Home
last modified time | relevance | path

Searched refs:encrypt (Results 1 – 25 of 213) sorted by relevance

123456789

/third_party/openssl/test/ssl-tests/
D19-mac-then-encrypt.conf5 test-0 = 0-disable-encrypt-then-mac-server-sha
6 test-1 = 1-disable-encrypt-then-mac-client-sha
7 test-2 = 2-disable-encrypt-then-mac-both-sha
8 test-3 = 3-disable-encrypt-then-mac-server-sha2
9 test-4 = 4-disable-encrypt-then-mac-client-sha2
10 test-5 = 5-disable-encrypt-then-mac-both-sha2
13 [0-disable-encrypt-then-mac-server-sha]
14 ssl_conf = 0-disable-encrypt-then-mac-server-sha-ssl
16 [0-disable-encrypt-then-mac-server-sha-ssl]
17 server = 0-disable-encrypt-then-mac-server-sha-server
[all …]
D19-mac-then-encrypt.conf.in18 name => "disable-encrypt-then-mac-server-sha",
31 name => "disable-encrypt-then-mac-client-sha",
44 name => "disable-encrypt-then-mac-both-sha",
61 name => "disable-encrypt-then-mac-server-sha2",
74 name => "disable-encrypt-then-mac-client-sha2",
87 name => "disable-encrypt-then-mac-both-sha2",
/third_party/mbedtls/tests/suites/
Dtest_suite_ccm.data57 CCM* encrypt and tag #1
61 CCM* encrypt and tag #2
65 CCM* encrypt and tag #3
81 CCM encrypt and tag RFC 3610 #1
85 CCM encrypt and tag RFC 3610 #2
89 CCM encrypt and tag RFC 3610 #3
93 CCM encrypt and tag RFC 3610 #4
97 CCM encrypt and tag RFC 3610 #5
101 CCM encrypt and tag RFC 3610 #6
105 CCM encrypt and tag RFC 3610 #7
[all …]
Dtest_suite_psa_crypto_driver_wrappers.data120 PSA symmetric encrypt validation: AES-CTR, 16 bytes, good
124 PSA symmetric encrypt validation: AES-CTR, 15 bytes, good
128 PSA symmetric encrypt validation: AES-CTR, 16 bytes, fallback
132 PSA symmetric encrypt validation: AES-CTR, 15 bytes, fallback
136 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, good
140 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, good
144 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, fallback
148 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, fallback
152 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, fake
156 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, fake
[all …]
Dtest_suite_psa_crypto.data755 PSA key policy: cipher, encrypt | decrypt
763 PSA key policy: cipher, encrypt but not decrypt
767 PSA key policy: cipher, decrypt but not encrypt
771 PSA key policy: cipher, neither encrypt nor decrypt
779 PSA key policy: AEAD, encrypt | decrypt
791 PSA key policy: AEAD, encrypt but not decrypt
795 PSA key policy: AEAD, decrypt but not encrypt
799 PSA key policy: AEAD, neither encrypt nor decrypt
859 PSA key policy: asymmetric encryption, encrypt | decrypt
879 PSA key policy: asymmetric encryption, encrypt but not decrypt
[all …]
/third_party/node/test/parallel/
Dtest-crypto-authenticated.js113 const encrypt = crypto.createCipheriv(test.algo, constant
119 encrypt.setAAD(Buffer.from(test.aad, 'hex'), aadOptions);
121 let hex = encrypt.update(test.plain, inputEncoding, 'hex');
122 hex += encrypt.final('hex');
124 const auth_tag = encrypt.getAuthTag();
167 const encrypt = crypto.createCipher(test.algo, test.password, options); constant
169 encrypt.setAAD(Buffer.from(test.aad, 'hex'), aadOptions);
170 let hex = encrypt.update(test.plain, 'ascii', 'hex');
171 hex += encrypt.final('hex');
172 const auth_tag = encrypt.getAuthTag();
