HomeSort by relevance Sort by last modified time
    Searched refs:encrypted (Results 1 - 25 of 28) sorted by null

1 2

  /external/openssl/crypto/pkcs12/
p12_add.c 159 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
180 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm);
181 p7->d.encrypted->enc_data->algorithm = pbe;
182 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data);
183 if (!(p7->d.encrypted->enc_data->enc_data =
196 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
199 p7->d.encrypted->enc_data->enc_data, 1);
p12_npas.c 123 alg_get(p7->d.encrypted->enc_data->algorithm,
  /frameworks/base/cmds/keystore/
keystore.c 45 * values are encrypted with checksums. The encryption key is protected by a
146 /* Here is the file format. Values are encrypted by AES CBC, and MD5 is used to
156 uint8_t encrypted[0]; member in struct:__anon7066
173 length = blob.length + blob.value - blob.encrypted;
177 MD5(blob.digested, length - (blob.digested - blob.encrypted), blob.digest);
180 AES_cbc_encrypt(blob.encrypted, blob.encrypted, length, aes_key, vector,
184 length += blob.encrypted - (uint8_t *)&blob;
203 length -= blob.encrypted - (uint8_t *)&blob;
204 if (length < blob.value - blob.encrypted || length % AES_BLOCK_SIZE != 0)
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_inf.c 139 int encrypted;
143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
147 if (encrypted) {
180 if (encrypted) {
262 /* make sure the packet was encrypted after the beginning of phase 1. */
274 "%s message must be encrypted\n",
295 msgid, encrypted);
300 msgid, encrypted);
331 isakmp_info_recv_n(iph1, notify, msgid, encrypted)
335 int encrypted;
138 int encrypted; local
    [all...]
  /external/wpa_supplicant/
eap.h 248 int encrypted);
eap.c 934 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
942 int encrypted)
961 } else if (!encrypted && config->anonymous_identity) {
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.h 264 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
eap.c 954 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
961 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted)
979 } else if (!encrypted && config->anonymous_identity) {
    [all...]
  /external/dropbear/
keyimport.c 355 int encrypted; member in struct:openssh_key
373 ret->encrypted = 0;
422 if (!strcmp(p, "ENCRYPTED\n"))
423 ret->encrypted = 1;
467 if (ret->encrypted && ret->keyblob_len % 8 != 0) {
468 errmsg = "Encrypted key blob is not a multiple of cipher block size";
501 ret = key->encrypted;
529 if (key->encrypted) {
530 errmsg = "encrypted keys not supported currently";
930 fprintf(stderr, "Encrypted keys aren't supported currently\n")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.h 320 const u8 *encrypted; member in struct:ikev2_payloads
332 const u8 *encrypted, size_t encrypted_len,
ikev2_common.c 272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
388 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Encrypted");
389 payloads->encrypted = pdata;
414 * Next Payload in the case of Encrypted Payload is
498 const u8 *encrypted, size_t encrypted_len,
510 if (encrypted == NULL) {
511 wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH");
534 iv = encrypted;
536 end = encrypted + encrypted_len;
574 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
    [all...]
  /external/qemu/
block.c 338 bs->encrypted = 0;
930 if (bs->backing_hd && bs->backing_hd->encrypted)
932 return bs->encrypted;
939 if (backing_hd && backing_hd->encrypted && !backing_hd->valid_key)
941 return (bs->encrypted && !bs->valid_key);
947 if (bs->backing_hd && bs->backing_hd->encrypted) {
951 if (!bs->encrypted)
954 if (!bs->encrypted || !bs->drv || !bs->drv->bdrv_set_key)
1091 monitor_printf(mon, " encrypted=%d", bdrv_is_encrypted(bs));
1119 if (bs->backing_hd && bs->backing_hd->encrypted)
    [all...]
block_int.h 120 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
monitor.c     [all...]
  /external/openssl/crypto/pkcs7/
pk7_lib.c 204 if ((p7->d.encrypted=PKCS7_ENCRYPT_new())
206 if (!ASN1_INTEGER_set(p7->d.encrypted->version,0))
208 p7->d.encrypted->enc_data->content_type
pk7_asn1.c 77 ADB_ENTRY(NID_pkcs7_encrypted, ASN1_NDEF_EXP_OPT(PKCS7, d.encrypted, PKCS7_ENCRYPT, 0))
pkcs7.h 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon3975
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 453 const u8 *encrypted,
463 hdr, encrypted, encrypted_len,
500 if (pl->encrypted) {
501 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - "
503 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
507 "encrypted payload");
727 &data->keys, 0, hdr, pl->encrypted,
  /dalvik/libcore/security/src/test/java/tests/targets/security/
CipherHelper.java 86 byte[] encrypted = crypt(cipher, plainData.getBytes());
94 byte[] decrypted = crypt(cipher, encrypted);
  /external/zlib/contrib/minizip/
unzip.c 147 int encrypted; member in struct:__anon7051
490 us.encrypted = 0;
    [all...]
  /external/openssl/include/openssl/
pkcs7.h 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon4019
  /external/v8/benchmarks/
crypto.js     [all...]
  /external/webkit/SunSpider/tests/v8-v4/
v8-crypto.js     [all...]
  /external/dropbear/libtomcrypt/
crypt.tex 523 ct, /* store encrypted data here */
526 /* now ct holds the encrypted version of pt */
    [all...]
  /external/openssl/apps/
pkcs12.c 727 BIO_printf(bio_err, "PKCS7 Encrypted data: ");
729 p7->d.encrypted->enc_data->algorithm);

Completed in 1278 milliseconds

1 2