/libcore/support/src/test/java/tests/security/ |
CipherHelper.java | 57 byte[] encrypted = crypt(cipher, plainData.getBytes()); 65 byte[] decrypted = crypt(cipher, encrypted);
|
/external/openssl/crypto/pkcs12/ |
p12_add.c | 166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 197 p7->d.encrypted->enc_data->algorithm = pbe; 198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 199 if (!(p7->d.encrypted->enc_data->enc_data = 212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 215 p7->d.encrypted->enc_data->enc_data, 1);
|
p12_npas.c | 123 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
|
/frameworks/base/cmds/keystore/ |
keystore.c | 45 * values are encrypted with checksums. The encryption key is protected by a 161 uint8_t encrypted[0]; member in struct:__anon8789 178 length = blob.length + (blob.value - blob.encrypted); 182 memmove(&blob.encrypted[length], &blob.value[blob.length], blob.info); 186 MD5(blob.digested, length - (blob.digested - blob.encrypted), blob.digest); 189 AES_cbc_encrypt(blob.encrypted, blob.encrypted, length, aes_key, vector, 193 length += (blob.encrypted - (uint8_t *)&blob) + blob.info; 212 length -= (blob.encrypted - (uint8_t *)&blob) + blob.info; 213 if (length < blob.value - blob.encrypted || length % AES_BLOCK_SIZE != 0) [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/chromium/net/third_party/nss/ssl/ |
sslgathr.c | 75 ** is encrypted (GS_MAC), or unencrypted (GS_DATA). 108 if (gs->encrypted) { 227 if (gs->encrypted) { 245 PORT_Assert(gs->encrypted);
|
/external/wpa_supplicant/ |
eap.h | 248 int encrypted);
|
eap.c | 934 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 942 int encrypted) 961 } else if (!encrypted && config->anonymous_identity) { [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.h | 264 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
|
eap.c | 954 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 961 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) 979 } else if (!encrypted && config->anonymous_identity) { [all...] |
/external/dropbear/ |
keyimport.c | 355 int encrypted; member in struct:openssh_key 373 ret->encrypted = 0; 422 if (!strcmp(p, "ENCRYPTED\n")) 423 ret->encrypted = 1; 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { 468 errmsg = "Encrypted key blob is not a multiple of cipher block size"; 501 ret = key->encrypted; 529 if (key->encrypted) { 530 errmsg = "encrypted keys not supported currently"; 930 fprintf(stderr, "Encrypted keys aren't supported currently\n") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.h | 320 const u8 *encrypted; member in struct:ikev2_payloads 332 const u8 *encrypted, size_t encrypted_len,
|
ikev2_common.c | 272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " 388 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Encrypted"); 389 payloads->encrypted = pdata; 414 * Next Payload in the case of Encrypted Payload is 498 const u8 *encrypted, size_t encrypted_len, 510 if (encrypted == NULL) { 511 wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH"); 534 iv = encrypted; 536 end = encrypted + encrypted_len; 574 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " [all...] |
/external/qemu/ |
block.c | 338 bs->encrypted = 0; 930 if (bs->backing_hd && bs->backing_hd->encrypted) 932 return bs->encrypted; 939 if (backing_hd && backing_hd->encrypted && !backing_hd->valid_key) 941 return (bs->encrypted && !bs->valid_key); 947 if (bs->backing_hd && bs->backing_hd->encrypted) { 951 if (!bs->encrypted) 954 if (!bs->encrypted || !bs->drv || !bs->drv->bdrv_set_key) 1091 monitor_printf(mon, " encrypted=%d", bdrv_is_encrypted(bs)); 1119 if (bs->backing_hd && bs->backing_hd->encrypted) [all...] |
block_int.h | 121 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
|
monitor.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.c | 453 const u8 *encrypted, 463 hdr, encrypted, encrypted_len, 500 if (pl->encrypted) { 501 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 503 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 507 "encrypted payload"); 727 &data->keys, 0, hdr, pl->encrypted,
|
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 205 if ((p7->d.encrypted=PKCS7_ENCRYPT_new()) 207 if (!ASN1_INTEGER_set(p7->d.encrypted->version,0)) 209 p7->d.encrypted->enc_data->content_type
|
pk7_asn1.c | 77 ADB_ENTRY(NID_pkcs7_encrypted, ASN1_NDEF_EXP_OPT(PKCS7, d.encrypted, PKCS7_ENCRYPT, 0))
|
pkcs7.h | 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon5591
|
/external/chromium/third_party/zlib/contrib/minizip/ |
unzip.c | 151 int encrypted; member in struct:__anon3279 494 us.encrypted = 0; [all...] |
/external/zlib/contrib/minizip/ |
unzip.c | 185 int encrypted; member in struct:__anon8775 752 us.encrypted = 0; [all...] |
/external/openssl/include/openssl/ |
pkcs7.h | 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon5635
|
/external/v8/benchmarks/ |
crypto.js | [all...] |
/external/webkit/SunSpider/tests/v8-v4/ |
v8-crypto.js | [all...] |