[all …]
Dtest-crypto-padding.js63 const encrypt = crypto.createCipheriv(CIPHER_NAME, KEY_PLAIN, IV_PLAIN);
64 encrypt.setAutoPadding(pad);
65 let hex = encrypt.update(plain, 'ascii', 'hex');
66 hex += encrypt.final('hex');
Dtest-crypto-ecb.js37 const encrypt = constant
39 let hex = encrypt.update('Hello World!', 'ascii', 'hex');
40 hex += encrypt.final('hex');
Dtest-crypto-padding-aes256.js34 function encrypt(val, pad) { function
50 let encrypted = encrypt(plaintext, false);
58 encrypted = encrypt(plaintext, true);
Dtest-tls-write-error.js47 client.encrypt(finished),
48 client.encrypt(ill),
/third_party/mbedtls/programs/psa/
Dcrypto_examples.c174 uint8_t encrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local
191 encrypt, sizeof( encrypt ), &output_len ); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
195 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
223 encrypt[input_size + block_size], decrypt[input_size + block_size]; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local
239 encrypt, sizeof( encrypt ), &output_len ); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi()
243 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi()
269 uint8_t iv[block_size], input[input_size], encrypt[input_size], in cipher_example_encrypt_decrypt_aes_ctr_multi() local
286 encrypt, sizeof( encrypt ), &output_len ); in cipher_example_encrypt_decrypt_aes_ctr_multi()
290 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_ctr_multi()
/third_party/openssl/crypto/modes/
Docb128.c131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument
138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new()
152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument
168 ctx->encrypt = encrypt; in CRYPTO_ocb128_init()
175 ctx->encrypt(ctx->l_star.c, ctx->l_star.c, ctx->keyenc); in CRYPTO_ocb128_init()
244 ctx->encrypt(tmp, ktop, ctx->keyenc); in CRYPTO_ocb128_setiv()
294 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_aad()
316 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_aad()
379 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_encrypt()
400 ctx->encrypt(ctx->sess.offset.c, pad.c, ctx->keyenc); in CRYPTO_ocb128_encrypt()
[all …]
/third_party/libnl/lib/route/link/
Dmacsec.c61 uint8_t send_sci, end_station, scb, replay_protect, protect, encrypt; member
163 info->encrypt = nla_get_u8(tb[IFLA_MACSEC_ENCRYPT]); in macsec_parse()
233 PRINT_FLAG(tmp, info, encrypt, 'E'); in flags_str()
274 …ntohll(info->sci), values_on_off[info->protect], info->encoding_sa, values_on_off[info->encrypt], … in macsec_dump_details()
313 NLA_PUT_U8(msg, IFLA_MACSEC_ENCRYPT, info->encrypt); in macsec_put_attrs()
382 diff |= MACSEC_DIFF(ENCRYPT, a->encrypt != b->encrypt); in macsec_compare()
611 int rtnl_link_macsec_set_encrypt(struct rtnl_link *link, uint8_t encrypt) in rtnl_link_macsec_set_encrypt() argument
617 if (encrypt > 1) in rtnl_link_macsec_set_encrypt()
620 info->encrypt = encrypt; in rtnl_link_macsec_set_encrypt()
626 int rtnl_link_macsec_get_encrypt(struct rtnl_link *link, uint8_t *encrypt) in rtnl_link_macsec_get_encrypt() argument
[all …]
/third_party/openssl/crypto/evp/
De_chacha20_poly1305.c240 if (ctx->encrypt) in chacha20_poly1305_tls_cipher()
