HomeSort by relevance Sort by last modified time
    Searched full:encryption (Results 1 - 25 of 1225) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /tools/test/connectivity/acts/tests/google/wifi/
WifiScannerTests.config 4 "radio0": {"settings": {"channel": 1}, "wifi-iface" : [{"ssid": "Test_1", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_1.1", "key": "hahahaha", "encryption": "psk2"},
5 {"ssid": "Test_1.2", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_1.3", "key": "hahahaha", "encryption": "psk2"}]},
6 "radio1": {"settings": {"channel": 40}, "wifi-iface" : [{"ssid": "Test_40", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_40.1", "key": "hahahaha", "encryption": "psk2"},
7 {"ssid": "Test_40.2", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_40.3", "key": "hahahaha", "encryption": "psk2"}]}
10 "radio0": {"settings": {"channel": 6}, "wifi-iface" : [{"ssid": "Test_6", "key": "hahahaha", "encryption": "psk"}, {"ssid": "Test_6.1", "key": "hahahaha", "encryption": "psk2"}
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
plaintext.conf 1 # Plaintext (no encryption) network
  /system/vold/
vdc.rc 5 # encryption) or trigger_restart_min_framework (other encryption)
12 # encryption)
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignatureEncryptionAlgorithmFinder.java 6 * Finder which is used to look up the algorithm identifiers representing the encryption algorithms that
12 * Return the encryption algorithm identifier associated with the passed in signatureAlgorithm
14 * @return the algorithm identifier to be associated with the encryption algorithm used in signature creation.
CMSSignatureAlgorithmNameGenerator.java 12 * @param encryptionAlg the encryption, or signing, algorithm id.
  /docs/source.android.com/src/security/encryption/
index.jd 1 page.title=Encryption
29 Encryption is the process of encoding all user data on an Android device using
30 symmetric encryption keys. Once a device is encrypted, all user-created data is
32 decrypt data before returning it to the calling process. Encryption ensures that
37 Android has two methods for device encryption: full-disk encryption and
38 file-based encryption.
40 <h2 id=full-disk>Full-disk encryption</h2>
42 Android 5.0 and above supports <a href="full-disk.html">full-disk encryption</a>.
43 Full-disk encryption uses a single key?protected with the user?s device password?t
    [all...]
file-based.jd 1 page.title=File-Based Encryption
29 Android 7.0 and above supports file-based encryption (FBE). File-based
30 encryption allows different files to be encrypted with different keys that can
34 This article describes how to enable file-based encryption on new devices
40 File-based encryption enables a new feature introduced in Android 7.0 called <a
44 encryption</a> (FDE), users needed to provided credentials before any data could
51 With the introduction of file-based encryption (FBE) and new APIs to make
52 applications aware of encryption, it is possible for these apps to operate
66 user to be protected at a time as the encryption is no longer based solely on a
70 The Direct Boot API allows encryption-aware applications to access each of thes
    [all...]
  /system/keymaster/
kem.h 28 // public-key encryption scheme, except that the encryption algorithm takes no
29 // input other than the recipient?s public key. Instead, the encryption algorithm
31 // and C0 is an encryption of K, that is, the decryption algorithm applied to C0
37 // For a key encapsulation mechanism, the goal of encryption is to take the recipient's public
39 // and C0 is an encryption of K.
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/s3/
test_cors_configuration.py 14 '<ExposeHeader>x-amz-server-side-encryption</ExposeHeader>'
28 '<ExposeHeader>x-amz-server-side-encryption</ExposeHeader>'
56 expose_header='x-amz-server-side-encryption',
66 expose_header='x-amz-server-side-encryption')
  /external/scrypt/lib/
README 5 included here which is not actually used by the scrypt file encryption
  /external/srtp/
timing 20 # timing.plt # # gnuplot script file for plotting the output generated by srtp_driver -t # # David A. McGrew # Cisco Systems, Inc. # set xrange [0:2500] set term pict "Times-Roman" 9 # # plot authentication-only data # set title "Authentication Only" set ylabel "Megabits per second" set xlabel "Octets in packet" set yrange [0:2000] set output "plot-auth.pict" plot "timing.dat" index 0 title "HMAC SHA1" with lines, "timing.dat" index 1 title "TMMH/AES" with lines, "timing.dat" index 2 title "TMMH/SEAL" with lines # # plot encryption-only data # set title "Encryption Only" set ylabel "Megabits per second" set xlabel "Octets in packet" set output "plot-enc.pict" set yrange [0:1200] plot "timing.dat" index 3 title "SEAL" with lines, "timing.dat" index 4 title "AES ICM" with lines # # plot encryption and authentication data # set title "Encryption and Authentication" set ylabel "Megabits per second" set xlabel "Octets in packet" set yrange [0:1 (…)
  /external/wpa_supplicant_8/src/tls/
pkcs5.h 2 * PKCS #5 (Password-based Encryption)
pkcs1.h 2 * PKCS #1 (RSA Encryption)
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_crypt.py 11 print 'Test encryption: ', c
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_crypt.py 11 print 'Test encryption: ', c
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_crypt.py 11 print 'Test encryption: ', c
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_crypt.py 11 print 'Test encryption: ', c
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
AESWrapEngine.java 7 * For further details see: <a href="http://csrc.nist.gov/encryption/kms/key-wrap.pdf">http://csrc.nist.gov/encryption/kms/key-wrap.pdf</a>.
  /external/srtp/crypto/include/
crypto.h 18 * cipher type, e.g. the Advanced Encryption Standard (AES). A
20 * and can be selected to indicate that no encryption is to take
  /docs/source.android.com/src/security/enhancements/
enhancements60.jd 18 Device Encryption, and Client Certificates to protect keys against kernel
22 advantage of new APIs to use fingerprints to lock and unlock encryption keys.</li>
26 encryption.</li>
  /development/samples/browseable/BasicAndroidKeyStore/
_index.jd 10 encryption keys that only your application can access. You can also sign data
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
InputDecryptor.java 14 * Return the algorithm identifier describing the encryption
  /frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/
FwdLockGlue.h 35 * Performs initialization of the key-encryption key. Should be called once during startup to
36 * facilitate encryption and decryption of session keys.
52 * Encrypts the given session key using a key-encryption key unique to this device.
67 * Decrypts the given session key using a key-encryption key unique to this device.
  /system/tpm/trunks/
authorization_delegate.h 28 // authorization data for responses. It also handles parameter encryption for
36 // |command_hash|. The availability of encryption for the command is indicated
53 // Encrypts |parameter| if encryption is enabled. Returns true on success.
56 // Decrypts |parameter| if encryption is enabled. Returns true on success.
  /frameworks/base/docs/html/training/articles/
direct-boot.jd 14 <li><a href="#testing">Testing Your Encryption Aware App</a></li>
15 <li><a href="#dpm">Checking Device Policy Encryption Status</a></li>
60 <i>encryption aware</i>. To mark your component as encryption aware, set the
63 <p>Encryption aware components can register to receive a
71 {@link android.content.BroadcastReceiver} as encryption aware, and add an
152 <h2 id="testing">Testing Your Encryption Aware App</h2>
154 <p>Test your encryption aware app with Direct Boot mode enabled. There are
168 <b>Convert to file encryption</b>.</li>
196 <h2 id="dpm">Checking Device Policy Encryption Status</h2
    [all...]

Completed in 507 milliseconds

1 2 3 4 5 6 7 8 91011>>