OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:encryption
(Results
1 - 25
of
1225
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/tools/test/connectivity/acts/tests/google/wifi/
WifiScannerTests.config
4
"radio0": {"settings": {"channel": 1}, "wifi-iface" : [{"ssid": "Test_1", "key": "hahahaha", "
encryption
": "psk2"},{"ssid": "Test_1.1", "key": "hahahaha", "
encryption
": "psk2"},
5
{"ssid": "Test_1.2", "key": "hahahaha", "
encryption
": "psk2"},{"ssid": "Test_1.3", "key": "hahahaha", "
encryption
": "psk2"}]},
6
"radio1": {"settings": {"channel": 40}, "wifi-iface" : [{"ssid": "Test_40", "key": "hahahaha", "
encryption
": "psk2"},{"ssid": "Test_40.1", "key": "hahahaha", "
encryption
": "psk2"},
7
{"ssid": "Test_40.2", "key": "hahahaha", "
encryption
": "psk2"},{"ssid": "Test_40.3", "key": "hahahaha", "
encryption
": "psk2"}]}
10
"radio0": {"settings": {"channel": 6}, "wifi-iface" : [{"ssid": "Test_6", "key": "hahahaha", "
encryption
": "psk"}, {"ssid": "Test_6.1", "key": "hahahaha", "
encryption
": "psk2"}
[
all
...]
/external/wpa_supplicant_8/wpa_supplicant/examples/
plaintext.conf
1
# Plaintext (no
encryption
) network
/system/vold/
vdc.rc
5
#
encryption
) or trigger_restart_min_framework (other
encryption
)
12
#
encryption
)
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignatureEncryptionAlgorithmFinder.java
6
* Finder which is used to look up the algorithm identifiers representing the
encryption
algorithms that
12
* Return the
encryption
algorithm identifier associated with the passed in signatureAlgorithm
14
* @return the algorithm identifier to be associated with the
encryption
algorithm used in signature creation.
CMSSignatureAlgorithmNameGenerator.java
12
* @param encryptionAlg the
encryption
, or signing, algorithm id.
/docs/source.android.com/src/security/encryption/
index.jd
1
page.title=
Encryption
29
Encryption
is the process of encoding all user data on an Android device using
30
symmetric
encryption
keys. Once a device is encrypted, all user-created data is
32
decrypt data before returning it to the calling process.
Encryption
ensures that
37
Android has two methods for device
encryption
: full-disk
encryption
and
38
file-based
encryption
.
40
<h2 id=full-disk>Full-disk
encryption
</h2>
42
Android 5.0 and above supports <a href="full-disk.html">full-disk
encryption
</a>.
43
Full-disk
encryption
uses a single key?protected with the user?s device password?t
[
all
...]
file-based.jd
1
page.title=File-Based
Encryption
29
Android 7.0 and above supports file-based
encryption
(FBE). File-based
30
encryption
allows different files to be encrypted with different keys that can
34
This article describes how to enable file-based
encryption
on new devices
40
File-based
encryption
enables a new feature introduced in Android 7.0 called <a
44
encryption
</a> (FDE), users needed to provided credentials before any data could
51
With the introduction of file-based
encryption
(FBE) and new APIs to make
52
applications aware of
encryption
, it is possible for these apps to operate
66
user to be protected at a time as the
encryption
is no longer based solely on a
70
The Direct Boot API allows
encryption
-aware applications to access each of thes
[
all
...]
/system/keymaster/
kem.h
28
// public-key
encryption
scheme, except that the
encryption
algorithm takes no
29
// input other than the recipient?s public key. Instead, the
encryption
algorithm
31
// and C0 is an
encryption
of K, that is, the decryption algorithm applied to C0
37
// For a key encapsulation mechanism, the goal of
encryption
is to take the recipient's public
39
// and C0 is an
encryption
of K.
