HomeSort by relevance Sort by last modified time
    Searched full:encrypt (Results 1 - 25 of 707) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /system/vold/
vdc.rc 7 # One shot invocation to encrypt unencrypted volumes
8 on encrypt
  /prebuilts/go/darwin-x86/src/crypto/des/
cipher.go 39 func (c *desCipher) Encrypt(dst, src []byte) { encryptBlock(c.subkeys[:], dst, src) }
63 func (c *tripleDESCipher) Encrypt(dst, src []byte) {
64 c.cipher1.Encrypt(dst, src)
66 c.cipher3.Encrypt(dst, dst)
71 c.cipher2.Encrypt(dst, dst)
  /prebuilts/go/linux-x86/src/crypto/des/
cipher.go 39 func (c *desCipher) Encrypt(dst, src []byte) { encryptBlock(c.subkeys[:], dst, src) }
63 func (c *tripleDESCipher) Encrypt(dst, src []byte) {
64 c.cipher1.Encrypt(dst, src)
66 c.cipher3.Encrypt(dst, dst)
71 c.cipher2.Encrypt(dst, dst)
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
AESWrapEngine.java 13 * Create a regular AESWrapEngine specifying the encrypt for wrapping, decrypt for unwrapping.
21 * Create an AESWrapEngine where the underlying cipher is set to decrypt for wrapping, encrypt for unwrapping.
  /frameworks/base/packages/BackupRestoreConfirmation/res/values-tl/
strings.xml 28 <string name="device_encryption_restore_text" msgid="1570864916855208992">"Mangyaring ilagay ang password ng pag-encrypt ng iyong device sa ibaba."</string>
29 <string name="device_encryption_backup_text" msgid="5866590762672844664">"Mangyaring ilagay ang password ng pag-encrypt ng iyong device sa ibaba. Gagamitin rin ito upang i-encrypt ang backup na archive."</string>
30 <string name="backup_enc_password_text" msgid="4981585714795233099">"Mangyaring maglagay ng password na gamitin sa pag-e-encrypt ng buong data sa pag-backup. Kung iiwanan itong blangko, gagamitin ang iyong kasalukuyang backup na password:"</string>
31 <string name="backup_enc_password_optional" msgid="1350137345907579306">"Kung nais mong i-encrypt ang buong data ng backup, maglagay ng password sa ibaba:"</string>
32 <string name="backup_enc_password_required" msgid="7889652203371654149">"Dahil naka-encrypt ang iyong device, hinihiling sa iyo na i-encrypt ang iyong backup. Pakilagay ang password sa ibaba:"</string>
33 <string name="restore_enc_password_text" msgid="6140898525580710823">"Kung naka-encrypt ang data sa pagpapanumbalik, pakilagay ang password sa ibaba:"</string>
  /external/autotest/client/cros/scripts/
destination 18 print cmd, 'encrypt', ' '.join(common_args)
19 print cmd, 'verify', ' '.join(common_args), '<data to encrypt>'
44 if command == 'encrypt':
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/
setup.py 34 'pyrsa-encrypt = rsa.cli:encrypt',
38 'pyrsa-encrypt-bigfile = rsa.cli:encrypt_bigfile',
  /external/fonttools/Lib/fontTools/misc/
eexec.py 29 def encrypt(plainstring, R): function
51 print(encrypt, encrypt(testStr, 12321))
  /system/connectivity/shill/
crypto_rot47_unittest.cc 43 TEST_F(CryptoROT47Test, Encrypt) {
45 EXPECT_TRUE(crypto_.Encrypt(kPlainText, &text));
47 EXPECT_TRUE(crypto_.Encrypt(kEmpty, &text));
crypto_provider.cc 47 string CryptoProvider::Encrypt(const string& plaintext) {
50 if (crypto->Encrypt(plaintext, &ciphertext)) {
55 LOG(WARNING) << "Unable to encrypt text, returning as is.";
crypto_rot47.cc 31 bool CryptoROT47::Encrypt(const string& plaintext, string* ciphertext) {
50 return Encrypt(ciphertext, plaintext);
crypto_provider_unittest.cc 84 TEST_F(CryptoProviderTest, Encrypt) {
85 EXPECT_EQ(kPlainText, provider_.Encrypt(kPlainText));
86 EXPECT_EQ(kEmptyText, provider_.Encrypt(kEmptyText));
