HomeSort by: relevance | last modified time | path
    Searched defs:decrypt (Results 1 - 22 of 22) sorted by relevancy

  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
Record.pm 107 $record->decrypt();
196 #Decrypt using encrypt-then-MAC
223 #Standard decrypt
224 sub decrypt() subroutine
241 #an unencrypted alert, so don't try to decrypt
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
Record.pm 107 $record->decrypt();
196 #Decrypt using encrypt-then-MAC
223 #Standard decrypt
224 sub decrypt() subroutine
241 #an unencrypted alert, so don't try to decrypt
  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
Record.pm 152 $record->decrypt();
302 #Decrypt using encrypt-then-MAC
329 #Standard decrypt
330 sub decrypt() subroutine
347 #an unencrypted alert, so don't try to decrypt
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
aes-test.c 315 krb5_data decrypt; local
318 krb5_data_zero(&decrypt);
325 &decrypt);
332 if (decrypt.length != clear->length ||
333 (decrypt.length &&
334 memcmp(decrypt.data, clear->data, decrypt.length) != 0)) {
339 krb5_data_free(&decrypt);
352 krb5_data decrypt; local
390 * Plain decrypt
562 krb5_data decrypt; local
    [all...]
  /src/external/bsd/elftosb/dist/common/
rijndael.cpp 984 if((dir != Encrypt) && (dir != Decrypt))return RIJNDAEL_UNSUPPORTED_DIRECTION;
1035 if(m_direction == Decrypt)keyEncToDec();
1202 decrypt(input,outBuffer);
1218 decrypt(input, block);
1289 if(m_direction != Decrypt)return RIJNDAEL_BAD_DIRECTION;
1301 decrypt(input, outBuffer);
1306 decrypt(input, block);
1320 decrypt(input, block);
1331 decrypt(input, block);
1530 void Rijndael::decrypt(const uint8_t a[16], uint8_t b[16] function in class:Rijndael
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/lib/
crypto.h 87 /* encrypt/decrypt one block */
90 /* Standard CFB encrypt/decrypt (as used by Sym Enc Int Prot packets) */
245 Encrypt/decrypt settings
310 pgp_crypt_t decrypt; member in struct:pgp_stream_t
keyring.c 233 decrypt_t *decrypt; local
236 decrypt = pgp_callback_arg(cbinfo);
247 if (pgp_getpassphrase(decrypt->passfp, pass, sizeof(pass)) == 0) {
276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) {
280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE);
281 *decrypt->seckey = content->seckey;
315 \param passphrase Passphrase to use to decrypt secret key
323 decrypt_t decrypt; local
326 (void) memset(&decrypt, 0x0, sizeof(decrypt))
    [all...]
packet-parse.c 2405 pgp_crypt_t decrypt; local
2609 pgp_crypt_any(&decrypt, pkt.u.seckey.alg);
2614 decrypt.set_iv(&decrypt, pkt.u.seckey.iv);
2615 decrypt.set_crypt_key(&decrypt, key);
2619 pgp_reader_push_decrypt(stream, &decrypt, region);
2923 pgp_crypt_any(&stream->decrypt, pkt.u.pk_sesskey.symm_alg);
2924 iv = calloc(1, stream->decrypt.blocksize);
2929 stream->decrypt.set_iv(&stream->decrypt, iv)
2940 pgp_crypt_t *decrypt; local
3000 pgp_crypt_t *decrypt; local
    [all...]
reader.c 1404 pgp_crypt_t *decrypt; member in struct:__anon1049
1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt);
1496 pgp_decrypt_se_ip(encrypted->decrypt,
1534 pgp_reader_push_decrypt(pgp_stream_t *stream, pgp_crypt_t *decrypt,
1542 encrypted->decrypt = decrypt;
1544 pgp_decrypt_init(encrypted->decrypt);
1561 encrypted->decrypt->decrypt_finish(encrypted->decrypt);
1576 pgp_crypt_t *decrypt; member in struct:__anon1050
    [all...]
  /src/crypto/external/bsd/openssl/dist/include/crypto/
modes.h 178 /* Need both encrypt and decrypt key schedules for decryption */
180 block128_f decrypt; member in struct:ocb128_context
evp.h 166 int (*decrypt) (EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member in struct:evp_pkey_method_st
306 /* encrypt/decrypt data */
  /src/crypto/external/bsd/openssl.old/dist/crypto/modes/
modes_local.h 179 /* Need both encrypt and decrypt key schedules for decryption */
181 block128_f decrypt; member in struct:ocb128_context
  /src/crypto/dist/ipsec-tools/src/racoon/
algorithm.h 158 vchar_t *(*decrypt)(vchar_t *, vchar_t *, vchar_t *); member in struct:enc_algorithm
  /src/crypto/external/apache2/openssl/dist/include/crypto/
modes.h 186 /* Need both encrypt and decrypt key schedules for decryption */
188 block128_f decrypt; member in struct:ocb128_context
evp.h 176 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member in struct:evp_pkey_method_st
316 /* encrypt/decrypt data */
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
evp_local.h 40 int encrypt; /* encrypt or decrypt */
203 OSSL_FUNC_asym_cipher_decrypt_fn *decrypt; member in struct:evp_asym_cipher_st
  /src/crypto/external/bsd/openssl.old/dist/include/crypto/
evp.h 74 int (*decrypt) (EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member in struct:evp_pkey_method_st
142 /* encrypt/decrypt data */
  /src/sys/opencrypto/
cryptosoft_xform.c 76 void (*decrypt)(void *, uint8_t *); member in struct:swcr_enc_xform
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
evp_local.h 39 int encrypt; /* encrypt or decrypt */
237 OSSL_FUNC_asym_cipher_decrypt_fn *decrypt; member in struct:evp_asym_cipher_st
  /src/crypto/external/bsd/openssl/dist/apps/
speed.c 242 {"decrypt", OPT_DECRYPT, '-',
732 static int decrypt = 0; variable
740 if (decrypt) {
757 if (decrypt)
910 BIO_printf(bio_err, "\nFailed to decrypt the data\n");
1647 decrypt = 1;
2339 if (decrypt)
2360 * a valid tag that enables us to decrypt. If we don't
2366 ae_mode ? 1 : !decrypt)) {
2390 if (ae_mode && decrypt) {
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
speed.c 311 {"decrypt", OPT_DECRYPT, '-',
918 static int decrypt = 0; variable
928 if (decrypt) {
945 if (decrypt)
967 if (decrypt) {
983 if (decrypt)
1006 if (decrypt) {
1580 decrypt = 1;
2639 NULL, iv, decrypt ? 0 : 1)) {
  /src/crypto/external/apache2/openssl/dist/apps/
speed.c 289 { "decrypt", OPT_DECRYPT, '-',
437 static double rsa_results[RSA_NUM][4]; /* 4 ops: sign, verify, encrypt, decrypt */
956 static int decrypt = 0; variable
964 if (decrypt) {
981 if (decrypt)
1139 BIO_printf(bio_err, "\nFailed to decrypt the data\n");
1227 BIO_printf(bio_err, "RSA decrypt failure\n");
2173 decrypt = 1;
3024 if (decrypt)
3044 * a valid tag that enables us to decrypt. If we don'
    [all...]

Completed in 34 milliseconds