264 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher()
298 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher()
344 Poly1305_Final(POLY1305_ctx(actx), ctx->encrypt ? actx->tag in chacha20_poly1305_tls_cipher()
349 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher()
412 if (ctx->encrypt) { /* plaintext */ in chacha20_poly1305_cipher()
470 Poly1305_Final(POLY1305_ctx(actx), ctx->encrypt ? actx->tag in chacha20_poly1305_cipher()
475 if (ctx->encrypt) { in chacha20_poly1305_cipher()
484 else if (!ctx->encrypt) { in chacha20_poly1305_cipher()
568 if (arg <= 0 || arg > POLY1305_BLOCK_SIZE || !ctx->encrypt) in chacha20_poly1305_ctrl()
[all …]
Devp_enc.c65 enc = ctx->encrypt; in EVP_CipherInit_ex()
69 ctx->encrypt = enc; in EVP_CipherInit_ex()
96 ctx->encrypt = enc; in EVP_CipherInit_ex()
213 if (ctx->encrypt) in EVP_CipherUpdate()
221 if (ctx->encrypt) in EVP_CipherFinal_ex()
229 if (ctx->encrypt) in EVP_CipherFinal()
401 if (!ctx->encrypt) { in EVP_EncryptUpdate()
422 if (!ctx->encrypt) { in EVP_EncryptFinal_ex()
471 if (ctx->encrypt) { in EVP_DecryptUpdate()
571 if (ctx->encrypt) { in EVP_DecryptFinal_ex()
/third_party/openssl/test/
Digetest.c38 const int encrypt; member
83 const int encrypt; member
155 if (v->encrypt == AES_ENCRYPT) in test_ige_vectors()
160 AES_ige_encrypt(v->in, buf, v->length, &key, iv, v->encrypt); in test_ige_vectors()
173 AES_ige_encrypt(buf, buf, v->length, &key, iv, v->encrypt); in test_ige_vectors()
196 if (v->encrypt == AES_ENCRYPT) { in test_bi_ige_vectors()
205 v->encrypt); in test_bi_ige_vectors()
/third_party/openssl/crypto/rc2/
Drc2_ecb.c23 int encrypt) in RC2_ecb_encrypt() argument
31 if (encrypt) in RC2_ecb_encrypt()
Drc2cfb64.c21 int *num, int encrypt) in RC2_cfb64_encrypt() argument
30 if (encrypt) { in RC2_cfb64_encrypt()
/third_party/openssl/crypto/rc5/
Drc5_ecb.c15 RC5_32_KEY *ks, int encrypt) in RC5_32_ecb_encrypt() argument
23 if (encrypt) in RC5_32_ecb_encrypt()
/third_party/openssl/crypto/bf/
Dbf_ecb.c26 const BF_KEY *key, int encrypt) in BF_ecb_encrypt() argument
34 if (encrypt) in BF_ecb_encrypt()
Dbf_cfb64.c21 unsigned char *ivec, int *num, int encrypt) in BF_cfb64_encrypt() argument
30 if (encrypt) { in BF_cfb64_encrypt()
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-jwe/
DREADME.md3 Demonstrates how to encrypt and decrypt using JWE and JWK, providing a
20 clear, for asymmetric keys the public part of the key is required to encrypt,
48 -k <jwk file>|JWK file to encrypt or decrypt with
61 You can also pipe the output of the encrypt action directly into the decrypt
/third_party/ltp/lib/
Dtst_af_alg.c207 if (params->encrypt && params->decrypt) in tst_alg_sendmsg()
211 if (params->encrypt || params->decrypt) in tst_alg_sendmsg()
225 if (params->encrypt || params->decrypt) { in tst_alg_sendmsg()
230 params->encrypt ? ALG_OP_ENCRYPT : ALG_OP_DECRYPT; in tst_alg_sendmsg()
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/
Dmasking.cc47 AESEncrypt encrypt(secret, secret_len, ivec, AES_IV_SIZE, AES_CTR);
48 if (encrypt.EncryptData(data.data(), size, encrypt_data.data(), &encrypt_len) != 0) {
/third_party/openssl/crypto/idea/
Di_cfb64.c21 unsigned char *ivec, int *num, int encrypt) in IDEA_cfb64_encrypt() argument
30 if (encrypt) { in IDEA_cfb64_encrypt()

123456789