HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 176 - 200 of 1225) sorted by null

1 2 3 4 5 6 78 91011>>

  /packages/apps/Settings/src/com/android/settings/
CryptKeeperConfirm.java 73 // Post a delayed message in 700 milliseconds to enable encryption.
111 However, prior to encryption, the crypto key/value store is not
116 crypto key/value store is up to date. On encryption, this store
CryptKeeper.java 76 * encryption flows everytime. It should be noted that starting the activity in this manner
91 /** Message sent to us to indicate encryption update progress. */
112 /** When encryption is detected, this flag indicates whether or not we've checked for errors. */
117 /** If gone bad, should we show encryption failed (false) or corrupt (true)*/
294 Log.d(TAG, "Validating encryption state.");
297 Log.w(TAG, "Unexpectedly in CryptKeeper even though there is no encryption.");
302 Log.w(TAG, "Unable to get encryption state properly");
311 Log.w(TAG, "Incomplete, or corrupted encryption detected. Prompting user to wipe.");
315 Log.d(TAG, "Encryption state validated. Proceeding to configure UI");
462 * Initializes the UI based on the current state of encryption
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/
key_prot.x 32 * The keyserver is a public key storage/encryption/decryption service
33 * The encryption method used is based on the Diffie-Hellman exponential
89 KEY_SYSTEMERR /* system error (out of memory, encryption failure) */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/
key_prot.x 32 * The keyserver is a public key storage/encryption/decryption service
33 * The encryption method used is based on the Diffie-Hellman exponential
89 KEY_SYSTEMERR /* system error (out of memory, encryption failure) */
  /external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/
security.py 29 gsutil performs all operations using transport-layer encryption (HTTPS), to
159 <B>ENCRYPTION AT REST</B>
161 `Server-Side Encryption
162 <https://cloud.google.com/storage/docs/concepts-techniques#encryption>`_.
214 help_name_aliases=['encryption', 'protection', 'privacy', 'proxies',
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreRSACipherSpi.java 43 * Base class for {@link CipherSpi} providing Android KeyStore backed RSA encryption/decryption.
59 // RSA encryption with no padding using private key is a way to implement raw RSA
104 * RSA cipher with PKCS#1 v1.5 encryption padding.
113 // RSA encryption with PCKS#1 padding using private key is a way to implement RSA
159 * RSA cipher with OAEP encryption padding. Only SHA-1 based MGF1 is supported as MGF.
KeyGenParameterSpec.java 164 * <p><h3>Example: RSA key pair for encryption/decryption using RSA OAEP</h3>
167 * OAEP encryption padding scheme with SHA-256 or SHA-512 digests. The use of the public key is
191 * <p><h3>Example: AES key for encryption/decryption in GCM mode</h3>
193 * alias {@code key2} authorized to be used only for encryption/decryption in GCM mode with no
432 * Returns the time instant after which the key is no longer valid for encryption and signing
517 * Returns {@code true} if encryption using this key must be sufficiently randomized to produce
    [all...]
  /packages/apps/Settings/src/com/android/settings/accessibility/
ToggleAccessibilityServicePreferenceFragment.java 214 * Return whether the device is encrypted with legacy full disk encryption. Newer devices
215 * should be using File Based Encryption.
302 // The user confirmed that they accept weaker encryption when
303 // enabling the accessibility service, so change encryption.
304 // Since we came here asynchronously, check encryption again.
