/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 200 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); 450 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); 549 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
|
/hardware/bsp/intel/peripheral/libupm/src/nrf8001/ |
aci.h | 325 * @brief Minimum encryption key size
330 * @brief Maximum encryption key size
497 * Bonding error: Invalid encryption key size
|
/libcore/ojluni/src/main/java/javax/crypto/ |
SealedObject.java | 135 * <p>Any algorithm parameters that may be used in the encryption 175 // if sealing is encryption only 185 // Save the encryption algorithm
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/parser/ |
ExtrasProvisioningDataParser.java | 251 // PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE, after encryption reboot, 313 // device is rebooted after encryption as part of the NFC provisioning flow, the 334 // If we go through encryption, and if the uri is a content uri:
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify.go | 174 // being valid for encryption only, but no-one noticed. Another 180 // digital signatures but not for encryption. Yet another CA reversed 187 // encryption key could only be used for Diffie-Hellman key agreement.
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify.go | 174 // being valid for encryption only, but no-one noticed. Another 180 // digital signatures but not for encryption. Yet another CA reversed 187 // encryption key could only be used for Diffie-Hellman key agreement.
|
/system/bt/stack/btm/ |
btm_acl.c | 669 /* some devices do not support switch while encryption is on */ 677 /* bypass turning off encryption if change link key is already doing it */ 719 ** Description This function is when encryption of the connection is 746 /* if encryption turn off failed we still will try to switch role */ 773 /* Finished enabling Encryption after role switch */ [all...] |
/system/tpm/trunks/ |
tpm_utility.h | 105 // This method performs an encryption operation using a LOADED RSA key 107 // to give us the |ciphertext|. |scheme| refers to the encryption scheme 241 // This method sets up a given HmacSession with parameter encryption set to
|
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 113 * aes_encrypt_init - Initialize AES for encryption 114 * @key: Encryption key 129 * aes_encrypt_deinit - Deinitialize AES encryption 305 * @passwd: Key encryption password or %NULL if key is not encrypted 334 * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5) 471 * encryption/decryption.
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 320 // Authorized to be used with any encryption and signature padding 329 // Disable randomized encryption requirement to support encryption 488 "Randomized encryption (IND-CPA) required but is violated by" 489 + " encryption padding mode: " 679 "Randomized encryption (IND-CPA) required but may be violated by" [all...] |
AndroidKeyStoreAuthenticatedAESCipherSpi.java | 291 // IV is being reused for encryption: this violates security best practices. 293 "IV has already been used. Reusing IV in encryption mode violates security best"
|
/device/google/contexthub/util/nanoapp_encr/ |
nanoapp_encr.c | 111 fprintf(stderr, "data is marked as signed; encryption is not possible for signed data\n"); 115 fprintf(stderr, "data is marked as encrypted; encryption is not possible for encrypted data\n");
|
/docs/source.android.com/src/ |
index.jd | 50 <a href="{@docRoot}security/encryption/file-based.html"><strong>Direct boot and 51 file-based encryption</strong></a> allows certain apps to run securely when
|
/docs/source.android.com/src/security/keystore/ |
implementer-ref.jd | 141 only for RSA encryption/decryption keys and specify RSA PKCS#1v2 OAEP 250 <p>Specifies the date and time at which the key expires for signing and encryption 494 <p>Provides "associated data" for AES-GCM encryption or decryption. This tag is 506 CTR encryption or decryption. This tag is provided to <a href="#begin">begin</a> 507 during encryption and decryption operations. It may only be provided to <a href="#begin">begin</a> 609 encryption and decryption.</p> 622 <li>Unpadded encryption, decryption, signing and verification. For unpadded 623 encryption and signing, if the message is shorter than the public modulus, 626 <li>PKCS#1 v1.5 encryption and signing padding modes [all...] |
/external/autotest/server/cros/ap_configurators/ |
belkinF9K1102_ap_configurator.py | 26 elif "Selecting WEP Encryption will disable the WPS" in text: 234 if 'Selecting WEP Encryption will disable the WPS' in message:
|
belkinF9K1105_ap_configurator.py | 25 elif "Selecting WEP Encryption will disable the WPS" in text: 257 if 'Selecting WEP Encryption will disable the WPS' in message:
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 193 * Process a packet of data for either CCM decryption or encryption. 226 * Process a packet of data for either CCM decryption or encryption.
|
/external/srtp/crypto/cipher/ |
cipher.c | 105 * encryption and decryption functions 117 debug_print(mod_cipher, "testing encryption", NULL);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 310 "client EAP encryption", 333 "client EAP encryption",
|
/prebuilts/go/darwin-x86/src/crypto/aes/ |
block.go | 143 // Encryption key setup. 159 // Derive decryption key from encryption key.
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
example_test.go | 165 // CTR mode is the same for both encryption and decryption, so we can 200 // OFB mode is the same for both encryption and decryption, so we can
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
block.go | 143 // Encryption key setup. 159 // Derive decryption key from encryption key.
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
example_test.go | 165 // CTR mode is the same for both encryption and decryption, so we can 200 // OFB mode is the same for both encryption and decryption, so we can
|
/system/connectivity/shill/shims/ |
crypto_util.cc | 63 // maximum length permissable for encryption with a key of |public_key| size. 97 LOG(ERROR) << "Error during encryption.";
|
/bionic/libc/include/bits/ |
posix_limits.h | 149 #define _XOPEN_CRYPT -1 /* don't support X/Open Encryption */
|