/frameworks/native/include/media/hardware/ |
HDCPAPI.h | 27 // structure below, a module either implements decryption or encryption. 38 // unused for ENCRYPTION and in the case of HDCP_INITIALIZATION_COMPLETE 65 // HDCP_CAPS_ENCRYPT_NATIVE: the HDCP module supports encryption from 80 // ENCRYPTION: Request to setup an HDCP session with the host specified 96 // ENCRYPTION only: 154 // Create a module for ENCRYPTION.
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/uiflows/ |
EncryptionController.java | 40 * This controller manages all things related to the encryption reboot. 42 * <p>An encryption reminder can be scheduled using {@link #setEncryptionReminder}. This will store 121 * Cancel the encryption reminder to avoid further resumption of encryption. 130 * Resume provisioning after encryption has happened. 155 ProvisionLogger.logd("Provisioning resumed after encryption with action: " + action);
|
/system/vold/ |
cryptfs.h | 48 #define CRYPT_ENCRYPTION_IN_PROGRESS 0x2 /* Encryption partially completed, 50 #define CRYPT_INCONSISTENT_STATE 0x4 /* Set when starting encryption, clear when 52 correctly marked partial encryption */ 53 #define CRYPT_DATA_CORRUPT 0x8 /* Set when encryption is fine, but the 61 #define CRYPT_FORCE_COMPLETE 0x20 /* Set when the above encryption cycle is 107 unsigned char crypto_type_name[MAX_CRYPTO_TYPE_NAME_LEN]; /* The type of encryption 112 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ 249 // Functions for file encryption to use to inherit our encryption logic
|
/device/moto/shamu/cryptfs_hw/ |
cryptfs_hw.c | 44 // password further, HW would wipe all disk encryption related crypto data 51 /* Operations that be performed on HW based device encryption key */ 140 SLOGI("Set key for HW disk encryption operation"); 146 SLOGI("Update key for HW disk encryption operation"); 165 SLOGI("Clear HW disk encryption key");
|
/system/extras/ext4_utils/ |
ext4_crypt.cpp | 34 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy" 123 PLOG(ERROR) << "Failed to set encryption policy for " << directory; 151 PLOG(ERROR) << "Failed to get encryption policy for " << directory; 161 LOG(ERROR) << "Failed to find matching encryption policy for " << directory; 202 LOG(ERROR) << "Invalid encryption mode";
|
/packages/apps/ManagedProvisioning/tests/src/com/android/managedprovisioning/uiflows/ |
PreProvisioningControllerTest.java | 171 // THEN show encryption screen 177 // GIVEN managed profile provisioning continues after successful encryption. In this case 263 // GIVEN an intent to provision a managed profile with skip encryption 285 // support encryption 296 // THEN show an error indicating that this device does not support encryption 318 // GIVEN provisioning was started via an NFC tap with encryption skipped 335 // GIVEN provisioning was started via an NFC tap with encryption necessary 340 // THEN show encryption screen 346 // GIVEN provisioning was started via an NFC tap and we have gone through encryption 350 // WHEN continuing NFC provisioning after encryption [all...] |
/docs/source.android.com/src/security/enhancements/ |
enhancements50.jd | 10 out-of-the-box, full disk encryption is enabled by default to improve 13 <li><strong>Improved full disk encryption.</strong> The user password is 17 encryption key are not sent off the device or exposed to any application.
