/third_party/openssl/test/ssl-tests/ |
D | 19-mac-then-encrypt.conf | 5 test-0 = 0-disable-encrypt-then-mac-server-sha 6 test-1 = 1-disable-encrypt-then-mac-client-sha 7 test-2 = 2-disable-encrypt-then-mac-both-sha 8 test-3 = 3-disable-encrypt-then-mac-server-sha2 9 test-4 = 4-disable-encrypt-then-mac-client-sha2 10 test-5 = 5-disable-encrypt-then-mac-both-sha2 13 [0-disable-encrypt-then-mac-server-sha] 14 ssl_conf = 0-disable-encrypt-then-mac-server-sha-ssl 16 [0-disable-encrypt-then-mac-server-sha-ssl] 17 server = 0-disable-encrypt-then-mac-server-sha-server [all …]
|
D | 19-mac-then-encrypt.conf.in | 18 name => "disable-encrypt-then-mac-server-sha", 31 name => "disable-encrypt-then-mac-client-sha", 44 name => "disable-encrypt-then-mac-both-sha", 61 name => "disable-encrypt-then-mac-server-sha2", 74 name => "disable-encrypt-then-mac-client-sha2", 87 name => "disable-encrypt-then-mac-both-sha2",
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ccm.data | 57 CCM* encrypt and tag #1 61 CCM* encrypt and tag #2 65 CCM* encrypt and tag #3 81 CCM encrypt and tag RFC 3610 #1 85 CCM encrypt and tag RFC 3610 #2 89 CCM encrypt and tag RFC 3610 #3 93 CCM encrypt and tag RFC 3610 #4 97 CCM encrypt and tag RFC 3610 #5 101 CCM encrypt and tag RFC 3610 #6 105 CCM encrypt and tag RFC 3610 #7 [all …]
|
D | test_suite_psa_crypto_driver_wrappers.data | 120 PSA symmetric encrypt validation: AES-CTR, 16 bytes, good 124 PSA symmetric encrypt validation: AES-CTR, 15 bytes, good 128 PSA symmetric encrypt validation: AES-CTR, 16 bytes, fallback 132 PSA symmetric encrypt validation: AES-CTR, 15 bytes, fallback 136 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, good 140 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, good 144 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, fallback 148 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, fallback 152 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, fake 156 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, fake [all …]
|
D | test_suite_psa_crypto.data | 755 PSA key policy: cipher, encrypt | decrypt 763 PSA key policy: cipher, encrypt but not decrypt 767 PSA key policy: cipher, decrypt but not encrypt 771 PSA key policy: cipher, neither encrypt nor decrypt 779 PSA key policy: AEAD, encrypt | decrypt 791 PSA key policy: AEAD, encrypt but not decrypt 795 PSA key policy: AEAD, decrypt but not encrypt 799 PSA key policy: AEAD, neither encrypt nor decrypt 859 PSA key policy: asymmetric encryption, encrypt | decrypt 879 PSA key policy: asymmetric encryption, encrypt but not decrypt [all …]
|
/third_party/node/test/parallel/ |
D | test-crypto-authenticated.js | 113 const encrypt = crypto.createCipheriv(test.algo, constant 119 encrypt.setAAD(Buffer.from(test.aad, 'hex'), aadOptions); 121 let hex = encrypt.update(test.plain, inputEncoding, 'hex'); 122 hex += encrypt.final('hex'); 124 const auth_tag = encrypt.getAuthTag(); 167 const encrypt = crypto.createCipher(test.algo, test.password, options); constant 169 encrypt.setAAD(Buffer.from(test.aad, 'hex'), aadOptions); 170 let hex = encrypt.update(test.plain, 'ascii', 'hex'); 171 hex += encrypt.final('hex'); 172 const auth_tag = encrypt.getAuthTag(); [all …]
|
D | test-crypto-padding.js | 63 const encrypt = crypto.createCipheriv(CIPHER_NAME, KEY_PLAIN, IV_PLAIN); 64 encrypt.setAutoPadding(pad); 65 let hex = encrypt.update(plain, 'ascii', 'hex'); 66 hex += encrypt.final('hex');
|
D | test-crypto-ecb.js | 37 const encrypt = constant 39 let hex = encrypt.update('Hello World!', 'ascii', 'hex'); 40 hex += encrypt.final('hex');
|
D | test-crypto-padding-aes256.js | 34 function encrypt(val, pad) { function 50 let encrypted = encrypt(plaintext, false); 58 encrypted = encrypt(plaintext, true);
|
D | test-tls-write-error.js | 47 client.encrypt(finished), 48 client.encrypt(ill),
|
/third_party/mbedtls/programs/psa/ |
D | crypto_examples.c | 174 uint8_t encrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local 191 encrypt, sizeof( encrypt ), &output_len ); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 195 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 223 encrypt[input_size + block_size], decrypt[input_size + block_size]; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local 239 encrypt, sizeof( encrypt ), &output_len ); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 243 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 269 uint8_t iv[block_size], input[input_size], encrypt[input_size], in cipher_example_encrypt_decrypt_aes_ctr_multi() local 286 encrypt, sizeof( encrypt ), &output_len ); in cipher_example_encrypt_decrypt_aes_ctr_multi() 290 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_ctr_multi()
