/aosp_15_r20/external/aws-sdk-java-v2/services/kms/target/generated-sources/sdk/software/amazon/awssdk/services/kms/model/ |
H A D | GrantConstraints.java | 41 …docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic 46 …* KMS applies the grant constraints only to cryptographic operations that support an encryption co… 47 * cryptographic operations with a <a 50 …* cryptographic operations with asymmetric KMS keys and management operations, such as <a>Describe… 55 …* In a cryptographic operation, the encryption context in the decryption operation must be an exac… 132 …docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic 133 …* operation</a> request. The grant allows the cryptographic operation only when the encryption con… 146 …href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations" 147 …* >cryptographic operation</a> request. The grant allows the cryptographic operation only … 170 …docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic [all …]
|
/aosp_15_r20/external/mbedtls/docs/architecture/ |
H A D | psa-crypto-implementation-structure.md | 6 …rypto/psa/#application-programming-interface) defines an interface to cryptographic operations for… 11 …s defined in the PSA driver interface. The key point is that software cryptographic operations are… 15 * Addressing software and hardware cryptographic implementations through the same C interface reduc… 16 * The organization of the software cryptographic implementations in drivers promotes modularization… 17 * As hardware capabilities, software cryptographic functionalities can be described by a JSON drive… 18 …ework to integrate third party or alternative software implementations of cryptographic operations. 22 …SA Cryptography API specification but does not perform on its own any cryptographic operation. The… 23 perform the cryptographic operations. The core is responsible for: 27 * dispatching the cryptographic operations to the appropriate PSA drivers. 29 The sketch of an Mbed TLS PSA cryptographic API implementation is thus: [all …]
|
H A D | alternative-implementations.md | 24 If your platform has a cryptographic accelerator, you can use it via a [PSA driver](#psa-cryptograp… 28 …cryptographic engine is present, you can implement a driver for this engine in the PSA interface. … 70 ### Alternative implementations of cryptographic functions 72 Options to replace individual functions of cryptographic modules generally have a name obtained by …
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/architecture/ |
H A D | psa-crypto-implementation-structure.md | 6 …rypto/psa/#application-programming-interface) defines an interface to cryptographic operations for… 11 …s defined in the PSA driver interface. The key point is that software cryptographic operations are… 15 * Addressing software and hardware cryptographic implementations through the same C interface reduc… 16 * The organization of the software cryptographic implementations in drivers promotes modularization… 17 * As hardware capabilities, software cryptographic functionalities can be described by a JSON drive… 18 …ework to integrate third party or alternative software implementations of cryptographic operations. 22 …SA Cryptography API specification but does not perform on its own any cryptographic operation. The… 23 perform the cryptographic operations. The core is responsible for: 27 * dispatching the cryptographic operations to the appropriate PSA drivers. 29 The sketch of an Mbed TLS PSA cryptographic API implementation is thus: [all …]
|
H A D | alternative-implementations.md | 24 If your platform has a cryptographic accelerator, you can use it via a [PSA driver](#psa-cryptograp… 28 …cryptographic engine is present, you can implement a driver for this engine in the PSA interface. … 70 ### Alternative implementations of cryptographic functions 72 Options to replace individual functions of cryptographic modules generally have a name obtained by …
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/gensrcs/libcore/ojluni/src/main/java/java/security/ |
D | AlgorithmConstraints.java | 31 * This interface specifies constraints for cryptographic algorithms, 56 * specified cryptographic primitives. 58 * @param primitives a set of cryptographic primitives 64 * of the specified cryptographic primitives 74 * cryptographic primitives. 78 * @param primitives a set of cryptographic primitives 82 * cryptographic primitives 91 * permission for the specified cryptographic primitives. 93 * @param primitives a set of cryptographic primitives 100 * specified cryptographic primitives
|
