OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:encryption
(Results
176 - 200
of
1225
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/packages/apps/Settings/src/com/android/settings/
CryptKeeperConfirm.java
73
// Post a delayed message in 700 milliseconds to enable
encryption
.
111
However, prior to
encryption
, the crypto key/value store is not
116
crypto key/value store is up to date. On
encryption
, this store
CryptKeeper.java
76
*
encryption
flows everytime. It should be noted that starting the activity in this manner
91
/** Message sent to us to indicate
encryption
update progress. */
112
/** When
encryption
is detected, this flag indicates whether or not we've checked for errors. */
117
/** If gone bad, should we show
encryption
failed (false) or corrupt (true)*/
294
Log.d(TAG, "Validating
encryption
state.");
297
Log.w(TAG, "Unexpectedly in CryptKeeper even though there is no
encryption
.");
302
Log.w(TAG, "Unable to get
encryption
state properly");
311
Log.w(TAG, "Incomplete, or corrupted
encryption
detected. Prompting user to wipe.");
315
Log.d(TAG, "
Encryption
state validated. Proceeding to configure UI");
462
* Initializes the UI based on the current state of
encryption
[
all
...]
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/
key_prot.x
32
* The keyserver is a public key storage/
encryption
/decryption service
33
* The
encryption
method used is based on the Diffie-Hellman exponential
89
KEY_SYSTEMERR /* system error (out of memory,
encryption
failure) */
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/
key_prot.x
32
* The keyserver is a public key storage/
encryption
/decryption service
33
* The
encryption
method used is based on the Diffie-Hellman exponential
89
KEY_SYSTEMERR /* system error (out of memory,
encryption
failure) */
/external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/
security.py
29
gsutil performs all operations using transport-layer
encryption
(HTTPS), to
159
<B>
ENCRYPTION
AT REST</B>
161
`Server-Side
Encryption
162
<https://cloud.google.com/storage/docs/concepts-techniques#
encryption
>`_.
214
help_name_aliases=['
encryption
', 'protection', 'privacy', 'proxies',
/frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreRSACipherSpi.java
43
* Base class for {@link CipherSpi} providing Android KeyStore backed RSA
encryption
/decryption.
59
// RSA
encryption
with no padding using private key is a way to implement raw RSA
104
* RSA cipher with PKCS#1 v1.5
encryption
padding.
113
// RSA
encryption
with PCKS#1 padding using private key is a way to implement RSA
159
* RSA cipher with OAEP
encryption
padding. Only SHA-1 based MGF1 is supported as MGF.
KeyGenParameterSpec.java
164
* <p><h3>Example: RSA key pair for
encryption
/decryption using RSA OAEP</h3>
167
* OAEP
encryption
padding scheme with SHA-256 or SHA-512 digests. The use of the public key is
191
* <p><h3>Example: AES key for
encryption
/decryption in GCM mode</h3>
193
* alias {@code key2} authorized to be used only for
encryption
/decryption in GCM mode with no
432
* Returns the time instant after which the key is no longer valid for
encryption
and signing
517
* Returns {@code true} if
encryption
using this key must be sufficiently randomized to produce
[
all
...]
/packages/apps/Settings/src/com/android/settings/accessibility/
ToggleAccessibilityServicePreferenceFragment.java
214
* Return whether the device is encrypted with legacy full disk
encryption
. Newer devices
215
* should be using File Based
Encryption
.
302
// The user confirmed that they accept weaker
encryption
when
303
// enabling the accessibility service, so change
encryption
.
304
// Since we came here asynchronously, check
encryption
again.
