HomeSort by relevance Sort by last modified time
    Searched full:encrypted (Results 101 - 125 of 951) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium_org/sync/internal_api/public/
configure_reason.h 32 // A configuration due to enabling or disabling encrypted types due to
  /external/chromium_org/third_party/openssl/openssl/crypto/des/
des.pod 125 Decrypt data that was encrypted with the B<-e> option.
129 Decrypt data that was encrypted with the B<-E> option.
178 the input file is assumed to contain uuencoded, DES encrypted data.
208 multiple of 512 bytes. This causes problems when encrypted data is
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_encrypt.c 24 @param ct [out] The ciphertext as encrypted
  /external/openssl/crypto/des/
des.pod 125 Decrypt data that was encrypted with the B<-e> option.
129 Decrypt data that was encrypted with the B<-E> option.
178 the input file is assumed to contain uuencoded, DES encrypted data.
208 multiple of 512 bytes. This causes problems when encrypted data is
  /frameworks/av/include/drm/
drm_framework_common.h 226 * Decrypt API set for non encrypted content
275 * (file format is not encrypted but ES is encrypted)
281 * 2. Decrypt APIs for container based DRM (file format itself is encrypted)
  /libcore/crypto/src/main/java/org/conscrypt/
ConnectionState.java 106 * data to be encrypted under the current connection state.
117 * data to be encrypted under the current connection state.
129 * data to be encrypted under the current connection state.
140 * data to be encrypted under the current connection state.
SSLSocketOutputStream.java 27 * The written bytes are encrypted, packed into the records,
  /libcore/luni/src/main/java/javax/crypto/
NullCipher.java 33 * in any way. The <i>encrypted</i> data is identical to the <i>plain text</i>.
  /packages/apps/Email/res/xml/
device_admin.xml 25 <encrypted-storage />
  /system/vold/
cryptfs.h 18 * partition that is encrypted, or in a separate partition. It's location
45 #define CRYPT_MNT_KEY_UNENCRYPTED 0x1 /* The key for the partition is not encrypted. */
71 __le64 fs_size; /* Size of the encrypted fs, in 512 byte sectors */
78 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */
cryptfs.c 18 * 1. Perhaps keep several copies of the encrypted key, in case something
205 /* If it's an encrypted Android partition, the last 16 Kbytes contain the
480 /* If not encrypted, just allocate an empty table and initialize it */
482 if (strcmp(encrypted_state, "encrypted") ) {
1090 SLOGE("Encrypted filesystem not validated, aborting");
1095 SLOGE("System already restarted with encrypted disk, aborting");
1104 * to umount the tmpfs /data, then mount the encrypted /data.
2043 int encrypted = 0; local
    [all...]
  /external/chromium_org/net/quic/crypto/
aes_128_gcm_12_encrypter_test.cc 309 scoped_ptr<QuicData> encrypted(EncryptWithNonce(
315 ASSERT_TRUE(encrypted.get());
323 ASSERT_EQ(ct_len + tag_len, encrypted->length());
324 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(),
327 "authentication tag", encrypted->data() + ct_len, tag_len, tag,
  /frameworks/av/include/media/stagefright/
MetaData.h 138 // If a MediaBuffer's data represents (at least partially) encrypted
140 // The data can be thought of as pairs of plain and encrypted data
141 // fragments, i.e. plain and encrypted data alternate.
148 // If only encrypted sizes are present it is assumed that all
149 // plain sizes are 0, i.e. all fragments are encrypted.
