OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:encryption
(Results
26 - 50
of
1225
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/docs/source.android.com/src/security/encryption/
full-disk.jd
1
page.title=Full-Disk
Encryption
28
<p>Full-disk
encryption
is the process of encoding all user data on an Android device using an
34
Full-disk
encryption
was introduced to Android in 4.4, but Android 5.0 introduced
37
<li>Created fast
encryption
, which only encrypts used blocks on the data partition
39
currently support fast
encryption
.
42
<li>Added support for patterns and
encryption
without a password.
43
<li>Added hardware-backed storage of the
encryption
key using Trusted
53
<h2 id=how_android_encryption_works>How Android full-disk
encryption
works</h2>
55
<p>Android full-disk
encryption
is based on <code>dm-crypt</code>, which is a kernel
57
this,
encryption
works with Embedded MultiMediaCard<strong> (</strong>eMMC) an
[
all
...]
/system/tpm/trunks/
hmac_authorization_delegate_test.cc
67
// Test with
encryption
not enabled.
78
// Test with
encryption
enabled.
106
false)); // Enable
encryption
.
121
true)); // Enable
encryption
.
211
//
Encryption
disabled and not possible for command.
222
//
Encryption
disabled and possible for command.
230
//
Encryption
enabled and not possible for command.
236
true)); // Enable
encryption
.
244
//
Encryption
enabled and possible only for command input.
253
//
Encryption
enabled and possible only for command output
[
all
...]
hmac_session.h
31
// authorization and parameter
encryption
.
42
// |bind_authorization_value|.
Encryption
is enabled if |enable_encryption| is
50
// Starts a salted, unbound session.
Encryption
is enabled if
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/kisa/
KISAObjectIdentifiers.java
10
* Use of the SEED
Encryption
Algorithm
13
* The SEED
Encryption
Algorithm
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
AsymmetricBlockCipher.java
14
*
encryption
, if false for decryption.
39
* @return the resulting byte array of the
encryption
/decryption process.
/external/ppp/pppd/
ecp.h
2
* ecp.h - Definitions for PPP
Encryption
Control Protocol.
36
unsigned enctype; /*
Encryption
type */
/external/wpa_supplicant_8/src/crypto/
aes-ctr.c
17
* aes_128_ctr_encrypt - AES-128 CTR mode
encryption
18
* @key: Key for
encryption
(16 bytes)
aes-cbc.c
17
* aes_128_cbc_encrypt - AES-128 CBC
encryption
18
* @key:
Encryption
key
19
* @iv:
Encryption
IV for CBC mode (16 bytes)
/external/zlib/src/contrib/minizip/
crypt.h
10
The
encryption
/decryption parts of this source code (as opposed to the
15
This
encryption
code is a direct transcription of the algorithm from
18
version without
encryption
capabilities).
23
This code support the "Traditional PKWARE
Encryption
".
25
The new AES
encryption
added on Zip format by Winzip (see the page
27
Encryption
is not supported.
46
* Update the
encryption
keys with the next byte of plain text
62
* Initialize the
encryption
keys and the random header according to
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/
BootReminder.java
26
* process. The reboot could be an unexpected reboot or a reboot during the
encryption
process.
28
* <p>For
encryption
flows during setup wizard, this class acts as a backup to
/hardware/qcom/msm8996/original-kernel-headers/linux/
msm_pft.h
27
* command ID to perfrom in-place file
encryption
42
* @PFT_STATE_KEY_REMOVED - driver is active but no
encryption
key is loaded.
