HomeSort by relevance Sort by last modified time
    Searched full:encrypted (Results 1 - 25 of 637) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/toybox/lib/
pending.h 6 int update_password(char *filename, char* username, char* encrypted);
  /external/vboot_reference/tests/
external_rsa_signer.sh 5 echo "Reads data to sign from stdin, encrypted data is output to stdout"
  /frameworks/base/tests/LegacyRestoreTest/
README 1 The file "jbmr2-encrypted-settings-abcd.ab" in this directory is an encrypted
12 The file "kk-fixed-encrypted-settings-abcd.ab" is a similar encrypted "adb backup"
17 These archives can be used as an ongoing test to verify that historical encrypted
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
InputDecryptor.java 9 * an InputStream that will decrypt a stream of encrypted data.
25 * @param encIn InputStream containing encrypted input.
  /external/boringssl/src/ssl/test/runner/
ticket.go 174 encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size)
175 iv := encrypted[:aes.BlockSize]
176 macBytes := encrypted[len(encrypted)-sha256.Size:]
185 cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized)
188 mac.Write(encrypted[:len(encrypted)-sha256.Size])
191 return encrypted, nil
194 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) {
195 if len(encrypted) < aes.BlockSize+sha256.Size
    [all...]
  /hardware/intel/common/libmix/videodecoder/securevideo/merrifield/
VideoFrameInfo.h 24 uint32_t offset; // offset to the pointer of the encrypted data
25 uint8_t* data; // if the nalu is encrypted, this field is useless; if current NALU is SPS/PPS, data is the pointer to clear SPS/PPS data
30 uint8_t* data; // pointer to the encrypted data
31 uint32_t size; // encrypted data size
  /hardware/intel/common/libmix/videodecoder/securevideo/moorefield/
VideoFrameInfo.h 24 uint32_t offset; // offset to the pointer of the encrypted data
25 uint8_t* data; // if the nalu is encrypted, this field is useless; if current NALU is SPS/PPS, data is the pointer to clear SPS/PPS data
30 uint8_t* data; // pointer to the encrypted data
31 uint32_t size; // encrypted data size
  /frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/
FwdLockGlue.h 43 * Returns the length of the encrypted key, given the length of the plaintext key.
47 * @return The length in bytes of the encrypted key.
56 * @param[out] pEncryptedKey A reference to the buffer containing the encrypted key.
57 * @param[in] encryptedKeyLength The length in bytes of the encrypted key.
69 * @param[in] pEncryptedKey A reference to the buffer containing the encrypted key.
70 * @param[in] encryptedKeyLength The length in bytes of the encrypted key.
  /external/lzma/CPP/7zip/UI/Common/
IFileExtractCallback.h 31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
  /external/libvpx/libvpx/test/
vp8_decrypt_test.cc 62 std::vector<uint8_t> encrypted(video.frame_size());
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0);
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
vp9_decrypt_test.cc 62 std::vector<uint8_t> encrypted(video.frame_size());
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0);
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
  /external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
AbstractSampleEncryptionBox.java 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted);
216 public Pair createPair(int clear, long encrypted) {
217 return new Pair(clear, encrypted);
223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair
225 public Pair(int clear, long encrypted) {
227 this.encrypted = encrypted;
244 if (encrypted != pair.encrypted) {
254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32))
    [all...]
  /external/openssh/
PROTOCOL.key 6 an encrypted list of matching private keys.
19 string encrypted, padded list of private keys
51 Before the key is encrypted, a random integer is assigned
  /system/vold/
PrivateVolume.h 28 * Private storage provided by an encrypted partition.
53 /* Kernel device of raw, encrypted partition */
55 /* Path to raw, encrypted block device */
cryptfs.h 18 * partition that is encrypted, or in a separate partition. It's location
47 #define CRYPT_MNT_KEY_UNENCRYPTED 0x1 /* The key for the partition is not encrypted. */
57 #define CRYPT_TYPE_PASSWORD 0 /* master_key is encrypted with a password
60 #define CRYPT_TYPE_DEFAULT 1 /* master_key is encrypted with default
62 #define CRYPT_TYPE_PATTERN 2 /* master_key is encrypted with a pattern */
63 #define CRYPT_TYPE_PIN 3 /* master_key is encrypted with a pin */
95 __le32 crypt_type; /* how master_key is encrypted. Must be a
97 __le64 fs_size; /* Size of the encrypted fs, in 512 byte sectors */
104 unsigned char master_key[MAX_KEY_LEN]; /* The encrypted key for decrypting the filesystem */
121 encrypted 512 byte sector.*
    [all...]
