/external/srtp/crypto/ae_xfm/ |
xfm.c | 74 /* encrypt the opaque data */ 150 /* encrypt the opaque data */ 247 /* encrypt the opaque data */
|
/external/srtp/crypto/cipher/ |
aes_icm.c | 72 * | encrypt | 361 /* encrypt bytes until the remaining data is 16-byte aligned */ 498 * note: the encrypt function is identical to the decrypt function
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto.h | 84 * des_encrypt - Encrypt one block with DES 100 * aes_encrypt - Encrypt one AES block 215 * crypto_cipher_encrypt - Cipher encrypt
|
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 83 * des_encrypt - Encrypt one block with DES 99 * aes_encrypt - Encrypt one AES block 215 * crypto_cipher_encrypt - Cipher encrypt
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 247 size_t data_len, int encrypt) 253 "encrypt=%d)", 254 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
DESedeWrapEngine.java | 160 // Encrypt WKCKS in CBC mode using KEK as the key and IV as the 188 // Encrypt TEMP3 in CBC mode using the KEK and an initialization vector
|
/external/dropbear/libtomcrypt/src/ciphers/ |
rc5.c | 273 /* encrypt and decrypt */ 282 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
/external/openssl/apps/ |
ec.c | 77 * -des - encrypt output if PEM format with DES in cbc mode 224 BIO_printf(bio_err, " -des encrypt PEM output, "
|
/external/openssl/crypto/bf/ |
bf_enc.c | 225 const BF_KEY *schedule, unsigned char *ivec, int encrypt) 232 if (encrypt)
|
/external/openssl/crypto/cmac/ |
cmac.c | 242 /* Else not final block so encrypt it */ 246 /* Encrypt all but one of the complete blocks left */
|
/external/openssl/crypto/rc2/ |
rc2_cbc.c | 63 RC2_KEY *ks, unsigned char *iv, int encrypt) 70 if (encrypt)
|
/external/srtp/ |
Changes | 18 There is a SIGBUS error in the AES encrypt function on sparc 67 Added 'output' functions to cipher, in addition to 'encrypt'
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
FwdLockFile.c | 187 // Encrypt the 16-byte value {0, 0, ..., 0} to produce the encryption key. 194 // Encrypt the 16-byte value {1, 0, ..., 0} to produce the signing key.
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionStateSSLv3.java | 229 protected byte[] encrypt(byte type, byte[] fragment, int offset, int len) { method in class:ConnectionStateSSLv3 265 logger.println("SSLRecordProtocol.encrypt: "
|
/external/dropbear/libtomcrypt/ |
crypt.tex | 147 and store data in a format independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt 183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines 404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode, 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher: 433 \index{Cipher Encrypt} \index{Cipher Decrypt} 443 These two functions will encrypt or decrypt (respectively) a single block of text\footnote{The size of which depends on 445 the same buffer. For the encrypt function \textit{pt}\footnote{pt stands for plaintext.} is the input and 521 /* encrypt the block */ 522 blowfish_ecb_encrypt(pt, /* encrypt this 8-byte array */ 644 and tables. The decryption and self--test function pointers of both \textit{encrypt only} descriptors are set to \textbf{NULL} and [all...] |
changes | 53 parameter you pass to ctr_start(), otherwise it will be LTC compliant (e.g. encrypt then increment) 63 -- Added RSA PKCS #1 v1.5 signature/encrypt tests to rsa_test.c 81 -- two fixes to CCM for corner cases [L+noncelen > 15] and fixing the CTR pad to encrypt the CBC-MAC tag 118 -- lrw_process now checks the return of the cipher ecb encrypt/decrypt calls 170 v1.07 -- Craig Schlenter pointed out the "encrypt" demo doesn't call ctr_start() correctly. That's because as of a few releases ago 185 -- Made the cipher ecb encrypt/decrypt return an int as well, changed ALL dependent code to check for this. 196 -- Added encrypt/decrypt to the DSA side (basically DH with DSA parameters) [all...] |
/docs/source.android.com/src/tech/encryption/ |
android_crypto_implementation.md | 174 For first release, we only support encrypt in place, which requires the 179 1. From the UI, the user selects to encrypt the device. The UI ensures that 186 Once the user presses the final button to encrypt the device, the UI calls 190 2. vold does some error checking, and returns -1 if it can't encrypt, and
|
/external/bluetooth/bluedroid/stack/include/ |
smp_api.h | 281 ** Description This function is called to encrypt the data with the specified
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CBCBlockCipher.java | 189 * then encrypt the cbcV
|
/external/chromium/chrome/browser/password_manager/ |
encryptor_linux.cc | 93 if (!encryptor.Encrypt(plaintext, ciphertext))
|
/external/chromium/chrome/browser/sync/engine/ |
apply_updates_command_unittest.cc | 236 cryptographer->Encrypt(data, 286 cryptographer->Encrypt(data, 301 cryptographer.Encrypt(data, 497 // We encrypt with new keys, triggering the local cryptographer to be unready
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.h | 95 // Protect/UnprotectRt(c)p can be called to encrypt/decrypt data.
|
/external/dropbear/libtomcrypt/notes/ |
tech0004.txt | 72 read() function to be used as an "encrypt" function as well.
|
/external/ipsec-tools/src/racoon/ |
algorithm.h | 156 vchar_t *(*encrypt) __P((vchar_t *, vchar_t *, vchar_t *)); member in struct:enc_algorithm
|
/external/kernel-headers/original/linux/sunrpc/ |
svcauth.h | 81 * It should sign/encrypt the results if needed
|