HomeSort by relevance Sort by last modified time
    Searched refs:encrypt (Results 1 - 25 of 139) sorted by null

1 2 3 4 5 6

  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
__init__.py 35 from rsa.pkcs1 import encrypt, decrypt, sign, verify, DecryptionError, \
43 __all__ = ["newkeys", "encrypt", "decrypt", "sign", "verify", 'PublicKey',
36 VerificationError namespace
bigfile.py 19 - break a file into smaller blocks, and encrypt them, and store the
50 :param pub_key: :py:class:`rsa.PublicKey` to encrypt with
63 # Encrypt and write each block
65 crypto = pkcs1.encrypt(block, pub_key)
pkcs1.py 143 def encrypt(message, pub_key): function
146 :param message: the message to encrypt. Must be a byte string no longer than
149 :param pub_key: the :py:class:`rsa.PublicKey` to encrypt with.
156 >>> crypto = encrypt(message, pub_key)
181 :param crypto: the crypto text as returned by :py:func:`rsa.encrypt`
193 >>> crypto = encrypt('hello', pub_key)
199 >>> crypto = encrypt('\x00\x00\x00\x00\x01', pub_key)
216 >>> crypto = encrypt('hello', pub_key)
268 # Encrypt the hash with the private key
376 __all__ = ['encrypt', 'decrypt', 'sign', 'verify'
    [all...]
cli.py 201 'pyrsa-encrypt-bigfile command.')
202 operation = 'encrypt'
210 return rsa.encrypt(indata, pub_key)
347 operation = 'encrypt'
361 'with pyrsa-encrypt-bigfile')
373 encrypt = EncryptOperation() variable
  /frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java 80 * @param encrypt require the connection to be encrypted
85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port)
88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null);
98 * @param encrypt require the connection to be encrypted
105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port,
109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm,
120 * @param encrypt require the connection to be encrypted
125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid)
127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
BluetoothSocket.java 157 * @param encrypt require the connection to be encrypted
164 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt,
166 this(type, fd, auth, encrypt, device, port, uuid, false, false);
174 * @param encrypt require the connection to be encrypted
183 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt,
200 mEncrypt = encrypt;
258 * @param encrypt require the connection to be encrypted
264 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address,
266 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null, false, false);
  /external/fonttools/Lib/fontTools/misc/
eexec.py 29 def encrypt(plainstring, R): function
51 print(encrypt, encrypt(testStr, 12321))
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
test_pkcs1.py 20 encrypted = pkcs1.encrypt(message, self.pub)
31 encrypted = pkcs1.encrypt(message, self.pub)
48 encrypted1 = pkcs1.encrypt(message, self.pub)
49 encrypted2 = pkcs1.encrypt(message, self.pub)
test_strings.py 21 encrypted = rsa.encrypt(message, self.pub)
  /cts/tests/tests/keystore/src/android/keystore/cts/
AESCipherNistCavpKatTest.java 174 String section = null; // ENCRYPT or DECRYPT
195 if ((!"DECRYPT".equals(section)) && (!"ENCRYPT".equals(section))) {
222 boolean encrypt;
223 if ("ENCRYPT".equals(section)) {
224 encrypt = true;
226 encrypt = false;
230 runKatTest(blockMode, encrypt, testVector);
269 private void runKatTest(String mode, boolean encrypt, TestVector testVector) throws Exception {
286 int opmode = (encrypt) ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE;
293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/
test_kms.py 41 self.service_connection.encrypt(key_id='foo', plaintext=data)
52 self.service_connection.encrypt(key_id='foo', plaintext=data)
  /external/boringssl/src/crypto/cipher/
e_des.c 85 ctx->encrypt);
110 &dat->ks.ks, ctx->encrypt);
149 &dat->ks.ks[2], (DES_cblock *)ctx->iv, ctx->encrypt);
196 ctx->encrypt);
cipher_test.cc 111 bool encrypt,
120 if (encrypt) {
132 encrypt ? 1 : 0)) {
146 if (is_aead && !encrypt &&
200 if (encrypt && is_aead) {
251 if (str == "ENCRYPT") {
263 if (!TestOperation(t, cipher, true /* encrypt */, false /* single-shot */,
265 !TestOperation(t, cipher, true /* encrypt */, true /* streaming */, key,
  /frameworks/av/media/libmediaplayerservice/
HDCP.h 35 virtual status_t encrypt(
HDCP.cpp 113 status_t HDCP::encrypt( function in class:android::HDCP
126 return mHDCPModule->encrypt(inData, size, streamCTR, outInputCTR, outData);
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt
41 extern void encrypt (char *__block, int __edflag) __THROW __nonnull ((1));
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt
41 extern void encrypt (char *__libc_block, int __edflag) __THROW __nonnull ((1));
  /external/srtp/crypto/include/
cipher.h 85 * and direction (i.e., encrypt or decrypt)
143 cipher_encrypt_func_t encrypt; member in struct:cipher_type_t
175 (((c)->type)->encrypt(((c)->state), (buf), (len)))
206 * number of bits that a cipher implementation can encrypt in a second
  /frameworks/av/include/media/
IHDCP.h 51 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt
61 // Encrypt data according to the HDCP spec. "size" bytes of data are
70 virtual status_t encrypt(
74 // Encrypt data according to the HDCP spec. "size" bytes of data starting
  /frameworks/native/include/media/hardware/
HDCPAPI.h 62 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt
97 // Encrypt data according to the HDCP spec. "size" bytes of data are
106 virtual status_t encrypt( function in struct:android::HDCPModule
112 // Encrypt data according to the HDCP spec. "size" bytes of data starting
  /device/google/contexthub/util/nanoapp_encr/
nanoapp_encr.c 128 //encrypt and emit data
144 // finally, encrypt and output SHA2 hash
244 " -e : encrypt post-processed file\n"
266 bool encrypt = false; local
278 encrypt = true;
314 if (encrypt)
325 if (encrypt && !keyId)
326 fatalUsage(appName, "Non-zero Key ID must be given to encrypt data", NULL);
342 if (encrypt)
  /external/ppp/pppd/
pppcrypt.c 156 encrypt((char *)des_input, 0);
172 encrypt((char *)des_input, 1);
198 &key_schedule, 1 /* encrypt */);
  /external/wpa_supplicant_8/src/ap/
ctrl_iface_ap.c 327 int encrypt; local
331 encrypt = atoi(pos);
342 encrypt) < 0)
387 int encrypt; local
391 encrypt = atoi(pos);
402 encrypt) < 0)
  /external/boringssl/src/crypto/evp/
evp_ctx.c 288 if (!ctx || !ctx->pmeth || !ctx->pmeth->encrypt) {
305 if (!ctx || !ctx->pmeth || !ctx->pmeth->encrypt) {
313 return ctx->pmeth->encrypt(ctx, out, outlen, in, inlen);
364 !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) ||
  /external/ipsec-tools/src/racoon/
algorithm.h 156 vchar_t *(*encrypt) __P((vchar_t *, vchar_t *, vchar_t *)); member in struct:enc_algorithm

Completed in 1724 milliseconds

1 2 3 4 5 6