| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| Record.pm | 107 $record->decrypt(); 196 #Decrypt using encrypt-then-MAC 223 #Standard decrypt 224 sub decrypt() subroutine 241 #an unencrypted alert, so don't try to decrypt
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| Record.pm | 107 $record->decrypt(); 196 #Decrypt using encrypt-then-MAC 223 #Standard decrypt 224 sub decrypt() subroutine 241 #an unencrypted alert, so don't try to decrypt
|
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| Record.pm | 152 $record->decrypt(); 302 #Decrypt using encrypt-then-MAC 329 #Standard decrypt 330 sub decrypt() subroutine 347 #an unencrypted alert, so don't try to decrypt
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| aes-test.c | 315 krb5_data decrypt; local 318 krb5_data_zero(&decrypt); 325 &decrypt); 332 if (decrypt.length != clear->length || 333 (decrypt.length && 334 memcmp(decrypt.data, clear->data, decrypt.length) != 0)) { 339 krb5_data_free(&decrypt); 352 krb5_data decrypt; local 390 * Plain decrypt 562 krb5_data decrypt; local [all...] |
| /src/external/bsd/elftosb/dist/common/ |
| rijndael.cpp | 984 if((dir != Encrypt) && (dir != Decrypt))return RIJNDAEL_UNSUPPORTED_DIRECTION; 1035 if(m_direction == Decrypt)keyEncToDec(); 1202 decrypt(input,outBuffer); 1218 decrypt(input, block); 1289 if(m_direction != Decrypt)return RIJNDAEL_BAD_DIRECTION; 1301 decrypt(input, outBuffer); 1306 decrypt(input, block); 1320 decrypt(input, block); 1331 decrypt(input, block); 1530 void Rijndael::decrypt(const uint8_t a[16], uint8_t b[16] function in class:Rijndael [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| crypto.h | 87 /* encrypt/decrypt one block */ 90 /* Standard CFB encrypt/decrypt (as used by Sym Enc Int Prot packets) */ 245 Encrypt/decrypt settings 310 pgp_crypt_t decrypt; member in struct:pgp_stream_t
|
| keyring.c | 233 decrypt_t *decrypt; local 236 decrypt = pgp_callback_arg(cbinfo); 247 if (pgp_getpassphrase(decrypt->passfp, pass, sizeof(pass)) == 0) { 276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) { 280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE); 281 *decrypt->seckey = content->seckey; 315 \param passphrase Passphrase to use to decrypt secret key 323 decrypt_t decrypt; local 326 (void) memset(&decrypt, 0x0, sizeof(decrypt)) [all...] |
| packet-parse.c | 2405 pgp_crypt_t decrypt; local 2609 pgp_crypt_any(&decrypt, pkt.u.seckey.alg); 2614 decrypt.set_iv(&decrypt, pkt.u.seckey.iv); 2615 decrypt.set_crypt_key(&decrypt, key); 2619 pgp_reader_push_decrypt(stream, &decrypt, region); 2923 pgp_crypt_any(&stream->decrypt, pkt.u.pk_sesskey.symm_alg); 2924 iv = calloc(1, stream->decrypt.blocksize); 2929 stream->decrypt.set_iv(&stream->decrypt, iv) 2940 pgp_crypt_t *decrypt; local 3000 pgp_crypt_t *decrypt; local [all...] |
| reader.c | 1404 pgp_crypt_t *decrypt; member in struct:__anon1049 1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt); 1496 pgp_decrypt_se_ip(encrypted->decrypt, 1534 pgp_reader_push_decrypt(pgp_stream_t *stream, pgp_crypt_t *decrypt, 1542 encrypted->decrypt = decrypt; 1544 pgp_decrypt_init(encrypted->decrypt); 1561 encrypted->decrypt->decrypt_finish(encrypted->decrypt); 1576 pgp_crypt_t *decrypt; member in struct:__anon1050 [all...] |
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| modes.h | 178 /* Need both encrypt and decrypt key schedules for decryption */ 180 block128_f decrypt; member in struct:ocb128_context
|
| evp.h | 166 int (*decrypt) (EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member in struct:evp_pkey_method_st 306 /* encrypt/decrypt data */
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/modes/ |
| modes_local.h | 179 /* Need both encrypt and decrypt key schedules for decryption */ 181 block128_f decrypt; member in struct:ocb128_context
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| algorithm.h | 158 vchar_t *(*decrypt)(vchar_t *, vchar_t *, vchar_t *); member in struct:enc_algorithm
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| modes.h | 186 /* Need both encrypt and decrypt key schedules for decryption */ 188 block128_f decrypt; member in struct:ocb128_context
|
| evp.h | 176 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member in struct:evp_pkey_method_st 316 /* encrypt/decrypt data */
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| evp_local.h | 40 int encrypt; /* encrypt or decrypt */ 203 OSSL_FUNC_asym_cipher_decrypt_fn *decrypt; member in struct:evp_asym_cipher_st
|
| /src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
| evp.h | 74 int (*decrypt) (EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member in struct:evp_pkey_method_st 142 /* encrypt/decrypt data */
|
| /src/sys/opencrypto/ |
| cryptosoft_xform.c | 76 void (*decrypt)(void *, uint8_t *); member in struct:swcr_enc_xform
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| evp_local.h | 39 int encrypt; /* encrypt or decrypt */ 237 OSSL_FUNC_asym_cipher_decrypt_fn *decrypt; member in struct:evp_asym_cipher_st
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| speed.c | 242 {"decrypt", OPT_DECRYPT, '-', 732 static int decrypt = 0; variable 740 if (decrypt) { 757 if (decrypt) 910 BIO_printf(bio_err, "\nFailed to decrypt the data\n"); 1647 decrypt = 1; 2339 if (decrypt) 2360 * a valid tag that enables us to decrypt. If we don't 2366 ae_mode ? 1 : !decrypt)) { 2390 if (ae_mode && decrypt) { [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| speed.c | 311 {"decrypt", OPT_DECRYPT, '-', 918 static int decrypt = 0; variable 928 if (decrypt) { 945 if (decrypt) 967 if (decrypt) { 983 if (decrypt) 1006 if (decrypt) { 1580 decrypt = 1; 2639 NULL, iv, decrypt ? 0 : 1)) {
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| speed.c | 289 { "decrypt", OPT_DECRYPT, '-', 437 static double rsa_results[RSA_NUM][4]; /* 4 ops: sign, verify, encrypt, decrypt */ 956 static int decrypt = 0; variable 964 if (decrypt) { 981 if (decrypt) 1139 BIO_printf(bio_err, "\nFailed to decrypt the data\n"); 1227 BIO_printf(bio_err, "RSA decrypt failure\n"); 2173 decrypt = 1; 3024 if (decrypt) 3044 * a valid tag that enables us to decrypt. If we don' [all...] |