/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
__init__.py | 35 from rsa.pkcs1 import encrypt, decrypt, sign, verify, DecryptionError, \ 43 __all__ = ["newkeys", "encrypt", "decrypt", "sign", "verify", 'PublicKey', 36 VerificationError namespace
|
bigfile.py | 19 - break a file into smaller blocks, and encrypt them, and store the 50 :param pub_key: :py:class:`rsa.PublicKey` to encrypt with 63 # Encrypt and write each block 65 crypto = pkcs1.encrypt(block, pub_key)
|
pkcs1.py | 143 def encrypt(message, pub_key): function 146 :param message: the message to encrypt. Must be a byte string no longer than 149 :param pub_key: the :py:class:`rsa.PublicKey` to encrypt with. 156 >>> crypto = encrypt(message, pub_key) 181 :param crypto: the crypto text as returned by :py:func:`rsa.encrypt` 193 >>> crypto = encrypt('hello', pub_key) 199 >>> crypto = encrypt('\x00\x00\x00\x00\x01', pub_key) 216 >>> crypto = encrypt('hello', pub_key) 268 # Encrypt the hash with the private key 376 __all__ = ['encrypt', 'decrypt', 'sign', 'verify' [all...] |
cli.py | 201 'pyrsa-encrypt-bigfile command.') 202 operation = 'encrypt' 210 return rsa.encrypt(indata, pub_key) 347 operation = 'encrypt' 361 'with pyrsa-encrypt-bigfile') 373 encrypt = EncryptOperation() variable
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothServerSocket.java | 80 * @param encrypt require the connection to be encrypted 85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) 88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 98 * @param encrypt require the connection to be encrypted 105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, 109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 120 * @param encrypt require the connection to be encrypted 125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) 127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
BluetoothSocket.java | 157 * @param encrypt require the connection to be encrypted 164 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, 166 this(type, fd, auth, encrypt, device, port, uuid, false, false); 174 * @param encrypt require the connection to be encrypted 183 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, 200 mEncrypt = encrypt; 258 * @param encrypt require the connection to be encrypted 264 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address, 266 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null, false, false);
|
/external/fonttools/Lib/fontTools/misc/ |
eexec.py | 29 def encrypt(plainstring, R): function 51 print(encrypt, encrypt(testStr, 12321))
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
test_pkcs1.py | 20 encrypted = pkcs1.encrypt(message, self.pub) 31 encrypted = pkcs1.encrypt(message, self.pub) 48 encrypted1 = pkcs1.encrypt(message, self.pub) 49 encrypted2 = pkcs1.encrypt(message, self.pub)
|
test_strings.py | 21 encrypted = rsa.encrypt(message, self.pub)
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AESCipherNistCavpKatTest.java | 174 String section = null; // ENCRYPT or DECRYPT 195 if ((!"DECRYPT".equals(section)) && (!"ENCRYPT".equals(section))) { 222 boolean encrypt; 223 if ("ENCRYPT".equals(section)) { 224 encrypt = true; 226 encrypt = false; 230 runKatTest(blockMode, encrypt, testVector); 269 private void runKatTest(String mode, boolean encrypt, TestVector testVector) throws Exception { 286 int opmode = (encrypt) ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE; 293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/ |
test_kms.py | 41 self.service_connection.encrypt(key_id='foo', plaintext=data) 52 self.service_connection.encrypt(key_id='foo', plaintext=data)
|
/external/boringssl/src/crypto/cipher/ |
e_des.c | 85 ctx->encrypt); 110 &dat->ks.ks, ctx->encrypt); 149 &dat->ks.ks[2], (DES_cblock *)ctx->iv, ctx->encrypt); 196 ctx->encrypt);
|
cipher_test.cc | 111 bool encrypt, 120 if (encrypt) { 132 encrypt ? 1 : 0)) { 146 if (is_aead && !encrypt && 200 if (encrypt && is_aead) { 251 if (str == "ENCRYPT") { 263 if (!TestOperation(t, cipher, true /* encrypt */, false /* single-shot */, 265 !TestOperation(t, cipher, true /* encrypt */, true /* streaming */, key,
|
/frameworks/av/media/libmediaplayerservice/ |
HDCP.h | 35 virtual status_t encrypt(
|
HDCP.cpp | 113 status_t HDCP::encrypt( function in class:android::HDCP 126 return mHDCPModule->encrypt(inData, size, streamCTR, outInputCTR, outData);
|
/libcore/ojluni/src/main/java/sun/security/ssl/ |
EngineOutputRecord.java | 138 * Encrypt a ByteBuffer. 147 void encrypt(CipherBox box, ByteBuffer bb) { method in class:EngineOutputRecord 148 box.encrypt(bb); 171 * We MAC/encrypt, then send down for processing. 199 encrypt(writeCipher); 297 * "flip" but skip over header again, add MAC & encrypt 306 * Encrypt may pad, so again the limit may have changed. 310 encrypt(writeCipher, dstBB); method 335 * Position was already set by encrypt() above.
|
CipherBox.java | 147 boolean encrypt) throws NoSuchAlgorithmException { 151 int mode = encrypt ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE; 200 boolean encrypt) throws NoSuchAlgorithmException { 208 return new CipherBox(version, cipher, key, iv, random, encrypt); 233 int encrypt(byte[] buf, int offset, int len) { method in class:CipherBox 288 * to encrypt. On return, the position and limit are 292 int encrypt(ByteBuffer bb) { method in class:CipherBox 356 * Encrypt "in-place". This does not add its own padding.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */ 39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt 41 extern void encrypt (char *__block, int __edflag) __THROW __nonnull ((1));
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */ 39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt 41 extern void encrypt (char *__libc_block, int __edflag) __THROW __nonnull ((1));
|
/external/srtp/crypto/include/ |
cipher.h | 85 * and direction (i.e., encrypt or decrypt) 143 cipher_encrypt_func_t encrypt; member in struct:cipher_type_t 175 (((c)->type)->encrypt(((c)->state), (buf), (len))) 206 * number of bits that a cipher implementation can encrypt in a second
|
/frameworks/av/include/media/ |
IHDCP.h | 51 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 61 // Encrypt data according to the HDCP spec. "size" bytes of data are 70 virtual status_t encrypt( 74 // Encrypt data according to the HDCP spec. "size" bytes of data starting
|
/frameworks/native/include/media/hardware/ |
HDCPAPI.h | 62 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 97 // Encrypt data according to the HDCP spec. "size" bytes of data are 106 virtual status_t encrypt( function in struct:android::HDCPModule 112 // Encrypt data according to the HDCP spec. "size" bytes of data starting
|
/device/google/contexthub/util/nanoapp_encr/ |
nanoapp_encr.c | 128 //encrypt and emit data 144 // finally, encrypt and output SHA2 hash 244 " -e : encrypt post-processed file\n" 266 bool encrypt = false; local 278 encrypt = true; 314 if (encrypt) 325 if (encrypt && !keyId) 326 fatalUsage(appName, "Non-zero Key ID must be given to encrypt data", NULL); 342 if (encrypt)
|
/external/ppp/pppd/ |
pppcrypt.c | 156 encrypt((char *)des_input, 0); 172 encrypt((char *)des_input, 1); 198 &key_schedule, 1 /* encrypt */);
|