D | Security.java | 225 * property in the master file of the "SUN" Cryptographic Service 411 * <p> A cryptographic service is always associated with a particular 421 * <p> The cryptographic service name must not contain any dots. 425 * specified algorithm or type for the specified cryptographic service. 431 * <p> The cryptographic service name must not contain any dots. There 437 * cryptographic service and its implementation meets the 448 * for information about standard cryptographic service names, standard 498 * <p> The cryptographic service name must not contain any dots. 502 * specified algorithm or type for the specified cryptographic service. 505 * <p> The cryptographic service name must not contain any dots. There [all …]
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/11/libcore/ojluni/src/main/java/java/security/ |
D | AlgorithmConstraints.java | 31 * This interface specifies constraints for cryptographic algorithms, 56 * specified cryptographic primitives. 58 * @param primitives a set of cryptographic primitives 64 * of the specified cryptographic primitives 74 * cryptographic primitives. 78 * @param primitives a set of cryptographic primitives 82 * cryptographic primitives 91 * permission for the specified cryptographic primitives. 93 * @param primitives a set of cryptographic primitives 100 * specified cryptographic primitives
|
/aosp_15_r20/libcore/ojluni/src/main/java/java/security/ |
H A D | AlgorithmConstraints.java | 31 * This interface specifies constraints for cryptographic algorithms, 56 * specified cryptographic primitives. 58 * @param primitives a set of cryptographic primitives 64 * of the specified cryptographic primitives 74 * cryptographic primitives. 78 * @param primitives a set of cryptographic primitives 82 * cryptographic primitives 91 * permission for the specified cryptographic primitives. 93 * @param primitives a set of cryptographic primitives 100 * specified cryptographic primitives
|
H A D | Security.java | 225 * property in the master file of the "SUN" Cryptographic Service 411 * <p> A cryptographic service is always associated with a particular 421 * <p> The cryptographic service name must not contain any dots. 425 * specified algorithm or type for the specified cryptographic service. 431 * <p> The cryptographic service name must not contain any dots. There 437 * cryptographic service and its implementation meets the 448 * for information about standard cryptographic service names, standard 498 * <p> The cryptographic service name must not contain any dots. 502 * specified algorithm or type for the specified cryptographic service. 505 * <p> The cryptographic service name must not contain any dots. There [all …]
|
/aosp_15_r20/external/pigweed/pw_software_update/ |
H A D | tuf.proto | 110 // Keyid is a unique identifier that identifies a cryptographic key. 111 // Contains all of cryptographic keys used by this repository. 210 // Cryptographic key 214 // Identifies an asymmetric cryptographic key. 223 // Stores the serialized public key for this cryptographic algorithm. 227 // The set of cryptographic keys used by a specific role. For example, list of 231 // Keyid is a unique identifier that identifies a cryptographic key. 250 // Digest of the cryptographic hash function computed on the target file. 268 // Algorithm name is the name of a cryptographic hash function. E.g. "sha256". 269 // The Hash string is the hex digest of the cryptographic function computed on [all …]
|
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/ |
H A D | BlockIoCrypto.h | 2 The UEFI Inline Cryptographic Interface protocol provides services to abstract 3 access to inline cryptographic capabilities. 61 /// Cryptographic Interface. 63 /// the Inline Cryptographic Interface. 99 // Is inline cryptographic capability supported on this device. 188 Get the capabilities of the underlying inline cryptographic interface. 221 Set the configuration of the underlying inline cryptographic interface. 224 inline cryptographic interface and should be called before attempting any crypto operations. 292 Get the configuration of the underlying inline cryptographic interface. 295 cryptographic interface. [all …]
|
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/ |
H A D | BlockIoCrypto.h | 2 The UEFI Inline Cryptographic Interface protocol provides services to abstract 3 access to inline cryptographic capabilities. 64 /// Cryptographic Interface. 66 /// the Inline Cryptographic Interface. 102 // Is inline cryptographic capability supported on this device. 191 Get the capabilities of the underlying inline cryptographic interface. 224 Set the configuration of the underlying inline cryptographic interface. 227 inline cryptographic interface and should be called before attempting any crypto operations. 295 Get the configuration of the underlying inline cryptographic interface. 298 cryptographic interface. [all …]
|
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/ |
