HomeSort by relevance Sort by last modified time
    Searched refs:encrypted (Results 1 - 25 of 32) sorted by null

1 2

  /libcore/support/src/test/java/tests/security/
CipherHelper.java 57 byte[] encrypted = crypt(cipher, plainData.getBytes());
65 byte[] decrypted = crypt(cipher, encrypted);
  /external/openssl/crypto/pkcs12/
p12_add.c 166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm);
197 p7->d.encrypted->enc_data->algorithm = pbe;
198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data);
199 if (!(p7->d.encrypted->enc_data->enc_data =
212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
215 p7->d.encrypted->enc_data->enc_data, 1);
p12_npas.c 123 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
  /frameworks/base/cmds/keystore/
keystore.c 45 * values are encrypted with checksums. The encryption key is protected by a
161 uint8_t encrypted[0]; member in struct:__anon8789
178 length = blob.length + (blob.value - blob.encrypted);
182 memmove(&blob.encrypted[length], &blob.value[blob.length], blob.info);
186 MD5(blob.digested, length - (blob.digested - blob.encrypted), blob.digest);
189 AES_cbc_encrypt(blob.encrypted, blob.encrypted, length, aes_key, vector,
193 length += (blob.encrypted - (uint8_t *)&blob) + blob.info;
212 length -= (blob.encrypted - (uint8_t *)&blob) + blob.info;
213 if (length < blob.value - blob.encrypted || length % AES_BLOCK_SIZE != 0)
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_inf.c 139 int encrypted;
143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
147 if (encrypted) {
180 if (encrypted) {
262 /* make sure the packet was encrypted after the beginning of phase 1. */
274 "%s message must be encrypted\n",
295 msgid, encrypted);
300 msgid, encrypted);
331 isakmp_info_recv_n(iph1, notify, msgid, encrypted)
335 int encrypted;
138 int encrypted; local
    [all...]
  /external/chromium/net/third_party/nss/ssl/
sslgathr.c 75 ** is encrypted (GS_MAC), or unencrypted (GS_DATA).
108 if (gs->encrypted) {
227 if (gs->encrypted) {
245 PORT_Assert(gs->encrypted);
  /external/wpa_supplicant/
eap.h 248 int encrypted);
eap.c 934 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
942 int encrypted)
961 } else if (!encrypted && config->anonymous_identity) {
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.h 264 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
eap.c 954 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
961 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted)
979 } else if (!encrypted && config->anonymous_identity) {
    [all...]
  /external/dropbear/
keyimport.c 355 int encrypted; member in struct:openssh_key
373 ret->encrypted = 0;
422 if (!strcmp(p, "ENCRYPTED\n"))
423 ret->encrypted = 1;
467 if (ret->encrypted && ret->keyblob_len % 8 != 0) {
468 errmsg = "Encrypted key blob is not a multiple of cipher block size";
501 ret = key->encrypted;
529 if (key->encrypted) {
530 errmsg = "encrypted keys not supported currently";
930 fprintf(stderr, "Encrypted keys aren't supported currently\n")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.h 320 const u8 *encrypted; member in struct:ikev2_payloads
332 const u8 *encrypted, size_t encrypted_len,
ikev2_common.c 272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
388 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Encrypted");
389 payloads->encrypted = pdata;
414 * Next Payload in the case of Encrypted Payload is
498 const u8 *encrypted, size_t encrypted_len,
510 if (encrypted == NULL) {
511 wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH");
534 iv = encrypted;
536 end = encrypted + encrypted_len;
574 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
    [all...]
  /external/qemu/
block.c 338 bs->encrypted = 0;
930 if (bs->backing_hd && bs->backing_hd->encrypted)
932 return bs->encrypted;
939 if (backing_hd && backing_hd->encrypted && !backing_hd->valid_key)
941 return (bs->encrypted && !bs->valid_key);
947 if (bs->backing_hd && bs->backing_hd->encrypted) {
951 if (!bs->encrypted)
954 if (!bs->encrypted || !bs->drv || !bs->drv->bdrv_set_key)
1091 monitor_printf(mon, " encrypted=%d", bdrv_is_encrypted(bs));
1119 if (bs->backing_hd && bs->backing_hd->encrypted)
    [all...]
block_int.h 121 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
monitor.c     [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 453 const u8 *encrypted,
463 hdr, encrypted, encrypted_len,
500 if (pl->encrypted) {
501 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - "
503 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
507 "encrypted payload");
727 &data->keys, 0, hdr, pl->encrypted,
  /external/openssl/crypto/pkcs7/
pk7_lib.c 205 if ((p7->d.encrypted=PKCS7_ENCRYPT_new())
207 if (!ASN1_INTEGER_set(p7->d.encrypted->version,0))
209 p7->d.encrypted->enc_data->content_type
pk7_asn1.c 77 ADB_ENTRY(NID_pkcs7_encrypted, ASN1_NDEF_EXP_OPT(PKCS7, d.encrypted, PKCS7_ENCRYPT, 0))
pkcs7.h 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon5591
  /external/chromium/third_party/zlib/contrib/minizip/
unzip.c 151 int encrypted; member in struct:__anon3279
494 us.encrypted = 0;
    [all...]
  /external/zlib/contrib/minizip/
unzip.c 185 int encrypted; member in struct:__anon8775
752 us.encrypted = 0;
    [all...]
  /external/openssl/include/openssl/
pkcs7.h 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon5635
  /external/v8/benchmarks/
crypto.js     [all...]
  /external/webkit/SunSpider/tests/v8-v4/
v8-crypto.js     [all...]

Completed in 544 milliseconds

1 2