/packages/apps/UnifiedEmail/src/org/apache/commons/io/ |
IOCase.java | 25 * Windows is case-insensitive, Unix is case-sensitive. 41 * The constant for case sensitive regardless of operating system. 43 public static final IOCase SENSITIVE = new IOCase("Sensitive", true); 52 * Windows is case-insensitive when comparing filenames, Unix is case-sensitive. 66 private final transient boolean sensitive; field in class:IOCase 77 if (IOCase.SENSITIVE.name.equals(name)){ 78 return IOCase.SENSITIVE; 94 * @param sensitive the sensitivity 96 private IOCase(String name, boolean sensitive) { [all...] |
/external/tpm2/ |
ObjectChangeAuth.c | 26 TPMT_SENSITIVE sensitive; local 60 // Copy internal sensitive area 61 sensitive = object->sensitive; 63 sensitive.authValue = in->newAuth; 65 // Prepare output private data from sensitive 66 SensitiveToPrivate(&sensitive, &object->name, in->parentHandle,
|
CreatePrimary.c | 16 // TPM_RC_ATTRIBUTES sensitiveDataOrigin is CLEAR when 'sensitive.data' is an Empty 17 // Buffer, or is SET when 'sensitive.data' is not empty; fixedTPM, 20 // restricted, decrypt and sign attributes; attempt to inject sensitive data 28 // TPM_RC_SIZE size of public auth policy or sensitive auth value does not match 29 // digest size of the name algorithm sensitive data size for the keyed 43 TPMT_SENSITIVE sensitive; local 49 != (in->inSensitive.t.sensitive.data.t.size == 0 )) 61 // Validate the sensitive area values 62 if( MemoryRemoveTrailingZeros(&in->inSensitive.t.sensitive.userAuth) 75 &in->inSensitive.t.sensitive,&sensitive) [all...] |
Create.c | 17 // TPM_RC_ATTRIBUTES sensitiveDataOrigin is CLEAR when 'sensitive.data' is an Empty 18 // Buffer, or is SET when 'sensitive.data' is not empty; fixedTPM, 21 // restricted, decrypt and sign attributes; attempt to inject sensitive data 29 // sensitive creation area; may also be returned if the TPM does not 35 // TPM_RC_SIZE size of public auth policy or sensitive auth value does not match 36 // digest size of the name algorithm sensitive data size for the keyed 42 // decryption key in the storage hierarchy with both public and sensitive 57 TPMT_SENSITIVE sensitive; local 73 != (in->inSensitive.t.sensitive.data.t.size == 0)) 85 // Validate the sensitive area value [all...] |
Unseal.c | 41 MemoryCopy2B(&out->outData.b, &object->sensitive.sensitive.bits.b,
|
LoadExternal.c | 16 // both public and sensitive portions are loaded 38 TPMT_SENSITIVE *sensitive; local 53 // For loading an object with both public and sensitive 59 // An external object with a sensitive area must have fixedTPM == CLEAR 79 // If a sensitive area was provided, load it 81 sensitive = &in->inPrivate.t.sensitiveArea; 83 sensitive = NULL; 88 sensitive, &out->name, TPM_RH_NULL, skipChecks,
|
Duplicate.c | 33 TPMT_SENSITIVE sensitive; local 106 // Copy sensitive area 107 sensitive = object->sensitive; 109 // Prepare output private data from sensitive 110 SensitiveToDuplicate(&sensitive, &object->name, in->newParentHandle,
|
Object_spt_fp.h | 32 TPMT_SENSITIVE *sensitive // OUT: sensitive structure 56 TPMT_SENSITIVE *sensitive // OUT: sensitive structure 68 UINT16 dataSize, // IN: the size of sensitive data, excluding the leading 70 BYTE *outerBuffer // IN/OUT: outer buffer with sensitive data in it 90 TPMT_SENSITIVE *sensitive, // IN: sensitive structure 108 TPMT_SENSITIVE *sensitive, // IN: sensitive structur [all...] |
ECDH_KeyGen.c | 25 TPM2B_ECC_PARAMETER sensitive; local 46 &out->pubPoint.t.point, &sensitive); 54 &sensitive, &eccKey->publicArea.unique.ecc);
|
Load.c | 39 TPMT_SENSITIVE sensitive; local 79 // Retrieve sensitive data. PrivateToSensitive() may return TPM_RC_INTEGRITY or 84 &sensitive); 96 result = ObjectLoad(hierarchy, &in->inPublic.t.publicArea, &sensitive,
|
Import.c | 35 // secret; or unmarshaling sensitive value from duplicate failed the 52 // type of parentHandle; or unmarshaling sensitive value from duplicate 77 TPMT_SENSITIVE sensitive; local 141 // Retrieve sensitive from private. 146 &in->encryptionKey, &sensitive); 168 &sensitive, NULL, in->parentHandle, FALSE, 180 // Prepare output private data from sensitive 181 SensitiveToPrivate(&sensitive, &name, in->parentHandle,
