/external/libvncserver/webclients/novnc/include/ |
des.js | 187 // Encrypt 8 bytes of text 268 // Encrypt 16 bytes of text using passwd as key 269 function encrypt(t) { function in function:DES 274 return {'encrypt': encrypt}; // Public interface
|
/system/iot/attestation/partner-tools/ |
aesgcm.py | 36 def encrypt(plaintext, key, associated_data=''): member in class:AESGCM
|
/external/fonttools/Lib/fontTools/misc/ |
eexec.py | 29 def encrypt(plainstring, R): function 51 print(encrypt, encrypt(testStr, 12321))
|
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/ |
JmhCipherEncryptBenchmark.java | 56 public void encrypt(Blackhole bh) throws Exception { method in class:JmhCipherEncryptBenchmark 57 bh.consume(benchmark.encrypt());
|
/external/scapy/scapy/layers/tls/crypto/ |
cipher_stream.py | 47 and _dec_updated_with every time encrypt() or decrypt() is called. 83 def encrypt(self, data): member in class:_StreamCipher 129 def encrypt(self, data): member in class:Cipher_NULL
|
pkcs1.py | 129 warning("Key.encrypt(): Unknown padding type (%s)", padStr) 143 def encrypt(self, m, t="pkcs", h="sha256", mgf=None, L=None): member in class:_EncryptAndVerifyRSA 147 return self.pubkey.encrypt(m, pad)
|
cipher_block.py | 78 def encrypt(self, data): member in class:_BlockCipher 80 Encrypt the data. Also, update the cipher iv. This is needed for SSLv3
|
/external/boringssl/src/fipstools/ |
cavp_keywrap_test.cc | 30 bool encrypt; member in struct:__anon14356::TestCtx 35 static bool AESKeyWrap(std::vector<uint8_t> *out, bool encrypt, 44 if (encrypt) { 66 std::string count, unused, in_label = ctx->encrypt ? "P" : "C", 67 result_label = ctx->encrypt ? "C" : "P"; 79 if (!AESKeyWrap(&result, ctx->encrypt, key, in)) { 80 if (ctx->encrypt) { 107 bool encrypt; local 109 encrypt = true; 111 encrypt = false [all...] |
/external/scapy/scapy/contrib/ |
macsec.py | 47 def __init__(self, sci, an, pn, key, icvlen, encrypt, send_sci): 58 self.do_encrypt = encrypt 127 def encrypt(self, orig_pkt, assoclen=None): member in class:MACsecSA 128 """encrypt a MACsec frame for this Secure Association"""
|
/external/pdfium/core/fdrm/crypto/ |
fx_crypt.h | 22 void (*encrypt)(CRYPT_aes_context* ctx, unsigned int* block); member in struct:CRYPT_aes_context
|
/external/syslinux/gpxe/src/include/gpxe/ |
crypto.h | 69 /** Encrypt data 72 * @v src Data to encrypt 78 void ( * encrypt ) ( void *ctx, const void *src, void *dst, member in struct:cipher_algorithm 129 cipher->encrypt ( ctx, src, dst, len );
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/ |
DrmPlugin.h | 193 virtual status_t encrypt( function in class:clearkeydrm::DrmPlugin
|
/frameworks/native/headers/media_plugin/media/hardware/ |
HDCPAPI.h | 61 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 96 // Encrypt data according to the HDCP spec. "size" bytes of data are 105 virtual status_t encrypt( function in struct:android::HDCPModule 111 // Encrypt data according to the HDCP spec. "size" bytes of data starting
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
CipherEncryptBenchmark.java | 24 * Benchmark for comparing cipher encrypt performance. 57 int encrypt() throws Exception { method in class:CipherEncryptBenchmark 58 return encryptStrategy.encrypt(); 90 abstract int encrypt() throws Exception; method in class:CipherEncryptBenchmark.EncryptStrategy 105 int encrypt() throws Exception { method in class:CipherEncryptBenchmark.ArrayStrategy 143 int encrypt() throws Exception { method in class:CipherEncryptBenchmark.ByteBufferStrategy
