HomeSort by relevance Sort by last modified time
    Searched full:encrypt (Results 151 - 175 of 416) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/chromium/chrome/browser/sync/engine/
syncer_util.cc 291 // encrypt any unsynced changes here because there is no Nigori
312 // We were unable to encrypt the changes, possibly due to a missing
316 // the new passphrase is entered we should be able to encrypt properly.
318 // we will properly encrypt all appropriate unsynced data.
320 << " to encrypt all necessary unsynced changes.";
324 // Note that we don't bother to encrypt any synced data that now requires
325 // encryption. The machine that turned on encryption should encrypt
    [all...]
  /external/dropbear/libtomcrypt/
makefile.shared 64 CRYPT=encrypt
220 CRYPTOBJECTS=demos/encrypt.o
265 gcc $(CFLAGS) demos/encrypt.c -o encrypt.o
266 gcc -o crypt encrypt.o -ltomcrypt $(EXTRALIBS)
crypt.tex 147 and store data in a format independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt
183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines
404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode,
432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher:
433 \index{Cipher Encrypt} \index{Cipher Decrypt}
443 These two functions will encrypt or decrypt (respectively) a single block of text\footnote{The size of which depends on
445 the same buffer. For the encrypt function \textit{pt}\footnote{pt stands for plaintext.} is the input and
521 /* encrypt the block */
522 blowfish_ecb_encrypt(pt, /* encrypt this 8-byte array */
644 and tables. The decryption and self--test function pointers of both \textit{encrypt only} descriptors are set to \textbf{NULL} and
    [all...]
changes 53 parameter you pass to ctr_start(), otherwise it will be LTC compliant (e.g. encrypt then increment)
63 -- Added RSA PKCS #1 v1.5 signature/encrypt tests to rsa_test.c
81 -- two fixes to CCM for corner cases [L+noncelen > 15] and fixing the CTR pad to encrypt the CBC-MAC tag
118 -- lrw_process now checks the return of the cipher ecb encrypt/decrypt calls
170 v1.07 -- Craig Schlenter pointed out the "encrypt" demo doesn't call ctr_start() correctly. That's because as of a few releases ago
185 -- Made the cipher ecb encrypt/decrypt return an int as well, changed ALL dependent code to check for this.
196 -- Added encrypt/decrypt to the DSA side (basically DH with DSA parameters)
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h 213 /** The pad used to encrypt/decrypt */
264 /** The pad used to encrypt/decrypt */
339 /** Encrypt a block
454 @param direction Encrypt or Decrypt direction (0 or 1)
479 @param direction Encrypt or Decrypt mode (GCM_ENCRYPT or GCM_DECRYPT)
  /external/dropbear/libtomcrypt/notes/etc/
saferp_optimizer.c 1 /* emits an optimized version of SAFER+ ... only does encrypt so far... */
42 /* -- ENCRYPT --- */
44 /* emit encrypt preabmle */
  /external/openssl/apps/
pkeyutl.c 199 else if(!strcmp(*argv, "-encrypt"))
402 BIO_printf(bio_err, "-encrypt encrypt with public key\n");
ec.c 77 * -des - encrypt output if PEM format with DES in cbc mode
224 BIO_printf(bio_err, " -des encrypt PEM output, "
  /external/srtp/crypto/ae_xfm/
xfm.c 74 /* encrypt the opaque data */
150 /* encrypt the opaque data */
247 /* encrypt the opaque data */
  /external/srtp/crypto/cipher/
aes_icm.c 72 * | encrypt |
361 /* encrypt bytes until the remaining data is 16-byte aligned */
498 * note: the encrypt function is identical to the decrypt function
  /external/wpa_supplicant/
crypto.h 83 * des_encrypt - Encrypt one block with DES
99 * aes_encrypt - Encrypt one AES block
214 * crypto_cipher_encrypt - Cipher encrypt
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto.h 84 * des_encrypt - Encrypt one block with DES
100 * aes_encrypt - Encrypt one AES block
215 * crypto_cipher_encrypt - Cipher encrypt
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 241 size_t data_len, int encrypt)
247 "encrypt=%d)",
248 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt);
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 230 int encrypt; local
234 encrypt = atoi(pos);
246 encrypt) < 0)
286 int encrypt; local
290 encrypt = atoi(pos);
302 encrypt) < 0)
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/
DESedeWrapEngine.java 156 // Encrypt WKCKS in CBC mode using KEK as the key and IV as the
184 // Encrypt TEMP3 in CBC mode using the KEK and an initialization vector
  /external/dropbear/libtomcrypt/src/ciphers/
rc5.c 273 /* encrypt and decrypt */
282 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
  /external/openssl/crypto/bf/
bf_enc.c 225 const BF_KEY *schedule, unsigned char *ivec, int encrypt)
232 if (encrypt)
  /external/openssl/crypto/rc2/
rc2_cbc.c 63 RC2_KEY *ks, unsigned char *iv, int encrypt)
70 if (encrypt)
  /external/srtp/
Changes 18 There is a SIGBUS error in the AES encrypt function on sparc
67 Added 'output' functions to cipher, in addition to 'encrypt'
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionStateSSLv3.java 229 protected byte[] encrypt(byte type, byte[] fragment, int offset, int len) { method in class:ConnectionStateSSLv3
265 logger.println("SSLRecordProtocol.encrypt: "
  /packages/apps/Settings/res/values-tl/
strings.xml     [all...]
  /docs/source.android.com/src/tech/encryption/
android_crypto_implementation.md 174 For first release, we only support encrypt in place, which requires the
179 1. From the UI, the user selects to encrypt the device. The UI ensures that
186 Once the user presses the final button to encrypt the device, the UI calls
190 2. vold does some error checking, and returns -1 if it can't encrypt, and
  /external/bluetooth/bluez/tools/
hciconfig.8 63 .B encrypt
hcitool.1 186 .BI enc " <bdaddr> [encrypt enable]"
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
CBCBlockCipher.java 171 * then encrypt the cbcV

Completed in 1362 milliseconds

1 2 3 4 5 67 8 91011>>