Home
last modified time | relevance | path

Searched full:cryptographic (Results 1 – 25 of 3823) sorted by relevance

12345678910>>...153

/aosp_15_r20/external/aws-sdk-java-v2/services/kms/target/generated-sources/sdk/software/amazon/awssdk/services/kms/model/
H A DGrantConstraints.java41 …docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
46 …* KMS applies the grant constraints only to cryptographic operations that support an encryption co…
47 * cryptographic operations with a <a
50 …* cryptographic operations with asymmetric KMS keys and management operations, such as <a>Describe…
55 …* In a cryptographic operation, the encryption context in the decryption operation must be an exac…
132 …docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
133 …* operation</a> request. The grant allows the cryptographic operation only when the encryption con…
146 …href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations"
147 …* >cryptographic operation</a> request. The grant allows the cryptographic operation only …
170 …docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
[all …]
/aosp_15_r20/external/mbedtls/docs/architecture/
H A Dpsa-crypto-implementation-structure.md6 …rypto/psa/#application-programming-interface) defines an interface to cryptographic operations for…
11 …s defined in the PSA driver interface. The key point is that software cryptographic operations are…
15 * Addressing software and hardware cryptographic implementations through the same C interface reduc…
16 * The organization of the software cryptographic implementations in drivers promotes modularization…
17 * As hardware capabilities, software cryptographic functionalities can be described by a JSON drive…
18 …ework to integrate third party or alternative software implementations of cryptographic operations.
22 …SA Cryptography API specification but does not perform on its own any cryptographic operation. The…
23 perform the cryptographic operations. The core is responsible for:
27 * dispatching the cryptographic operations to the appropriate PSA drivers.
29 The sketch of an Mbed TLS PSA cryptographic API implementation is thus:
[all …]
H A Dalternative-implementations.md24 If your platform has a cryptographic accelerator, you can use it via a [PSA driver](#psa-cryptograp…
28cryptographic engine is present, you can implement a driver for this engine in the PSA interface. …
70 ### Alternative implementations of cryptographic functions
72 Options to replace individual functions of cryptographic modules generally have a name obtained by …
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/architecture/
H A Dpsa-crypto-implementation-structure.md6 …rypto/psa/#application-programming-interface) defines an interface to cryptographic operations for…
11 …s defined in the PSA driver interface. The key point is that software cryptographic operations are…
15 * Addressing software and hardware cryptographic implementations through the same C interface reduc…
16 * The organization of the software cryptographic implementations in drivers promotes modularization…
17 * As hardware capabilities, software cryptographic functionalities can be described by a JSON drive…
18 …ework to integrate third party or alternative software implementations of cryptographic operations.
22 …SA Cryptography API specification but does not perform on its own any cryptographic operation. The…
23 perform the cryptographic operations. The core is responsible for:
27 * dispatching the cryptographic operations to the appropriate PSA drivers.
29 The sketch of an Mbed TLS PSA cryptographic API implementation is thus:
[all …]
H A Dalternative-implementations.md24 If your platform has a cryptographic accelerator, you can use it via a [PSA driver](#psa-cryptograp…
28cryptographic engine is present, you can implement a driver for this engine in the PSA interface. …
70 ### Alternative implementations of cryptographic functions
72 Options to replace individual functions of cryptographic modules generally have a name obtained by …
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/gensrcs/libcore/ojluni/src/main/java/java/security/
DAlgorithmConstraints.java31 * This interface specifies constraints for cryptographic algorithms,
56 * specified cryptographic primitives.
58 * @param primitives a set of cryptographic primitives
64 * of the specified cryptographic primitives
74 * cryptographic primitives.
78 * @param primitives a set of cryptographic primitives
82 * cryptographic primitives
91 * permission for the specified cryptographic primitives.
93 * @param primitives a set of cryptographic primitives
100 * specified cryptographic primitives
DSecurity.java225 * property in the master file of the "SUN" Cryptographic Service
411 * <p> A cryptographic service is always associated with a particular
421 * <p> The cryptographic service name must not contain any dots.