H A D | BlockIoCrypto.h | 2 The UEFI Inline Cryptographic Interface protocol provides services to abstract 3 access to inline cryptographic capabilities. 61 /// Cryptographic Interface. 63 /// the Inline Cryptographic Interface. 99 // Is inline cryptographic capability supported on this device. 188 Get the capabilities of the underlying inline cryptographic interface. 221 Set the configuration of the underlying inline cryptographic interface. 224 inline cryptographic interface and should be called before attempting any crypto operations. 292 Get the configuration of the underlying inline cryptographic interface. 295 cryptographic interface. [all …]
|
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/ |
H A D | BlockIoCrypto.h | 2 The UEFI Inline Cryptographic Interface protocol provides services to abstract 3 access to inline cryptographic capabilities. 61 /// Cryptographic Interface. 63 /// the Inline Cryptographic Interface. 99 // Is inline cryptographic capability supported on this device. 188 Get the capabilities of the underlying inline cryptographic interface. 221 Set the configuration of the underlying inline cryptographic interface. 224 inline cryptographic interface and should be called before attempting any crypto operations. 292 Get the configuration of the underlying inline cryptographic interface. 295 cryptographic interface. [all …]
|
/aosp_15_r20/external/mbedtls/docs/proposed/ |
H A D | psa-conditional-inclusion-c.md | 1 Conditional inclusion of cryptographic mechanism through the PSA API in Mbed TLS 4 This document is a proposed interface for deciding at build time which cryptographic mechanisms to … 12 …cryptographic algorithms (hashes, MAC, signatures, etc.). In each category, a typical implementati… 18 Mbed TLS offers a way to select which cryptographic mechanisms are included in a build through its … 22 …cryptographic mechanisms) can be augmented with drivers. **Transparent drivers** replace the built… 28 [Req.interface] The application can declare which cryptographic mechanisms it needs. 57 * If `MBEDTLS_PSA_CRYPTO_CONFIG` is set, the necessary software implementations of cryptographic al… 71 … that requires conditional compilation based on the availability of a cryptographic mechanism thro… 75 * In application code that provides additional features based on cryptographic capabilities, for ex… 143 …`psa/crypto_sizes.h`, and application code that's specific to a given cryptographic mechanism. In …
|
H A D | psa-driver-interface.md | 14 The PSA Cryptography API defines an interface that allows applications to perform cryptographic ope… 16 …e handles key management, enforces key usage policies, and dispatches cryptographic operations eit… 24 …cryptographic operations on keys that are provided in cleartext at the beginning of each operation… 25 * **Opaque** drivers implement cryptographic operations on keys that can only be used inside a prot… 41 …support a cryptographic mechanism and that a fallback to core code may be necessary. Conversely, i… 43 …hich mechanisms they support. A driver's code will not be invoked for cryptographic mechanisms tha… 49 …cription file declares which functions the driver implements and what cryptographic mechanisms the… 81 …s a family of functions that the driver implements for a certain class of cryptographic mechanisms. 90 …family of functions that the driver implements for a certain class of cryptographic mechanisms. Th… 103 When the PSA Cryptography implementation performs a cryptographic mechanism, it invokes available d… [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/proposed/ |
H A D | psa-conditional-inclusion-c.md | 1 Conditional inclusion of cryptographic mechanism through the PSA API in Mbed TLS 4 This document is a proposed interface for deciding at build time which cryptographic mechanisms to … 12 …cryptographic algorithms (hashes, MAC, signatures, etc.). In each category, a typical implementati… 18 Mbed TLS offers a way to select which cryptographic mechanisms are included in a build through its … 22 …cryptographic mechanisms) can be augmented with drivers. **Transparent drivers** replace the built… 28 [Req.interface] The application can declare which cryptographic mechanisms it needs. 57 * If `MBEDTLS_PSA_CRYPTO_CONFIG` is set, the necessary software implementations of cryptographic al… 71 … that requires conditional compilation based on the availability of a cryptographic mechanism thro… 75 * In application code that provides additional features based on cryptographic capabilities, for ex… 143 …`psa/crypto_sizes.h`, and application code that's specific to a given cryptographic mechanism. In …
|
