HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 451 - 475 of 1225) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 200 wpa_printf(MSG_INFO, "IKEV2: Encryption failed");
450 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
549 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
  /hardware/bsp/intel/peripheral/libupm/src/nrf8001/
aci.h 325 * @brief Minimum encryption key size
330 * @brief Maximum encryption key size
497 * Bonding error: Invalid encryption key size
  /libcore/ojluni/src/main/java/javax/crypto/
SealedObject.java 135 * <p>Any algorithm parameters that may be used in the encryption
175 // if sealing is encryption only
185 // Save the encryption algorithm
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/parser/
ExtrasProvisioningDataParser.java 251 // PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE, after encryption reboot,
313 // device is rebooted after encryption as part of the NFC provisioning flow, the
334 // If we go through encryption, and if the uri is a content uri:
  /prebuilts/go/darwin-x86/src/crypto/x509/
verify.go 174 // being valid for encryption only, but no-one noticed. Another
180 // digital signatures but not for encryption. Yet another CA reversed
187 // encryption key could only be used for Diffie-Hellman key agreement.
  /prebuilts/go/linux-x86/src/crypto/x509/
verify.go 174 // being valid for encryption only, but no-one noticed. Another
180 // digital signatures but not for encryption. Yet another CA reversed
187 // encryption key could only be used for Diffie-Hellman key agreement.
  /system/bt/stack/btm/
btm_acl.c 669 /* some devices do not support switch while encryption is on */
677 /* bypass turning off encryption if change link key is already doing it */
719 ** Description This function is when encryption of the connection is
746 /* if encryption turn off failed we still will try to switch role */
773 /* Finished enabling Encryption after role switch */
    [all...]
  /system/tpm/trunks/
tpm_utility.h 105 // This method performs an encryption operation using a LOADED RSA key
107 // to give us the |ciphertext|. |scheme| refers to the encryption scheme
241 // This method sets up a given HmacSession with parameter encryption set to
  /external/wpa_supplicant_8/src/crypto/
crypto.h 113 * aes_encrypt_init - Initialize AES for encryption
114 * @key: Encryption key
129 * aes_encrypt_deinit - Deinitialize AES encryption
305 * @passwd: Key encryption password or %NULL if key is not encrypted
334 * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5)
471 * encryption/decryption.
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreSpi.java 320 // Authorized to be used with any encryption and signature padding
329 // Disable randomized encryption requirement to support encryption
488 "Randomized encryption (IND-CPA) required but is violated by"
489 + " encryption padding mode: "
679 "Randomized encryption (IND-CPA) required but may be violated by"
    [all...]
AndroidKeyStoreAuthenticatedAESCipherSpi.java 291 // IV is being reused for encryption: this violates security best practices.
293 "IV has already been used. Reusing IV in encryption mode violates security best"
  /device/google/contexthub/util/nanoapp_encr/
nanoapp_encr.c 111 fprintf(stderr, "data is marked as signed; encryption is not possible for signed data\n");
115 fprintf(stderr, "data is marked as encrypted; encryption is not possible for encrypted data\n");
  /docs/source.android.com/src/
index.jd 50 <a href="{@docRoot}security/encryption/file-based.html"><strong>Direct boot and
51 file-based encryption</strong></a> allows certain apps to run securely when
  /docs/source.android.com/src/security/keystore/
implementer-ref.jd 141 only for RSA encryption/decryption keys and specify RSA PKCS#1v2 OAEP
250 <p>Specifies the date and time at which the key expires for signing and encryption
494 <p>Provides "associated data" for AES-GCM encryption or decryption. This tag is
506 CTR encryption or decryption. This tag is provided to <a href="#begin">begin</a>
507 during encryption and decryption operations. It may only be provided to <a href="#begin">begin</a>
609 encryption and decryption.</p>
622 <li>Unpadded encryption, decryption, signing and verification. For unpadded
623 encryption and signing, if the message is shorter than the public modulus,
626 <li>PKCS#1 v1.5 encryption and signing padding modes
    [all...]
  /external/autotest/server/cros/ap_configurators/
belkinF9K1102_ap_configurator.py 26 elif "Selecting WEP Encryption will disable the WPS" in text:
234 if 'Selecting WEP Encryption will disable the WPS' in message:
belkinF9K1105_ap_configurator.py 25 elif "Selecting WEP Encryption will disable the WPS" in text:
257 if 'Selecting WEP Encryption will disable the WPS' in message:
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
CCMBlockCipher.java 193 * Process a packet of data for either CCM decryption or encryption.
226 * Process a packet of data for either CCM decryption or encryption.
  /external/srtp/crypto/cipher/
cipher.c 105 * encryption and decryption functions
117 debug_print(mod_cipher, "testing encryption", NULL);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 310 "client EAP encryption",
333 "client EAP encryption",
  /prebuilts/go/darwin-x86/src/crypto/aes/
block.go 143 // Encryption key setup.
159 // Derive decryption key from encryption key.
  /prebuilts/go/darwin-x86/src/crypto/cipher/
example_test.go 165 // CTR mode is the same for both encryption and decryption, so we can
200 // OFB mode is the same for both encryption and decryption, so we can
  /prebuilts/go/linux-x86/src/crypto/aes/
block.go 143 // Encryption key setup.
159 // Derive decryption key from encryption key.
  /prebuilts/go/linux-x86/src/crypto/cipher/
example_test.go 165 // CTR mode is the same for both encryption and decryption, so we can
200 // OFB mode is the same for both encryption and decryption, so we can
  /system/connectivity/shill/shims/
crypto_util.cc 63 // maximum length permissable for encryption with a key of |public_key| size.
97 LOG(ERROR) << "Error during encryption.";
  /bionic/libc/include/bits/
posix_limits.h 149 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */

Completed in 1094 milliseconds

<<11121314151617181920>>