425 * specified algorithm or type for the specified cryptographic service.
431 * <p> The cryptographic service name must not contain any dots. There
437 * cryptographic service and its implementation meets the
448 * for information about standard cryptographic service names, standard
498 * <p> The cryptographic service name must not contain any dots.
502 * specified algorithm or type for the specified cryptographic service.
505 * <p> The cryptographic service name must not contain any dots. There
[all …]
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/11/libcore/ojluni/src/main/java/java/security/
DAlgorithmConstraints.java31 * This interface specifies constraints for cryptographic algorithms,
56 * specified cryptographic primitives.
58 * @param primitives a set of cryptographic primitives
64 * of the specified cryptographic primitives
74 * cryptographic primitives.
78 * @param primitives a set of cryptographic primitives
82 * cryptographic primitives
91 * permission for the specified cryptographic primitives.
93 * @param primitives a set of cryptographic primitives
100 * specified cryptographic primitives
/aosp_15_r20/libcore/ojluni/src/main/java/java/security/
H A DAlgorithmConstraints.java31 * This interface specifies constraints for cryptographic algorithms,
56 * specified cryptographic primitives.
58 * @param primitives a set of cryptographic primitives
64 * of the specified cryptographic primitives
74 * cryptographic primitives.
78 * @param primitives a set of cryptographic primitives
82 * cryptographic primitives
91 * permission for the specified cryptographic primitives.
93 * @param primitives a set of cryptographic primitives
100 * specified cryptographic primitives
H A DSecurity.java225 * property in the master file of the "SUN" Cryptographic Service
411 * <p> A cryptographic service is always associated with a particular
421 * <p> The cryptographic service name must not contain any dots.
425 * specified algorithm or type for the specified cryptographic service.
431 * <p> The cryptographic service name must not contain any dots. There
437 * cryptographic service and its implementation meets the
448 * for information about standard cryptographic service names, standard
498 * <p> The cryptographic service name must not contain any dots.
502 * specified algorithm or type for the specified cryptographic service.
505 * <p> The cryptographic service name must not contain any dots. There
[all …]
/aosp_15_r20/external/pigweed/pw_software_update/
H A Dtuf.proto110 // Keyid is a unique identifier that identifies a cryptographic key.
111 // Contains all of cryptographic keys used by this repository.
210 // Cryptographic key
214 // Identifies an asymmetric cryptographic key.
223 // Stores the serialized public key for this cryptographic algorithm.
227 // The set of cryptographic keys used by a specific role. For example, list of
231 // Keyid is a unique identifier that identifies a cryptographic key.
250 // Digest of the cryptographic hash function computed on the target file.
268 // Algorithm name is the name of a cryptographic hash function. E.g. "sha256".
269 // The Hash string is the hex digest of the cryptographic function computed on
[all …]
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/
H A DBlockIoCrypto.h2 The UEFI Inline Cryptographic Interface protocol provides services to abstract
3 access to inline cryptographic capabilities.
61 /// Cryptographic Interface.
63 /// the Inline Cryptographic Interface.
99 // Is inline cryptographic capability supported on this device.
188 Get the capabilities of the underlying inline cryptographic interface.
221 Set the configuration of the underlying inline cryptographic interface.
224 inline cryptographic interface and should be called before attempting any crypto operations.
292 Get the configuration of the underlying inline cryptographic interface.
295 cryptographic interface.
[all …]
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/
H A DBlockIoCrypto.h2 The UEFI Inline Cryptographic Interface protocol provides services to abstract
3 access to inline cryptographic capabilities.
64 /// Cryptographic Interface.
66 /// the Inline Cryptographic Interface.
102 // Is inline cryptographic capability supported on this device.
191 Get the capabilities of the underlying inline cryptographic interface.
224 Set the configuration of the underlying inline cryptographic interface.
227 inline cryptographic interface and should be called before attempting any crypto operations.
