/third_party/openssl/test/ssl-tests/ |
D | 19-mac-then-encrypt.conf | 5 test-0 = 0-disable-encrypt-then-mac-server-sha 6 test-1 = 1-disable-encrypt-then-mac-client-sha 7 test-2 = 2-disable-encrypt-then-mac-both-sha 8 test-3 = 3-disable-encrypt-then-mac-server-sha2 9 test-4 = 4-disable-encrypt-then-mac-client-sha2 10 test-5 = 5-disable-encrypt-then-mac-both-sha2 13 [0-disable-encrypt-then-mac-server-sha] 14 ssl_conf = 0-disable-encrypt-then-mac-server-sha-ssl 16 [0-disable-encrypt-then-mac-server-sha-ssl] 17 server = 0-disable-encrypt-then-mac-server-sha-server [all …]
|
D | 19-mac-then-encrypt.conf.in | 18 name => "disable-encrypt-then-mac-server-sha", 31 name => "disable-encrypt-then-mac-client-sha", 44 name => "disable-encrypt-then-mac-both-sha", 61 name => "disable-encrypt-then-mac-server-sha2", 74 name => "disable-encrypt-then-mac-client-sha2", 87 name => "disable-encrypt-then-mac-both-sha2",
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ccm.data | 60 CCM* encrypt and tag #1 64 CCM* encrypt and tag #2 68 CCM* encrypt and tag #3 84 CCM encrypt and tag RFC 3610 #1 88 CCM encrypt and tag RFC 3610 #2 92 CCM encrypt and tag RFC 3610 #3 96 CCM encrypt and tag RFC 3610 #4 100 CCM encrypt and tag RFC 3610 #5 104 CCM encrypt and tag RFC 3610 #6 108 CCM encrypt and tag RFC 3610 #7 [all …]
|
/third_party/boringssl/src/util/fipstools/cavp/ |
D | cavp_keywrap_test.cc | 30 bool encrypt; member 36 static bool AESKeyWrap(std::vector<uint8_t> *out, bool encrypt, in AESKeyWrap() argument 45 if (encrypt) { in AESKeyWrap() 64 static bool AESKeyWrapWithPadding(std::vector<uint8_t> *out, bool encrypt, in AESKeyWrapWithPadding() argument 74 if (encrypt) { in AESKeyWrapWithPadding() 97 std::string count, unused, in_label = ctx->encrypt ? "P" : "C", in TestCipher() 98 result_label = ctx->encrypt ? "C" : "P"; in TestCipher() 115 if (!wrap_function(&result, ctx->encrypt, key, in)) { in TestCipher() 116 if (ctx->encrypt) { in TestCipher() 143 bool encrypt = false; in cavp_keywrap_test_main() local [all …]
|
D | cavp_aes_test.cc | 44 bool encrypt, std::vector<uint8_t> key, in MonteCarlo() argument 46 const std::string in_label = encrypt ? "PLAINTEXT" : "CIPHERTEXT", in MonteCarlo() 47 result_label = encrypt ? "CIPHERTEXT" : "PLAINTEXT"; in MonteCarlo() 61 if (!CipherOperation(cipher, &result, encrypt, key, iv, in)) { in MonteCarlo() 70 if (encrypt) { in MonteCarlo() 77 if (!CipherOperation(cipher, &result, encrypt, key, iv, in)) { in MonteCarlo()
|
/third_party/node/test/parallel/ |
D | test-crypto-authenticated.js | 113 const encrypt = crypto.createCipheriv(test.algo, constant 119 encrypt.setAAD(Buffer.from(test.aad, 'hex'), aadOptions); 121 let hex = encrypt.update(test.plain, inputEncoding, 'hex'); 122 hex += encrypt.final('hex'); 124 const auth_tag = encrypt.getAuthTag(); 167 const encrypt = crypto.createCipher(test.algo, test.password, options); constant 169 encrypt.setAAD(Buffer.from(test.aad, 'hex'), aadOptions); 170 let hex = encrypt.update(test.plain, 'ascii', 'hex'); 171 hex += encrypt.final('hex'); 172 const auth_tag = encrypt.getAuthTag(); [all …]
|
