/external/wpa_supplicant_8/src/crypto/ |
des_i.h | 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt); 19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain); 22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain);
|
aes.h | 15 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 18 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_t len [all...] |
aes-unwrap.c | 22 * @plain: Plaintext key, n * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) 33 r = plain; 48 r = plain + (n - 1) * 8; 64 * These are already in @plain due to the location of temporary
|
aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 22 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain); 45 const u8 *plain, size_t plain_len, 52 u8 *plain); 57 size_t M, const u8 *plain, size_t plain_len, 62 u8 *plain);
|
aes-wrap.c | 21 * @plain: Plaintext key to be wrapped, n * 64 bits 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) 36 os_memcpy(r, plain, 8 * n);
|
crypto_libtomcrypt.c | 99 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) 102 aes_ecb_encrypt(plain, crypt, skey); 128 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) 131 aes_ecb_encrypt(plain, (u8 *) crypt, skey); 350 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, 356 if (plain != crypt) 357 os_memcpy(crypt, plain, len); 364 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 375 u8 *plain, size_t len) 380 if (plain != crypt [all...] |
crypto_nss.c | 144 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) 160 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) 191 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, 199 u8 *plain, size_t len)
|
crypto_gnutls.c | 110 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) 113 gcry_cipher_encrypt(hd, crypt, 16, plain, 16); 140 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) 143 gcry_cipher_decrypt(hd, plain, 16, crypt, 16); 274 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, 277 if (gcry_cipher_encrypt(ctx->enc, crypt, len, plain, len) != 285 u8 *plain, size_t len) 287 if (gcry_cipher_decrypt(ctx->dec, plain, len, crypt, len) !=
|
crypto_internal-rsa.c | 104 u8 *plain, size_t *plain_len) 107 crypt, crypt_len, plain, plain_len);
|
aes-ccm.c | 149 size_t M, const u8 *plain, size_t plain_len, 164 aes_ccm_auth(aes, plain, plain_len, x); 168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 202 aes_ccm_auth(aes, plain, crypt_len, x);
|
crypto.h | 101 * @plain: Plaintext data to be encrypted (16 bytes) 104 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 124 * @plain: Buffer for the decrypted data (16 bytes) 126 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain); 217 * @plain: Plaintext to cipher 227 const u8 *plain, u8 *crypt, size_t len); 233 * @plain: Resulting plaintext 242 const u8 *crypt, u8 *plain, size_t len); 382 * @plain: Buffer for plaintext (at least crypt_len bytes) 388 u8 *plain, size_t *plain_len) [all...] |
des-internal.c | 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) 437 work[0] = WPA_GET_BE32(plain); 438 work[1] = WPA_GET_BE32(plain + 4); 445 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain) 451 WPA_PUT_BE32(plain, work[0]); 452 WPA_PUT_BE32(plain + 4, work[1]); 468 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt) 472 work[0] = WPA_GET_BE32(plain); 473 work[1] = WPA_GET_BE32(plain + 4); 482 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain) [all...] |
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
saslmechanism.cc | 56 SaslMechanism::Base64Encode(const std::string & plain) { 57 return Base64::Encode(plain); 66 SaslMechanism::Base64EncodeFromArray(const char * plain, size_t length) { 68 Base64::EncodeFromArray(plain, length, &result);