89 EXPECT_EQ(kROT47Text, provider_.Encrypt(kPlainText));
95 EXPECT_EQ(kROT47Text, provider_.Encrypt(kPlainText));
  /external/boringssl/src/crypto/cipher/test/
cipher_test.txt 57 # AES 128 ECB tests (from FIPS-197 test vectors, encrypt)
60 Operation = ENCRYPT
65 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt)
68 Operation = ENCRYPT
76 # ECB-AES128.Encrypt and ECB-AES128.Decrypt
98 # ECB-AES256.Encrypt and ECB-AES256.Decrypt
122 # CBC-AES128.Encrypt and CBC-AES128.Decrypt
148 # CBC-AES256.Encrypt and CBC-AES256.Decrypt
178 Operation = ENCRYPT
185 Operation = ENCRYPT
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/
rpc_des.h 39 #define DES_MAXLEN 65536 /* maximum # of bytes to encrypt */
40 #define DES_QUICKLEN 16 /* maximum # of bytes to encrypt quickly */
44 ENCRYPT, DECRYPT
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpc/
rpc_des.h 39 #define DES_MAXLEN 65536 /* maximum # of bytes to encrypt */
40 #define DES_QUICKLEN 16 /* maximum # of bytes to encrypt quickly */
44 ENCRYPT, DECRYPT
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
upgrading.rst 18 re-encrypt them::
24 new_crypto = rsa.encrypt(decrypted, version_3_public_key)
30 secure, but also requires a larger key to encrypt the same message.
32 :py:func:`rsa.bigfile.encrypt_bigfile` to encrypt your files.
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
test_pkcs1.py 20 encrypted = pkcs1.encrypt(message, self.pub)
31 encrypted = pkcs1.encrypt(message, self.pub)
48 encrypted1 = pkcs1.encrypt(message, self.pub)
49 encrypted2 = pkcs1.encrypt(message, self.pub)
test_strings.py 21 encrypted = rsa.encrypt(message, self.pub)
  /system/sepolicy/
vdc.te 3 # encrypt
  /cts/tests/tests/keystore/src/android/keystore/cts/
AESCipherNistCavpKatTest.java 174 String section = null; // ENCRYPT or DECRYPT
195 if ((!"DECRYPT".equals(section)) && (!"ENCRYPT".equals(section))) {
222 boolean encrypt;
223 if ("ENCRYPT".equals(section)) {
224 encrypt = true;
226 encrypt = false;
230 runKatTest(blockMode, encrypt, testVector);
269 private void runKatTest(String mode, boolean encrypt, TestVector testVector) throws Exception {
286 int opmode = (encrypt) ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE;
293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
__init__.py 35 from rsa.pkcs1 import encrypt, decrypt, sign, verify, DecryptionError, \
43 __all__ = ["newkeys", "encrypt", "decrypt", "sign", "verify", 'PublicKey',
36 VerificationError namespace
  /frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java 80 * @param encrypt require the connection to be encrypted
85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port)
88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null);
98 * @param encrypt require the connection to be encrypted
105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port,
109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm,
120 * @param encrypt require the connection to be encrypted
125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid)
127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt
41 extern void encrypt (char *__block, int __edflag) __THROW __nonnull ((1));
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt
41 extern void encrypt (char *__libc_block, int __edflag) __THROW __nonnull ((1));
  /prebuilts/go/darwin-x86/src/crypto/cipher/
cipher.go 12 // using a given key. It provides the capability to encrypt
19 // Encrypt encrypts the first block in src into dst.
21 Encrypt(dst, src []byte)

Completed in 907 milliseconds

1 2 3 4 5 6 7 8 91011>>