43
* @PFT_STATE_REMOVING_KEY - driver is active, but the
encryption
key is being
45
* @PFT_STATE_KEY_LOADED - driver is active, and the
encryption
key is loaded
46
* to
encryption
block, hence registered apps can perform file operations
/frameworks/base/packages/BackupRestoreConfirmation/res/values/
strings.xml
38
<!-- Text for message to user that they must enter their device
encryption
password in order to perform this restore operation. -->
39
<string name="device_encryption_restore_text">Please enter your device
encryption
password below.</string>
40
<!-- Text for message to user that they must enter their device
encryption
password in order to perform this backup operation. -->
41
<string name="device_encryption_backup_text">Please enter your device
encryption
password below. This will also be used to encrypt the backup archive.</string>
43
<!-- Text for message to user that they must enter an
encryption
password to use for the full backup operation. -->
45
<!-- Text for message to user that they may optionally supply an
encryption
password to use for a full backup operation. -->
47
<!-- Text for message to user that they must supply an
encryption
password to use for a full backup operation because their phone is locked. -->
/system/bt/stack/smp/
aes.h
35
# define AES_ENC_PREKEYED /* AES
encryption
with a precomputed key schedule */
41
# define AES_ENC_128_OTFK /* AES
encryption
with 'on the fly' 128 bit keying */
47
# define AES_ENC_256_OTFK /* AES
encryption
with 'on the fly' 256 bit keying */
115
encryption
and decryption keys are different.
117
The
encryption
subroutines take a key in an array of bytes in
123
to reverse the
encryption
operation. The two key arrays can
128
can be used to reverse their effect when used for
encryption
.
/system/tpm/attestation/common/
attestation_ca.proto
28
// Key
encryption
: RSA-OAEP with no custom parameters.
29
// Data
encryption
: 256-bit key, AES-CBC with PKCS5 padding.
108
// Key
encryption
: RSA-OAEP with no custom parameters.
109
// Data
encryption
: 256-bit key, AES-CBC with PKCS5 padding.
118
// Key
encryption
: RSA-OAEP with no custom parameters.
119
// Data
encryption
: 256-bit key, AES-CBC with PKCS5 padding.
160
// The KeyInfo message encrypted using a public
encryption
key, pushed via
162
// Key
encryption
: RSA-OAEP with no custom parameters.
163
// Data
encryption
: 256-bit key, AES-CBC with PKCS5 padding.
/development/samples/Vault/res/values/
strings.xml
20
<string name="info_software_detail">
Encryption
key is software-backed, which is less secure.</string>
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
compatibility.rst
7
Python-RSA implements
encryption
and signatures according to PKCS#1
14
Encryption
:
27
:ref:`VARBLOCK <bigfiles>`
encryption
:
45
Encryption
and decryption is also compatible::
/external/srtp/doc/
references.txt
17
ISMAcryp (the Internet Streaming Media Alliance 1.0
Encryption
and
/prebuilts/go/darwin-x86/src/crypto/des/
example_test.go
23
// See crypto/cipher for how to use a cipher.Block for
encryption
and
cipher.go
21
// desCipher is an instance of DES
encryption
.
43
// A tripleDESCipher is an instance of TripleDES
encryption
.
/prebuilts/go/linux-x86/src/crypto/des/
example_test.go
23
// See crypto/cipher for how to use a cipher.Block for
encryption
and
cipher.go
21
// desCipher is an instance of DES
encryption
.
43
// A tripleDESCipher is an instance of TripleDES
encryption
.
/system/security/keystore/
keystore_client.proto
21
// The initialization vector used during
encryption
.
/external/opencv3/3rdparty/include/ffmpeg_/libavutil/
aes.h
47
* @param decrypt 0 for
encryption
, 1 for decryption
57
* @param decrypt 0 for
encryption
, 1 for decryption
xtea.h
41
* @param key a key of 16 bytes used for
encryption
/decryption
53
* @param decrypt 0 for
encryption
, 1 for decryption
/system/bt/stack/include/
profiles_api.h
49
#define BT_SEC_IN_ENCRYPT BTM_SEC_IN_ENCRYPT /* Inbound call requires
encryption
*/
52
#define BT_SEC_OUT_ENCRYPT BTM_SEC_OUT_ENCRYPT /* Outbound call requires
encryption
*/
Completed in 865 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>