  /external/sepolicy/
blkid.te 5 # Allowed read-only access to encrypted devices to extract UUID/label
  /docs/source.android.com/src/devices/tech/security/encryption/
index.jd 31 encrypted key. Once a device is encrypted, all user-created data is
32 automatically encrypted before committing it to disk and all reads
45 See <a href="#storing_the_encrypted_key">Storing the encrypted key</a> for more
50 encrypted may be returned to an unencrypted state by factory data reset. New Android 5.0
51 devices encrypted at first boot cannot be returned to an unencrypted state.</p>
63 cipher-block chaining (CBC) and ESSIV:SHA256. The master key is encrypted with
88 is re-encrypted and stored. (ie. user PIN/pass/pattern changes do NOT cause
118 <p>There are four flows for an encrypted device. A device is encrypted just onc
    [all...]
  /libcore/luni/src/main/java/javax/crypto/
EncryptedPrivateKeyInfo.java 63 // Encrypted private key data
122 * name and its encrypted data.
127 * the encrypted data.
159 * encryption algorithm parameters an its encrypted data.
164 * the encrypted data.
212 * Returns the encrypted data of this key.
214 * @return the encrypted data of this key, each time this method is called a
225 * encrypted data.
232 * the cipher initialized for decrypting the encrypted data.
236 * encrypted data
    [all...]
  /external/lzma/CPP/7zip/UI/Console/
ExtractCallbackConsole.cpp 43 static const char *kCrcFailedEncrypted = "CRC Failed in encrypted file. Wrong password?";
45 static const char *kDataErrorEncrypted = "Data Error in encrypted file. Wrong password?";
108 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted)
125 (*OutStream) << (encrypted ? kCrcFailedEncrypted: kCrcFailed);
128 (*OutStream) << (encrypted ? kDataErrorEncrypted : kDataError);
168 HRESULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted)
176 (*OutStream) << (encrypted ?
177 "Can not open encrypted archive. Wrong password?" :
ExtractCallbackConsole.h 39 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted);
42 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
  /external/toybox/toys/lsb/
passwd.c 102 char *name = NULL, *pass = NULL, *encrypted = NULL, *newp = NULL, local
158 encrypted = crypt(newp, salt);
164 encrypted = xmprintf("!%s",pass);
169 encrypted = xstrdup(&pass[1]);
172 encrypted = xstrdup(""); //1 = "", 2 = '\0'
177 ret = update_password("/etc/shadow", name, encrypted);
178 else ret = update_password("/etc/passwd", name, encrypted);
180 if ((toys.optflags & (FLAG_l | FLAG_u | FLAG_d))) free(encrypted);
  /bootable/recovery/uncrypt/
uncrypt.cpp 22 // If the filesystem is using an encrypted block device, it will also
133 static const char* find_block_device(const char* path, bool* encryptable, bool* encrypted) {
135 // return its block device. Set encrypted if it's currently
136 // encrypted.
145 *encrypted = false;
151 strcmp(buffer, "encrypted") == 0) {
152 *encrypted = true;
177 bool encrypted, int status_fd) {
212 if (encrypted) {
228 if (encrypted) {
382 bool encrypted; local
    [all...]
  /hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/test/
vp8_decrypt_test.cc 63 std::vector<uint8_t> encrypted(video.frame_size());
64 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0);
65 vp8_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
  /developers/build/prebuilts/gradle/AppRestrictionEnforcer/Application/src/main/res/xml/
enforcer_device_admin_receiver.xml 25 <encrypted-storage />
  /developers/build/prebuilts/gradle/BasicManagedProfile/Application/src/main/res/xml/
basic_device_admin_receiver.xml 25 <encrypted-storage/>

Completed in 3458 milliseconds

1 2 3 4 5 6 7 8 91011>>