/external/toybox/toys/lsb/ |
passwd.c | 109 char *name = NULL, *pass = NULL, *encrypted = NULL, *newp = NULL, local 164 encrypted = crypt(newp, salt); 170 encrypted = xmprintf("!%s",pass); 175 encrypted = xstrdup(&pass[1]); 178 encrypted = xstrdup(""); //1 = "", 2 = '\0' 183 ret = update_password("/etc/shadow", name, encrypted); 184 else ret = update_password("/etc/passwd", name, encrypted); 186 if ((toys.optflags & (FLAG_l | FLAG_u | FLAG_d))) free(encrypted);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
AesCtrDecryptorUnittest.cpp | 46 const uint8_t* encrypted, 52 ASSERT_EQ(android::OK, attemptDecrypt(key, iv, encrypted, outputBuffer, 136 uint8_t encrypted[kTotalSize] = { local 162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 181 uint8_t encrypted[kTotalSize] = { local 208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 227 uint8_t encrypted[kTotalSize] = { local 254 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 273 uint8_t encrypted[kTotalSize] = { local 276 // 64 encrypted byte 322 uint8_t encrypted[kTotalSize] = { local 376 uint8_t encrypted[kTotalSize] = { local 431 uint8_t encrypted[kTotalSize] = { local [all...] |
/frameworks/av/media/libstagefright/mpeg2ts/ |
HlsSampleDecryptor.cpp | 70 // NONE method while still sample-encrypted stream is parsed). 91 // Encrypted NALUs have extra start code emulation prevention that must be 119 uint8_t *encrypted = nalData + offset; local 120 status_t ret = decryptBlock(encrypted, AES_BLOCK_SIZE, AESInitVec); 181 uint8_t *encrypted = data + offset; local 182 status_t ret = decryptBlock(encrypted, encryptedBytes, AESInitVec); 190 } // encrypted 237 uint8_t *encrypted = data + offset; local 238 status_t ret = decryptBlock(encrypted, encryptedBytes, AESInitVec); 246 } // encrypted [all...] |
/system/security/keystore/ |
blob.h | 59 uint8_t encrypted[0]; // Marks offset to encrypted data. member in struct:blobv2 69 offsetof(blobv3, aead_tag) == offsetof(blobv2, encrypted) && 106 void setEncrypted(bool encrypted);
|
/system/tpm/attestation/client/ |
main.cc | 67 Activates an attestation key using the encrypted credential in 355 EncryptedIdentityCredential encrypted; local 358 attestation_key_info.public_key_tpm_format(), &encrypted)) { 362 encrypted.SerializeToString(&output);
|
/system/tpm/attestation/common/ |
crypto_utility_impl.cc | 148 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; 153 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; 214 EncryptedIdentityCredential* encrypted) { 264 encrypted->set_asym_ca_contents(encrypted_asym_content); 265 encrypted->set_sym_ca_attestation(sym_content); 430 std::string encrypted; local 431 if (!AesEncrypt(input, key, iv, &encrypted)) { 435 *output = iv + encrypted;
|
/bootable/recovery/uncrypt/ |
uncrypt.cpp | 22 // If the filesystem is using an encrypted block device, it will also 175 static const char* find_block_device(const char* path, bool* encryptable, bool* encrypted, bool *f2fs_fs) { 177 // return its block device. Set encrypted if it's currently 178 // encrypted. 191 *encrypted = false; 195 if (android::base::GetProperty("ro.crypto.state", "") == "encrypted") { 196 *encrypted = true; 253 bool encrypted, bool f2fs_fs, int socket) { 295 if (encrypted) { 308 if (encrypted) { 477 bool encrypted; local [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); 216 public Pair createPair(int clear, long encrypted) { 217 return new Pair(clear, encrypted); 223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { 227 this.encrypted = encrypted; 244 if (encrypted != pair.encrypted) { 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)) [all...] |
/system/iot/attestation/atap/libatap/ |
atap_types.h | 134 AtapBlob encrypted; member in struct:__anon3049
|
/system/bt/stack/smp/ |
smp_keys.cc | 107 * Plain_text is encrypted using key, the result is at p_out. 119 uint8_t* p_rev_output = NULL; /* encrypted output in big endilan format */ 151 smp_debug_print_nbyte_little_endian(p_out->param_buf, "Encrypted text", 737 bool encrypted = local 739 if (!encrypted) { 742 return encrypted; [all...] |
/external/e2fsprogs/e2fsck/ |
pass2.c | 907 int encrypted = 0; local 1115 encrypted = ext2fs_u32_list_test(ctx->encrypted_dirs, ino); [all...] |
/external/zlib/src/contrib/minizip/ |
unzip.c | 185 int encrypted; member in struct:__anon44868 752 us.encrypted = 0; [all...] |
/toolchain/binutils/binutils-2.27/zlib/contrib/minizip/ |
unzip.c | 185 int encrypted; member in struct:__anon5131 752 us.encrypted = 0; [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 310 const u8 *encrypted; member in struct:ikev2_payloads 322 const u8 *encrypted, size_t encrypted_len,
|
/frameworks/av/media/extractors/mkv/ |
MatroskaExtractor.cpp | 597 bool encrypted = data[0] & 0x1; local 599 if (encrypted && mbuf->range_length() < 9) { 605 if (encrypted) { 631 * | Clear/encrypted sample data | 681 * : Bytes 1..N of encrypted frame : [all...] |
/hardware/qcom/wlan/qcwcn/wifi_hal/ |
pkt_stats.h | 117 u32 encrypted : 1; //[13] member in struct:rx_mpdu_start
|
/system/vold/ |
cryptfs.cpp | 18 * 1. Perhaps keep several copies of the encrypted key, in case something 465 /* If it's an encrypted Android partition, the last 16 Kbytes contain the 782 /* If not encrypted, just allocate an empty table and initialize it */ 784 if (strcmp(encrypted_state, "encrypted") ) { 2783 int encrypted = 0; local [all...] |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.equinox.security_1.2.0.v20130424-1801.jar | |
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/ |
Tpm20.h | 1757 TPM2B_CONTEXT_SENSITIVE encrypted; member in struct:__anon10091 [all...] |
/external/tpm2/ |
tpm_types.h | 1617 TPM2B_CONTEXT_SENSITIVE encrypted; member in struct:__anon40660 [all...] |
/system/tpm/trunks/ |
tpm_generated.h | 1625 TPM2B_CONTEXT_SENSITIVE encrypted; member in struct:trunks::TPMS_CONTEXT_DATA [all...] |
/prebuilts/jdk/jdk8/darwin-x86/jre/lib/ |
jsse.jar | |
/prebuilts/jdk/jdk8/linux-x86/jre/lib/ |
jsse.jar | |
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-redshift/1.11.18/ |
aws-java-sdk-redshift-1.11.18.jar | |