/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 133 * last encrypt or decrypt operation.
|
/external/chromium/chrome/browser/sync/ |
profile_sync_service_harness.h | 124 // Encrypt the datatype |type|. This method will block while the sync backend
|
/external/dropbear/libtomcrypt/src/ciphers/ |
xtea.c | 171 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
/external/openssh/ |
OVERVIEW | 64 extract data from them, and the code to compress and/or encrypt
|
/external/openssl/crypto/aes/asm/ |
vpaes-x86.pl | 24 # encrypt/decrypt/with-hyper-threading-off(*) results in cycles per 26 # large-block CBC] encrypt/decrypt. 169 ## AES-encrypt %xmm0. 661 ## On encrypt,
|
vpaes-x86_64.pl | 24 # encrypt/decrypt/with-hyper-threading-off(*) results in cycles per 26 # [also large-block CBC] encrypt/decrypt. 69 ## AES-encrypt %xmm0. 284 # rcx = direction. 0=encrypt, 1=decrypt 582 ## On encrypt,
|
/external/openssl/ssl/ |
s2_enc.c | 118 /* read/writes from s->s2->mac_data using length for encrypt and
|
/external/srtp/ |
README | 98 -e encrypt/decrypt (for data confidentiality)
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 190 size_t data_len, int encrypt);
|
/frameworks/base/docs/html/guide/google/play/billing/ |
billing_best_practices.jd | 55 sure to encrypt the content and use a device-specific encryption key.</p>
|
/tools/motodev/src/help/studio_help/src/topics/ |
c_keys-keystores.dita | 21 encrypt the message with the public key and decrypt it with the private key. For app signing, the reverse is
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
BlowfishEngine.java | 479 * Encrypt the all-zero string with the Blowfish algorithm, using 486 * Encrypt the output of step(3) using the Blowfish algorithm, 506 * Encrypt the given input starting at the given offset and place
|
/external/dropbear/libtomcrypt/testprof/ |
rsa_test.c | 183 /* encrypt the key (without lparam) */ 233 /* encrypt the key (with lparam) */ 260 /* encrypt the key PKCS #1 v1.5 (payload from 1 to 117 bytes) */
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
BlowFish.java | 319 * (3) Encrypt the all-zero string with the Blowfish algorithm, using 324 * (5) Encrypt the output of step(3) using the Blowfish algorithm, with 342 * Encrypt the given input starting at the given offset and place the result
|
/packages/apps/Settings/res/values-tl/ |
strings.xml | [all...] |
/external/chromium/chrome/browser/sync/engine/ |
syncapi.h | 409 // Will encrypt if necessary. 460 // Encrypt the specifics if the datatype requries it. 796 // now used to encrypt sync data. |bootstrap_token| is an opaque base6 [all...] |
/external/qemu/ |
vnc-android.c | [all...] |
vnc.c | [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 389 cryp.op = ctx->encrypt ? COP_ENCRYPT : COP_DECRYPT; 393 if (!ctx->encrypt) { 408 if (ctx->encrypt) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.c | 901 * eap_peer_tls_encrypt - Encrypt phase 2 TLS message 907 * @in_data: Plaintext phase 2 data to encrypt or %NULL to continue fragments 931 wpa_printf(MSG_INFO, "SSL: Failed to encrypt Phase 2 "
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 904 * eap_peer_tls_encrypt - Encrypt phase 2 TLS message 910 * @in_data: Plaintext phase 2 data to encrypt or %NULL to continue fragments 924 wpa_printf(MSG_INFO, "SSL: Failed to encrypt Phase 2 "
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/ |
FwdLockConv.c | 256 // Encrypt the 16-byte value {0, 0, ..., 0} to produce the encryption key. 263 // Encrypt the 16-byte value {1, 0, ..., 0} to produce the signing key. 825 * @param[in] ch The character to encrypt and write. [all...] |
/bionic/libc/include/arpa/ |
telnet.h | 133 "ENCRYPT", "NEW-ENVIRON",
|
/development/ndk/platforms/android-9/include/arpa/ |
telnet.h | 133 "ENCRYPT", "NEW-ENVIRON",
|
/external/bluetooth/bluedroid/stack/btm/ |
btm_ble.c | [all...] |