/external/toybox/toys/lsb/ |
passwd.c | 109 char *name = NULL, *pass = NULL, *encrypted = NULL, *newp = NULL, local 164 encrypted = crypt(newp, salt); 170 encrypted = xmprintf("!%s",pass); 175 encrypted = xstrdup(&pass[1]); 178 encrypted = xstrdup(""); //1 = "", 2 = '\0' 183 ret = update_password("/etc/shadow", name, encrypted); 184 else ret = update_password("/etc/passwd", name, encrypted); 186 if ((toys.optflags & (FLAG_l | FLAG_u | FLAG_d))) free(encrypted);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/tests/ |
AesCtrDecryptorUnittest.cpp | 46 const uint8_t* encrypted, 52 ASSERT_EQ(android::OK, attemptDecrypt(key, iv, encrypted, outputBuffer, 75 uint8_t encrypted[kTotalSize] = { local 101 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 120 uint8_t encrypted[kTotalSize] = { local 147 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 166 uint8_t encrypted[kTotalSize] = { local 193 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 212 uint8_t encrypted[kTotalSize] = { local 215 // 64 encrypted byte 261 uint8_t encrypted[kTotalSize] = { local 315 uint8_t encrypted[kTotalSize] = { local 370 uint8_t encrypted[kTotalSize] = { local [all...] |
/system/security/keystore/ |
blob.h | 58 uint8_t encrypted[0]; // Marks offset to encrypted data. member in struct:blob 61 int32_t length; // in network byte order when encrypted 95 void setEncrypted(bool encrypted);
|
/external/boringssl/src/crypto/rsa/ |
rsa_test.cc | 643 uint8_t encrypted[kBits \/ 8], decrypted[kBits \/ 8]; local [all...] |
/system/tpm/attestation/client/ |
main.cc | 67 Activates an attestation key using the encrypted credential in 373 EncryptedIdentityCredential encrypted; local 378 &encrypted)) { 382 encrypted.SerializeToString(&output);
|
/system/tpm/attestation/common/ |
crypto_utility_impl.cc | 149 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; 154 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; 215 EncryptedIdentityCredential* encrypted) { 265 encrypted->set_asym_ca_contents(encrypted_asym_content); 266 encrypted->set_sym_ca_attestation(sym_content); 431 std::string encrypted; local 432 if (!AesEncrypt(input, key, iv, &encrypted)) { 436 *output = iv + encrypted;
|
/bootable/recovery/uncrypt/ |
uncrypt.cpp | 22 // If the filesystem is using an encrypted block device, it will also 186 static const char* find_block_device(const char* path, bool* encryptable, bool* encrypted) { 188 // return its block device. Set encrypted if it's currently 189 // encrypted. 198 *encrypted = false; 204 strcmp(buffer, "encrypted") == 0) { 205 *encrypted = true; 235 bool encrypted, int socket) { 275 if (encrypted) { 288 if (encrypted) { 431 bool encrypted; local [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); 216 public Pair createPair(int clear, long encrypted) { 217 return new Pair(clear, encrypted); 223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { 227 this.encrypted = encrypted; 244 if (encrypted != pair.encrypted) { 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)) [all...] |
/external/e2fsprogs/e2fsck/ |
pass2.c | 751 int encrypted = 0; local 861 encrypted = ext2fs_u32_list_test(ctx->encrypted_dirs, ino); 1054 if (!encrypted && check_name(ctx, dirent, &cd->pctx)) 1057 if (encrypted && (dot_state) > 1 && [all...] |
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 692 * the ASN.1 data gets wrapped in OCTETSTRINGs and/or encrypted and the 724 * copy of the same encrypted private key (with the same IV and 752 * PKCS#7 encrypted data inside a PKCS#12 structure is generally an 753 * encrypted certificate bag and it's generally encrypted with 40-bit 819 X509_SIG *encrypted = NULL; local 831 /* encrypted isn't actually an X.509 signature, but it has the same 833 encrypted = d2i_X509_SIG(NULL, &inp, (long)CBS_len(&wrapped_contents)); 834 if (encrypted == NULL) { 840 X509_SIG_free(encrypted); [all...] |
/external/zlib/src/contrib/minizip/ |
unzip.c | 185 int encrypted; member in struct:__anon27230 752 us.encrypted = 0; [all...] |
/system/bt/stack/smp/ |
smp_keys.c | 118 ** Plain_text is encrypted using key, the result is at p_out. 132 UINT8 *p_rev_output = NULL; /* encrypted output in big endilan format */ 164 smp_debug_print_nbyte_little_endian(p_out->param_buf, (const UINT8 *)"Encrypted text", SMP_ENCRYT_KEY_SIZE); 943 BOOLEAN encrypted; local 945 encrypted = SMP_Encrypt( p_cb->tk, BT_OCTET16_LEN, ptext, BT_OCTET16_LEN, output); 946 if (!encrypted) 950 return encrypted; [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 310 const u8 *encrypted; member in struct:ikev2_payloads 322 const u8 *encrypted, size_t encrypted_len,
|
/hardware/qcom/wlan/qcwcn/wifi_hal/ |
pkt_stats.h | 105 u32 encrypted : 1; //[13] member in struct:rx_mpdu_start
|
/system/vold/ |
cryptfs.c | 18 * 1. Perhaps keep several copies of the encrypted key, in case something 555 /* If it's an encrypted Android partition, the last 16 Kbytes contain the 861 /* If not encrypted, just allocate an empty table and initialize it */ 863 if (strcmp(encrypted_state, "encrypted") ) { 3622 int encrypted = 0; local [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.security_1.0.200.v20100503.jar | |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.equinox.security_1.2.0.v20130424-1801.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.equinox.security_1.2.0.v20130424-1801.jar | |
/external/tpm2/ |
tpm_types.h | 1614 TPM2B_CONTEXT_SENSITIVE encrypted; member in struct:__anon23492 [all...] |
/system/tpm/trunks/ |
tpm_generated.h | 1593 TPM2B_CONTEXT_SENSITIVE encrypted; member in struct:trunks::TPMS_CONTEXT_DATA [all...] |
/prebuilts/tools/common/m2/repository/itext/itext/2.0.8/ |
itext-2.0.8.jar | |