| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| symmetric.c | 107 std_resync(pgp_crypt_t *decrypt) 109 if ((size_t) decrypt->num == decrypt->blocksize) { 113 memmove(decrypt->civ + decrypt->blocksize - decrypt->num, decrypt->civ, 114 (unsigned)decrypt->num); 115 (void) memcpy(decrypt->civ, decrypt->siv + decrypt->num [all...] |
| keyring.c | 233 decrypt_t *decrypt; local 236 decrypt = pgp_callback_arg(cbinfo); 247 if (pgp_getpassphrase(decrypt->passfp, pass, sizeof(pass)) == 0) { 276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) { 280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE); 281 *decrypt->seckey = content->seckey; 315 \param passphrase Passphrase to use to decrypt secret key 323 decrypt_t decrypt; local 326 (void) memset(&decrypt, 0x0, sizeof(decrypt)) [all...] |
| packet-parse.c | 2405 pgp_crypt_t decrypt; local 2609 pgp_crypt_any(&decrypt, pkt.u.seckey.alg); 2614 decrypt.set_iv(&decrypt, pkt.u.seckey.iv); 2615 decrypt.set_crypt_key(&decrypt, key); 2619 pgp_reader_push_decrypt(stream, &decrypt, region); 2923 pgp_crypt_any(&stream->decrypt, pkt.u.pk_sesskey.symm_alg); 2924 iv = calloc(1, stream->decrypt.blocksize); 2929 stream->decrypt.set_iv(&stream->decrypt, iv) 2940 pgp_crypt_t *decrypt; local 3000 pgp_crypt_t *decrypt; local [all...] |
| reader.c | 1404 pgp_crypt_t *decrypt; member in struct:__anon1049 1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt); 1496 pgp_decrypt_se_ip(encrypted->decrypt, 1534 pgp_reader_push_decrypt(pgp_stream_t *stream, pgp_crypt_t *decrypt, 1542 encrypted->decrypt = decrypt; 1544 pgp_decrypt_init(encrypted->decrypt); 1561 encrypted->decrypt->decrypt_finish(encrypted->decrypt); 1576 pgp_crypt_t *decrypt; member in struct:__anon1050 [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_rsa.c | 182 int ossl_cms_rsa_envelope(CMS_RecipientInfo *ri, int decrypt) 184 assert(decrypt == 0 || decrypt == 1); 186 if (decrypt == 1) 189 if (decrypt == 0)
|
| cms_dh.c | 331 int ossl_cms_dh_envelope(CMS_RecipientInfo *ri, int decrypt) 333 assert(decrypt == 0 || decrypt == 1); 335 if (decrypt == 1) 338 if (decrypt == 0)
|
| cms_ec.c | 382 int ossl_cms_ecdh_envelope(CMS_RecipientInfo *ri, int decrypt) 384 assert(decrypt == 0 || decrypt == 1); 386 if (decrypt == 1) 389 if (decrypt == 0)
|
| /src/crypto/external/apache2/openssl/dist/crypto/cms/ |
| cms_rsa.c | 188 int ossl_cms_rsa_envelope(CMS_RecipientInfo *ri, int decrypt) 190 assert(decrypt == 0 || decrypt == 1); 192 if (decrypt == 1) 195 if (decrypt == 0)
|
| cms_dh.c | 336 int ossl_cms_dh_envelope(CMS_RecipientInfo *ri, int decrypt) 338 assert(decrypt == 0 || decrypt == 1); 340 if (decrypt == 1) 343 if (decrypt == 0)
|
| cms_ec.c | 388 int ossl_cms_ecdh_envelope(CMS_RecipientInfo *ri, int decrypt) 390 assert(decrypt == 0 || decrypt == 1); 392 if (decrypt == 1) 395 if (decrypt == 0)
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| aes-test.c | 315 krb5_data decrypt; local 318 krb5_data_zero(&decrypt); 325 &decrypt); 332 if (decrypt.length != clear->length || 333 (decrypt.length && 334 memcmp(decrypt.data, clear->data, decrypt.length) != 0)) { 339 krb5_data_free(&decrypt); 352 krb5_data decrypt; local 390 * Plain decrypt 562 krb5_data decrypt; local [all...] |
| /src/external/bsd/nsd/dist/contrib/bind2nsd/bind2nsd/ |
| Config.py | 146 self.config['syspw'] = obj.decrypt(mkcipher(syspw), '#') 147 self.config['dnspw'] = obj.decrypt(mkcipher(dnspw), '#')
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| pmeth_fn.c | 173 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { 191 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { 201 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); 225 || !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt)
|
| /src/external/bsd/elftosb/dist/common/ |
