HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 51 - 75 of 1225) sorted by null

1 23 4 5 6 7 8 91011>>

  /frameworks/native/include/media/hardware/
HDCPAPI.h 27 // structure below, a module either implements decryption or encryption.
38 // unused for ENCRYPTION and in the case of HDCP_INITIALIZATION_COMPLETE
65 // HDCP_CAPS_ENCRYPT_NATIVE: the HDCP module supports encryption from
80 // ENCRYPTION: Request to setup an HDCP session with the host specified
96 // ENCRYPTION only:
154 // Create a module for ENCRYPTION.
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/uiflows/
EncryptionController.java 40 * This controller manages all things related to the encryption reboot.
42 * <p>An encryption reminder can be scheduled using {@link #setEncryptionReminder}. This will store
121 * Cancel the encryption reminder to avoid further resumption of encryption.
130 * Resume provisioning after encryption has happened.
155 ProvisionLogger.logd("Provisioning resumed after encryption with action: " + action);
  /system/vold/
cryptfs.h 48 #define CRYPT_ENCRYPTION_IN_PROGRESS 0x2 /* Encryption partially completed,
50 #define CRYPT_INCONSISTENT_STATE 0x4 /* Set when starting encryption, clear when
52 correctly marked partial encryption */
53 #define CRYPT_DATA_CORRUPT 0x8 /* Set when encryption is fine, but the
61 #define CRYPT_FORCE_COMPLETE 0x20 /* Set when the above encryption cycle is
107 unsigned char crypto_type_name[MAX_CRYPTO_TYPE_NAME_LEN]; /* The type of encryption
112 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */
249 // Functions for file encryption to use to inherit our encryption logic
  /device/moto/shamu/cryptfs_hw/
cryptfs_hw.c 44 // password further, HW would wipe all disk encryption related crypto data
51 /* Operations that be performed on HW based device encryption key */
140 SLOGI("Set key for HW disk encryption operation");
146 SLOGI("Update key for HW disk encryption operation");
165 SLOGI("Clear HW disk encryption key");
  /system/extras/ext4_utils/
ext4_crypt.cpp 34 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy"
123 PLOG(ERROR) << "Failed to set encryption policy for " << directory;
151 PLOG(ERROR) << "Failed to get encryption policy for " << directory;
161 LOG(ERROR) << "Failed to find matching encryption policy for " << directory;
202 LOG(ERROR) << "Invalid encryption mode";
  /packages/apps/ManagedProvisioning/tests/src/com/android/managedprovisioning/uiflows/
PreProvisioningControllerTest.java 171 // THEN show encryption screen
177 // GIVEN managed profile provisioning continues after successful encryption. In this case
263 // GIVEN an intent to provision a managed profile with skip encryption
285 // support encryption
296 // THEN show an error indicating that this device does not support encryption
318 // GIVEN provisioning was started via an NFC tap with encryption skipped
335 // GIVEN provisioning was started via an NFC tap with encryption necessary
340 // THEN show encryption screen
346 // GIVEN provisioning was started via an NFC tap and we have gone through encryption
350 // WHEN continuing NFC provisioning after encryption
    [all...]
  /docs/source.android.com/src/security/enhancements/
enhancements50.jd 10 out-of-the-box, full disk encryption is enabled by default to improve
13 <li><strong>Improved full disk encryption.</strong> The user password is
17 encryption key are not sent off the device or exposed to any application.
enhancements70.jd 24 <li><strong>File-based encryption</strong>. Encrypting at the file level,
28 <li><strong>Direct Boot</strong>. Enabled by file-based encryption, Direct
  /docs/source.android.com/src/security/overview/
kernel-security.jd 142 encryption with a key stored off-device, such as on a server or a user
150 <p> In the case of a lost or stolen device, full filesystem encryption on Android
151 devices uses the device password to protect the encryption key, so modifying
155 <h4 id="filesystem-encryption">Filesystem Encryption</h4>
156 <p>Android 3.0 and later provides full filesystem encryption, so all user data can
158 and ESSIV:SHA256. The encryption key is protected by AES128 using a key
166 administrator and enforced by the operating system. Filesystem encryption
168 <p>More details on implementation of filesystem encryption are available at <a
169 href="{@docRoot}security/encryption/index.html">Encryption</a>.</p
    [all...]
  /external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/
EncryptedPrivateKeyInfo_ImplTest.java 46 * Assertion: Returns the encryption algorithm name <br>
72 * Assertion: Returns the encryption algorithm name <br>
97 * Assertion: Returns the encryption algorithm name <br>