295 Get the configuration of the underlying inline cryptographic interface.
298 cryptographic interface.
[all …]
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/
H A DBlockIoCrypto.h2 The UEFI Inline Cryptographic Interface protocol provides services to abstract
3 access to inline cryptographic capabilities.
61 /// Cryptographic Interface.
63 /// the Inline Cryptographic Interface.
99 // Is inline cryptographic capability supported on this device.
188 Get the capabilities of the underlying inline cryptographic interface.
221 Set the configuration of the underlying inline cryptographic interface.
224 inline cryptographic interface and should be called before attempting any crypto operations.
292 Get the configuration of the underlying inline cryptographic interface.
295 cryptographic interface.
[all …]
/aosp_15_r20/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/
H A DBlockIoCrypto.h2 The UEFI Inline Cryptographic Interface protocol provides services to abstract
3 access to inline cryptographic capabilities.
61 /// Cryptographic Interface.
63 /// the Inline Cryptographic Interface.
99 // Is inline cryptographic capability supported on this device.
188 Get the capabilities of the underlying inline cryptographic interface.
221 Set the configuration of the underlying inline cryptographic interface.
224 inline cryptographic interface and should be called before attempting any crypto operations.
292 Get the configuration of the underlying inline cryptographic interface.
295 cryptographic interface.
[all …]
/aosp_15_r20/external/mbedtls/docs/proposed/
H A Dpsa-conditional-inclusion-c.md1 Conditional inclusion of cryptographic mechanism through the PSA API in Mbed TLS
4 This document is a proposed interface for deciding at build time which cryptographic mechanisms to …
12cryptographic algorithms (hashes, MAC, signatures, etc.). In each category, a typical implementati…
18 Mbed TLS offers a way to select which cryptographic mechanisms are included in a build through its …
22cryptographic mechanisms) can be augmented with drivers. **Transparent drivers** replace the built…
28 [Req.interface] The application can declare which cryptographic mechanisms it needs.
57 * If `MBEDTLS_PSA_CRYPTO_CONFIG` is set, the necessary software implementations of cryptographic al…
71 … that requires conditional compilation based on the availability of a cryptographic mechanism thro…
75 * In application code that provides additional features based on cryptographic capabilities, for ex…
143 …`psa/crypto_sizes.h`, and application code that's specific to a given cryptographic mechanism. In …
H A Dpsa-driver-interface.md14 The PSA Cryptography API defines an interface that allows applications to perform cryptographic ope…
16 …e handles key management, enforces key usage policies, and dispatches cryptographic operations eit…
24cryptographic operations on keys that are provided in cleartext at the beginning of each operation…
25 * **Opaque** drivers implement cryptographic operations on keys that can only be used inside a prot…
41 …support a cryptographic mechanism and that a fallback to core code may be necessary. Conversely, i…
43 …hich mechanisms they support. A driver's code will not be invoked for cryptographic mechanisms tha…
49 …cription file declares which functions the driver implements and what cryptographic mechanisms the…
81 …s a family of functions that the driver implements for a certain class of cryptographic mechanisms.
90 …family of functions that the driver implements for a certain class of cryptographic mechanisms. Th…
103 When the PSA Cryptography implementation performs a cryptographic mechanism, it invokes available d…
[all …]
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/proposed/
H A Dpsa-conditional-inclusion-c.md1 Conditional inclusion of cryptographic mechanism through the PSA API in Mbed TLS
4 This document is a proposed interface for deciding at build time which cryptographic mechanisms to …
12cryptographic algorithms (hashes, MAC, signatures, etc.). In each category, a typical implementati…
18 Mbed TLS offers a way to select which cryptographic mechanisms are included in a build through its …
22cryptographic mechanisms) can be augmented with drivers. **Transparent drivers** replace the built…
28 [Req.interface] The application can declare which cryptographic mechanisms it needs.