|
CryptUtil.c | 638 &signKey->sensitive.sensitive.bits.b, 669 &signKey->sensitive.sensitive.bits.b, &hmacState); 690 // TPM_RC_SIZE sensitive data size is larger than allowed for the scheme 697 TPMS_SENSITIVE_CREATE *sensitiveCreate, // IN: sensitive creation data 698 TPMT_SENSITIVE *sensitive, // OUT: sensitive area 737 sensitive->sensitive.sym.t.size = CryptGetHashDigestSize(hashAlg) 907 TPMT_SENSITIVE *sensitive = &rsaKey->sensitive; local 3066 TPMT_SENSITIVE *sensitive; local [all...] |
ECDH_ZGen.c | 53 &eccKey->sensitive.sensitive.ecc,
|
HMAC.c | 69 &hmacObject->sensitive.sensitive.bits.b,
|
ZGen_2Phase.c | 81 &eccKey->sensitive.sensitive.ecc,
|
Commit.c | 127 &eccKey->sensitive.sensitive.ecc,
|
EncryptDecrypt.c | 81 key = symKey->sensitive.sensitive.sym.t.buffer;
|
Object.c | 287 // TPM_RC_BINDING if the public and sensitive parts of the object are not matched 296 TPMT_SENSITIVE *sensitive, // IN: sensitive area (may be null) 313 if(sensitive != NULL) 314 object->sensitive = *sensitive; 324 if(sensitive != NULL) 326 // Check if public type matches sensitive type 332 object->attributes.publicOnly = (sensitive == NULL); 470 CryptStartHMACSequence2B(hashAlg, &keyObject->sensitive.sensitive.bits.b [all...] |
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/arm/ |
reg-alias.s | 1 @ Test case-sensitive register aliases
|
/external/libchrome/crypto/third_party/nss/ |
chromium-nss.h | 68 PRBool sensitive,
|
/external/drrickorang/LoopbackApp/ |
PrivacyPolicy.md | 3 This file is required in order to comply with Google Play requirements for apps using sensitive permissions:
|
/packages/apps/Email/provider_src/com/android/email/mail/store/ |
ImapConnection.java | 271 * @param sensitive If true, the command will not be logged 274 String sendCommand(String command, boolean sensitive) 276 LogUtils.d(Logging.LOG_TAG, "sendCommand %s", (sensitive ? IMAP_REDACTED_LOG : command)); 278 return sendCommandInternal(command, sensitive); 281 String sendCommandInternal(String command, boolean sensitive) 288 mTransport.writeLine(commandToSend, sensitive ? IMAP_REDACTED_LOG : null); 289 mDiscourse.addSentCommand(sensitive ? IMAP_REDACTED_LOG : commandToSend); 301 String sendComplexCommand(List<String> commands, boolean sensitive) throws MessagingException, 321 mDiscourse.addSentCommand(sensitive ? IMAP_REDACTED_LOG : commandToSend); 367 * @param sensitive whether the command should be redacted in logs (used for login [all...] |
/external/webrtc/webrtc/base/ |
httpcommon.cc | 772 // TODO: convert sensitive to a secure buffer that gets securely deleted 775 char * sensitive = new char[len]; local 776 size_t pos = strcpyn(sensitive, len, username.data(), username.size()); 777 pos += strcpyn(sensitive + pos, len - pos, ":"); 778 password.CopyTo(sensitive + pos, true); 782 // TODO: create a sensitive-source version of Base64::encode 783 response.append(Base64::Encode(sensitive)); 784 memset(sensitive, 0, len); 785 delete [] sensitive; 816 // TODO: convert sensitive to be secure buffe 819 char * sensitive = new char[len]; \/\/ A1 local 960 char * sensitive = new char[len]; local [all...] |
/packages/apps/Dialer/java/com/android/voicemail/impl/mail/store/ |
ImapConnection.java | 342 * @param sensitive whether the command should be redacted in logs (used for login) 347 public List<ImapResponse> executeSimpleCommand(String command, boolean sensitive) 351 sendCommand(command, sensitive); 355 public String sendCommand(String command, boolean sensitive) 364 mTransport.writeLine(commandToSend, (sensitive ? IMAP_REDACTED_LOG : command)); 368 List<ImapResponse> executeContinuationResponse(String response, boolean sensitive) 370 mTransport.writeLine(response, (sensitive ? IMAP_REDACTED_LOG : response));
|
/external/libchrome/crypto/ |
ec_private_key.h | 76 bool sensitive,
|