  /frameworks/base/core/java/android/content/pm/
ContainerEncryptionParams.java 75 /** Offset into file where encrypted data begins. */
79 * Offset into file for the end of encrypted data (and, by extension,
92 * Creates container encryption specifications for installing from encrypted
106 * @param encryptedDataStart offset of start of encrypted data in stream
107 * @param dataEnd offset of the end of both the authenticated and encrypted
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
EncryptedPrivateKeyInfoTest.java 281 // ... and corrupt it (set wrong encrypted data tag)
292 // ... and corrupt it (set wrong encrypted data length)
416 * algorithm or encrypted data is <code>null</code><br>
418 * encrypted data <br>
433 // pass null as encrypted data
444 * Assertion: <code>IllegalArgumentException</code>- if encrypted data is
446 * Test preconditions: pass empty encrypted data <br>
535 * algorithm parameters or encrypted data is <code>null</code><br>
537 * as encrypted data <br>
553 // 2: pass null as encrypted dat
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
EncryptedPrivateKeyInfoTest.java 317 // ... and corrupt it (set wrong encrypted data tag)
328 // ... and corrupt it (set wrong encrypted data length)
452 * algorithm or encrypted data is <code>null</code><br>
454 * encrypted data <br>
469 // pass null as encrypted data
480 * Assertion: <code>IllegalArgumentException</code>- if encrypted data is
482 * Test preconditions: pass empty encrypted data <br>
589 * algorithm parameters or encrypted data is <code>null</code><br>
591 * as encrypted data <br>
607 // 2: pass null as encrypted dat
    [all...]
  /docs/source.android.com/src/devices/tech/encryption/
android_crypto_implementation.jd 72 encrypted with 128 bit AES via calls to the openssl library.</p>
107 <h2 id="booting-an-encrypted-system">Booting an encrypted system.</h2>
110 <p>When init fails to mount /data, it assumes the filesystem is encrypted,
112 ro.crypto.state = "encrypted"
129 disk was properly encrypted. It sends the command "cryptfs cryptocomplete"
155 encrypted with the wipe option, which is not supported on first release).
171 device encrypted, after which the device reboots to go through the process
179 has finished encrypting, file data is left in a partially encrypted state,
196 mentioned in step 3 for booting an encrypted system, and then sets th
    [all...]
  /external/chromium_org/sync/internal_api/
base_node.cc 83 // We assume any node with the encrypted field set has encrypted data and if
105 const sync_pb::EncryptedData& encrypted = specifics.encrypted(); local
107 DecryptToString(encrypted);
109 LOG(ERROR) << "Failed to decrypt encrypted node of type "
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_info.c 183 if ((int)strlen(header) > 10) /* assume encrypted */
205 if ((int)strlen(header) > 10) /* assume encrypted */
227 if ((int)strlen(header) > 10) /* assume encrypted */
263 { /* encrypted RSA data */
336 * it is non-encrypted then we use the base code
380 /* normal optionally encrypted stuff */
  /external/openssl/crypto/pem/
pem_info.c 183 if ((int)strlen(header) > 10) /* assume encrypted */
205 if ((int)strlen(header) > 10) /* assume encrypted */
227 if ((int)strlen(header) > 10) /* assume encrypted */
263 { /* encrypted RSA data */
336 * it is non-encrypted then we use the base code
380 /* normal optionally encrypted stuff */
  /hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/
mcSo.h 109 * | Header | plain-data | encrypted-data | hash | random |
131 * | Header | plain-data | encrypted-data | hash | random | padding |
153 * | Header | plain-data | encrypted-data | hash | padding |
180 /** Length of encrypted user data (after unencrypted data, excl. checksum
185 /** Maximum size of the payload (plain length + encrypted length) of a secure object. */
225 * @param encryptedLen Length of encrypted part within secure object (excl.
  /external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/
EncryptedPrivateKeyInfo_ImplTest.java 74 * name and encrypted data as a parameters <br>
99 * AlgorithmParameters and encrypted data as a parameters <br>
  /external/chromium_org/components/user_prefs/
pref_registry_syncable.h 37 // never encrypted and are synced before other datatypes. Because they're
38 // never encrypted, on first sync, they can be synced down before the user
  /external/chromium_org/media/base/
media_keys.h 72 // http://dvcs.w3.org/hg/html-media/raw-file/eme-v0.1b/encrypted-media/encrypted-media.html#event-summary
  /external/chromium_org/media/filters/
decrypting_demuxer_stream.h 26 // encrypted demuxer stream to a clear demuxer stream.
98 // Pointer to the input demuxer stream that will feed us encrypted buffers.

Completed in 1516 milliseconds

1 2 3 45 6 7 8 91011>>