/frameworks/base/core/java/android/bluetooth/ |
BluetoothServerSocket.java | 80 * @param encrypt require the connection to be encrypted 85 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) 88 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 98 * @param encrypt require the connection to be encrypted 105 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, 109 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 120 * @param encrypt require the connection to be encrypted 125 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) 127 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
BluetoothSocket.java | 157 * @param encrypt require the connection to be encrypted 164 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, 166 this(type, fd, auth, encrypt, device, port, uuid, false, false); 174 * @param encrypt require the connection to be encrypted 183 /*package*/ BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, 200 mEncrypt = encrypt; 258 * @param encrypt require the connection to be encrypted 264 private BluetoothSocket(int type, int fd, boolean auth, boolean encrypt, String address, 266 this(type, fd, auth, encrypt, new BluetoothDevice(address), port, null, false, false);
|
/external/fonttools/Lib/fontTools/misc/ |
eexec.py | 29 def encrypt(plainstring, R): function 51 print(encrypt, encrypt(testStr, 12321))
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AESCipherNistCavpKatTest.java | 174 String section = null; // ENCRYPT or DECRYPT 195 if ((!"DECRYPT".equals(section)) && (!"ENCRYPT".equals(section))) { 222 boolean encrypt; 223 if ("ENCRYPT".equals(section)) { 224 encrypt = true; 226 encrypt = false; 230 runKatTest(blockMode, encrypt, testVector); 269 private void runKatTest(String mode, boolean encrypt, TestVector testVector) throws Exception { 286 int opmode = (encrypt) ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE; 293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext [all...] |
/external/boringssl/src/crypto/cipher/ |
e_des.c | 85 ctx->encrypt); 109 &dat->ks.ks, ctx->encrypt); 148 &dat->ks.ks[2], (DES_cblock *)ctx->iv, ctx->encrypt); 194 ctx->encrypt);
|
cipher_test.cc | 110 bool encrypt, 119 if (encrypt) { 131 encrypt ? 1 : 0)) { 145 if (is_aead && !encrypt && 204 if (encrypt && is_aead) { 255 if (str == "ENCRYPT") { 271 !TestOperation(t, cipher, true /* encrypt */, chunk_size, key, iv,
|
/frameworks/native/include/media/hardware/ |
HDCPAPI.h | 62 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 97 // Encrypt data according to the HDCP spec. "size" bytes of data are 106 virtual status_t encrypt( function in struct:android::HDCPModule 112 // Encrypt data according to the HDCP spec. "size" bytes of data starting
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */ 39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt 41 extern void encrypt (char *__block, int __edflag) __THROW __nonnull ((1));
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */ 39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt 41 extern void encrypt (char *__libc_block, int __edflag) __THROW __nonnull ((1));
|
/frameworks/base/services/core/java/com/android/server/ |
SyntheticPasswordCrypto.java | 67 private static byte[] encrypt(SecretKey key, byte[] blob) method in class:SyntheticPasswordCrypto 88 public static byte[] encrypt(byte[] keyBytes, byte[] personalisation, byte[] message) { method in class:SyntheticPasswordCrypto 93 return encrypt(key, message); 153 byte[] intermediate = encrypt(secretKey, data); 154 return encrypt(applicationId, APPLICATION_ID_PERSONALIZATION, intermediate); 161 throw new RuntimeException("Failed to encrypt blob", e);
|
/external/syslinux/gpxe/src/include/gpxe/ |
crypto.h | 69 /** Encrypt data 72 * @v src Data to encrypt 78 void ( * encrypt ) ( void *ctx, const void *src, void *dst, member in struct:cipher_algorithm 129 cipher->encrypt ( ctx, src, dst, len );
|
cbc.h | 96 .encrypt = _cbc_name ## _encrypt, \
|
/external/openssh/ |
cipher.h | 68 int encrypt; member in struct:sshcipher_ctx
|
cipher-aes.c | 61 enc = ctx->encrypt; 87 if (ctx->encrypt) {
|
/external/syslinux/gpxe/src/crypto/ |
crypto_null.c | 80 .encrypt = cipher_null_encrypt,
|
arc4.c | 65 * @v srcv Data to encrypt or decrypt 110 * @v src Message to encrypt or decrypt 129 .encrypt = arc4_xor,
|
axtls_aes.c | 108 * Encrypt data 111 * @v src Data to encrypt 152 .encrypt = aes_encrypt,
|
/frameworks/av/media/libmedia/include/media/ |
IHDCP.h | 51 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 61 // Encrypt data according to the HDCP spec. "size" bytes of data are 70 virtual status_t encrypt( 74 // Encrypt data according to the HDCP spec. "size" bytes of data starting
|
/frameworks/av/media/libmediaplayerservice/ |
HDCP.h | 35 virtual status_t encrypt(
|
HDCP.cpp | 113 status_t HDCP::encrypt( function in class:android::HDCP 126 return mHDCPModule->encrypt(inData, size, streamCTR, outInputCTR, outData);
|
/device/google/contexthub/util/nanoapp_encr/ |
nanoapp_encr.c | 128 //encrypt and emit data 144 // finally, encrypt and output SHA2 hash 244 " -e : encrypt post-processed file\n" 266 bool encrypt = false; local 278 encrypt = true; 314 if (encrypt) 325 if (encrypt && !keyId) 326 fatalUsage(appName, "Non-zero Key ID must be given to encrypt data", NULL); 342 if (encrypt)
|
/external/ppp/pppd/ |
pppcrypt.c | 156 encrypt((char *)des_input, 0); 172 encrypt((char *)des_input, 1); 198 &key_schedule, 1 /* encrypt */);
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
cipher_test.go | 68 assertEqual("CBC encrypt", ct, pt) 76 assertEqual("CFB encrypt", ct, pt)
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
cipher_test.go | 68 assertEqual("CBC encrypt", ct, pt) 76 assertEqual("CFB encrypt", ct, pt)
|
/external/wpa_supplicant_8/src/ap/ |
ctrl_iface_ap.c | 328 int encrypt; local 332 encrypt = atoi(pos); 343 encrypt) < 0) 391 int encrypt; local 395 encrypt = atoi(pos); 406 encrypt) < 0)
|