/external/chromium/chrome/browser/webdata/ |
token_service_table.cc | 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 56 if (!encrypted) {
|
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; local 22 encrypted.set_key_name("foo"); 23 encrypted.set_blob("bar"); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 54 sync_pb::EncryptedData encrypted; local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 102 sync_pb::EncryptedData encrypted; local [all...] |
/external/openssh/ |
authfile.c | 88 Buffer buffer, encrypted; local 117 * will be stored in plain text, and storing them also in encrypted 125 /* Pad the part to be encrypted until its size is a multiple of 8. */ 130 buffer_init(&encrypted); 134 buffer_put_char(&encrypted, authfile_id_string[i]); 135 buffer_put_char(&encrypted, 0); 138 buffer_put_char(&encrypted, cipher_num); 139 buffer_put_int(&encrypted, 0); /* For future extension */ 142 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); 143 buffer_put_bignum(&encrypted, key->rsa->n) [all...] |
/external/dropbear/ |
keyimport.c | 355 int encrypted; member in struct:openssh_key 373 ret->encrypted = 0; 422 if (!strcmp(p, "ENCRYPTED\n")) 423 ret->encrypted = 1; 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { 468 errmsg = "Encrypted key blob is not a multiple of cipher block size"; 501 ret = key->encrypted; 529 if (key->encrypted) { 530 errmsg = "encrypted keys not supported currently"; 930 fprintf(stderr, "Encrypted keys aren't supported currently\n") [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); 216 public Pair createPair(int clear, long encrypted) { 217 return new Pair(clear, encrypted); 223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { 227 this.encrypted = encrypted; 244 if (encrypted != pair.encrypted) { 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)) [all...] |
/system/core/fs_mgr/ |
fs_mgr.c | 513 int encrypted = 0; local 550 /* mount(2) returned an error, check if it's encrypted and deal with it */ 558 ERROR("Cannot mount tmpfs filesystem for encrypted fs at %s\n", 562 encrypted = 1; 570 if (encrypted) {
|
/external/qemu/ |
block_int.h | 148 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
|
/external/zlib/src/contrib/minizip/ |
unzip.c | 185 int encrypted; member in struct:__anon18666 752 us.encrypted = 0; [all...] |
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon12670
|
/external/openssl/include/openssl/ |
pkcs7.h | 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon12713
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 314 const u8 *encrypted; member in struct:ikev2_payloads 326 const u8 *encrypted, size_t encrypted_len,
|
/system/security/keystore/ |
keystore.cpp | 61 * values are encrypted with checksums. The encryption key is protected by a 391 uint8_t encrypted[0]; // Marks offset to encrypted data. member in struct:blob 394 int32_t length; // in network byte order when encrypted 457 void setEncrypted(bool encrypted) { 458 if (encrypted) { 481 ALOGD("couldn't insert encrypted blob while not unlocked"); 496 // encrypted data includes the digest value 499 memmove(&mBlob.encrypted[encryptedLength], &mBlob.value[mBlob.length], mBlob.info); 510 AES_cbc_encrypt(mBlob.encrypted, mBlob.encrypted, encryptedLength [all...] |
/external/chromium/chrome/browser/sync/engine/ |
syncapi.cc | 209 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 212 if (!crypto->Decrypt(encrypted, data.get())) 231 // We assume any node with the encrypted field set has encrypted data. 235 const sync_pb::EncryptedData& encrypted = local 236 specifics.encrypted(); 238 DecryptToString(encrypted); 242 LOG(ERROR) << "Failed to decrypt encrypted node of type " << 438 DCHECK_NE(type, syncable::NIGORI); // Nigori is encrypted separately 454 sync_pb::EntitySpecifics encrypted; local 1450 const sync_pb::EncryptedData& encrypted = a.ref(SPECIFICS).encrypted(); local 1456 const sync_pb::EncryptedData& encrypted = b.Get(SPECIFICS).encrypted(); local 2397 const sync_pb::EncryptedData& encrypted = original_specifics.encrypted(); local [all...] |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.h | 669 bool encrypted() const { return encryption_ != SECURITY_NONE; } function in class:chromeos::WifiNetwork [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.security_1.0.200.v20100503.jar | |