H A D | psa-driver-interface.md | 14 The PSA Cryptography API defines an interface that allows applications to perform cryptographic ope… 16 …e handles key management, enforces key usage policies, and dispatches cryptographic operations eit… 24 …cryptographic operations on keys that are provided in cleartext at the beginning of each operation… 25 * **Opaque** drivers implement cryptographic operations on keys that can only be used inside a prot… 41 …support a cryptographic mechanism and that a fallback to core code may be necessary. Conversely, i… 43 …hich mechanisms they support. A driver's code will not be invoked for cryptographic mechanisms tha… 49 …cription file declares which functions the driver implements and what cryptographic mechanisms the… 81 …s a family of functions that the driver implements for a certain class of cryptographic mechanisms. 90 …family of functions that the driver implements for a certain class of cryptographic mechanisms. Th… 103 When the PSA Cryptography implementation performs a cryptographic mechanism, it invokes available d… [all …]
|
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/ |
D | cloudkms_v1.projects.locations.keyRings.cryptoKeys.cryptoKeyVersions.html | 162 …"digest": { # A Digest holds a cryptographic message digest. # Optional. The digest of t… 202 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 243 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 297 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 345 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 426 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 484 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 610 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 652 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 706 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
|
D | cloudkms_v1.projects.locations.keyRings.cryptoKeys.html | 133 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent… 142 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 192 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent… 201 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 322 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent… 331 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 444 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent… 453 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… 521 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent… 530 …cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph… [all …]
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/13/libcore/ojluni/src/main/java/java/security/ |
D | Security.java | 225 * property in the master file of the "SUN" Cryptographic Service 411 * <p> A cryptographic service is always associated with a particular 421 * <p> The cryptographic service name must not contain any dots. 425 * specified algorithm or type for the specified cryptographic service. 431 * <p> The cryptographic service name must not contain any dots. There 437 * cryptographic service and its implementation meets the 448 * for information about standard cryptographic service names, standard 498 * <p> The cryptographic service name must not contain any dots. 502 * specified algorithm or type for the specified cryptographic service. 505 * <p> The cryptographic service name must not contain any dots. There [all …]
|
/aosp_15_r20/prebuilts/jdk/jdk21/linux-x86/conf/security/policy/ |
D | README.txt | 8 Import and export control rules on cryptographic software vary from 10 allows flexible cryptographic key strength to be configured via the 14 By default, Java provides two different sets of cryptographic policy 17 unlimited: These policy files contain no restrictions on cryptographic 20 limited: These policy files contain more restricted cryptographic 52 cryptographic policy files, and standard JCE providers provided with
|
/aosp_15_r20/prebuilts/jdk/jdk21/darwin-arm64/conf/security/policy/ |
D | README.txt | 8 Import and export control rules on cryptographic software vary from 10 allows flexible cryptographic key strength to be configured via the 14 By default, Java provides two different sets of cryptographic policy 17 unlimited: These policy files contain no restrictions on cryptographic 20 limited: These policy files contain more restricted cryptographic 52 cryptographic policy files, and standard JCE providers provided with
|
/aosp_15_r20/prebuilts/jdk/jdk21/darwin-x86/conf/security/policy/ |
D | README.txt | 8 Import and export control rules on cryptographic software vary from 10 allows flexible cryptographic key strength to be configured via the 14 By default, Java provides two different sets of cryptographic policy 17 unlimited: These policy files contain no restrictions on cryptographic 20 limited: These policy files contain more restricted cryptographic 52 cryptographic policy files, and standard JCE providers provided with
|