OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:encrypt
(Results
151 - 175
of
416
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/chromium/chrome/browser/sync/engine/
syncer_util.cc
291
//
encrypt
any unsynced changes here because there is no Nigori
312
// We were unable to
encrypt
the changes, possibly due to a missing
316
// the new passphrase is entered we should be able to
encrypt
properly.
318
// we will properly
encrypt
all appropriate unsynced data.
320
<< " to
encrypt
all necessary unsynced changes.";
324
// Note that we don't bother to
encrypt
any synced data that now requires
325
// encryption. The machine that turned on encryption should
encrypt
[
all
...]
/external/dropbear/libtomcrypt/
makefile.shared
64
CRYPT=
encrypt
220
CRYPTOBJECTS=demos/
encrypt
.o
265
gcc $(CFLAGS) demos/
encrypt
.c -o
encrypt
.o
266
gcc -o crypt
encrypt
.o -ltomcrypt $(EXTRALIBS)
crypt.tex
147
and store data in a format independent of the platform. This means if you
encrypt
with Blowfish on a PPC it should decrypt
183
the key setup, ECB decrypt and
encrypt
and test vector routines. After that all five chaining mode routines
404
should never use the ECB modes directly to
encrypt
data. Instead you should use the ECB functions to make a chaining mode,
432
To
encrypt
or decrypt a block in ECB mode there are these two functions per cipher:
433
\index{Cipher
Encrypt
} \index{Cipher Decrypt}
443
These two functions will
encrypt
or decrypt (respectively) a single block of text\footnote{The size of which depends on
445
the same buffer. For the
encrypt
function \textit{pt}\footnote{pt stands for plaintext.} is the input and
521
/*
encrypt
the block */
522
blowfish_ecb_encrypt(pt, /*
encrypt
this 8-byte array */
644
and tables. The decryption and self--test function pointers of both \textit{
encrypt
only} descriptors are set to \textbf{NULL} and
[
all
...]
changes
53
parameter you pass to ctr_start(), otherwise it will be LTC compliant (e.g.
encrypt
then increment)
63
-- Added RSA PKCS #1 v1.5 signature/
encrypt
tests to rsa_test.c
81
-- two fixes to CCM for corner cases [L+noncelen > 15] and fixing the CTR pad to
encrypt
the CBC-MAC tag
118
-- lrw_process now checks the return of the cipher ecb
encrypt
/decrypt calls
170
v1.07 -- Craig Schlenter pointed out the "
encrypt
" demo doesn't call ctr_start() correctly. That's because as of a few releases ago
185
-- Made the cipher ecb
encrypt
/decrypt return an int as well, changed ALL dependent code to check for this.
196
-- Added
encrypt
/decrypt to the DSA side (basically DH with DSA parameters)
[
all
...]
/external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h
213
/** The pad used to
encrypt
/decrypt */
264
/** The pad used to
encrypt
/decrypt */
339
/**
Encrypt
a block
454
@param direction
Encrypt
or Decrypt direction (0 or 1)
479
@param direction
Encrypt
or Decrypt mode (GCM_ENCRYPT or GCM_DECRYPT)
/external/dropbear/libtomcrypt/notes/etc/
saferp_optimizer.c
1
/* emits an optimized version of SAFER+ ... only does
encrypt
so far... */
42
/* --
ENCRYPT
--- */
44
/* emit
encrypt
preabmle */
/external/openssl/apps/
pkeyutl.c
199
else if(!strcmp(*argv, "-
encrypt
"))
402
BIO_printf(bio_err, "-
encrypt
encrypt
with public key\n");
ec.c
77
* -des -
encrypt
output if PEM format with DES in cbc mode
224
BIO_printf(bio_err, " -des
encrypt
PEM output, "
/external/srtp/crypto/ae_xfm/
xfm.c
74
/*
encrypt
the opaque data */
150
/*
encrypt
the opaque data */
247
/*
encrypt
the opaque data */
/external/srtp/crypto/cipher/
aes_icm.c
72
* |
encrypt
|
361
/*
encrypt
bytes until the remaining data is 16-byte aligned */
498
* note: the
encrypt
function is identical to the decrypt function
/external/wpa_supplicant/
crypto.h
83
* des_encrypt -
Encrypt
one block with DES
99
* aes_encrypt -
Encrypt
one AES block
214
* crypto_cipher_encrypt - Cipher
encrypt
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto.h
84
* des_encrypt -
Encrypt
one block with DES
100
* aes_encrypt -
Encrypt
one AES block
215
* crypto_cipher_encrypt - Cipher
encrypt
/external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c
241
size_t data_len, int
encrypt
)
247
"
encrypt
=%d)",
248
__func__, MAC2STR(addr), (unsigned long) data_len,
encrypt
);
/external/wpa_supplicant_8/hostapd/
ctrl_iface.c
230
int
encrypt
;
local
234
encrypt
= atoi(pos);
246
encrypt
) < 0)
286
int
encrypt
;
local
290
encrypt
= atoi(pos);
302
encrypt
) < 0)
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/
DESedeWrapEngine.java
156
//
Encrypt
WKCKS in CBC mode using KEK as the key and IV as the
184
//
Encrypt
TEMP3 in CBC mode using the KEK and an initialization vector
/external/dropbear/libtomcrypt/src/ciphers/
rc5.c
273
/*
encrypt
and decrypt */
282
/* now see if we can
encrypt
all zero bytes 1000 times, decrypt and come back where we started */
/external/openssl/crypto/bf/
bf_enc.c
225
const BF_KEY *schedule, unsigned char *ivec, int
encrypt
)
232
if (
encrypt
)
/external/openssl/crypto/rc2/
rc2_cbc.c
63
RC2_KEY *ks, unsigned char *iv, int
encrypt
)
70
if (
encrypt
)
/external/srtp/
Changes
18
There is a SIGBUS error in the AES
encrypt
function on sparc
67
Added 'output' functions to cipher, in addition to '
encrypt
'
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionStateSSLv3.java
229
protected byte[]
encrypt
(byte type, byte[] fragment, int offset, int len) {
method in class:ConnectionStateSSLv3
265
logger.println("SSLRecordProtocol.
encrypt
: "
/packages/apps/Settings/res/values-tl/
strings.xml
[
all
...]
/docs/source.android.com/src/tech/encryption/
android_crypto_implementation.md
174
For first release, we only support
encrypt
in place, which requires the
179
1. From the UI, the user selects to
encrypt
the device. The UI ensures that
186
Once the user presses the final button to
encrypt
the device, the UI calls
190
2. vold does some error checking, and returns -1 if it can't
encrypt
, and
/external/bluetooth/bluez/tools/
hciconfig.8
63
.B
encrypt
hcitool.1
186
.BI enc " <bdaddr> [
encrypt
enable]"
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
CBCBlockCipher.java
171
* then
encrypt
the cbcV
Completed in 1362 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>