HomeSort by relevance Sort by last modified time
    Searched full:encrypt (Results 176 - 200 of 481) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/srtp/crypto/ae_xfm/
xfm.c 74 /* encrypt the opaque data */
150 /* encrypt the opaque data */
247 /* encrypt the opaque data */
  /external/srtp/crypto/cipher/
aes_icm.c 72 * | encrypt |
361 /* encrypt bytes until the remaining data is 16-byte aligned */
498 * note: the encrypt function is identical to the decrypt function
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto.h 84 * des_encrypt - Encrypt one block with DES
100 * aes_encrypt - Encrypt one AES block
215 * crypto_cipher_encrypt - Cipher encrypt
  /external/wpa_supplicant_8/src/crypto/
crypto.h 83 * des_encrypt - Encrypt one block with DES
99 * aes_encrypt - Encrypt one AES block
215 * crypto_cipher_encrypt - Cipher encrypt
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 247 size_t data_len, int encrypt)
253 "encrypt=%d)",
254 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
DESedeWrapEngine.java 160 // Encrypt WKCKS in CBC mode using KEK as the key and IV as the
188 // Encrypt TEMP3 in CBC mode using the KEK and an initialization vector
  /external/dropbear/libtomcrypt/src/ciphers/
rc5.c 273 /* encrypt and decrypt */
282 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
  /external/openssl/apps/
ec.c 77 * -des - encrypt output if PEM format with DES in cbc mode
224 BIO_printf(bio_err, " -des encrypt PEM output, "
  /external/openssl/crypto/bf/
bf_enc.c 225 const BF_KEY *schedule, unsigned char *ivec, int encrypt)
232 if (encrypt)
  /external/openssl/crypto/cmac/
cmac.c 242 /* Else not final block so encrypt it */
246 /* Encrypt all but one of the complete blocks left */
  /external/openssl/crypto/rc2/
rc2_cbc.c 63 RC2_KEY *ks, unsigned char *iv, int encrypt)
70 if (encrypt)
  /external/srtp/
Changes 18 There is a SIGBUS error in the AES encrypt function on sparc
67 Added 'output' functions to cipher, in addition to 'encrypt'
  /frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/
FwdLockFile.c 187 // Encrypt the 16-byte value {0, 0, ..., 0} to produce the encryption key.
194 // Encrypt the 16-byte value {1, 0, ..., 0} to produce the signing key.
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionStateSSLv3.java 229 protected byte[] encrypt(byte type, byte[] fragment, int offset, int len) { method in class:ConnectionStateSSLv3
265 logger.println("SSLRecordProtocol.encrypt: "
  /external/dropbear/libtomcrypt/
crypt.tex 147 and store data in a format independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt
183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines
404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode,
432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher:
433 \index{Cipher Encrypt} \index{Cipher Decrypt}
443 These two functions will encrypt or decrypt (respectively) a single block of text\footnote{The size of which depends on
445 the same buffer. For the encrypt function \textit{pt}\footnote{pt stands for plaintext.} is the input and
521 /* encrypt the block */
522 blowfish_ecb_encrypt(pt, /* encrypt this 8-byte array */
644 and tables. The decryption and self--test function pointers of both \textit{encrypt only} descriptors are set to \textbf{NULL} and
    [all...]
changes 53 parameter you pass to ctr_start(), otherwise it will be LTC compliant (e.g. encrypt then increment)
63 -- Added RSA PKCS #1 v1.5 signature/encrypt tests to rsa_test.c
81 -- two fixes to CCM for corner cases [L+noncelen > 15] and fixing the CTR pad to encrypt the CBC-MAC tag
118 -- lrw_process now checks the return of the cipher ecb encrypt/decrypt calls
170 v1.07 -- Craig Schlenter pointed out the "encrypt" demo doesn't call ctr_start() correctly. That's because as of a few releases ago
185 -- Made the cipher ecb encrypt/decrypt return an int as well, changed ALL dependent code to check for this.
196 -- Added encrypt/decrypt to the DSA side (basically DH with DSA parameters)
    [all...]
  /docs/source.android.com/src/tech/encryption/
android_crypto_implementation.md 174 For first release, we only support encrypt in place, which requires the
179 1. From the UI, the user selects to encrypt the device. The UI ensures that
186 Once the user presses the final button to encrypt the device, the UI calls
190 2. vold does some error checking, and returns -1 if it can't encrypt, and
  /external/bluetooth/bluedroid/stack/include/
smp_api.h 281 ** Description This function is called to encrypt the data with the specified
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
CBCBlockCipher.java 189 * then encrypt the cbcV
  /external/chromium/chrome/browser/password_manager/
encryptor_linux.cc 93 if (!encryptor.Encrypt(plaintext, ciphertext))
  /external/chromium/chrome/browser/sync/engine/
apply_updates_command_unittest.cc 236 cryptographer->Encrypt(data,
286 cryptographer->Encrypt(data,
301 cryptographer.Encrypt(data,
497 // We encrypt with new keys, triggering the local cryptographer to be unready
  /external/chromium/third_party/libjingle/source/talk/session/phone/
srtpfilter.h 95 // Protect/UnprotectRt(c)p can be called to encrypt/decrypt data.
  /external/dropbear/libtomcrypt/notes/
tech0004.txt 72 read() function to be used as an "encrypt" function as well.
  /external/ipsec-tools/src/racoon/
algorithm.h 156 vchar_t *(*encrypt) __P((vchar_t *, vchar_t *, vchar_t *)); member in struct:enc_algorithm
  /external/kernel-headers/original/linux/sunrpc/
svcauth.h 81 * It should sign/encrypt the results if needed

Completed in 490 milliseconds

1 2 3 4 5 6 78 91011>>