| rijndael.h | 59 // rin.init(Rijndael::CBC,Rijndael::Decrypt,key,Rijndael::Key32Bytes)); 89 enum Direction { Encrypt , Decrypt }; 94 // You have to call init() before you can encrypt or decrypt stuff 117 // dir : Rijndael::Encrypt or Rijndael::Decrypt 156 void decrypt(const uint8_t a[16], uint8_t b[16]);
|
| /src/crypto/external/bsd/netpgp/dist/bindings/lua/ |
| netpgp.lua | 40 opt.add_option{"-d", "--decrypt", action="store_true", dest="decrypt", help="--decrypt [--armour] file"} 75 if options.decrypt or options.sign then 88 if options.decrypt then 89 -- decrypt file
|
| /src/crypto/external/bsd/netpgp/dist/ |
| tst | 58 echo "======> encrypt/decrypt 10809 file" 61 /usr/bin/netpgp --decrypt b.gpg 64 echo "======> encrypt/decrypt 180938 file" 67 /usr/bin/netpgp --decrypt c.gpg 70 echo "======> encrypt/decrypt bigass file" 75 /usr/bin/netpgp --decrypt d.gpg 148 echo "======> pipeline and memory encrypt/decrypt" 149 /usr/bin/netpgp --encrypt < a | /usr/bin/netpgp --decrypt > a4 195 echo "======> pipeline and memory encrypt/decrypt with specified cipher"
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| asymcipher.c | 313 ret = cipher->decrypt(ctx->op.ciph.algctx, out, outlen, (out == NULL ? 0 : *outlen), in, inlen); 316 "%s decrypt:%s", cipher->type_name, desc); 322 if (ctx->pmeth == NULL || ctx->pmeth->decrypt == NULL) { 326 M_check_autoarg(ctx, out, outlen, EVP_F_EVP_PKEY_DECRYPT) return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); 329 /* decrypt to new buffer of dynamic size, checking any pre-determined size */ 412 if (cipher->decrypt != NULL) 414 cipher->decrypt = OSSL_FUNC_asym_cipher_decrypt(fns); 468 * (decrypt_init decrypt). set_ctx_params and settable_ctx_params are
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| asymcipher.c | 288 ret = ctx->op.ciph.cipher->decrypt(ctx->op.ciph.algctx, out, outlen, 293 if (ctx->pmeth == NULL || ctx->pmeth->decrypt == NULL) { 298 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); 370 if (cipher->decrypt != NULL) 372 cipher->decrypt = OSSL_FUNC_asym_cipher_decrypt(fns); 426 * (decrypt_init decrypt). set_ctx_params and settable_ctx_params are
|
| /src/crypto/external/apache2/openssl/dist/crypto/modes/ |
| ocb128.c | 131 block128_f encrypt, block128_f decrypt, 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, 152 block128_f encrypt, block128_f decrypt, 167 ctx->decrypt = decrypt; 469 ctx->decrypt(tmp.c, tmp.c, ctx->keydec);
|
| /src/crypto/external/bsd/openssl/dist/crypto/modes/ |
| ocb128.c | 131 block128_f encrypt, block128_f decrypt, 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, 152 block128_f encrypt, block128_f decrypt, 169 ctx->decrypt = decrypt; 468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/modes/ |
| ocb128.c | 131 block128_f encrypt, block128_f decrypt, 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, 152 block128_f encrypt, block128_f decrypt, 169 ctx->decrypt = decrypt; 468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec);
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| algorithm.h | 158 vchar_t *(*decrypt)(vchar_t *, vchar_t *, vchar_t *); member in struct:enc_algorithm
|
| /src/sys/opencrypto/ |
| cryptosoft.c | 145 exf->decrypt(sw->sw_kschedule, buf + i); 160 } else { /* Decrypt */ 167 exf->decrypt(sw->sw_kschedule, buf + i); 204 exf->decrypt(sw->sw_kschedule, 220 } else { /* decrypt */ 230 exf->decrypt(sw->sw_kschedule, blk); 282 exf->decrypt(sw->sw_kschedule, 292 } else { /* decrypt */ 302 exf->decrypt(sw->sw_kschedule, idat); 347 exf->decrypt(sw->sw_kschedule [all...] |
| /src/crypto/external/apache2/openssl/dist/include/openssl/ |
| modes.h | 194 block128_f encrypt, block128_f decrypt, 197 block128_f encrypt, block128_f decrypt,
|
| /src/crypto/external/bsd/openssl/dist/include/openssl/ |
| modes.h | 194 block128_f encrypt, block128_f decrypt, 197 block128_f encrypt, block128_f decrypt,
|