Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 142) sorted by relevance

123456

/external/libcups/cups/
Dusersys.c65 http_encryption_t encryption; /* Encryption setting */ member
120 if (cg->encryption == (http_encryption_t)-1) in cupsEncryption()
123 return (cg->encryption); in cupsEncryption()
286 cg->encryption = e; in cupsSetEncryption()
932 if (cg->encryption == (http_encryption_t)-1) in _cupsSetDefaults()
933 cg->encryption = cc.encryption; in _cupsSetDefaults()
1076 if (cc->encryption == (http_encryption_t)-1) in cups_finalize_client_conf()
1077 cc->encryption = HTTP_ENCRYPTION_IF_REQUESTED; in cups_finalize_client_conf()
1173 cc->encryption = (http_encryption_t)-1; in cups_init_client_conf()
1293 cc->encryption = HTTP_ENCRYPTION_NEVER; in cups_set_encryption()
[all …]
Dhttp.c53 http_encryption_t encryption,
455 http_encryption_t encryption, /* I - Type of encryption to use */ in httpConnect2() argument
463 …ocking=%d, msec=%d, cancel=%p)", host, port, (void *)addrlist, family, encryption, blocking, msec,… in httpConnect2()
469 if ((http = http_create(host, port, addrlist, family, encryption, blocking, in httpConnect2()
503 http_encryption_t encryption) /* I - Type of encryption to use */ in httpConnectEncrypt() argument
506 host, port, encryption)); in httpConnectEncrypt()
508 return (httpConnect2(host, port, NULL, AF_UNSPEC, encryption, 1, 30000, in httpConnectEncrypt()
559 http->encryption = e; in httpEncryption()
561 if ((http->encryption == HTTP_ENCRYPTION_ALWAYS && !http->tls) || in httpEncryption()
562 (http->encryption == HTTP_ENCRYPTION_NEVER && http->tls)) in httpEncryption()
[all …]
Ddest-localization.c334 http_encryption_t encryption; /* Encryption to use */ in cups_create_localizations() local
393 encryption = HTTP_ENCRYPTION_ALWAYS; in cups_create_localizations()
395 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in cups_create_localizations()
397 if ((http2 = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, in cups_create_localizations()
Dtesthttp.c226 http_encryption_t encryption; /* Encryption type */ in main() local
655 encryption = HTTP_ENCRYPTION_ALWAYS; in main()
657 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in main()
659 http = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, 30000, NULL); in main()
/external/scapy/test/
Dipsec.uts68 * after encryption the original packet payload should NOT be readable
120 * after encryption the original packet payload should NOT be readable
171 * after encryption the original packet payload should NOT be readable
223 * after encryption the original packet payload should NOT be readable
274 * after encryption the original packet payload should NOT be readable
325 * after encryption the original packet payload should NOT be readable
375 * after encryption packet should be encapsulated with the given ip tunnel header
408 * after encryption packet should be encapsulated with the given ip tunnel header
416 * after encryption the original packet payload should NOT be readable
443 * after encryption packet should be encapsulated with the given ip tunnel header
[all …]
/external/cros/system_api/dbus/authpolicy/
Dactive_directory_info.proto94 // Domain join failed because KDC does not support the encryption enforced in
95 // the Samba configuration, e.g. if 'kerberos encryption types' is set to
96 // 'strong' to enforce AES encryption, but KDC does not support AES.
177 // What Kerberos encryption types kinit should use.
197 // Supported Kerberos encryption types for domain join. By default, only
202 // allow strong encryption. In this case, domain join fails. Likewise, there
203 // might also be rare use cases that require legacy encryption only. If the
204 // server supports strong encryption, it is always preferred.
206 // DeviceKerberosEncryptionTypes policy is used to determine encryption types.
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/external/libcups/filter/
Dtestclient.c38 http_encryption_t encryption; /* Use encryption? */ member
85 http_encryption_t encryption; /* Encryption mode */ in main() local
205 encryption = HTTP_ENCRYPTION_ALWAYS; in main()
207 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in main()
209 if ((http = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, 0, NULL)) == NULL) in main()
289 monitor.encryption = encryption; in main()
756 …http = httpConnect2(monitor->hostname, monitor->port, NULL, AF_UNSPEC, monitor->encryption, 1, 0, … in monitor_printer()
/external/u-boot/board/xilinx/zynqmp/
DKconfig14 either authentication or encryption or both encryption
/external/apache-commons-compress/
DREADME.txt24 possession, use, and/or re-export to another country, of encryption
25 software. BEFORE using any encryption software, please check your
27 possession, or use, and re-export of encryption software, to see if
