/hardware/qcom/media/msm8996/mm-core/inc/ |
QOMX_FileFormatExtensions.h | 141 /**QOMX_ENCRYPT_TYPE indicates the type of encryption */ 152 QOMX_ENCRYPT_TYPE nType; /** type of Encryption */
|
/libcore/ojluni/src/main/java/javax/crypto/spec/ |
PBEKeySpec.java | 31 * A user-chosen password that can be used with password-based encryption 35 * the encryption mechanism that uses it derives a cryptographic key.
|
/packages/apps/ManagedProvisioning/tests/src/com/android/managedprovisioning/uiflows/ |
EncryptionControllerTest.java | 93 // WHEN setting an encryption reminder 110 // WHEN setting an encryption reminder
|
/prebuilts/go/darwin-x86/src/crypto/des/ |
const.go | 5 // Package des implements the Data Encryption Standard (DES) and the 6 // Triple Data Encryption Algorithm (TDEA) as defined
|
/prebuilts/go/linux-x86/src/crypto/des/ |
const.go | 5 // Package des implements the Data Encryption Standard (DES) and the 6 // Triple Data Encryption Algorithm (TDEA) as defined
|
/system/bt/stack/smp/ |
smp_utils.c | 68 SMP_ENC_INFO_SIZE, /* 0x06: encryption information */ 96 smp_command_has_valid_fixed_length, /* 0x06: encryption information */ 122 smp_parameter_unconditionally_valid, /* 0x06: encryption information */ 160 smp_build_encrypt_info_cmd, /* 0x06: encryption information */ 813 ** Description This function is called to mask off the encryption key based 814 ** on the maximum encryption key size. [all...] |
/system/tpm/trunks/ |
hmac_authorization_delegate.cc | 178 // No parameter encryption enabled. 203 LOG(ERROR) << "Parameter size is too large for TPM encryption.";
|
/docs/source.android.com/src/security/keystore/ |
features.jd | 38 <li>Asymmetric encryption and decryption with appropriate padding modes 41 <li>Symmetric encryption and decryption in appropriate modes, including an AEAD 77 <li>Required padding modes for RSA encryption/decryption are: 102 encryption must fail if the input isn't a multiple of the block size. 150 indicates multiple authorized values. For example, an encryption key will 252 password-based encryption, and
|
/external/curl/lib/ |
curl_ntlm_core.c | 216 /* use internal slot for DES encryption (requires NSS to be initialized) */ 235 /* Create the DES encryption context */ 243 /* Perform the encryption */ 276 /* Perform the encryption */ 302 /* Perform the encryption */ 349 /* Perform the encryption */
|
/external/ipsec-tools/src/racoon/ |
strnames.c | 520 { IPSECDOI_ATTR_ENC_MODE, "Encryption Mode", s_ipsecdoi_encmode }, 636 { OAKLEY_ATTR_ENC_ALG, "Encryption Algorithm", s_attr_isakmp_enc }, 712 { OAKLEY_ATTR_AUTH_METHOD_RSAENC, "Encryption with RSA", NULL }, 713 { OAKLEY_ATTR_AUTH_METHOD_RSAREV, "Revised encryption with RSA", NULL }, 714 { OAKLEY_ATTR_AUTH_METHOD_EGENC, "Encryption with El-Gamal", NULL }, 715 { OAKLEY_ATTR_AUTH_METHOD_EGREV, "Revised encryption with El-Gamal", NULL },
|
/external/wpa_supplicant_8/hostapd/ |
README | 270 hardware. It still uses RC4 for the encryption like WEP, but with 282 Handshake) for generating and exchanging data encryption keys between 297 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 336 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 340 # Group cipher suite (encryption algorithm for broadcast and multicast frames) 346 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
|
/packages/apps/Email/provider_src/com/android/email/activity/setup/ |
AccountSecurity.java | 57 * 6. If necessary, request for user to activate device encryption 370 * steps a few times. It may go as far as step 5 (password) or step 6 (encryption), but it 454 // Step 6. If encryption is needed, try to have the user set it 458 LogUtils.d(TAG, "Encryption needed; repost notification"); 464 LogUtils.d(TAG, "Encryption needed; request it via DPM"); 467 // launch the activity to start up encryption.
|
/external/srtp/srtp/ |
srtp.c | 369 /* generate encryption key */ 383 /* generate encryption salt, put after encryption key */ 418 /* generate encryption key */ 432 /* generate encryption salt, put after encryption key */ 687 * find starting point for encryption and length of data to be [all...] |
/system/bt/stack/btm/ |
btm_ble.c | 178 ** Description Local local identity key, encryption root or sign counter. 214 ** Description This function is called to read the local device encryption [all...] |
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 591 // Set the encryption password to default. 648 // Update the device encryption password. 823 /** Update the encryption password if it is enabled **/ 830 Log.e(TAG, "Could not find the mount service to update the encryption password"); 841 Log.e(TAG, "Error changing encryption password", e); [all...] |
/external/srtp/doc/ |
intro.txt | 274 for encryption by only a single sender. In other words, the key is 375 @section ISMAcryp ISMA Encryption Support 379 is an alternative to SRTP encryption, which is potentially 384 libSRTP provides the encryption and decryption functions needed for ISMAcryp 392 streams while using ISMAcryp encryption to protect the media itself.
|
/external/wpa_supplicant_8/src/wps/ |
wps.h | 38 * @encr_type: Encryption Type (WPS_ENCR_NONE, .. flags) 662 * encr_types - Enabled encryption types (bit field of WPS_ENCR_*) 667 * encr_types_rsn - Enabled encryption types for RSN (WPS_ENCR_*) 672 * encr_types_wpa - Enabled encryption types for WPA (WPS_ENCR_*) 682 * encr_types - Current AP encryption type (WPS_ENCR_*)
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.sgml | 37 Link-layer encryption can be used to provide a layer of security for 39 included a simple encryption mechanism, WEP. However, that proved to 43 security issues due to the use of WEP for encryption. Wi-Fi Protected 46 enabled networks that are using CCMP (encryption mechanism based on strong 122 <para><command>wpa_supplicant</command> configures encryption
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreCipherSpiBase.java | 772 * Returns {@code true} if this cipher is initialized for encryption, {@code false} if this 872 * consuming any entropy. For encryption, the value combined with [all...] |
AndroidKeyStoreKeyPairGeneratorSpi.java | 251 // Authorized to be used with any encryption and signature padding 260 // Disable randomized encryption requirement to support encryption 325 "Randomized encryption (IND-CPA) required but may be violated" 456 "Encryption at rest using secure lock screen credential requested for key pair" [all...] |
/system/bt/stack/gatt/ |
gatt_db.c | 202 ** key_size: encryption key size. 316 ** key_size: encryption key size. 622 ** key_size: encryption key size 680 ** key_size: encryption key size 726 ** key_size: encryption key size [all...] |
/external/boringssl/src/include/openssl/ |
aead.h | 25 /* Authenticated Encryption with Additional Data. 49 * authenticity for authenticated encryption. For formal definitions see 50 * Bellare and Namprempre, "Authenticated encryption: relations among notions
|
/external/lzma/DOC/ |
lzma-sdk.txt | 19 7z also supports AES-256 based encryption.
115 Asm/ - asm files (optimized code for CRC calculation and Intel-AES encryption)
151 Crypto - files for encryption / decompression
|
/external/tpm2/ |
CpriRSA.c | 250 // CRYPT_SUCCESS encryption complete [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 83 * GroupKey and PeerKey require encryption, otherwise, encryption is optional. 213 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */
|