/external/fonttools/Lib/fontTools/misc/ |
H A D | eexec.py | 29 def encrypt(plainstring, R): function 51 print(encrypt, encrypt(testStr, 12321))
|
/external/fonttools/Tools/fontTools/misc/ |
H A D | eexec.py | 29 def encrypt(plainstring, R): function 51 print(encrypt, encrypt(testStr, 12321))
|
/external/boringssl/src/crypto/cipher/ |
H A D | e_des.c | 85 ctx->encrypt); 124 &dat->ks.ks[2], (DES_cblock *)ctx->iv, ctx->encrypt);
|
H A D | cipher_test.cc | 106 bool encrypt, 114 if (encrypt) { 126 encrypt ? 1 : 0)) { 140 if (is_aead && !encrypt && 177 if (encrypt && is_aead) { 240 !TestOperation(t, cipher, true /* encrypt */, key, iv, plaintext, 104 TestOperation(FileTest *t, const EVP_CIPHER *cipher, bool encrypt, const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, const std::vector<uint8_t> &plaintext, const std::vector<uint8_t> &ciphertext, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &tag) argument
|
H A D | cipher.c | 145 enc = ctx->encrypt; 150 ctx->encrypt = enc; 159 /* Restore encrypt and flags */ 160 ctx->encrypt = enc; 487 if (ctx->encrypt) { 495 if (ctx->encrypt) {
|
H A D | e_rc2.c | 213 RC2_KEY *ks, uint8_t *iv, int encrypt) { 219 if (encrypt) { 380 RC2_cbc_encrypt(in, out, kChunkSize, &key->ks, ctx->iv, ctx->encrypt); 386 RC2_cbc_encrypt(in, out, inl, &key->ks, ctx->iv, ctx->encrypt); 212 RC2_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t length, RC2_KEY *ks, uint8_t *iv, int encrypt) argument
|
H A D | e_aes.c | 353 (*dat->stream.cbc)(in, out, len, &dat->ks, ctx->iv, ctx->encrypt); 354 } else if (ctx->encrypt) { 550 if (arg <= 0 || arg > 16 || c->encrypt) { 558 if (arg <= 0 || arg > 16 || !c->encrypt || gctx->taglen < 0) { 579 if (c->encrypt && !RAND_bytes(gctx->iv + arg, gctx->ivlen - arg)) { 602 if (gctx->iv_gen == 0 || gctx->key_set == 0 || c->encrypt) { 653 } else if (ctx->encrypt) { 712 if (!ctx->encrypt) { 865 aesni_cbc_encrypt(in, out, len, ctx->cipher_data, ctx->iv, ctx->encrypt); 878 aesni_ecb_encrypt(in, out, len, ctx->cipher_data, ctx->encrypt); [all...] |
H A D | e_ssl3.c | 134 if (!ssl3_ctx->cipher_ctx.encrypt) { 218 if (ssl3_ctx->cipher_ctx.encrypt) {
|
/external/srtp/crypto/include/ |
H A D | cipher.h | 85 * and direction (i.e., encrypt or decrypt) 143 cipher_encrypt_func_t encrypt; member in struct:cipher_type_t 175 (((c)->type)->encrypt(((c)->state), (buf), (len))) 206 * number of bits that a cipher implementation can encrypt in a second
|
/external/openssh/ |
H A D | cipher.h | 68 int encrypt; member in struct:sshcipher_ctx
|
H A D | cipher-aes.c | 61 enc = ctx->encrypt; 87 if (ctx->encrypt) {
|
H A D | cipher.c | 312 cc->encrypt = do_encrypt; 396 len, aadlen, authlen, cc->encrypt); 422 if (!cc->encrypt && 439 /* compute tag (on encrypt) or verify tag (on decrypt) */ 441 return cc->encrypt ? 443 if (cc->encrypt &&
|
H A D | cipher-3des1.c | 66 enc = ctx->encrypt;
|
/external/ppp/pppd/ |
H A D | pppcrypt.c | 156 encrypt((char *)des_input, 0); 172 encrypt((char *)des_input, 1); 198 &key_schedule, 1 /* encrypt */);
|
/external/boringssl/src/crypto/rsa/ |
H A D | rsa_impl.c | 88 static int encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, function 97 OPENSSL_PUT_ERROR(RSA, encrypt, RSA_R_MODULUS_TOO_LARGE); 102 OPENSSL_PUT_ERROR(RSA, encrypt, RSA_R_OUTPUT_BUFFER_TOO_SMALL); 107 OPENSSL_PUT_ERROR(RSA, encrypt, RSA_R_BAD_E_VALUE); 114 OPENSSL_PUT_ERROR(RSA, encrypt, RSA_R_BAD_E_VALUE); 128 OPENSSL_PUT_ERROR(RSA, encrypt, ERR_R_MALLOC_FAILURE); 145 OPENSSL_PUT_ERROR(RSA, encrypt, RSA_R_UNKNOWN_PADDING_TYPE); 159 OPENSSL_PUT_ERROR(RSA, encrypt, RSA_R_DATA_TOO_LARGE_FOR_MODULUS); 178 OPENSSL_PUT_ERROR(RSA, encrypt, ERR_R_INTERNAL_ERROR); 945 encrypt, [all...] |
/external/libvncserver/x11vnc/ |
H A D | enc.h | 690 * encrypt or decrypt. 692 static void enc_xfer(int sock_fr, int sock_to, int encrypt) { argument 736 encrypt = (!encrypt); 738 encstr = encrypt ? "encrypt" : "decrypt"; /* string for messages */ 739 encsym = encrypt ? "+" : "-"; 742 if (encrypt) { 756 } else if (encrypt) { 847 encrypt); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ctrl_iface_ap.c | 309 int encrypt; local 313 encrypt = atoi(pos); 324 encrypt) < 0) 369 int encrypt; local 373 encrypt = atoi(pos); 384 encrypt) < 0)
|
H A D | ap_drv_ops.h | 160 size_t data_len, int encrypt, 166 data_len, encrypt, 158 hostapd_drv_hapd_send_eapol(struct hostapd_data *hapd, const u8 *addr, const u8 *data, size_t data_len, int encrypt, u32 flags) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ctrl_iface_ap.c | 309 int encrypt; local 313 encrypt = atoi(pos); 324 encrypt) < 0) 369 int encrypt; local 373 encrypt = atoi(pos); 384 encrypt) < 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ctrl_iface_ap.c | 309 int encrypt; local 313 encrypt = atoi(pos); 324 encrypt) < 0) 369 int encrypt; local 373 encrypt = atoi(pos); 384 encrypt) < 0)
|
/external/boringssl/src/crypto/evp/ |
H A D | evp_ctx.c | 297 if (!ctx || !ctx->pmeth || !ctx->pmeth->encrypt) { 315 if (!ctx || !ctx->pmeth || !ctx->pmeth->encrypt) { 324 return ctx->pmeth->encrypt(ctx, out, outlen, in, inlen); 378 !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) ||
|
/external/ipsec-tools/src/racoon/ |
H A D | algorithm.h | 156 vchar_t *(*encrypt) __P((vchar_t *, vchar_t *, vchar_t *)); member in struct:enc_algorithm
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.security_1.0.200.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 232 size_t data_len, int encrypt) 237 "encrypt=%d)", 238 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); 231 auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_monitor.c | 439 int encrypt, int noack) 472 if (encrypt) 437 nl80211_send_monitor(struct wpa_driver_nl80211_data *drv, const void *data, size_t len, int encrypt, int noack) argument
|