/external/boringssl/src/fipstools/ |
cavp_keywrap_test.cc | 30 bool encrypt; member in struct:__anon14356::TestCtx 35 static bool AESKeyWrap(std::vector<uint8_t> *out, bool encrypt, 44 if (encrypt) { 66 std::string count, unused, in_label = ctx->encrypt ? "P" : "C", 67 result_label = ctx->encrypt ? "C" : "P"; 79 if (!AESKeyWrap(&result, ctx->encrypt, key, in)) { 80 if (ctx->encrypt) { 107 bool encrypt; local 109 encrypt = true; 111 encrypt = false [all...] |
cavp_aes_test.cc | 44 bool encrypt, std::vector<uint8_t> key, 46 const std::string in_label = encrypt ? "PLAINTEXT" : "CIPHERTEXT", 47 result_label = encrypt ? "CIPHERTEXT" : "PLAINTEXT"; 61 if (!CipherOperation(cipher, &result, encrypt, key, iv, in)) { 70 if (encrypt) { 77 if (!CipherOperation(cipher, &result, encrypt, key, iv, in)) { 133 if (t->HasInstruction("ENCRYPT") == t->HasInstruction("DECRYPT")) { 134 t->PrintLine("Want either ENCRYPT or DECRYPT"); 140 } operation = t->HasInstruction("ENCRYPT") ? kEncrypt : kDecrypt; 171 operation == kEncrypt ? "[ENCRYPT]" : "[DECRYPT]" [all...] |
/frameworks/base/core/java/android/bluetooth/ |
BluetoothServerSocket.java | 82 * @param encrypt require the connection to be encrypted 87 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port) 90 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null); 101 * @param encrypt require the connection to be encrypted 108 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, int port, 112 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, port, null, mitm, 124 * @param encrypt require the connection to be encrypted 129 /*package*/ BluetoothServerSocket(int type, boolean auth, boolean encrypt, ParcelUuid uuid) 131 mSocket = new BluetoothSocket(type, -1, auth, encrypt, null, -1, uuid);
|
/external/fonttools/Lib/fontTools/misc/ |
eexec.py | 29 def encrypt(plainstring, R): function 51 print(encrypt, encrypt(testStr, 12321))
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
CipherEncryptBenchmark.java | 24 * Benchmark for comparing cipher encrypt performance. 57 int encrypt() throws Exception { method in class:CipherEncryptBenchmark 58 return encryptStrategy.encrypt(); 90 abstract int encrypt() throws Exception; method in class:CipherEncryptBenchmark.EncryptStrategy 105 int encrypt() throws Exception { method in class:CipherEncryptBenchmark.ArrayStrategy 143 int encrypt() throws Exception { method in class:CipherEncryptBenchmark.ByteBufferStrategy
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AESCipherNistCavpKatTest.java | 174 String section = null; // ENCRYPT or DECRYPT 195 if ((!"DECRYPT".equals(section)) && (!"ENCRYPT".equals(section))) { 222 boolean encrypt; 223 if ("ENCRYPT".equals(section)) { 224 encrypt = true; 226 encrypt = false; 230 runKatTest(blockMode, encrypt, testVector); 269 private void runKatTest(String mode, boolean encrypt, TestVector testVector) throws Exception { 286 int opmode = (encrypt) ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE; 293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext [all...] |
/external/conscrypt/benchmark-jmh/src/jmh/java/org/conscrypt/ |
JmhCipherEncryptBenchmark.java | 56 public void encrypt(Blackhole bh) throws Exception { method in class:JmhCipherEncryptBenchmark 57 bh.consume(benchmark.encrypt());
|
/external/boringssl/src/decrepit/cfb/ |
cfb.c | 47 ctx->encrypt ? AES_ENCRYPT : AES_DECRYPT);
|
/frameworks/native/headers/media_plugin/media/hardware/ |
HDCPAPI.h | 61 // HDCP_CAPS_ENCRYPT: mandatory, meaning the HDCP module can encrypt 96 // Encrypt data according to the HDCP spec. "size" bytes of data are 105 virtual status_t encrypt( function in struct:android::HDCPModule 111 // Encrypt data according to the HDCP spec. "size" bytes of data starting
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */ 39 /* Encrypt data in BLOCK in place if EDFLAG is zero; otherwise decrypt 41 extern void encrypt (char *__libc_block, int __edflag) __THROW __nonnull ((1));
|
/external/boringssl/src/crypto/cipher_extra/ |
