/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_encrypt_key.c | 21 (PKCS #1 v2.0) OAEP pad then encrypt 32 @param key The RSA key to encrypt to
|
/external/grub/util/ |
grub-md5-crypt | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format.
|
grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format.
|
/external/openssl/crypto/evp/ |
e_des3.c | 97 ctx->encrypt); 139 (DES_cblock *)ctx->iv, ctx->encrypt); 147 (DES_cblock *)ctx->iv, ctx->encrypt); 158 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); 166 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); 183 (DES_cblock *)ctx->iv,ctx->encrypt); 198 (DES_cblock *)ctx->iv,ctx->encrypt); 206 (DES_cblock *)ctx->iv,ctx->encrypt);
|
e_aes.c | 268 aesni_cbc_encrypt(in,out,len,ctx->cipher_data,ctx->iv,ctx->encrypt); 280 aesni_ecb_encrypt(in,out,len,ctx->cipher_data,ctx->encrypt); 580 (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt); 581 else if (ctx->encrypt) 620 ctx->iv,&ctx->num,ctx->encrypt,dat->block); 630 ctx->iv,&ctx->num,ctx->encrypt,dat->block); 641 ctx->iv,&ctx->num,ctx->encrypt,dat->block); 647 ctx->iv,&ctx->num,ctx->encrypt,dat->block); 652 ctx->iv,&ctx->num,ctx->encrypt,dat->block); 736 if (arg <= 0 || arg > 16 || c->encrypt) [all...] |
/frameworks/av/include/media/ |
IHDCP.h | 48 // Encrypt a data according to the HDCP spec. The data is to be 56 virtual status_t encrypt(
|
/frameworks/av/media/libmediaplayerservice/ |
HDCP.cpp | 99 status_t HDCP::encrypt( function in class:android::HDCP 110 return mHDCPModule->encrypt(inData, size, streamCTR, outInputCTR, outData);
|
HDCP.h | 34 virtual status_t encrypt(
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
StreamCipher.java | 28 * encrypt/decrypt a single byte returning the result.
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_process.c | 26 @param direction Encrypt or Decrypt mode (GCM_ENCRYPT or GCM_DECRYPT) 64 /* encrypt the counter */ 82 /* ctr encrypt */ 100 /* ctr encrypt */
|
/external/openssh/ |
acss.h | 37 int encrypt; /* XXX make these bit flags? */ member in struct:acss_key_st
|
/external/qemu/ |
d3des.h | 22 #define EN0 0 /* MODE == encrypt */
|
/external/srtp/crypto/include/ |
cipher.h | 85 * and direction (i.e., encrypt or decrypt) 143 cipher_encrypt_func_t encrypt; member in struct:cipher_type_t 175 (((c)->type)->encrypt(((c)->state), (buf), (len))) 206 * number of bits that a cipher implementation can encrypt in a second
|
/external/wpa_supplicant_8/src/crypto/ |
aes-ctr.c | 20 * @data: Data to encrypt in-place
|
aes-eax.c | 23 * @data: Data to encrypt in-place 87 * @data: Data to encrypt in-place
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionState.java | 50 * encrypt call 108 protected byte[] encrypt(byte type, byte[] fragment) { method in class:ConnectionState 109 return encrypt(type, fragment, 0, fragment.length); 121 protected abstract byte[] encrypt method in class:ConnectionState
|
/system/core/fastboot/ |
genkey.sh | 10 # Encrypt private key with provided password.
|
/external/chromium/crypto/ |
encryptor_unittest.cc | 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 44 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt. 46 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt. 103 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 133 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 159 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 212 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
|
/external/openssl/apps/ |
gendsa.c | 176 BIO_printf(bio_err," -des - encrypt the generated key with DES in cbc mode\n"); 177 BIO_printf(bio_err," -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key)\n"); 180 BIO_printf(bio_err," -idea - encrypt the generated key with IDEA in cbc mode\n"); 184 BIO_printf(bio_err," encrypt PEM output with cbc seed\n"); 188 BIO_printf(bio_err," encrypt PEM output with cbc aes\n"); 192 BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
|
genrsa.c | 197 BIO_printf(bio_err," -des encrypt the generated key with DES in cbc mode\n"); 198 BIO_printf(bio_err," -des3 encrypt the generated key with DES in ede cbc mode (168 bit key)\n"); 200 BIO_printf(bio_err," -idea encrypt the generated key with IDEA in cbc mode\n"); 204 BIO_printf(bio_err," encrypt PEM output with cbc seed\n"); 208 BIO_printf(bio_err," encrypt PEM output with cbc aes\n"); 212 BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_encrypt.c | 15 F8 implementation, encrypt data, Tom St Denis 21 F8 encrypt
|
f8_start.c | 74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */ 79 /* encrypt IV */
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_process.c | 15 LRW_MODE implementation, Encrypt/decrypt blocks, Tom St Denis 21 Process blocks with LRW, since decrypt/encrypt are largely the same they share this code.
|
/external/openssl/crypto/bf/ |
bf_ecb.c | 82 const BF_KEY *key, int encrypt) 88 if (encrypt)
|
/frameworks/base/packages/BackupRestoreConfirmation/res/values-en-rGB/ |
strings.xml | 29 <string name="device_encryption_backup_text" msgid="5866590762672844664">"Please enter your device encryption password below. This will also be used to encrypt the backup archive."</string> 31 <string name="backup_enc_password_optional" msgid="1350137345907579306">"If you wish to encrypt the full backup data, enter a password below:"</string>
|