|
/external/scapy/scapy/layers/ |
ipsec.py | 30 >>> e = sa.encrypt(p) 296 Add the correct amount of padding so that the data to encrypt is 329 def encrypt(self, sa, esp, key): member in class:CryptAlgo 331 Encrypt an ESP packet 935 def encrypt(self, pkt, seq_num=None, iv=None): member in class:SecurityAssociation [all...] |
dot11.py | 314 def encrypt(self, p, pay, key=None): member in class:Dot11WEP 335 p = self.encrypt(p, raw(pay))
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
SyntheticPasswordCrypto.java | 67 private static byte[] encrypt(SecretKey key, byte[] blob) method in class:SyntheticPasswordCrypto 88 public static byte[] encrypt(byte[] keyBytes, byte[] personalisation, byte[] message) { method in class:SyntheticPasswordCrypto 93 return encrypt(key, message); 167 byte[] intermediate = encrypt(applicationId, APPLICATION_ID_PERSONALIZATION, data); 168 return encrypt(secretKey, intermediate); 174 throw new RuntimeException("Failed to encrypt blob", e);
|
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
rsa.go | 344 // ErrMessageTooLong is returned when attempting to encrypt a message which is 348 func encrypt(c *big.Int, pub *PublicKey, m *big.Int) *big.Int { func 403 c := encrypt(new(big.Int), pub, m) 567 check := encrypt(new(big.Int), &priv.PublicKey, m)
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
rsa.go | 344 // ErrMessageTooLong is returned when attempting to encrypt a message which is 348 func encrypt(c *big.Int, pub *PublicKey, m *big.Int) *big.Int { func 403 c := encrypt(new(big.Int), pub, m) 567 check := encrypt(new(big.Int), &priv.PublicKey, m)
|
/device/google/contexthub/util/nanoapp_encr/ |
nanoapp_encr.c | 128 //encrypt and emit data 144 // finally, encrypt and output SHA2 hash 244 " -e : encrypt post-processed file\n" 266 bool encrypt = false; local 278 encrypt = true; 314 if (encrypt) 325 if (encrypt && !keyId) 326 fatalUsage(appName, "Non-zero Key ID must be given to encrypt data", NULL); 342 if (encrypt)
|
/external/scapy/scapy/layers/tls/ |
cert.py | 297 def encrypt(self, msg, t="pkcs", h="sha256", mgf=None, L=None): member in class:PubKeyRSA 299 return _EncryptAndVerifyRSA.encrypt(self, msg, t, h, mgf, L) 321 def encrypt(self, msg, h="sha256", **kwargs): member in class:PubKeyECDSA 639 def encrypt(self, msg, t="pkcs", h="sha256", mgf=None, L=None): member in class:Cert 641 return self.pubKey.encrypt(msg, t, h, mgf, L) [all...] |
/external/wpa_supplicant_8/src/ap/ |
ctrl_iface_ap.c | 397 int encrypt; local 401 encrypt = atoi(pos); 412 encrypt) < 0) 460 int encrypt; local 464 encrypt = atoi(pos); 475 encrypt) < 0)
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/ |
DrmPlugin.h | 174 Return<void> encrypt( function in struct:android::hardware::drm::V1_1::clearkey::DrmPlugin
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
MockDrmCryptoPlugin.cpp | 552 status_t MockDrmPlugin::encrypt(Vector<uint8_t> const &sessionId, function in class:android::MockDrmPlugin 559 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)",
|
/hardware/interfaces/drm/1.0/default/ |
DrmPlugin.cpp | 267 Return<void> DrmPlugin::encrypt(const hidl_vec<uint8_t>& sessionId, function in class:android::hardware::drm::V1_0::implementation::DrmPlugin 272 status_t status = mLegacyPlugin->encrypt(toVector(sessionId),
|