930>>