|
saslmechanism.h | 48 // Should return the name of the SASL mechanism, e.g., "PLAIN" 67 static std::string Base64Encode(const std::string & plain); 69 static std::string Base64EncodeFromArray(const char * plain, size_t length);
|
/external/apache-xml/src/main/java/org/apache/xml/serializer/ |
output_text.properties | 26 media-type=text/plain
|
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 129 u8 *plain, size_t *plain_len) 135 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 148 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 154 pos = plain + 3; 155 if (plain[1] == 0x00) { 157 if (plain[2] != 0x00) { 162 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 166 if (plain[2] != 0xff) [all...] |
pkcs1.h | 20 u8 *plain, size_t *plain_len);
|
/external/openssh/ |
cipher-aes.c | 79 u_char *cprev, *cnow, *plain, *ivp; local 92 plain = (u_char *)src; 94 for (i = 0; i < blocks; i++, plain+=RIJNDAEL_BLOCKSIZE, 97 buf[j] = plain[j] ^ cprev[j]; 104 plain = dest+len-RIJNDAEL_BLOCKSIZE; 108 plain-=RIJNDAEL_BLOCKSIZE) { 109 rijndael_decrypt(&c->r_ctx, cnow, plain); 112 plain[j] ^= ivp[j];
|
/external/webkit/LayoutTests/fast/encoding/resources/ |
char-decoding-utils.js | 15 req.open('GET', 'data:text/plain,' + characterSequence, false); 16 req.overrideMimeType('text/plain; charset="' + charsetName + '"');
|
/frameworks/base/core/tests/coretests/src/android/util/ |
Base64Test.java | 319 byte[] plain = (lipsum + lipsum + lipsum + lipsum + lipsum).getBytes(); 322 byte[] encoded = Base64.encode(plain, flags); 326 byte[] actual = new byte[plain.length * 2]; 330 // ----- test decoding ("encoded" -> "plain") ----- 339 assertEquals(actual, ap, plain); 348 assertEquals(actual, ap, plain); 367 assertEquals(actual, ap, plain); 369 // ----- test encoding ("plain" -> "encoded") ----- 372 bais = new ByteArrayInputStream(plain); 381 bais = new ByteArrayInputStream(plain); [all...] |
/external/openssl/crypto/des/ |
destest.c | 290 static unsigned char plain[24]= variable 612 for (i=0; i<sizeof(plain); i++) 613 des_cfb_encrypt(&(plain[i]),&(cfb_buf1[i]), 615 if (memcmp(cfb_cipher8,cfb_buf1,sizeof(plain)) != 0) 622 for (i=0; i<sizeof(plain); i++) 625 if (memcmp(plain,cfb_buf2,sizeof(plain)) != 0) 639 des_ofb_encrypt(plain,ofb_buf1,64,sizeof(plain)/8,ks,&ofb_tmp); 653 if (memcmp(plain,ofb_buf2,sizeof(ofb_buf2)) != 0 [all...] |
/external/webkit/LayoutTests/fast/url/script-tests/ |
segments-from-data-url.js | 21 ["", ["data:","","","text/plain,baseURL","",""]], 22 [" \\t", ["data:","","","text/plain,baseURL","",""]], 74 setBaseURL("data:text/plain,baseURL");
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 210 struct wpabuf *msg, *plain; local 214 plain = wpabuf_alloc(200); 215 if (plain == NULL) 220 wpabuf_free(plain); 227 wps_build_e_snonce1(wps, plain) || 228 wps_build_key_wrap_auth(wps, plain) || 229 wps_build_encr_settings(wps, msg, plain) || 232 wpabuf_free(plain); 236 wpabuf_free(plain); 320 static int wps_build_ap_settings(struct wps_data *wps, struct wpabuf *plain) 339 struct wpabuf *msg, *plain; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 1167 struct wpabuf *plain = wpabuf_alloc(data->IDr_len + 1000); local 1168 if (plain == NULL) { 1172 if (ikev2_build_idr(data, plain, 1176 &data->keys, 0, msg, plain, 1178 wpabuf_free(plain); 1182 wpabuf_free(plain); 1200 struct wpabuf *msg, *plain; local 1209 plain = wpabuf_alloc(data->IDr_len + 1000); 1210 if (plain == NULL) { 1215 if (ikev2_build_idr(data, plain, IKEV2_PAYLOAD_AUTHENTICATION) | 1243 struct wpabuf *plain = wpabuf_alloc(100); local [all...] |