HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 26 - 50 of 1225) sorted by null

12 3 4 5 6 7 8 91011>>

  /docs/source.android.com/src/security/encryption/
full-disk.jd 1 page.title=Full-Disk Encryption
28 <p>Full-disk encryption is the process of encoding all user data on an Android device using an
34 Full-disk encryption was introduced to Android in 4.4, but Android 5.0 introduced
37 <li>Created fast encryption, which only encrypts used blocks on the data partition
39 currently support fast encryption.
42 <li>Added support for patterns and encryption without a password.
43 <li>Added hardware-backed storage of the encryption key using Trusted
53 <h2 id=how_android_encryption_works>How Android full-disk encryption works</h2>
55 <p>Android full-disk encryption is based on <code>dm-crypt</code>, which is a kernel
57 this, encryption works with Embedded MultiMediaCard<strong> (</strong>eMMC) an
    [all...]
  /system/tpm/trunks/
hmac_authorization_delegate_test.cc 67 // Test with encryption not enabled.
78 // Test with encryption enabled.
106 false)); // Enable encryption.
121 true)); // Enable encryption.
211 // Encryption disabled and not possible for command.
222 // Encryption disabled and possible for command.
230 // Encryption enabled and not possible for command.
236 true)); // Enable encryption.
244 // Encryption enabled and possible only for command input.
253 // Encryption enabled and possible only for command output
    [all...]
hmac_session.h 31 // authorization and parameter encryption.
42 // |bind_authorization_value|. Encryption is enabled if |enable_encryption| is
50 // Starts a salted, unbound session. Encryption is enabled if
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/kisa/
KISAObjectIdentifiers.java 10 * Use of the SEED Encryption Algorithm
13 * The SEED Encryption Algorithm
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
AsymmetricBlockCipher.java 14 * encryption, if false for decryption.
39 * @return the resulting byte array of the encryption/decryption process.
  /external/ppp/pppd/
ecp.h 2 * ecp.h - Definitions for PPP Encryption Control Protocol.
36 unsigned enctype; /* Encryption type */
  /external/wpa_supplicant_8/src/crypto/
aes-ctr.c 17 * aes_128_ctr_encrypt - AES-128 CTR mode encryption
18 * @key: Key for encryption (16 bytes)
aes-cbc.c 17 * aes_128_cbc_encrypt - AES-128 CBC encryption
18 * @key: Encryption key
19 * @iv: Encryption IV for CBC mode (16 bytes)
  /external/zlib/src/contrib/minizip/
crypt.h 10 The encryption/decryption parts of this source code (as opposed to the
15 This encryption code is a direct transcription of the algorithm from
18 version without encryption capabilities).
23 This code support the "Traditional PKWARE Encryption".
25 The new AES encryption added on Zip format by Winzip (see the page
27 Encryption is not supported.
46 * Update the encryption keys with the next byte of plain text
62 * Initialize the encryption keys and the random header according to
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/
BootReminder.java 26 * process. The reboot could be an unexpected reboot or a reboot during the encryption process.
28 * <p>For encryption flows during setup wizard, this class acts as a backup to
  /hardware/qcom/msm8996/original-kernel-headers/linux/
msm_pft.h 27 * command ID to perfrom in-place file encryption
42 * @PFT_STATE_KEY_REMOVED - driver is active but no encryption key is loaded.
43 * @PFT_STATE_REMOVING_KEY - driver is active, but the encryption key is being
45 * @PFT_STATE_KEY_LOADED - driver is active, and the encryption key is loaded
46 * to encryption block, hence registered apps can perform file operations
  /frameworks/base/packages/BackupRestoreConfirmation/res/values/
strings.xml 38 <!-- Text for message to user that they must enter their device encryption password in order to perform this restore operation. -->
39 <string name="device_encryption_restore_text">Please enter your device encryption password below.</string>
40 <!-- Text for message to user that they must enter their device encryption password in order to perform this backup operation. -->
41 <string name="device_encryption_backup_text">Please enter your device encryption password below. This will also be used to encrypt the backup archive.</string>
43 <!-- Text for message to user that they must enter an encryption password to use for the full backup operation. -->
45 <!-- Text for message to user that they may optionally supply an encryption password to use for a full backup operation. -->
47 <!-- Text for message to user that they must supply an encryption password to use for a full backup operation because their phone is locked. -->
  /system/bt/stack/smp/
aes.h 35 # define AES_ENC_PREKEYED /* AES encryption with a precomputed key schedule */
41 # define AES_ENC_128_OTFK /* AES encryption with 'on the fly' 128 bit keying */
47 # define AES_ENC_256_OTFK /* AES encryption with 'on the fly' 256 bit keying */
115 encryption and decryption keys are different.
117 The encryption subroutines take a key in an array of bytes in
123 to reverse the encryption operation. The two key arrays can
128 can be used to reverse their effect when used for encryption.
  /system/tpm/attestation/common/
attestation_ca.proto 28 // Key encryption: RSA-OAEP with no custom parameters.
29 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
108 // Key encryption: RSA-OAEP with no custom parameters.
109 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
118 // Key encryption: RSA-OAEP with no custom parameters.
119 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
160 // The KeyInfo message encrypted using a public encryption key, pushed via
162 // Key encryption: RSA-OAEP with no custom parameters.
163 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
  /development/samples/Vault/res/values/
strings.xml 20 <string name="info_software_detail">Encryption key is software-backed, which is less secure.</string>
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
compatibility.rst 7 Python-RSA implements encryption and signatures according to PKCS#1
14 Encryption:
27 :ref:`VARBLOCK <bigfiles>` encryption:
45 Encryption and decryption is also compatible::
  /external/srtp/doc/
references.txt 17 ISMAcryp (the Internet Streaming Media Alliance 1.0 Encryption and
  /prebuilts/go/darwin-x86/src/crypto/des/
example_test.go 23 // See crypto/cipher for how to use a cipher.Block for encryption and
cipher.go 21 // desCipher is an instance of DES encryption.
43 // A tripleDESCipher is an instance of TripleDES encryption.
  /prebuilts/go/linux-x86/src/crypto/des/
example_test.go 23 // See crypto/cipher for how to use a cipher.Block for encryption and
cipher.go 21 // desCipher is an instance of DES encryption.
43 // A tripleDESCipher is an instance of TripleDES encryption.
  /system/security/keystore/
keystore_client.proto 21 // The initialization vector used during encryption.
  /external/opencv3/3rdparty/include/ffmpeg_/libavutil/
aes.h 47 * @param decrypt 0 for encryption, 1 for decryption
57 * @param decrypt 0 for encryption, 1 for decryption
xtea.h 41 * @param key a key of 16 bytes used for encryption/decryption
53 * @param decrypt 0 for encryption, 1 for decryption
  /system/bt/stack/include/
profiles_api.h 49 #define BT_SEC_IN_ENCRYPT BTM_SEC_IN_ENCRYPT /* Inbound call requires encryption */
52 #define BT_SEC_OUT_ENCRYPT BTM_SEC_OUT_ENCRYPT /* Outbound call requires encryption */

Completed in 865 milliseconds

12 3 4 5 6 7 8 91011>>