  /packages/inputmethods/LatinIME/tools/dicttool/src/com/android/inputmethod/latin/dicttool/
BinaryDictOffdeviceUtils.java 59 public final static int ENCRYPTION = 2;
62 { }, { COMPRESSION }, { ENCRYPTION, COMPRESSION }
82 case ENCRYPTION:
83 return "encryption";
115 case ENCRYPTION:
  /external/srtp/crypto/ae_xfm/
xfm.c 51 /* derive encryption and authentication keys from the input key */
63 /* perform encryption and authentication */
128 /* derive encryption and authentication keys from the input key */
139 /* perform encryption and authentication */
216 /* derive encryption and authentication keys from the input key */
228 /* perform encryption and authentication */
329 /* derive encryption and authentication keys from the input key */
  /external/tpm2/
CryptUtil_fp.h 273 TPMI_DH_OBJECT keyHandle, // IN: encryption key handle
316 TPM_ALG_ID algorithm, // IN: algorithm for encryption
318 TPMI_ALG_SYM_MODE mode, // IN: symmetric encryption mode
319 BYTE *key, // IN: encryption key
326 TPM_ALG_ID algorithm, // IN: algorithm for encryption
328 TPMI_ALG_SYM_MODE mode, // IN: symmetric encryption mode
329 BYTE *key, // IN: encryption key
Object_spt.c 78 // Use the context encryption algorithm and key size
97 // retrieved from this function include encryption algorithm, key size in bit, and a TPM2B_SYM_KEY
116 // Determine the algorithms for the KDF and the encryption/decryption
120 // Use the context encryption algorithm and key size
653 // Get a seed for KDF. The KDF for encryption and HMAC key use the same seed. It returns a pointer to
663 // Get seed for encryption key. Use input seed if provided.
    [all...]
  /packages/apps/ManagedProvisioning/res/values/
strings.xml 95 <!-- Title for reminder notification to resume provisioning after encryption [CHAR LIMIT=30] -->
96 <string name="continue_provisioning_notify_title">Encryption complete</string>
97 <!-- Body for reminder notification to resume provisioning after encryption [CHAR LIMIT=NONE] -->
138 <!-- Message of the error dialog in case a device does not support encryption, but encryption is necessary. [CHAR LIMIT=NONE] -->
139 <string name="preprovisioning_error_encryption_not_supported">Your device does not support encryption. Contact your IT department.</string>
194 <!-- Accessibility description for the profile setup screen showing encryption info. [CHAR LIMIT=NONE] -->
195 <string name="setup_profile_encryption">Set up your profile. Encryption</string>
200 <!-- Accessibility description for the device setup screen showing encryption info. [CHAR LIMIT=NONE] -->
201 <string name="setup_device_encryption">Set up your device. Encryption</string
    [all...]
  /system/vold/
cryptfs.c 427 * Since the entire framework is torn down and rebuilt after encryption,
556 * encryption info footer and key, and plenty of bytes to spare for future
    [all...]
  /external/srtp/doc/
rfc3711.txt 65 4.1. Encryption . . . . . . . . . . . . . . . . . . . . . . . 19
76 5.1. Encryption: AES-CM and NULL. . . . . . . . . . . . . . . 29
134 SRTP provides a framework for encryption and message authentication
145 encryption, a keyed-hash based function for message authentication,
178 The word "encryption" includes also use of the NULL algorithm (which
324 The "Encrypted Portion" of an SRTP packet consists of the encryption
330 None of the pre-defined encryption transforms uses any padding; for
339 their padding. It is important to note that encryption transforms
351 new encryption transform needs to carefully consider and describe the
375 Portion of the SRTP packet. Thus, if both encryption an
    [all...]
