/external/openssh/ |
auth-passwd.c | 204 /* Encrypt the candidate password using the proper salt. */
|
cipher-3des1.c | 76 enc = ctx->encrypt;
|
ssh-pkcs11-client.c | 138 /* redirect the private key encrypt operation to the ssh-pkcs11-helper */
|
acss.c | 209 if (key->encrypt) { 253 key->encrypt = enc;
|
/external/openssl/crypto/des/ |
fcrypt.c | 88 /* Encrypt it (from/to ASCII) */
|
/external/openssl/crypto/evp/ |
e_idea.c | 71 /* NB idea_ecb_encrypt doesn't take an 'encrypt' argument so we treat it as a special
|
/external/openssl/crypto/pkcs12/ |
pk12err.c | 111 {ERR_REASON(PKCS12_R_ENCRYPT_ERROR) ,"encrypt error"},
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
crypto-aes.js | 4 * AES Cipher function: encrypt 'input' with Rijndael algorithm 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 197 var cipherCntr = Cipher(counterBlock, keySchedule); // -- encrypt counter block -- 257 var cipherCntr = Cipher(counterBlock, keySchedule); // encrypt counter block
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
crypto-aes.js | 4 * AES Cipher function: encrypt 'input' with Rijndael algorithm 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 197 var cipherCntr = Cipher(counterBlock, keySchedule); // -- encrypt counter block -- 257 var cipherCntr = Cipher(counterBlock, keySchedule); // encrypt counter block
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 63 * This parameter is used to set a key for EAP-FAST to encrypt the
|
/external/dropbear/libtomcrypt/src/ciphers/ |
rc2.c | 121 * Encrypt an 8-byte block of plaintext using the given key. * 322 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
rc6.c | 283 /* encrypt and decrypt */ 309 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
skipjack.c | 296 /* encrypt and decrypt */ 305 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
safer.c | 433 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */ 475 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
/external/dropbear/ |
packet.c | 408 /* encrypt the writepayload, putting into writebuf, ready for write_packet() 487 /* encrypt it */
|
/external/ipsec-tools/src/racoon/ |
algorithm.c | 563 if (f == NULL || f->encrypt == NULL) 570 res = (f->encrypt)(buf, key, iv);
|
/external/ppp/pppd/plugins/radius/ |
sendserver.c | 90 /* Encrypt the password */ 132 /* Encrypt the Password */
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_aes.c | 45 printf("Encrypt:"); 153 printf("AES-CBC encrypt %d failed\n", i);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 252 int encrypt) 263 encrypt, flags);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 313 size_t data_len, int encrypt, 318 data, data_len, encrypt,
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
SSLRecordProtocol.java | 212 activeWriteState.encrypt(content_type, fragment, offset, len); 286 activeWriteState.encrypt(ContentType.CHANGE_CIPHER_SPEC,
|
/external/bluetooth/bluedroid/stack/btm/ |
btm_ble_addr.c | 116 /* encrypt with ur IRK */
|
btm_ble_int.h | 77 #define BTM_BLE_SEC_REQ_ACT_ENCRYPT 1 /* encrypt the link using current key or key refresh */
|
/external/bluetooth/bluedroid/stack/gatt/ |
gatt_auth.c | 415 GATT_TRACE_DEBUG0("gatt_security_check_start: Encrypt now or key upgreade first");
|
/external/bluetooth/bluedroid/stack/smp/ |
smp_api.c | 314 ** Description This function is called to encrypt the data with the specified
|