cipher_test.cc | 114 static void TestOperation(FileTest *t, const EVP_CIPHER *cipher, bool encrypt, 122 if (encrypt) { 134 encrypt ? 1 : 0)); 143 if (is_aead && !encrypt) { 184 if (encrypt && is_aead) { 218 if (str == "ENCRYPT") { 234 SCOPED_TRACE("encrypt"); 235 TestOperation(t, cipher, true /* encrypt */, chunk_size, key, iv,
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
SyntheticPasswordCrypto.java | 67 private static byte[] encrypt(SecretKey key, byte[] blob) method in class:SyntheticPasswordCrypto 88 public static byte[] encrypt(byte[] keyBytes, byte[] personalisation, byte[] message) { method in class:SyntheticPasswordCrypto 93 return encrypt(key, message); 167 byte[] intermediate = encrypt(applicationId, APPLICATION_ID_PERSONALIZATION, data); 168 return encrypt(secretKey, intermediate); 174 throw new RuntimeException("Failed to encrypt blob", e);
|
/external/syslinux/gpxe/src/include/gpxe/ |
crypto.h | 69 /** Encrypt data 72 * @v src Data to encrypt 78 void ( * encrypt ) ( void *ctx, const void *src, void *dst, member in struct:cipher_algorithm 129 cipher->encrypt ( ctx, src, dst, len );
|
cbc.h | 96 .encrypt = _cbc_name ## _encrypt, \
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
e_des.c | 86 ctx->encrypt); 113 &dat->ks.ks, ctx->encrypt); 154 &dat->ks.ks[2], (DES_cblock *)ctx->iv, ctx->encrypt); 206 ctx->encrypt);
|
/external/syslinux/gpxe/src/crypto/ |
crypto_null.c | 80 .encrypt = cipher_null_encrypt,
|
arc4.c | 65 * @v srcv Data to encrypt or decrypt 110 * @v src Message to encrypt or decrypt 129 .encrypt = arc4_xor,
|
axtls_aes.c | 108 * Encrypt data 111 * @v src Data to encrypt 152 .encrypt = aes_encrypt,
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
KeySyncUtils.java | 75 * @throws InvalidKeyException if the public key or the lock screen could not be used to encrypt 89 return SecureBox.encrypt( 120 * @throws InvalidKeyException if the hash cannot be used to encrypt for some reason. 125 return SecureBox.encrypt( 160 byte[] encryptedKey = SecureBox.encrypt( 192 * @throws InvalidKeyException if the {@code publicKey} could not be used to encrypt. 202 return SecureBox.encrypt( 212 * @param keyClaimant The key claimant, used by the remote service to encrypt the response.
|
/system/iot/attestation/partner-tools/ |
aesgcm.py | 36 def encrypt(plaintext, key, associated_data=''): member in class:AESGCM
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
SecureBoxTest.java | 194 state = SecureBox.encrypt(THM_PUBLIC_KEY, TEST_SHARED_SECRET, TEST_HEADER, state); 205 SecureBox.encrypt( 216 SecureBox.encrypt( 226 SecureBox.encrypt( 236 SecureBox.encrypt( 253 SecureBox.encrypt( 292 SecureBox.encrypt(THM_PUBLIC_KEY, TEST_SHARED_SECRET, TEST_HEADER, TEST_PAYLOAD); 310 () -> SecureBox.encrypt(publicKey, TEST_SHARED_SECRET, TEST_HEADER, TEST_PAYLOAD)); 316 SecureBox.encrypt(THM_PUBLIC_KEY, TEST_SHARED_SECRET, TEST_HEADER, TEST_PAYLOAD); 329 SecureBox.encrypt(THM_PUBLIC_KEY, TEST_SHARED_SECRET, TEST_HEADER, TEST_PAYLOAD) [all...] |
/device/google/contexthub/util/nanoapp_encr/ |
nanoapp_encr.c | 128 //encrypt and emit data 144 // finally, encrypt and output SHA2 hash 244 " -e : encrypt post-processed file\n" 266 bool encrypt = false; local 278 encrypt = true; 314 if (encrypt) 325 if (encrypt && !keyId) 326 fatalUsage(appName, "Non-zero Key ID must be given to encrypt data", NULL); 342 if (encrypt)
|
/external/scapy/test/ |
ipsec.uts | 26 e = sa.encrypt(p) 57 e = sa.encrypt(p) 109 e = sa.encrypt(p) 161 e = sa.encrypt(p) 213 e = sa.encrypt(p) 264 e = sa.encrypt(p) 315 e = sa.encrypt(p) 371 e = sa.encrypt(p) 404 e = sa.encrypt(p) 439 e = sa.encrypt(p [all...] |
/external/ppp/pppd/ |
pppcrypt.c | 156 encrypt((char *)des_input, 0); 172 encrypt((char *)des_input, 1); 198 &key_schedule, 1 /* encrypt */);
|
/external/scapy/scapy/layers/tls/crypto/ |
cipher_stream.py | 47 and _dec_updated_with every time encrypt() or decrypt() is called. 83 def encrypt(self, data): member in class:_StreamCipher 129 def encrypt(self, data): member in class:Cipher_NULL
|