HomeSort by relevance Sort by last modified time
    Searched full:encrypt (Results 51 - 75 of 481) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_encrypt_key.c 21 (PKCS #1 v2.0) OAEP pad then encrypt
32 @param key The RSA key to encrypt to
  /external/grub/util/
grub-md5-crypt 3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
grub-md5-crypt.in 3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
  /external/openssl/crypto/evp/
e_des3.c 97 ctx->encrypt);
139 (DES_cblock *)ctx->iv, ctx->encrypt);
147 (DES_cblock *)ctx->iv, ctx->encrypt);
158 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt);
166 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt);
183 (DES_cblock *)ctx->iv,ctx->encrypt);
198 (DES_cblock *)ctx->iv,ctx->encrypt);
206 (DES_cblock *)ctx->iv,ctx->encrypt);
e_aes.c 268 aesni_cbc_encrypt(in,out,len,ctx->cipher_data,ctx->iv,ctx->encrypt);
280 aesni_ecb_encrypt(in,out,len,ctx->cipher_data,ctx->encrypt);
580 (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt);
581 else if (ctx->encrypt)
620 ctx->iv,&ctx->num,ctx->encrypt,dat->block);
630 ctx->iv,&ctx->num,ctx->encrypt,dat->block);
641 ctx->iv,&ctx->num,ctx->encrypt,dat->block);
647 ctx->iv,&ctx->num,ctx->encrypt,dat->block);
652 ctx->iv,&ctx->num,ctx->encrypt,dat->block);
736 if (arg <= 0 || arg > 16 || c->encrypt)
    [all...]
  /frameworks/av/include/media/
IHDCP.h 48 // Encrypt a data according to the HDCP spec. The data is to be
56 virtual status_t encrypt(
  /frameworks/av/media/libmediaplayerservice/
HDCP.cpp 99 status_t HDCP::encrypt( function in class:android::HDCP
110 return mHDCPModule->encrypt(inData, size, streamCTR, outInputCTR, outData);
HDCP.h 34 virtual status_t encrypt(
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
StreamCipher.java 28 * encrypt/decrypt a single byte returning the result.
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_process.c 26 @param direction Encrypt or Decrypt mode (GCM_ENCRYPT or GCM_DECRYPT)
64 /* encrypt the counter */
82 /* ctr encrypt */
100 /* ctr encrypt */
  /external/openssh/
acss.h 37 int encrypt; /* XXX make these bit flags? */ member in struct:acss_key_st
  /external/qemu/
d3des.h 22 #define EN0 0 /* MODE == encrypt */
  /external/srtp/crypto/include/
cipher.h 85 * and direction (i.e., encrypt or decrypt)
143 cipher_encrypt_func_t encrypt; member in struct:cipher_type_t
175 (((c)->type)->encrypt(((c)->state), (buf), (len)))
206 * number of bits that a cipher implementation can encrypt in a second
  /external/wpa_supplicant_8/src/crypto/
aes-ctr.c 20 * @data: Data to encrypt in-place
aes-eax.c 23 * @data: Data to encrypt in-place
87 * @data: Data to encrypt in-place
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionState.java 50 * encrypt call
108 protected byte[] encrypt(byte type, byte[] fragment) { method in class:ConnectionState
109 return encrypt(type, fragment, 0, fragment.length);
121 protected abstract byte[] encrypt method in class:ConnectionState
  /system/core/fastboot/
genkey.sh 10 # Encrypt private key with provided password.
  /external/chromium/crypto/
encryptor_unittest.cc 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
44 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt.
46 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt.
103 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
133 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
159 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
212 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
  /external/openssl/apps/
gendsa.c 176 BIO_printf(bio_err," -des - encrypt the generated key with DES in cbc mode\n");
177 BIO_printf(bio_err," -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
180 BIO_printf(bio_err," -idea - encrypt the generated key with IDEA in cbc mode\n");
184 BIO_printf(bio_err," encrypt PEM output with cbc seed\n");
188 BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
192 BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
genrsa.c 197 BIO_printf(bio_err," -des encrypt the generated key with DES in cbc mode\n");
198 BIO_printf(bio_err," -des3 encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
200 BIO_printf(bio_err," -idea encrypt the generated key with IDEA in cbc mode\n");
204 BIO_printf(bio_err," encrypt PEM output with cbc seed\n");
208 BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
212 BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_encrypt.c 15 F8 implementation, encrypt data, Tom St Denis
21 F8 encrypt
f8_start.c 74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */
79 /* encrypt IV */
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_process.c 15 LRW_MODE implementation, Encrypt/decrypt blocks, Tom St Denis
21 Process blocks with LRW, since decrypt/encrypt are largely the same they share this code.
  /external/openssl/crypto/bf/
bf_ecb.c 82 const BF_KEY *key, int encrypt)
88 if (encrypt)
  /frameworks/base/packages/BackupRestoreConfirmation/res/values-en-rGB/
strings.xml 29 <string name="device_encryption_backup_text" msgid="5866590762672844664">"Please enter your device encryption password below. This will also be used to encrypt the backup archive."</string>
31 <string name="backup_enc_password_optional" msgid="1350137345907579306">"If you wish to encrypt the full backup data, enter a password below:"</string>

Completed in 173 milliseconds

1 23 4 5 6 7 8 91011>>