/external/wpa_supplicant_8/src/crypto/ |
D | crypto_none.c | 21 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument
|
D | ms_funcs.c | 497 const u8 *block, u8 *cypher) in nt_password_hash_encrypted_with_block() argument 499 if (des_encrypt(password_hash, block, cypher) < 0 || in nt_password_hash_encrypted_with_block() 500 des_encrypt(password_hash + 8, block + 7, cypher + 8) < 0) in nt_password_hash_encrypted_with_block()
|
D | des-internal.c | 399 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument 419 WPA_PUT_BE32(cypher, work[0]); in des_encrypt() 420 WPA_PUT_BE32(cypher + 4, work[1]); in des_encrypt()
|
D | ms_funcs.h | 54 const u8 *block, u8 *cypher);
|
D | crypto_nettle.c | 29 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument 45 nettle_des_encrypt(&ctx, DES_BLOCK_SIZE, cypher, clear); in des_encrypt()
|
D | crypto_gnutls.c | 48 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument 65 gcry_cipher_encrypt(hd, cypher, 8, clear, 8); in des_encrypt()
|
D | crypto_libtomcrypt.c | 38 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument 54 des_ecb_encrypt(clear, cypher, &skey); in des_encrypt()
|
D | crypto.h | 111 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher);
|
D | crypto_linux.c | 607 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument 655 ret = read(skcipher->t, cypher, 8); in des_encrypt()
|
D | crypto_wolfssl.c | 285 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument 301 wc_Des_EcbEncrypt(&des, cypher, clear, DES_BLOCK_SIZE); in des_encrypt()
|
D | crypto_openssl.c | 204 int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) in des_encrypt() argument 220 DES_ecb_encrypt((DES_cblock *) clear, (DES_cblock *) cypher, &ks, in des_encrypt()
|
/external/rust/crates/ahash/ |
D | FAQ.md | 45 From a cryptography point of view, a hashmap needs something closer to a block cypher. 57 4. Like any cypher based hash, it will show certain statistical deviations from truly random output…
|
/external/python/rsa/doc/ |
D | usage.rst | 241 The most common way to use RSA with larger files uses a block cypher
|
/external/python/cpython2/Doc/library/ |
D | codecs.rst | 1166 | rot_13 | rot13 | Returns the Caesar-cypher |
|
/external/python/cpython3/Doc/library/ |
D | codecs.rst | 1393 | rot_13 | rot13 | Return the Caesar-cypher |
|
/external/kotlinx.coroutines/benchmarks/src/jmh/resources/ |
D | ospd.txt.gz |
|
/external/one-true-awk/testdir/ |
D | funstack.in | 3409 …cypher employs a specified document whose words are simply numbered consecutively, and first lette…
|
/external/cldr/tools/java/org/unicode/cldr/util/data/transforms/ |
D | en-IPA.txt | 21247 $x{cypher → sɑɪfər ; # sɪfər
|