  /external/ImageMagick/ImageMagick/script/
export.html 55 <p class="lead magick-description">ImageMagick Studio LLC is a limited liability corporation based in the United States of America. All of our products are developed via online collaboration in public forums and distributed from a central server within the U.S. Therefore, U.S. export laws and regulations apply to our distributions and remain in force as products and technology are re-exported to different parties and places around the world. Information on export control classifications and associated restrictions may be required for exporting, re-exporting, record keeping, bundling/embedding of ImageMagick products, encryption reporting, and shipping documentation. More information on U.S. Export Regulations can be found at the <a href="http://www.bis.doc.gov/">U. S. Bureau of Industry and Security</a>.</p>
57 <p>The <a href="https://github.com/ImageMagick/ImageMagick/tree/ImageMagick-6/">ImageMagick</a> software distribution is classified as <a href="http://www.access.gpo.gov/bis/ear/txt/ccl5-pt2.txt">ECCN 5D002</a>. However, ImageMagick Studio LLC makes no warranty or representation that this classification is accurate, current, or complete. ImageMagick is exported under the <a href="http://www.access.gpo.gov/bis/ear/txt/740.txt">TSU exception in EAR 740.13(e)</a> which applies to software containing or designed for use with encryption software that is publicly available as open source. TSU further provides that <var>Posting encryption source code and corresponding object code on the Internet (e.g., FTP or World Wide Web site) where it may be downloaded by anyone neither establishes "knowledge" of a prohibited export or reexport for purposes of this paragraph, nor triggers any "red flags" necessitating the affirmative duty to inquire[...]</var>. It is your obligation as the exporter to comply with the current applicable requirements of United States export rules and regulations.</p>
  /external/ImageMagick/www/
export.html 59 <p class="lead magick-description">ImageMagick Studio LLC is a limited liability corporation based in the United States of America. All of our products are developed via online collaboration in public forums and distributed from a central server within the U.S. Therefore, U.S. export laws and regulations apply to our distributions and remain in force as products and technology are re-exported to different parties and places around the world. Information on export control classifications and associated restrictions may be required for exporting, re-exporting, record keeping, bundling/embedding of ImageMagick products, encryption reporting, and shipping documentation. More information on U.S. Export Regulations can be found at the <a href="http://www.bis.doc.gov/">U. S. Bureau of Industry and Security</a>.</p>
61 <p>The <a href="https://github.com/ImageMagick/ImageMagick/tree/ImageMagick-6/">ImageMagick</a> software distribution is classified as <a href="http://www.access.gpo.gov/bis/ear/txt/ccl5-pt2.txt">ECCN 5D002</a>. However, ImageMagick Studio LLC makes no warranty or representation that this classification is accurate, current, or complete. ImageMagick is exported under the <a href="http://www.access.gpo.gov/bis/ear/txt/740.txt">TSU exception in EAR 740.13(e)</a> which applies to software containing or designed for use with encryption software that is publicly available as open source. TSU further provides that <var>Posting encryption source code and corresponding object code on the Internet (e.g., FTP or World Wide Web site) where it may be downloaded by anyone neither establishes "knowledge" of a prohibited export or reexport for purposes of this paragraph, nor triggers any "red flags" necessitating the affirmative duty to inquire[...]</var>. It is your obligation as the exporter to comply with the current applicable requirements of United States export rules and regulations.</p>
  /external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
SealedObjectTest.java 129 * encryption algorithm and specified parameters can be retrieved by
156 * with encryption algorithm and specified parameters can be retrieved by
188 * object sealed with encryption algorithm can be retrieved by specifying
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedHelper.java 45 private static void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption)
48 encryptionAlgs.put(alias.getId(), encryption); local
129 * Return the digest encryption algorithm using one of the standard
  /frameworks/base/tools/obbtool/
mkobb.sh 110 hidden_prompt " Encryption key: " key
117 hidden_prompt "Encryption key (again): " key2
120 echo "ERROR: Encryption keys do not match!"
  /bionic/libc/include/arpa/
telnet.h 116 #define TELOPT_ENCRYPT 38 /* Encryption option */
277 * ENCRYPTion suboptions
279 #define ENCRYPT_IS 0 /* I pick encryption type ... */
280 #define ENCRYPT_SUPPORT 1 /* I support encryption types ... */
  /development/ndk/platforms/android-21/include/arpa/
telnet.h 116 #define TELOPT_ENCRYPT 38 /* Encryption option */
277 * ENCRYPTion suboptions
279 #define ENCRYPT_IS 0 /* I pick encryption type ... */
280 #define ENCRYPT_SUPPORT 1 /* I support encryption types ... */
  /development/ndk/platforms/android-9/include/arpa/
telnet.h 116 #define TELOPT_ENCRYPT 38 /* Encryption option */
277 * ENCRYPTion suboptions
279 #define ENCRYPT_IS 0 /* I pick encryption type ... */
280 #define ENCRYPT_SUPPORT 1 /* I support encryption types ... */
  /device/google/contexthub/firmware/inc/
eeData.h 34 * True is returned if the data item exists at all, else false is. For encryption keys, we
  /device/google/contexthub/firmware/inc/platform/stm32f4xx/
bl.h 76 //hashing, encryption, signature apis

Completed in 4406 milliseconds

1 2 3 4 5 6 78 91011>>