/external/openssh/
DPROTOCOL.chacha20poly13052 encryption cipher supported by OpenSSH.
17 authenticated encryption mode. The construction used is based on that
25 The chacha20-poly1305@openssh.com offers both encryption and
60 for encryption of the packet payload.
87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
DOVERVIEW36 - Ssh contains several encryption algorithms. These are all
48 RSA key generation, encryption, decryption
69 encryption routines.
145 negotiate encryption, then perform authentication, preparatory
/external/wycheproof/doc/
Drsa.md36 ## RSA PKCS #1 v1.5 encryption
40 PKCS #1 v1.5 encryption often depends on the amount of information leaked after
46 chosen ciphertexts [S10], though in this case the encryption did not use PKCS #1
102 the RSA encryption standard PKCS# 1" Crypto 98
105 encryption padding (OAEP) as standardized in PKCS# 1 v2.0", Crypto 2001 This
108 "Errors matter: Breaking RSA-based PIN encryption with thirty ciphertext
/external/u-boot/tools/
Dzynqimage.c74 uint32_t encryption; /* 0x28 */ member
99 checksum += le32_to_cpu(ptr->encryption); in zynqimage_checksum()
121 ptr->encryption = cpu_to_le32(ENCRYPTION_NONE); in zynqimage_default_header()
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
DDefaultCMSSignatureAlgorithmNameGenerator.java27 private void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument
30 encryptionAlgs.put(alias, encryption); in addEntries()
DCMSSignedHelper.java43 private static void addEntries(ASN1ObjectIdentifier alias, String encryption) in addEntries() argument
45 encryptionAlgs.put(alias.getId(), encryption); in addEntries() local
/external/python/rsa/doc/
Dcompatibility.rst7 Python-RSA implements encryption and signatures according to PKCS#1
27 :ref:`VARBLOCK <bigfiles>` encryption:
Dusage.rst18 as the *encryption key*. Decrypting a message can only be done using
263 encryption for you.
274 1. decrypt/encrypt_bigfile() does not implement `Authenticated encryption`_ nor
277 2. decrypt/encrypt_bigfile() does not use hybrid encryption (it uses plain RSA)
282 .. _Authenticated encryption: https://en.wikipedia.org/wiki/Authenticated_encryption
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml47 hardware. It still uses RC4 for the encryption like WEP, but with
60 Group Key Handshake) for generating and exchanging data encryption
75 support for more robust encryption algorithm (CCMP: AES in Counter
/external/python/rsa/
DMETADATA2 description: "Python-RSA is a pure-Python RSA implementation. It supports encryption and decryption…
/external/scrypt/lib/
DREADME5 included here which is not actually used by the scrypt file encryption
/external/ukey2/src/main/proto/
Dsecuremessage.proto39 // Supported encryption schemes
41 // No encryption
/external/libvpx/libvpx/third_party/libwebm/mkvparser/
Dmkvparser.cc4266 ContentEncryption* const encryption = in ParseContentEncodingEntry() local
4268 if (!encryption) in ParseContentEncodingEntry()
4271 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry()
4273 delete encryption; in ParseContentEncodingEntry()
4276 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry()
4346 ContentEncryption* encryption) { in ParseEncryptionEntry() argument
4348 assert(encryption); in ParseEncryptionEntry()
4360 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry()
4361 if (encryption->algo != 5) in ParseEncryptionEntry()
4364 delete[] encryption->key_id; in ParseEncryptionEntry()
[all …]
/external/libvpx/libwebm/mkvparser/
Dmkvparser.cc4268 ContentEncryption* const encryption = in ParseContentEncodingEntry() local
4270 if (!encryption) in ParseContentEncodingEntry()
4273 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry()
4275 delete encryption; in ParseContentEncodingEntry()
4279 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry()
4355 ContentEncryption* encryption) { in ParseEncryptionEntry() argument
4357 assert(encryption); in ParseEncryptionEntry()
4369 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry()
4370 if (encryption->algo != 5) in ParseEncryptionEntry()
4373 delete[] encryption->key_id; in ParseEncryptionEntry()
[all …]
/external/libaom/libaom/third_party/libwebm/mkvparser/
Dmkvparser.cc4266 ContentEncryption* const encryption = in ParseContentEncodingEntry() local
4268 if (!encryption) in ParseContentEncodingEntry()
4271 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry()
4273 delete encryption; in ParseContentEncodingEntry()
4276 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry()
4346 ContentEncryption* encryption) { in ParseEncryptionEntry() argument
4348 assert(encryption); in ParseEncryptionEntry()
4360 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry()
4361 if (encryption->algo != 5) in ParseEncryptionEntry()
4364 delete[] encryption->key_id; in ParseEncryptionEntry()
[all …]

123456