D | test-crypto-padding.js | 63 const encrypt = crypto.createCipheriv(CIPHER_NAME, KEY_PLAIN, IV_PLAIN); 64 encrypt.setAutoPadding(pad); 65 let hex = encrypt.update(plain, 'ascii', 'hex'); 66 hex += encrypt.final('hex');
|
D | test-crypto-ecb.js | 37 const encrypt = constant 39 let hex = encrypt.update('Hello World!', 'ascii', 'hex'); 40 hex += encrypt.final('hex');
|
D | test-crypto-padding-aes256.js | 34 function encrypt(val, pad) { function 50 let encrypted = encrypt(plaintext, false); 58 encrypted = encrypt(plaintext, true);
|
D | test-tls-write-error.js | 47 client.encrypt(finished), 48 client.encrypt(ill),
|
/third_party/boringssl/src/util/fipstools/acvp/acvptool/subprocess/ |
D | block.go | 70 var encrypt bool 73 encrypt = true 75 encrypt = false 81 if !encrypt { 111 if encrypt { 150 if encrypt { 159 if encrypt { 183 if encrypt { 205 if encrypt {
|
/third_party/openssl/crypto/modes/ |
D | ocb128.c | 131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new() 152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument 168 ctx->encrypt = encrypt; in CRYPTO_ocb128_init() 175 ctx->encrypt(ctx->l_star.c, ctx->l_star.c, ctx->keyenc); in CRYPTO_ocb128_init() 244 ctx->encrypt(tmp, ktop, ctx->keyenc); in CRYPTO_ocb128_setiv() 294 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_aad() 316 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_aad() 379 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_encrypt() 400 ctx->encrypt(ctx->sess.offset.c, pad.c, ctx->keyenc); in CRYPTO_ocb128_encrypt() [all …]
|
/third_party/libnl/lib/route/link/ |
D | macsec.c | 61 uint8_t send_sci, end_station, scb, replay_protect, protect, encrypt; member 163 info->encrypt = nla_get_u8(tb[IFLA_MACSEC_ENCRYPT]); in macsec_parse() 233 PRINT_FLAG(tmp, info, encrypt, 'E'); in flags_str() 274 …ntohll(info->sci), values_on_off[info->protect], info->encoding_sa, values_on_off[info->encrypt], … in macsec_dump_details() 313 NLA_PUT_U8(msg, IFLA_MACSEC_ENCRYPT, info->encrypt); in macsec_put_attrs() 382 diff |= MACSEC_DIFF(ENCRYPT, a->encrypt != b->encrypt); in macsec_compare() 611 int rtnl_link_macsec_set_encrypt(struct rtnl_link *link, uint8_t encrypt) in rtnl_link_macsec_set_encrypt() argument 617 if (encrypt > 1) in rtnl_link_macsec_set_encrypt() 620 info->encrypt = encrypt; in rtnl_link_macsec_set_encrypt() 626 int rtnl_link_macsec_get_encrypt(struct rtnl_link *link, uint8_t *encrypt) in rtnl_link_macsec_get_encrypt() argument [all …]
|
/third_party/boringssl/src/decrepit/blowfish/ |
D | blowfish.c | 141 const BF_KEY *key, int encrypt) { in BF_ecb_encrypt() argument 146 if (encrypt) { in BF_ecb_encrypt() 156 const BF_KEY *schedule, uint8_t *ivec, int encrypt) { in BF_cbc_encrypt() argument 162 if (encrypt) { in BF_cbc_encrypt() 503 int encrypt) { in BF_cfb64_encrypt() argument 511 if (encrypt) { in BF_cfb64_encrypt() 569 BF_ecb_encrypt(in, out, bf_key, ctx->encrypt); in bf_ecb_cipher() 582 BF_cbc_encrypt(in, out, len, bf_key, ctx->iv, ctx->encrypt); in bf_cbc_cipher() 590 BF_cfb64_encrypt(in, out, len, bf_key, ctx->iv, &num, ctx->encrypt); in bf_cfb_cipher()
|
/third_party/openssl/crypto/rc5/ |
D | rc5_ecb.c | 15 RC5_32_KEY *ks, int encrypt) in RC5_32_ecb_encrypt() argument 23 if (encrypt) in RC5_32_ecb_encrypt()
