Home
last modified time | relevance | path

Searched refs:crypt (Results 1 – 12 of 12) sorted by relevance

/packages/modules/Connectivity/tests/cts/net/src/android/net/cts/
DIpSecManagerTest.java595 IpSecAlgorithm crypt,
611 if (crypt != null) {
612 transformBuilder.setEncryption(crypt);
651 getIvLen(crypt != null ? crypt : aead),
652 getBlkSize(crypt != null ? crypt : aead),
765 IpSecAlgorithm crypt = new IpSecAlgorithm(IpSecAlgorithm.CRYPT_AES_CBC, CRYPT_KEY);
772 .setEncryption(crypt)
850 IpSecAlgorithm crypt = new IpSecAlgorithm(IpSecAlgorithm.CRYPT_AES_CBC, CRYPT_KEY);
852 checkTransform(IPPROTO_UDP, IPV4_LOOPBACK, crypt, auth, null, false, 1000, false);
857 IpSecAlgorithm crypt = new IpSecAlgorithm(IpSecAlgorithm.CRYPT_AES_CBC, CRYPT_KEY);
[all …]
/packages/modules/Virtualization/libs/devicemapper/src/
Dlib.rs44 pub mod crypt; module
53 use crypt::DmCryptTarget;
237 use crypt::{CipherType, DmCryptTargetBuilder};
355 let crypt = read(crypt_device).unwrap(); in mapping_again_keeps_data() localVariable
356 assert_eq!(inputimg.len(), crypt.len()); // fail early if the size doesn't match in mapping_again_keeps_data()
357 assert_eq!(inputimg, crypt.as_slice()); in mapping_again_keeps_data()
404 let crypt = read(crypt_device).unwrap(); in data_inaccessible_with_diff_key() localVariable
405 assert_ne!(inputimg, crypt.as_slice()); in data_inaccessible_with_diff_key()
/packages/modules/Connectivity/service-t/src/com/android/server/
DIpSecService.java1580 IpSecAlgorithm crypt = config.getEncryption(); in validateAlgorithms() local
1585 aead != null || crypt != null || auth != null, in validateAlgorithms()
1591 crypt == null || crypt.isEncryption(), "Unsupported algorithm for Encryption"); in validateAlgorithms()
1596 aead == null || (auth == null && crypt == null), in validateAlgorithms()
1739 IpSecAlgorithm crypt = c.getEncryption(); in createOrUpdateTransform() local
1743 if (crypt == null) { in createOrUpdateTransform()
1746 cryptName = crypt.getName(); in createOrUpdateTransform()
1762 (crypt != null) ? crypt.getKey() : new byte[] {}, in createOrUpdateTransform()
1763 (crypt != null) ? crypt.getTruncationLengthBits() : 0, in createOrUpdateTransform()
/packages/inputmethods/LatinIME/tools/dicttool/tests/com/android/inputmethod/latin/dicttool/
DBinaryDictOffdeviceUtilsTests.java154 public void runTestHeaderReaderProcessorWithOneSpec(final boolean compress, final boolean crypt) in runTestHeaderReaderProcessorWithOneSpec() argument
189 if (crypt) { in runTestHeaderReaderProcessorWithOneSpec()
202 assertEquals("raw" + (crypt ? " > encryption" : "") + (compress ? " > compression" : ""), in runTestHeaderReaderProcessorWithOneSpec()
/packages/modules/Virtualization/encryptedstore/src/
Dmain.rs23 use dm::{crypt::CipherType, util};
117 let target = dm::crypt::DmCryptTargetBuilder::default() in enable_crypt()
/packages/modules/Connectivity/tests/unit/java/com/android/server/
DIpSecServiceParameterizedTest.java382 IpSecAlgorithm crypt = config.getEncryption(); in verifyTransformNetdCalledForCreatingSA() local
398 eq((crypt != null) ? crypt.getName() : ""), in verifyTransformNetdCalledForCreatingSA()
399 eq((crypt != null) ? crypt.getKey() : new byte[] {}), in verifyTransformNetdCalledForCreatingSA()
400 eq((crypt != null) ? crypt.getTruncationLengthBits() : 0), in verifyTransformNetdCalledForCreatingSA()
/packages/modules/Virtualization/encryptedstore/
DREADME.md12 Encrypted Storage uses block level encryption layer (Device-Mapper's "crypt" target) using a key
/packages/inputmethods/LatinIME/dictionaries/
Dfr_wordlist.combined.gz
Den_GB_wordlist.combined.gz
Den_US_wordlist.combined.gz
Den_wordlist.combined.gz
Dnl_wordlist.combined.gz