/system/vold/ |
vdc.rc | 7 # One shot invocation to encrypt unencrypted volumes 8 on encrypt
|
/prebuilts/go/darwin-x86/src/crypto/des/ |
cipher.go | 39 func (c *desCipher) Encrypt(dst, src []byte) { encryptBlock(c.subkeys[:], dst, src) } 63 func (c *tripleDESCipher) Encrypt(dst, src []byte) { 64 c.cipher1.Encrypt(dst, src) 66 c.cipher3.Encrypt(dst, dst) 71 c.cipher2.Encrypt(dst, dst)
|
/prebuilts/go/linux-x86/src/crypto/des/ |
cipher.go | 39 func (c *desCipher) Encrypt(dst, src []byte) { encryptBlock(c.subkeys[:], dst, src) } 63 func (c *tripleDESCipher) Encrypt(dst, src []byte) { 64 c.cipher1.Encrypt(dst, src) 66 c.cipher3.Encrypt(dst, dst) 71 c.cipher2.Encrypt(dst, dst)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
AESWrapEngine.java | 13 * Create a regular AESWrapEngine specifying the encrypt for wrapping, decrypt for unwrapping. 21 * Create an AESWrapEngine where the underlying cipher is set to decrypt for wrapping, encrypt for unwrapping.
|
/frameworks/base/packages/BackupRestoreConfirmation/res/values-tl/ |
strings.xml | 28 <string name="device_encryption_restore_text" msgid="1570864916855208992">"Mangyaring ilagay ang password ng pag-encrypt ng iyong device sa ibaba."</string> 29 <string name="device_encryption_backup_text" msgid="5866590762672844664">"Mangyaring ilagay ang password ng pag-encrypt ng iyong device sa ibaba. Gagamitin rin ito upang i-encrypt ang backup na archive."</string> 30 <string name="backup_enc_password_text" msgid="4981585714795233099">"Mangyaring maglagay ng password na gamitin sa pag-e-encrypt ng buong data sa pag-backup. Kung iiwanan itong blangko, gagamitin ang iyong kasalukuyang backup na password:"</string> 31 <string name="backup_enc_password_optional" msgid="1350137345907579306">"Kung nais mong i-encrypt ang buong data ng backup, maglagay ng password sa ibaba:"</string> 32 <string name="backup_enc_password_required" msgid="7889652203371654149">"Dahil naka-encrypt ang iyong device, hinihiling sa iyo na i-encrypt ang iyong backup. Pakilagay ang password sa ibaba:"</string> 33 <string name="restore_enc_password_text" msgid="6140898525580710823">"Kung naka-encrypt ang data sa pagpapanumbalik, pakilagay ang password sa ibaba:"</string>
|
/external/autotest/client/cros/scripts/ |
destination | 18 print cmd, 'encrypt', ' '.join(common_args) 19 print cmd, 'verify', ' '.join(common_args), '<data to encrypt>' 44 if command == 'encrypt':
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/ |
setup.py | 34 'pyrsa-encrypt = rsa.cli:encrypt', 38 'pyrsa-encrypt-bigfile = rsa.cli:encrypt_bigfile',
|
/external/fonttools/Lib/fontTools/misc/ |
eexec.py | 29 def encrypt(plainstring, R): function 51 print(encrypt, encrypt(testStr, 12321))
|
/system/connectivity/shill/ |
crypto_rot47_unittest.cc | 43 TEST_F(CryptoROT47Test, Encrypt) { 45 EXPECT_TRUE(crypto_.Encrypt(kPlainText, &text)); 47 EXPECT_TRUE(crypto_.Encrypt(kEmpty, &text));
|
crypto_provider.cc | 47 string CryptoProvider::Encrypt(const string& plaintext) { 50 if (crypto->Encrypt(plaintext, &ciphertext)) { 55 LOG(WARNING) << "Unable to encrypt text, returning as is.";
|
crypto_rot47.cc | 31 bool CryptoROT47::Encrypt(const string& plaintext, string* ciphertext) { 50 return Encrypt(ciphertext, plaintext);
|
crypto_provider_unittest.cc | 84 TEST_F(CryptoProviderTest, Encrypt) { 85 EXPECT_EQ(kPlainText, provider_.Encrypt(kPlainText)); 86 EXPECT_EQ(kEmptyText, provider_.Encrypt(kEmptyText)); 89 EXPECT_EQ(kROT47Text, provider_.Encrypt(kPlainText)); 95 EXPECT_EQ(kROT47Text, provider_.Encrypt(kPlainText));
