/libcore/crypto/src/main/java/org/conscrypt/ |
ConnectionStateSSLv3.java | 229 protected byte[] encrypt(byte type, byte[] fragment, int offset, int len) { method in class:ConnectionStateSSLv3 265 logger.println("SSLRecordProtocol.encrypt: "
|
ConnectionStateTLS.java | 237 protected byte[] encrypt(byte type, byte[] fragment, int offset, int len) { method in class:ConnectionStateTLS
|
/external/dropbear/libtomcrypt/ |
crypt.tex | 147 and store data in a format independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt 183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines 404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode, 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher: 433 \index{Cipher Encrypt} \index{Cipher Decrypt} 443 These two functions will encrypt or decrypt (respectively) a single block of text\footnote{The size of which depends on 445 the same buffer. For the encrypt function \textit{pt}\footnote{pt stands for plaintext.} is the input and 521 /* encrypt the block */ 522 blowfish_ecb_encrypt(pt, /* encrypt this 8-byte array */ 644 and tables. The decryption and self--test function pointers of both \textit{encrypt only} descriptors are set to \textbf{NULL} and [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
eng_cryptodev.c | 389 cryp.op = ctx->encrypt ? COP_ENCRYPT : COP_DECRYPT; 393 if (!ctx->encrypt) { 408 if (ctx->encrypt) [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 389 cryp.op = ctx->encrypt ? COP_ENCRYPT : COP_DECRYPT; 393 if (!ctx->encrypt) { 408 if (ctx->encrypt) [all...] |
/frameworks/av/media/libstagefright/wifi-display/ |
MediaSender.cpp | 437 err = mHDCP->encrypt( 445 ALOGE("Failed to HDCP-encrypt media data (err %d)",
|
/external/chromium_org/third_party/tlslite/tlslite/ |
TLSRecordLayer.py | 520 #Encrypt for Block or Stream Cipher 522 #Add padding and encrypt (for Block Cipher): 540 #Encrypt 542 ciphertext = self._writeState.encContext.encrypt(plaintext) 545 #Encrypt (for Stream Cipher) 549 ciphertext = self._writeState.encContext.encrypt(plaintext) [all...] |
/external/ipsec-tools/src/racoon/ |
eaytest.c | 596 eay_func encrypt, 616 res1 = (encrypt)(buf, key, iv);
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | [all...] |
driver_hostap.c | 283 size_t data_len, int encrypt, const u8 *own_addr, 303 if (encrypt)
|
driver_wired.c | 311 const u8 *data, size_t data_len, int encrypt,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 273 size_t data_len, int encrypt) 279 "encrypt=%d)", 280 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt);
|
/frameworks/av/media/libmedia/ |
IDrm.cpp | 51 ENCRYPT, 316 virtual status_t encrypt(Vector<uint8_t> const &sessionId, function in struct:android::BpDrm 329 remote()->transact(ENCRYPT, data, &reply); 672 case ENCRYPT: 680 uint32_t result = encrypt(sessionId, keyId, input, iv, output);
|
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | [all...] |
/frameworks/base/core/java/android/bluetooth/ |
BluetoothAdapter.java | [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 45 int encrypt = 0; local 65 encrypt = 1; 71 encrypt, hostapd_sta_flags_to_drv(sta->flags)); 162 wpa_printf(MSG_ERROR, "Could not encrypt key"); [all...] |
/cts/suite/pts/deviceTests/browserbench/assets/octane/ |
crypto.js | 35 new Benchmark("Encrypt", encrypt), [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/SunSpider/tests/v8-v4/ |
v8-crypto.js | [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/SunSpider/tests/v8-v5/ |
v8-crypto.js | [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/SunSpider/tests/v8-v6/ |
v8-crypto.js | [all...] |
/external/chromium_org/third_party/zlib/contrib/minizip/ |
zip.c | 153 int encrypt; member in struct:__anon16434 [all...] |
/external/chromium_org/v8/benchmarks/ |
crypto.js | 35 new Benchmark("Encrypt", encrypt), [all...] |
/external/v8/benchmarks/ |
crypto.js | 35 new Benchmark("Encrypt", encrypt), [all...] |
/external/zlib/src/contrib/minizip/ |
zip.c | 153 int encrypt; member in struct:__anon30845 [all...] |
/frameworks/av/drm/mediadrm/plugins/mock/ |
MockDrmCryptoPlugin.cpp | 451 status_t MockDrmPlugin::encrypt(Vector<uint8_t> const &sessionId, function in class:android::MockDrmPlugin 458 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
|