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
RC4Engine.java 15 * during encryption and decryption
26 * @param forEncryption whether or not we are for encryption.
39 * RC4 encryption and decryption is completely
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/s3/
test_encryption.py 25 Some unit tests for the S3 Encryption
45 "s3:x-amz-server-side-encryption":"AES256"
59 bucket_name = 'encryption-%d' % int(time.time())
  /external/curl/lib/
socks_gssapi.c 327 /* Do encryption */
329 socksreq[1] = 2; /* encryption message type */
344 * Sending the encryption type in clear seems wrong. It should be
394 failf(data, "Failed to wrap GSS-API encryption value into token.");
405 failf(data, "Failed to send GSS-API encryption request.");
415 failf(data, "Failed to send GSS-API encryption type.");
424 failf(data, "Failed to send GSS-API encryption type.");
434 failf(data, "Failed to receive GSS-API encryption response.");
448 failf(data, "Invalid GSS-API encryption response type (%d %d).",
482 failf(data, "Failed to unwrap GSS-API encryption value into token.")
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/header/ims/
SecurityAgreeHeader.java 60 * Set Encryption Algorithm (ealg parameter)
61 * @param ealg - encryption algorithm value
132 * Get Encryption Algorithm
  /external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft 15 ATTRIBUTE MS-MPPE-Encryption-Policy 7 string Microsoft
18 ATTRIBUTE MS-MPPE-Encryption-Type 8 string Microsoft
19 ATTRIBUTE MS-MPPE-Encryption-Types 8 string Microsoft
  /prebuilts/tools/common/http-client/
README.txt 43 to another country, of encryption software. BEFORE using any encryption
45 concerning the import, possession, or use, and re-export of encryption
  /system/tpm/trunks/
policy_session.h 32 // authorization and parameter encryption.
43 // |bind_authorization_value|. Encryption is enabled if |enable_encryption| is
51 // Starts a salted, unbound session. Encryption is enabled if
  /docs/source.android.com/src/security/
security_toc.cs 97 <a href="<?cs var:toroot ?>security/encryption/index.html">
98 <span class="en">Encryption</span>
102 <li><a href="<?cs var:toroot ?>security/encryption/file-based.html">File-Based Encryption</a></li>
103 <li><a href="<?cs var:toroot ?>security/encryption/full-disk.html">Full-Disk Encryption</a></li>
  /external/tpm2/
CpriSym.c 68 // AES Encryption
72 // This function performs AES encryption in CBC chain mode. The input dIn buffer is encrypted into dOut.
189 // This function performs AES encryption in CFB chain mode. The dOut buffer receives the values
190 // encrypted dIn. The input iv is assumed to be the size of an encryption block (16 bytes). The iv buffer will
217 // Create AES encryption key schedule
244 // The input iv is assumed to be the size of an encryption block (16 bytes). The iv buffer will be modified to
273 // Create AES encryption key schedule
299 // This function performs AES encryption/decryption in CTR chain mode. The dIn buffer is encrypted into
328 // Create AES encryption schedule
349 // AES encryption in ECB mode. The data buffer is modified to contain the cipher text
    [all...]
RSA_Encrypt.c 57 // Select a scheme for encryption
62 // Encryption. TPM_RC_VALUE, or TPM_RC_SCHEME errors my be returned buy
  /cts/hostsidetests/security/src/android/security/cts/
EncryptionHostTest.java 28 * Host side encryption tests
30 * These tests analyze a userdebug device for correct encryption properties
  /docs/source.android.com/src/devices/tech/admin/
index.jd 34 href="{@docRoot}security/encryption/index.html">encryption</a>,
  /external/opencv3/3rdparty/include/ffmpeg_/libavutil/
blowfish.h 55 * @param decrypt 0 for encryption, 1 for decryption
68 * @param decrypt 0 for encryption, 1 for decryption
  /external/wpa_supplicant_8/src/crypto/
aes_wrap.h 6 * - AES-128 CTR mode encryption
7 * - AES-128 EAX mode encryption/decryption
  /frameworks/opt/net/voip/src/java/android/net/sip/
SimpleSessionDescription.java 27 * ("b="), encryption keys ("k="), and attribute fields ("a="). Currently this
162 * Returns the encryption method or {@code null} if it is not present.
169 * Returns the encryption key or {@code null} if it is not present.
176 * Sets the encryption method and the encryption key. The field will be
427 * Returns the encryption method or {@code null} if it is not present.
430 String encryption = get("k", '='); local
431 if (encryption == null) {
434 int colon = encryption.indexOf(':');
435 return (colon == -1) ? encryption : encryption.substring(0, colon)
442 String encryption = get("k", '='); local
    [all...]

Completed in 1255 milliseconds

1 23 4 5 6 7 8 91011>>