/packages/inputmethods/LatinIME/tools/dicttool/src/com/android/inputmethod/latin/dicttool/
BinaryDictOffdeviceUtils.java
59
public final static int
ENCRYPTION
= 2;
62
{ }, { COMPRESSION }, {
ENCRYPTION
, COMPRESSION }
82
case
ENCRYPTION
:
83
return "
encryption
";
115
case
ENCRYPTION
:
/external/srtp/crypto/ae_xfm/
xfm.c
51
/* derive
encryption
and authentication keys from the input key */
63
/* perform
encryption
and authentication */
128
/* derive
encryption
and authentication keys from the input key */
139
/* perform
encryption
and authentication */
216
/* derive
encryption
and authentication keys from the input key */
228
/* perform
encryption
and authentication */
329
/* derive
encryption
and authentication keys from the input key */
/external/tpm2/
CryptUtil_fp.h
273
TPMI_DH_OBJECT keyHandle, // IN:
encryption
key handle
316
TPM_ALG_ID algorithm, // IN: algorithm for
encryption
318
TPMI_ALG_SYM_MODE mode, // IN: symmetric
encryption
mode
319
BYTE *key, // IN:
encryption
key
326
TPM_ALG_ID algorithm, // IN: algorithm for
encryption
328
TPMI_ALG_SYM_MODE mode, // IN: symmetric
encryption
mode
329
BYTE *key, // IN:
encryption
key
Object_spt.c
78
// Use the context
encryption
algorithm and key size
97
// retrieved from this function include
encryption
algorithm, key size in bit, and a TPM2B_SYM_KEY
116
// Determine the algorithms for the KDF and the
encryption
/decryption
120
// Use the context
encryption
algorithm and key size
653
// Get a seed for KDF. The KDF for
encryption
and HMAC key use the same seed. It returns a pointer to
663
// Get seed for
encryption
key. Use input seed if provided.
[
all
...]
/packages/apps/ManagedProvisioning/res/values/
strings.xml
95
<!-- Title for reminder notification to resume provisioning after
encryption
[CHAR LIMIT=30] -->
96
<string name="continue_provisioning_notify_title">
Encryption
complete</string>
97
<!-- Body for reminder notification to resume provisioning after
encryption
[CHAR LIMIT=NONE] -->
138
<!-- Message of the error dialog in case a device does not support
encryption
, but
encryption
is necessary. [CHAR LIMIT=NONE] -->
139
<string name="preprovisioning_error_encryption_not_supported">Your device does not support
encryption
. Contact your IT department.</string>
194
<!-- Accessibility description for the profile setup screen showing
encryption
info. [CHAR LIMIT=NONE] -->
195
<string name="setup_profile_encryption">Set up your profile.
Encryption
</string>
200
<!-- Accessibility description for the device setup screen showing
encryption
info. [CHAR LIMIT=NONE] -->
201
<string name="setup_device_encryption">Set up your device.
Encryption
</string
[
all
...]
/system/vold/
cryptfs.c
427
* Since the entire framework is torn down and rebuilt after
encryption
,
556
*
encryption
info footer and key, and plenty of bytes to spare for future
[
all
...]
/external/srtp/doc/
rfc3711.txt
65
4.1.
Encryption
. . . . . . . . . . . . . . . . . . . . . . . 19
76
5.1.
Encryption
: AES-CM and NULL. . . . . . . . . . . . . . . 29
134
SRTP provides a framework for
encryption
and message authentication
145
encryption
, a keyed-hash based function for message authentication,
178
The word "
encryption
" includes also use of the NULL algorithm (which
324
The "Encrypted Portion" of an SRTP packet consists of the
encryption
330
None of the pre-defined
encryption
transforms uses any padding; for
339
their padding. It is important to note that
encryption
transforms
351
new
encryption
transform needs to carefully consider and describe the
375
Portion of the SRTP packet. Thus, if both
encryption
an
[
all
...]
