/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 672 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
/external/openssh/ |
ssh-agent.c | 657 /* XXX todo: encrypt sensitive data with passphrase */ [all...] |
sshd.0 | 159 which is used to encrypt all further communications in the session. The [all...] |
sshd.8 | 300 random number as a session key which is used to encrypt all further
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 638 * the data, the encrypt BIO, if present, will read
|
/external/openssl/crypto/x509/ |
x509.h | 499 /* used to encrypt and decrypt */ [all...] |
/external/openssl/include/openssl/ |
x509.h | 499 /* used to encrypt and decrypt */ [all...] |
/external/qemu/block/ |
qcow2.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 1234 wpa_printf(MSG_INFO, "EAP-PEAPv2: Failed to encrypt Phase 2 " [all...] |
eap_ttls.c | 472 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS/EAP: Encrypt encapsulated Phase " [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 1043 /* Add User-Password attribute to a RADIUS message and encrypt it as specified
|
/external/wpa_supplicant_8/src/drivers/ |
driver_madwifi.c | 1082 int encrypt, const u8 *own_addr, u32 flags) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 1198 wpa_printf(MSG_INFO, "EAP-PEAPv2: Failed to encrypt Phase 2 " [all...] |
eap_server_ttls.c | 385 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS/EAP: Encrypt encapsulated "
|
/packages/providers/TelephonyProvider/src/com/android/providers/telephony/ |
MmsProvider.java | 425 // Give everyone rw permission until we encrypt the file [all...] |
/external/openssl/crypto/modes/ |
gcm128.c | 910 /* First call to encrypt finalizes GHASH(AAD) */ [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 124 const u8 *data, size_t data_len, int encrypt) 129 encrypt); 1076 * supplicant is allowed to encrypt it. [all...] |
/external/openssl/crypto/aes/asm/ |
aes-x86_64.pl | 21 # ECB encrypt ECB decrypt CBC large chunk [all...] |
/external/bluetooth/bluedroid/bta/include/ |
bta_api.h | [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
cast5.c | [all...] |
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 32 ("%-20s[%3d]: Encrypt at %5lu, Decrypt at %5lu\n", cipher_descriptor[results[x].id].name, cipher_descriptor[results[x].id].ID, results[x].spd1, results[x].spd2); [all...] |
/external/grub/docs/ |
Makefile.in | 760 @MAINTAINER_MODE_TRUE@ --name="Encrypt a password in MD5 format" \
|
grub.texi | 25 * grub-md5-crypt: (grub)Invoking grub-md5-crypt. Encrypt a password [all...] |
/external/ipsec-tools/src/racoon/ |
racoon.conf.5 | [all...] |
/external/openssl/apps/ |
req.c | 416 BIO_printf(bio_err," -nodes don't encrypt the output key\n"); [all...] |