|
/third_party/openssl/crypto/rc2/ |
D | rc2_ecb.c | 23 int encrypt) in RC2_ecb_encrypt() argument 31 if (encrypt) in RC2_ecb_encrypt()
|
/third_party/openssl/crypto/bf/ |
D | bf_ecb.c | 26 const BF_KEY *key, int encrypt) in BF_ecb_encrypt() argument 34 if (encrypt) in BF_ecb_encrypt()
|
D | bf_cfb64.c | 21 unsigned char *ivec, int *num, int encrypt) in BF_cfb64_encrypt() argument 30 if (encrypt) { in BF_cfb64_encrypt()
|
/third_party/openssl/crypto/evp/ |
D | evp_enc.c | 65 enc = ctx->encrypt; in EVP_CipherInit_ex() 69 ctx->encrypt = enc; in EVP_CipherInit_ex() 92 ctx->encrypt = enc; in EVP_CipherInit_ex() 213 if (ctx->encrypt) in EVP_CipherUpdate() 221 if (ctx->encrypt) in EVP_CipherFinal_ex() 229 if (ctx->encrypt) in EVP_CipherFinal() 401 if (!ctx->encrypt) { in EVP_EncryptUpdate() 422 if (!ctx->encrypt) { in EVP_EncryptFinal_ex() 471 if (ctx->encrypt) { in EVP_DecryptUpdate() 571 if (ctx->encrypt) { in EVP_DecryptFinal_ex()
|
D | e_chacha20_poly1305.c | 240 if (ctx->encrypt) in chacha20_poly1305_tls_cipher() 264 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher() 298 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher() 344 Poly1305_Final(POLY1305_ctx(actx), ctx->encrypt ? actx->tag in chacha20_poly1305_tls_cipher() 349 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher() 412 if (ctx->encrypt) { /* plaintext */ in chacha20_poly1305_cipher() 470 Poly1305_Final(POLY1305_ctx(actx), ctx->encrypt ? actx->tag in chacha20_poly1305_cipher() 475 if (ctx->encrypt) { in chacha20_poly1305_cipher() 484 else if (!ctx->encrypt) { in chacha20_poly1305_cipher() 568 if (arg <= 0 || arg > POLY1305_BLOCK_SIZE || !ctx->encrypt) in chacha20_poly1305_ctrl() [all …]
|
/third_party/openssl/test/ |
D | igetest.c | 38 const int encrypt; member 83 const int encrypt; member 155 if (v->encrypt == AES_ENCRYPT) in test_ige_vectors() 160 AES_ige_encrypt(v->in, buf, v->length, &key, iv, v->encrypt); in test_ige_vectors() 173 AES_ige_encrypt(buf, buf, v->length, &key, iv, v->encrypt); in test_ige_vectors() 196 if (v->encrypt == AES_ENCRYPT) { in test_bi_ige_vectors() 205 v->encrypt); in test_bi_ige_vectors()
|
/third_party/uboot/u-boot-2020.01/common/ |
D | image-cipher.c | 26 .encrypt = image_aes_encrypt, 37 .encrypt = image_aes_encrypt, 48 .encrypt = image_aes_encrypt,
|
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-jwe/ |
D | README.md | 3 Demonstrates how to encrypt and decrypt using JWE and JWK, providing a 20 clear, for asymmetric keys the public part of the key is required to encrypt, 48 -k <jwk file>|JWK file to encrypt or decrypt with 61 You can also pipe the output of the encrypt action directly into the decrypt
|
/third_party/boringssl/src/crypto/fipsmodule/cipher/ |
D | e_des.c | 86 ctx->encrypt); in des_cbc_cipher() 113 &dat->ks.ks, ctx->encrypt); in des_ecb_cipher() 154 &dat->ks.ks[2], (DES_cblock *)ctx->iv, ctx->encrypt); in des_ede3_cbc_cipher() 206 ctx->encrypt); in des_ede_ecb_cipher()
|
/third_party/openssl/crypto/idea/ |
D | i_cfb64.c | 21 unsigned char *ivec, int *num, int encrypt) in IDEA_cfb64_encrypt() argument 30 if (encrypt) { in IDEA_cfb64_encrypt()
|