/external/ImageMagick/ImageMagick/script/
export.html
55
<p class="lead magick-description">ImageMagick Studio LLC is a limited liability corporation based in the United States of America. All of our products are developed via online collaboration in public forums and distributed from a central server within the U.S. Therefore, U.S. export laws and regulations apply to our distributions and remain in force as products and technology are re-exported to different parties and places around the world. Information on export control classifications and associated restrictions may be required for exporting, re-exporting, record keeping, bundling/embedding of ImageMagick products,
encryption
reporting, and shipping documentation. More information on U.S. Export Regulations can be found at the <a href="http://www.bis.doc.gov/">U. S. Bureau of Industry and Security</a>.</p>
57
<p>The <a href="https://github.com/ImageMagick/ImageMagick/tree/ImageMagick-6/">ImageMagick</a> software distribution is classified as <a href="http://www.access.gpo.gov/bis/ear/txt/ccl5-pt2.txt">ECCN 5D002</a>. However, ImageMagick Studio LLC makes no warranty or representation that this classification is accurate, current, or complete. ImageMagick is exported under the <a href="http://www.access.gpo.gov/bis/ear/txt/740.txt">TSU exception in EAR 740.13(e)</a> which applies to software containing or designed for use with
encryption
software that is publicly available as open source. TSU further provides that <var>Posting
encryption
source code and corresponding object code on the Internet (e.g., FTP or World Wide Web site) where it may be downloaded by anyone neither establishes "knowledge" of a prohibited export or reexport for purposes of this paragraph, nor triggers any "red flags" necessitating the affirmative duty to inquire[...]</var>. It is your obligation as the exporter to comply with the current applicable requirements of United States export rules and regulations.</p>
/external/ImageMagick/www/
export.html
59
<p class="lead magick-description">ImageMagick Studio LLC is a limited liability corporation based in the United States of America. All of our products are developed via online collaboration in public forums and distributed from a central server within the U.S. Therefore, U.S. export laws and regulations apply to our distributions and remain in force as products and technology are re-exported to different parties and places around the world. Information on export control classifications and associated restrictions may be required for exporting, re-exporting, record keeping, bundling/embedding of ImageMagick products,
encryption
reporting, and shipping documentation. More information on U.S. Export Regulations can be found at the <a href="http://www.bis.doc.gov/">U. S. Bureau of Industry and Security</a>.</p>
61
<p>The <a href="https://github.com/ImageMagick/ImageMagick/tree/ImageMagick-6/">ImageMagick</a> software distribution is classified as <a href="http://www.access.gpo.gov/bis/ear/txt/ccl5-pt2.txt">ECCN 5D002</a>. However, ImageMagick Studio LLC makes no warranty or representation that this classification is accurate, current, or complete. ImageMagick is exported under the <a href="http://www.access.gpo.gov/bis/ear/txt/740.txt">TSU exception in EAR 740.13(e)</a> which applies to software containing or designed for use with
encryption
software that is publicly available as open source. TSU further provides that <var>Posting
encryption
source code and corresponding object code on the Internet (e.g., FTP or World Wide Web site) where it may be downloaded by anyone neither establishes "knowledge" of a prohibited export or reexport for purposes of this paragraph, nor triggers any "red flags" necessitating the affirmative duty to inquire[...]</var>. It is your obligation as the exporter to comply with the current applicable requirements of United States export rules and regulations.</p>
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
SealedObjectTest.java
129
*
encryption
algorithm and specified parameters can be retrieved by
156
* with
encryption
algorithm and specified parameters can be retrieved by
188
* object sealed with
encryption
algorithm can be retrieved by specifying
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedHelper.java
45
private static void addEntries(ASN1ObjectIdentifier alias, String digest, String
encryption
)
48
encryptionAlgs.put(alias.getId(),
encryption
);
local
129
* Return the digest
encryption
algorithm using one of the standard
/frameworks/base/tools/obbtool/
mkobb.sh
110
hidden_prompt "
Encryption
key: " key
117
hidden_prompt "
Encryption
key (again): " key2
120
echo "ERROR:
Encryption
keys do not match!"
/bionic/libc/include/arpa/
telnet.h
116
#define TELOPT_ENCRYPT 38 /*
Encryption
option */
277
*
ENCRYPTion
suboptions
279
#define ENCRYPT_IS 0 /* I pick
encryption
type ... */
280
#define ENCRYPT_SUPPORT 1 /* I support
encryption
types ... */
/development/ndk/platforms/android-21/include/arpa/
telnet.h
116
#define TELOPT_ENCRYPT 38 /*
Encryption
option */
277
*
ENCRYPTion
suboptions
279
#define ENCRYPT_IS 0 /* I pick
encryption
type ... */
280
#define ENCRYPT_SUPPORT 1 /* I support
encryption
types ... */
/development/ndk/platforms/android-9/include/arpa/
telnet.h
116
#define TELOPT_ENCRYPT 38 /*
Encryption
option */
277
*
ENCRYPTion
suboptions
279
#define ENCRYPT_IS 0 /* I pick
encryption
type ... */
280
#define ENCRYPT_SUPPORT 1 /* I support
encryption
types ... */
/device/google/contexthub/firmware/inc/
eeData.h
34
* True is returned if the data item exists at all, else false is. For
encryption
keys, we
/device/google/contexthub/firmware/inc/platform/stm32f4xx/
bl.h
76
//hashing,
encryption
, signature apis
Completed in 4406 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>