|
enhancements70.jd | 24 <li><strong>File-based encryption</strong>. Encrypting at the file level, 28 <li><strong>Direct Boot</strong>. Enabled by file-based encryption, Direct
|
/docs/source.android.com/src/security/overview/ |
kernel-security.jd | 142 encryption with a key stored off-device, such as on a server or a user 150 <p> In the case of a lost or stolen device, full filesystem encryption on Android 151 devices uses the device password to protect the encryption key, so modifying 155 <h4 id="filesystem-encryption">Filesystem Encryption</h4> 156 <p>Android 3.0 and later provides full filesystem encryption, so all user data can 158 and ESSIV:SHA256. The encryption key is protected by AES128 using a key 166 administrator and enforced by the operating system. Filesystem encryption 168 <p>More details on implementation of filesystem encryption are available at <a 169 href="{@docRoot}security/encryption/index.html">Encryption</a>.</p [all...] |
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
EncryptedPrivateKeyInfo_ImplTest.java | 46 * Assertion: Returns the encryption algorithm name <br> 72 * Assertion: Returns the encryption algorithm name <br> 97 * Assertion: Returns the encryption algorithm name <br>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
RC4Engine.java | 15 * during encryption and decryption 26 * @param forEncryption whether or not we are for encryption. 39 * RC4 encryption and decryption is completely
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/s3/ |
test_encryption.py | 25 Some unit tests for the S3 Encryption 45 "s3:x-amz-server-side-encryption":"AES256" 59 bucket_name = 'encryption-%d' % int(time.time())
|
/external/curl/lib/ |
socks_gssapi.c | 327 /* Do encryption */ 329 socksreq[1] = 2; /* encryption message type */ 344 * Sending the encryption type in clear seems wrong. It should be 394 failf(data, "Failed to wrap GSS-API encryption value into token."); 405 failf(data, "Failed to send GSS-API encryption request."); 415 failf(data, "Failed to send GSS-API encryption type."); 424 failf(data, "Failed to send GSS-API encryption type."); 434 failf(data, "Failed to receive GSS-API encryption response."); 448 failf(data, "Invalid GSS-API encryption response type (%d %d).", 482 failf(data, "Failed to unwrap GSS-API encryption value into token.") [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
SecurityAgreeHeader.java | 60 * Set Encryption Algorithm (ealg parameter) 61 * @param ealg - encryption algorithm value 132 * Get Encryption Algorithm
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 15 ATTRIBUTE MS-MPPE-Encryption-Policy 7 string Microsoft 18 ATTRIBUTE MS-MPPE-Encryption-Type 8 string Microsoft 19 ATTRIBUTE MS-MPPE-Encryption-Types 8 string Microsoft
|
/prebuilts/tools/common/http-client/ |
README.txt | 43 to another country, of encryption software. BEFORE using any encryption 45 concerning the import, possession, or use, and re-export of encryption
|
/system/tpm/trunks/ |
policy_session.h | 32 // authorization and parameter encryption. 43 // |bind_authorization_value|. Encryption is enabled if |enable_encryption| is 51 // Starts a salted, unbound session. Encryption is enabled if
|
/docs/source.android.com/src/security/ |
security_toc.cs | 97 <a href="<?cs var:toroot ?>security/encryption/index.html"> 98 <span class="en">Encryption</span> 102 <li><a href="<?cs var:toroot ?>security/encryption/file-based.html">File-Based Encryption</a></li> 103 <li><a href="<?cs var:toroot ?>security/encryption/full-disk.html">Full-Disk Encryption</a></li>
|
/external/tpm2/ |
CpriSym.c | 68 // AES Encryption 72 // This function performs AES encryption in CBC chain mode. The input dIn buffer is encrypted into dOut. 189 // This function performs AES encryption in CFB chain mode. The dOut buffer receives the values 190 // encrypted dIn. The input iv is assumed to be the size of an encryption block (16 bytes). The iv buffer will 217 // Create AES encryption key schedule 244 // The input iv is assumed to be the size of an encryption block (16 bytes). The iv buffer will be modified to 273 // Create AES encryption key schedule 299 // This function performs AES encryption/decryption in CTR chain mode. The dIn buffer is encrypted into 328 // Create AES encryption schedule 349 // AES encryption in ECB mode. The data buffer is modified to contain the cipher text [all...] |
RSA_Encrypt.c | 57 // Select a scheme for encryption 62 // Encryption. TPM_RC_VALUE, or TPM_RC_SCHEME errors my be returned buy
|
/cts/hostsidetests/security/src/android/security/cts/ |
EncryptionHostTest.java | 28 * Host side encryption tests 30 * These tests analyze a userdebug device for correct encryption properties
|
/docs/source.android.com/src/devices/tech/admin/ |
index.jd | 34 href="{@docRoot}security/encryption/index.html">encryption</a>,
|
/external/opencv3/3rdparty/include/ffmpeg_/libavutil/ |
blowfish.h | 55 * @param decrypt 0 for encryption, 1 for decryption 68 * @param decrypt 0 for encryption, 1 for decryption
|
/external/wpa_supplicant_8/src/crypto/ |
aes_wrap.h | 6 * - AES-128 CTR mode encryption 7 * - AES-128 EAX mode encryption/decryption
|
/frameworks/opt/net/voip/src/java/android/net/sip/ |
SimpleSessionDescription.java | 27 * ("b="), encryption keys ("k="), and attribute fields ("a="). Currently this 162 * Returns the encryption method or {@code null} if it is not present. 169 * Returns the encryption key or {@code null} if it is not present. 176 * Sets the encryption method and the encryption key. The field will be 427 * Returns the encryption method or {@code null} if it is not present. 430 String encryption = get("k", '='); local 431 if (encryption == null) { 434 int colon = encryption.indexOf(':'); 435 return (colon == -1) ? encryption : encryption.substring(0, colon) 442 String encryption = get("k", '='); local [all...] |