57 * If `MBEDTLS_PSA_CRYPTO_CONFIG` is set, the necessary software implementations of cryptographic al…
71 … that requires conditional compilation based on the availability of a cryptographic mechanism thro…
75 * In application code that provides additional features based on cryptographic capabilities, for ex…
143 …`psa/crypto_sizes.h`, and application code that's specific to a given cryptographic mechanism. In …
H A Dpsa-driver-interface.md14 The PSA Cryptography API defines an interface that allows applications to perform cryptographic ope…
16 …e handles key management, enforces key usage policies, and dispatches cryptographic operations eit…
24cryptographic operations on keys that are provided in cleartext at the beginning of each operation…
25 * **Opaque** drivers implement cryptographic operations on keys that can only be used inside a prot…
41 …support a cryptographic mechanism and that a fallback to core code may be necessary. Conversely, i…
43 …hich mechanisms they support. A driver's code will not be invoked for cryptographic mechanisms tha…
49 …cription file declares which functions the driver implements and what cryptographic mechanisms the…
81 …s a family of functions that the driver implements for a certain class of cryptographic mechanisms.
90 …family of functions that the driver implements for a certain class of cryptographic mechanisms. Th…
103 When the PSA Cryptography implementation performs a cryptographic mechanism, it invokes available d…
[all …]
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/
Dcloudkms_v1.projects.locations.keyRings.cryptoKeys.cryptoKeyVersions.html162 …&quot;digest&quot;: { # A Digest holds a cryptographic message digest. # Optional. The digest of t…
202cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
243cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
297cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
345cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
426cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
484cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
610cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
652cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
706cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
Dcloudkms_v1.projects.locations.keyRings.cryptoKeys.html133 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent…
142cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
192 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent…
201cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
322 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent…
331cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
444 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent…
453cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
521 …sed for cryptographic operations. A CryptoKey is made up of zero or more versions, which represent…
530cryptographic key, and the associated key material. An ENABLED version can be used for cryptograph…
[all …]
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/13/libcore/ojluni/src/main/java/java/security/
DSecurity.java225 * property in the master file of the "SUN" Cryptographic Service
411 * <p> A cryptographic service is always associated with a particular
421 * <p> The cryptographic service name must not contain any dots.
425 * specified algorithm or type for the specified cryptographic service.
431 * <p> The cryptographic service name must not contain any dots. There
437 * cryptographic service and its implementation meets the
448 * for information about standard cryptographic service names, standard
498 * <p> The cryptographic service name must not contain any dots.
502 * specified algorithm or type for the specified cryptographic service.
505 * <p> The cryptographic service name must not contain any dots. There
[all …]
/aosp_15_r20/prebuilts/jdk/jdk21/linux-x86/conf/security/policy/
DREADME.txt8 Import and export control rules on cryptographic software vary from
10 allows flexible cryptographic key strength to be configured via the
14 By default, Java provides two different sets of cryptographic policy
17 unlimited: These policy files contain no restrictions on cryptographic
20 limited: These policy files contain more restricted cryptographic
52 cryptographic policy files, and standard JCE providers provided with
/aosp_15_r20/prebuilts/jdk/jdk21/darwin-arm64/conf/security/policy/
DREADME.txt8 Import and export control rules on cryptographic software vary from
10 allows flexible cryptographic key strength to be configured via the
14 By default, Java provides two different sets of cryptographic policy
17 unlimited: These policy files contain no restrictions on cryptographic
20 limited: These policy files contain more restricted cryptographic
52 cryptographic policy files, and standard JCE providers provided with
/aosp_15_r20/prebuilts/jdk/jdk21/darwin-x86/conf/security/policy/
DREADME.txt8 Import and export control rules on cryptographic software vary from
10 allows flexible cryptographic key strength to be configured via the
14 By default, Java provides two different sets of cryptographic policy
17 unlimited: These policy files contain no restrictions on cryptographic
20 limited: These policy files contain more restricted cryptographic
52 cryptographic policy files, and standard JCE providers provided with

12345678910>>...153