/prebuilts/go/darwin-x86/src/crypto/aes/ |
cipher.go | 53 func (c *aesCipher) Encrypt(dst, src []byte) {
|
cipher_amd64.go | 48 func (c *aesCipherAsm) Encrypt(dst, src []byte) {
|
cipher_s390x.go | 61 func (c *aesCipherAsm) Encrypt(dst, src []byte) {
|
modes_test.go | 26 func (*testBlock) Encrypt(a, b []byte) {}
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
ctr_test.go | 16 func (noopBlock) Encrypt(dst, src []byte) { copy(dst, src) }
|
gcm_test.go | 325 func (w *wrapper) Encrypt(dst, src []byte) { w.block.Encrypt(dst, src) }
|
/prebuilts/go/darwin-x86/src/crypto/des/ |
cipher.go | 39 func (c *desCipher) Encrypt(dst, src []byte) { encryptBlock(c.subkeys[:], dst, src) } 63 func (c *tripleDESCipher) Encrypt(dst, src []byte) { 64 c.cipher1.Encrypt(dst, src) 66 c.cipher3.Encrypt(dst, dst) 71 c.cipher2.Encrypt(dst, dst)
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
cipher.go | 53 func (c *aesCipher) Encrypt(dst, src []byte) {
|
cipher_amd64.go | 48 func (c *aesCipherAsm) Encrypt(dst, src []byte) {
|
cipher_s390x.go | 61 func (c *aesCipherAsm) Encrypt(dst, src []byte) {
|
modes_test.go | 26 func (*testBlock) Encrypt(a, b []byte) {}
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
ctr_test.go | 16 func (noopBlock) Encrypt(dst, src []byte) { copy(dst, src) }
|
gcm_test.go | 325 func (w *wrapper) Encrypt(dst, src []byte) { w.block.Encrypt(dst, src) }
|
/prebuilts/go/linux-x86/src/crypto/des/ |
cipher.go | 39 func (c *desCipher) Encrypt(dst, src []byte) { encryptBlock(c.subkeys[:], dst, src) } 63 func (c *tripleDESCipher) Encrypt(dst, src []byte) { 64 c.cipher1.Encrypt(dst, src) 66 c.cipher3.Encrypt(dst, dst) 71 c.cipher2.Encrypt(dst, dst)
|
/system/keymaster/ |
ecies_kem.cpp | 75 bool EciesKem::Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, 77 return Encrypt(peer_public_value.peek_read(), peer_public_value.available_read(), 82 bool EciesKem::Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len,
|
key_blob_test.cpp | 67 keymaster_error_t Encrypt() { 100 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 128 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 138 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 155 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 172 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 189 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 203 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 226 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 249 ASSERT_EQ(KM_ERROR_OK, Encrypt()); [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Application/Cryptest/ |
BlockCipherVerify.c | 148 UINT8 Encrypt[256];
165 ZeroMem (Encrypt, sizeof (Encrypt));
174 Status = TdesEcbEncrypt (CipherCtx, TdesEcbData, 8, Encrypt);
180 Status = TdesEcbDecrypt (CipherCtx, Encrypt, 8, Decrypt);
186 if (CompareMem (Encrypt, TdesEcbCipher, 8) != 0) {
201 ZeroMem (Encrypt, sizeof (Encrypt));
210 Status = TdesEcbEncrypt (CipherCtx, TdesEcbData, 8, Encrypt);
216 Status = TdesEcbDecrypt (CipherCtx, Encrypt, 8, Decrypt); [all...] |
/system/security/keystore/ |
keystore_cli_v2.cpp | 182 {"RSA-2048 Encrypt", true, GetRSAEncryptParameters(2048)}, 183 {"RSA-3072 Encrypt", false, GetRSAEncryptParameters(3072)}, 184 {"RSA-4096 Encrypt", false, GetRSAEncryptParameters(4096)}, 406 int Encrypt(const std::string& key_name, const std::string& input_filename, 464 } else if (args[0] == "encrypt") { 465 return Encrypt(command_line->GetSwitchValueASCII("name"),
|
/system/tpm/attestation/client/ |
main.cc | 45 const char kEncryptCommand[] = "encrypt"; 73 encrypt [--user=<email>] [--label=<keylabel>] --input=<input_file> 197 task = base::Bind(&ClientLoop::Encrypt, weak_factory_.GetWeakPtr(), 381 void Encrypt(const std::string& label,
|
/external/pdfium/xfa/fxfa/ |
fxfa_basic.h | 853 Encrypt,
|
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-kms/1.11.18/ |
aws-java-sdk-kms-1.11.18.jar | |