HomeSort by relevance Sort by last modified time
    Searched full:encrypted (Results 101 - 125 of 637) sorted by null

1 2 3 45 6 7 8 91011>>

  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
fiemap.h 52 #define FIEMAP_EXTENT_DATA_ENCRYPTED 0x00000080 /* Data is encrypted by fs.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/
yppasswd.x 50 string pw_passwd<>; /* encrypted password */
  /system/extras/ext4_utils/
setup_fs.c 40 fprintf(stderr,"device %s not wiped, probably encrypted, not wiping\n", blockdev);
  /cts/tests/tests/security/jni/
android_security_cts_EncryptionTest.cpp 37 * Purpose: Check the device is encrypted
39 * Returns: boolean: (true) if encrypted, (false) otherwise
47 jboolean rc = !strcmp(prop_value, "encrypted");
  /external/boringssl/src/crypto/pkcs8/
pkcs8.c 655 * the ASN.1 data gets wrapped in OCTETSTRINGs and/or encrypted and the
688 * copy of the same encrypted private key (with the same IV and
717 * PKCS#7 encrypted data inside a PKCS#12 structure is generally an
718 * encrypted certificate bag and it's generally encrypted with 40-bit
787 X509_SIG *encrypted = NULL; local
795 /* encrypted isn't actually an X.509 signature, but it has the same
797 encrypted = d2i_X509_SIG(NULL, &inp, CBS_len(&wrapped_contents));
798 if (encrypted == NULL) {
806 X509_SIG_free(encrypted);
    [all...]
  /frameworks/base/core/java/android/bluetooth/
BluetoothGattDescriptor.java 51 * Descriptor permission: Allow encrypted read operations
66 * Descriptor permission: Allow encrypted writes
71 * Descriptor permission: Allow encrypted writes with man-in-the-middle
BluetoothServerSocket.java 80 * @param encrypt require the connection to be encrypted
98 * @param encrypt require the connection to be encrypted
120 * @param encrypt require the connection to be encrypted
  /frameworks/base/core/tests/coretests/src/android/os/storage/
StorageManagerIntegrationTest.java 114 * Tests mounting a single encrypted OBB file and verifies its contents.
126 * Tests mounting a single encrypted OBB file using an invalid password.
137 * Tests simultaneously mounting 2 encrypted OBBs with different keys and verifies contents.
  /frameworks/base/keystore/java/android/security/
KeyStoreParameter.java 66 * Returns {@code true} if the {@link java.security.KeyStore} entry must be encrypted at rest.
89 * This can be used to require that KeyStore entries be stored encrypted.
118 * Sets whether this {@link java.security.KeyStore} entry must be encrypted at rest.
  /system/keymaster/include/keymaster/
keymaster_context.h 44 * encrypted (though they are integrity-checked) because there is no place to securely store a
50 * not encrypted by AndroidKeymaster, but some may be opaque blobs provided by the backing
74 * (Keystore, generally). The blob is integrity-checked and may be encrypted, depending on the
  /system/keymaster/
soft_keymaster_context.cpp 281 // 1. New keymaster1 software key blobs. These are integrity-assured but not encrypted. The
285 // 2. Old keymaster1 software key blobs. These are OCB-encrypted with an all-zero master key.
292 // 4. New keymaster0 hardware key blobs. These are integrity-assured but not encrypted (though
300 // integrity-assured and OCB-encrypted blobs are self-consistent and effectively impossible to
303 // integrity-assured nor OCB-encrypted and lacks the old software key header is assumed to be
317 // Wasn't an integrity-assured blob. Maybe it's an OCB-encrypted blob.
324 // Wasn't an OCB-encrypted blob. Maybe it's an old softkeymaster blob.
  /external/wpa_supplicant_8/src/wps/
wps_validate.c 841 wpa_printf(MSG_INFO, "WPS-STRICT: Encrypted Settings "
848 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encrypted Settings "
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
CFBBlockCipher.java 202 * @param in the array containing the data to be encrypted.
204 * @param out the array the encrypted data will be copied into.
228 * @param out the array the encrypted data will be copied into.
CBCBlockCipher.java 166 * @param in the array containing the data to be encrypted.
168 * @param out the array the encrypted data will be copied into.
  /external/ipsec-tools/src/racoon/
isakmp_inf.c 139 int encrypted;
143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
147 if (encrypted) {
180 if (encrypted) {
262 /* make sure the packet was encrypted after the beginning of phase 1. */
274 "%s message must be encrypted\n",
295 msgid, encrypted);
300 msgid, encrypted);
331 isakmp_info_recv_n(iph1, notify, msgid, encrypted)
335 int encrypted;
138 int encrypted; local
    [all...]
  /external/tcpdump/
rpc_auth.h 79 #define SUNRPC_AUTH_DES 3 /* des style (encrypted timestamps) */
  /external/wpa_supplicant_8/src/common/
eapol_common.h 81 * key field (of key_length bytes) contains the key in encrypted form;
  /frameworks/av/drm/mediadrm/plugins/clearkey/
CryptoPlugin.cpp 52 "Encrypted subsamples found in allegedly unencrypted "
  /frameworks/av/media/libstagefright/include/
WVMExtractor.h 73 // In this mode, the extractor returns encrypted data for use
  /frameworks/av/media/libstagefright/wifi-display/
MediaSender.h 40 // Optionally the (video) data is encrypted using the provided hdcp object.
  /libcore/luni/src/test/java/libcore/javax/crypto/
CipherTest.java     [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto.h 101 * @plain: Plaintext data to be encrypted (16 bytes)
102 * @crypt: Buffer for the encrypted data (16 bytes)
123 * @crypt: Encrypted data (16 bytes)
282 * @passwd: Key encryption password or %NULL if key is not encrypted
315 * @out: Output buffer for encrypted data
330 * @in: Encrypted buffer
331 * @inlen: Length of encrypted buffer in bytes
332 * @out: Output buffer for encrypted data
349 * @out: Output buffer for encrypted (signed) data
384 * @crypt: Encrypted signature data (using the private key
    [all...]
  /external/openssh/
ssh_api.h 99 * ssh_packet_put() creates an encrypted packet with the given type
101 * the encrypted packet is appended to the output byte-stream.
sshkey.c 3056 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local
3419 struct sshbuf *buffer = NULL, *encrypted = NULL; local
    [all...]
  /external/srtp/include/
srtp_priv.h 125 unsigned int e:1; /* encrypted? 1=yes */
151 unsigned int e:1; /* encrypted? 1=yes */

Completed in 693 milliseconds

1 2 3 45 6 7 8 91011>>