|
/external/boringssl/src/crypto/cipher/test/ |
cipher_test.txt | 57 # AES 128 ECB tests (from FIPS-197 test vectors, encrypt) 60 Operation = ENCRYPT 65 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 68 Operation = ENCRYPT 76 # ECB-AES128.Encrypt and ECB-AES128.Decrypt 98 # ECB-AES256.Encrypt and ECB-AES256.Decrypt 122 # CBC-AES128.Encrypt and CBC-AES128.Decrypt 148 # CBC-AES256.Encrypt and CBC-AES256.Decrypt 178 Operation = ENCRYPT 185 Operation = ENCRYPT [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/ |
rpc_des.h | 39 #define DES_MAXLEN 65536 /* maximum # of bytes to encrypt */ 40 #define DES_QUICKLEN 16 /* maximum # of bytes to encrypt quickly */ 44 ENCRYPT, DECRYPT
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpc/ |
rpc_des.h | 39 #define DES_MAXLEN 65536 /* maximum # of bytes to encrypt */ 40 #define DES_QUICKLEN 16 /* maximum # of bytes to encrypt quickly */ 44 ENCRYPT, DECRYPT
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
upgrading.rst | 18 re-encrypt them:: 24 new_crypto = rsa.encrypt(decrypted, version_3_public_key) 30 secure, but also requires a larger key to encrypt the same message. 32 :py:func:`rsa.bigfile.encrypt_bigfile` to encrypt your files.
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
test_pkcs1.py | 20 encrypted = pkcs1.encrypt(message, self.pub) 31 encrypted = pkcs1.encrypt(message, self.pub) 48 encrypted1 = pkcs1.encrypt(message, self.pub) 49 encrypted2 = pkcs1.encrypt(message, self.pub)
|
test_strings.py | 21 encrypted = rsa.encrypt(message, self.pub)
|
/system/sepolicy/ |
vdc.te | 3 # encrypt
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AESCipherNistCavpKatTest.java | 174 String section = null; // ENCRYPT or DECRYPT 195 if ((!"DECRYPT".equals(section)) && (!"ENCRYPT".equals(section))) { 222 boolean encrypt; 223 if ("ENCRYPT".equals(section)) { 224 encrypt = true; 226 encrypt = false; 230 runKatTest(blockMode, encrypt, testVector); 269 private void runKatTest(String mode, boolean encrypt, TestVector testVector) throws Exception { 286 int opmode = (encrypt) ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE; 293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
__init__.py | 35 from rsa.pkcs1 import encrypt, decrypt, sign, verify, DecryptionError, \ 43 __all__ = ["newkeys", "encrypt", "decrypt", "sign", "verify", 'PublicKey', 36 VerificationError namespace
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothServerSocket.java | 80 * @param encrypt require the connection to be encrypted 85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) 88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 98 * @param encrypt require the connection to be encrypted 105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, 109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 120 * @param encrypt require the connection to be encrypted 125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) 127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */ 39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt 41 extern void encrypt (char *__block, int __edflag) __THROW __nonnull ((1));
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */ 39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt 41 extern void encrypt (char *__libc_block, int __edflag) __THROW __nonnull ((1));
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
cipher.go | 12 // using a given key. It provides the capability to encrypt 19 // Encrypt encrypts the first block in src into dst. 21 Encrypt(dst, src []byte)
|