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/s3/
test_cors_configuration.py
14
'<ExposeHeader>x-amz-server-side-
encryption
</ExposeHeader>'
28
'<ExposeHeader>x-amz-server-side-
encryption
</ExposeHeader>'
56
expose_header='x-amz-server-side-
encryption
',
66
expose_header='x-amz-server-side-
encryption
')
/external/scrypt/lib/
README
5
included here which is not actually used by the scrypt file
encryption
/external/srtp/
timing
20
# timing.plt # # gnuplot script file for plotting the output generated by srtp_driver -t # # David A. McGrew # Cisco Systems, Inc. # set xrange [0:2500] set term pict "Times-Roman" 9 # # plot authentication-only data # set title "Authentication Only" set ylabel "Megabits per second" set xlabel "Octets in packet" set yrange [0:2000] set output "plot-auth.pict" plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with lines, "timing.dat" index 2 title "TMMH/SEAL" with lines # # plot
encryption
-only data # set title "
Encryption
Only" set ylabel "Megabits per second" set xlabel "Octets in packet" set output "plot-enc.pict" set yrange [0:1200] plot "timing.dat" index 3 title "SEAL" with lines, "timing.dat" index 4 title "AES ICM" with lines # # plot
encryption
and authentication data # set title "
Encryption
and Authentication" set ylabel "Megabits per second" set xlabel "Octets in packet" set yrange [0:1 (…)
/external/wpa_supplicant_8/src/tls/
pkcs5.h
2
* PKCS #5 (Password-based
Encryption
)
pkcs1.h
2
* PKCS #1 (RSA
Encryption
)
/prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_crypt.py
11
print 'Test
encryption
: ', c
/prebuilts/gdb/linux-x86/lib/python2.7/test/
test_crypt.py
11
print 'Test
encryption
: ', c
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_crypt.py
11
print 'Test
encryption
: ', c
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_crypt.py
11
print 'Test
encryption
: ', c
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
AESWrapEngine.java
7
* For further details see: <a href="http://csrc.nist.gov/
encryption
/kms/key-wrap.pdf">http://csrc.nist.gov/
encryption
/kms/key-wrap.pdf</a>.
/external/srtp/crypto/include/
crypto.h
18
* cipher type, e.g. the Advanced
Encryption
Standard (AES). A
20
* and can be selected to indicate that no
encryption
is to take
/docs/source.android.com/src/security/enhancements/
enhancements60.jd
18
Device
Encryption
, and Client Certificates to protect keys against kernel
22
advantage of new APIs to use fingerprints to lock and unlock
encryption
keys.</li>
26
encryption
.</li>
/development/samples/browseable/BasicAndroidKeyStore/
_index.jd
10
encryption
keys that only your application can access. You can also sign data
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
InputDecryptor.java
14
* Return the algorithm identifier describing the
encryption
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/
FwdLockGlue.h
35
* Performs initialization of the key-
encryption
key. Should be called once during startup to
36
* facilitate
encryption
and decryption of session keys.
52
* Encrypts the given session key using a key-
encryption
key unique to this device.
67
* Decrypts the given session key using a key-
encryption
key unique to this device.
/system/tpm/trunks/
authorization_delegate.h
28
// authorization data for responses. It also handles parameter
encryption
for
36
// |command_hash|. The availability of
encryption
for the command is indicated
53
// Encrypts |parameter| if
encryption
is enabled. Returns true on success.
56
// Decrypts |parameter| if
encryption
is enabled. Returns true on success.
/frameworks/base/docs/html/training/articles/
direct-boot.jd
14
<li><a href="#testing">Testing Your
Encryption
Aware App</a></li>
15
<li><a href="#dpm">Checking Device Policy
Encryption
Status</a></li>
60
<i>
encryption
aware</i>. To mark your component as
encryption
aware, set the
63
<p>
Encryption
aware components can register to receive a
71
{@link android.content.BroadcastReceiver} as
encryption
aware, and add an
152
<h2 id="testing">Testing Your
Encryption
Aware App</h2>
154
<p>Test your
encryption
aware app with Direct Boot mode enabled. There are
168
<b>Convert to file
encryption
</b>.</li>
196
<h2 id="dpm">Checking Device Policy
Encryption
Status</h2
[
all
...]
Completed in 507 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>