/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
fiemap.h | 52 #define FIEMAP_EXTENT_DATA_ENCRYPTED 0x00000080 /* Data is encrypted by fs.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/ |
yppasswd.x | 50 string pw_passwd<>; /* encrypted password */
|
/system/extras/ext4_utils/ |
setup_fs.c | 40 fprintf(stderr,"device %s not wiped, probably encrypted, not wiping\n", blockdev);
|
/cts/tests/tests/security/jni/ |
android_security_cts_EncryptionTest.cpp | 37 * Purpose: Check the device is encrypted 39 * Returns: boolean: (true) if encrypted, (false) otherwise 47 jboolean rc = !strcmp(prop_value, "encrypted");
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 655 * the ASN.1 data gets wrapped in OCTETSTRINGs and/or encrypted and the 688 * copy of the same encrypted private key (with the same IV and 717 * PKCS#7 encrypted data inside a PKCS#12 structure is generally an 718 * encrypted certificate bag and it's generally encrypted with 40-bit 787 X509_SIG *encrypted = NULL; local 795 /* encrypted isn't actually an X.509 signature, but it has the same 797 encrypted = d2i_X509_SIG(NULL, &inp, CBS_len(&wrapped_contents)); 798 if (encrypted == NULL) { 806 X509_SIG_free(encrypted); [all...] |
/frameworks/base/core/java/android/bluetooth/ |
BluetoothGattDescriptor.java | 51 * Descriptor permission: Allow encrypted read operations 66 * Descriptor permission: Allow encrypted writes 71 * Descriptor permission: Allow encrypted writes with man-in-the-middle
|
BluetoothServerSocket.java | 80 * @param encrypt require the connection to be encrypted 98 * @param encrypt require the connection to be encrypted 120 * @param encrypt require the connection to be encrypted
|
/frameworks/base/core/tests/coretests/src/android/os/storage/ |
StorageManagerIntegrationTest.java | 114 * Tests mounting a single encrypted OBB file and verifies its contents. 126 * Tests mounting a single encrypted OBB file using an invalid password. 137 * Tests simultaneously mounting 2 encrypted OBBs with different keys and verifies contents.
|
/frameworks/base/keystore/java/android/security/ |
KeyStoreParameter.java | 66 * Returns {@code true} if the {@link java.security.KeyStore} entry must be encrypted at rest. 89 * This can be used to require that KeyStore entries be stored encrypted. 118 * Sets whether this {@link java.security.KeyStore} entry must be encrypted at rest.
|
/system/keymaster/include/keymaster/ |
keymaster_context.h | 44 * encrypted (though they are integrity-checked) because there is no place to securely store a 50 * not encrypted by AndroidKeymaster, but some may be opaque blobs provided by the backing 74 * (Keystore, generally). The blob is integrity-checked and may be encrypted, depending on the
|
/system/keymaster/ |
soft_keymaster_context.cpp | 281 // 1. New keymaster1 software key blobs. These are integrity-assured but not encrypted. The 285 // 2. Old keymaster1 software key blobs. These are OCB-encrypted with an all-zero master key. 292 // 4. New keymaster0 hardware key blobs. These are integrity-assured but not encrypted (though 300 // integrity-assured and OCB-encrypted blobs are self-consistent and effectively impossible to 303 // integrity-assured nor OCB-encrypted and lacks the old software key header is assumed to be 317 // Wasn't an integrity-assured blob. Maybe it's an OCB-encrypted blob. 324 // Wasn't an OCB-encrypted blob. Maybe it's an old softkeymaster blob.
|
/external/wpa_supplicant_8/src/wps/ |
wps_validate.c | 841 wpa_printf(MSG_INFO, "WPS-STRICT: Encrypted Settings " 848 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encrypted Settings " [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CFBBlockCipher.java | 202 * @param in the array containing the data to be encrypted. 204 * @param out the array the encrypted data will be copied into. 228 * @param out the array the encrypted data will be copied into.
|
CBCBlockCipher.java | 166 * @param in the array containing the data to be encrypted. 168 * @param out the array the encrypted data will be copied into.
|
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/tcpdump/ |
rpc_auth.h | 79 #define SUNRPC_AUTH_DES 3 /* des style (encrypted timestamps) */
|
/external/wpa_supplicant_8/src/common/ |
eapol_common.h | 81 * key field (of key_length bytes) contains the key in encrypted form;
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
CryptoPlugin.cpp | 52 "Encrypted subsamples found in allegedly unencrypted "
|
/frameworks/av/media/libstagefright/include/ |
WVMExtractor.h | 73 // In this mode, the extractor returns encrypted data for use
|
/frameworks/av/media/libstagefright/wifi-display/ |
MediaSender.h | 40 // Optionally the (video) data is encrypted using the provided hdcp object.
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
CipherTest.java | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 101 * @plain: Plaintext data to be encrypted (16 bytes) 102 * @crypt: Buffer for the encrypted data (16 bytes) 123 * @crypt: Encrypted data (16 bytes) 282 * @passwd: Key encryption password or %NULL if key is not encrypted 315 * @out: Output buffer for encrypted data 330 * @in: Encrypted buffer 331 * @inlen: Length of encrypted buffer in bytes 332 * @out: Output buffer for encrypted data 349 * @out: Output buffer for encrypted (signed) data 384 * @crypt: Encrypted signature data (using the private key [all...] |
/external/openssh/ |
ssh_api.h | 99 * ssh_packet_put() creates an encrypted packet with the given type 101 * the encrypted packet is appended to the output byte-stream.
|
sshkey.c | 3056 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local 3419 struct sshbuf *buffer = NULL, *encrypted = NULL; local [all...] |
/external/srtp/include/ |
srtp_priv.h | 125 unsigned int e:1; /* encrypted? 1=yes */ 151 unsigned int e:1; /* encrypted? 1=yes */
|