|
/third_party/openssl/crypto/modes/ |
D | ocb128.c | 131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new() 152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument 168 ctx->encrypt = encrypt; in CRYPTO_ocb128_init() 175 ctx->encrypt(ctx->l_star.c, ctx->l_star.c, ctx->keyenc); in CRYPTO_ocb128_init() 244 ctx->encrypt(tmp, ktop, ctx->keyenc); in CRYPTO_ocb128_setiv() 294 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_aad() 316 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_aad() 379 ctx->encrypt(tmp.c, tmp.c, ctx->keyenc); in CRYPTO_ocb128_encrypt() 400 ctx->encrypt(ctx->sess.offset.c, pad.c, ctx->keyenc); in CRYPTO_ocb128_encrypt() [all …]
|
/third_party/libnl/lib/route/link/ |
D | macsec.c | 61 uint8_t send_sci, end_station, scb, replay_protect, protect, encrypt; member 163 info->encrypt = nla_get_u8(tb[IFLA_MACSEC_ENCRYPT]); in macsec_parse() 233 PRINT_FLAG(tmp, info, encrypt, 'E'); in flags_str() 274 …ntohll(info->sci), values_on_off[info->protect], info->encoding_sa, values_on_off[info->encrypt], … in macsec_dump_details() 313 NLA_PUT_U8(msg, IFLA_MACSEC_ENCRYPT, info->encrypt); in macsec_put_attrs() 382 diff |= MACSEC_DIFF(ENCRYPT, a->encrypt != b->encrypt); in macsec_compare() 611 int rtnl_link_macsec_set_encrypt(struct rtnl_link *link, uint8_t encrypt) in rtnl_link_macsec_set_encrypt() argument 617 if (encrypt > 1) in rtnl_link_macsec_set_encrypt() 620 info->encrypt = encrypt; in rtnl_link_macsec_set_encrypt() 626 int rtnl_link_macsec_get_encrypt(struct rtnl_link *link, uint8_t *encrypt) in rtnl_link_macsec_get_encrypt() argument [all …]
|
/third_party/openssl/crypto/evp/ |
D | e_chacha20_poly1305.c | 240 if (ctx->encrypt) in chacha20_poly1305_tls_cipher() 264 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher() 298 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher() 344 Poly1305_Final(POLY1305_ctx(actx), ctx->encrypt ? actx->tag in chacha20_poly1305_tls_cipher() 349 if (ctx->encrypt) { in chacha20_poly1305_tls_cipher() 412 if (ctx->encrypt) { /* plaintext */ in chacha20_poly1305_cipher() 470 Poly1305_Final(POLY1305_ctx(actx), ctx->encrypt ? actx->tag in chacha20_poly1305_cipher() 475 if (ctx->encrypt) { in chacha20_poly1305_cipher() 484 else if (!ctx->encrypt) { in chacha20_poly1305_cipher() 568 if (arg <= 0 || arg > POLY1305_BLOCK_SIZE || !ctx->encrypt) in chacha20_poly1305_ctrl() [all …]
|
D | evp_enc.c | 65 enc = ctx->encrypt; in EVP_CipherInit_ex() 69 ctx->encrypt = enc; in EVP_CipherInit_ex() 96 ctx->encrypt = enc; in EVP_CipherInit_ex() 213 if (ctx->encrypt) in EVP_CipherUpdate() 221 if (ctx->encrypt) in EVP_CipherFinal_ex() 229 if (ctx->encrypt) in EVP_CipherFinal() 401 if (!ctx->encrypt) { in EVP_EncryptUpdate() 422 if (!ctx->encrypt) { in EVP_EncryptFinal_ex() 471 if (ctx->encrypt) { in EVP_DecryptUpdate() 571 if (ctx->encrypt) { in EVP_DecryptFinal_ex()
|
/third_party/openssl/test/ |
D | igetest.c | 38 const int encrypt; member 83 const int encrypt; member 155 if (v->encrypt == AES_ENCRYPT) in test_ige_vectors() 160 AES_ige_encrypt(v->in, buf, v->length, &key, iv, v->encrypt); in test_ige_vectors() 173 AES_ige_encrypt(buf, buf, v->length, &key, iv, v->encrypt); in test_ige_vectors() 196 if (v->encrypt == AES_ENCRYPT) { in test_bi_ige_vectors() 205 v->encrypt); in test_bi_ige_vectors()
|
/third_party/openssl/crypto/rc2/ |
D | rc2_ecb.c | 23 int encrypt) in RC2_ecb_encrypt() argument 31 if (encrypt) in RC2_ecb_encrypt()
|
D | rc2cfb64.c | 21 int *num, int encrypt) in RC2_cfb64_encrypt() argument 30 if (encrypt) { in RC2_cfb64_encrypt()
|
/third_party/openssl/crypto/rc5/ |
D | rc5_ecb.c | 15 RC5_32_KEY *ks, int encrypt) in RC5_32_ecb_encrypt() argument 23 if (encrypt) in RC5_32_ecb_encrypt()
|
/third_party/openssl/crypto/bf/ |
D | bf_ecb.c | 26 const BF_KEY *key, int encrypt) in BF_ecb_encrypt() argument 34 if (encrypt) in BF_ecb_encrypt()
|
D | bf_cfb64.c | 21 unsigned char *ivec, int *num, int encrypt) in BF_cfb64_encrypt() argument 30 if (encrypt) { in BF_cfb64_encrypt()
|
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-jwe/ |
D | README.md | 3 Demonstrates how to encrypt and decrypt using JWE and JWK, providing a 20 clear, for asymmetric keys the public part of the key is required to encrypt, 48 -k <jwk file>|JWK file to encrypt or decrypt with 61 You can also pipe the output of the encrypt action directly into the decrypt
|
/third_party/ltp/lib/ |
D | tst_af_alg.c | 207 if (params->encrypt && params->decrypt) in tst_alg_sendmsg() 211 if (params->encrypt || params->decrypt) in tst_alg_sendmsg() 225 if (params->encrypt || params->decrypt) { in tst_alg_sendmsg() 230 params->encrypt ? ALG_OP_ENCRYPT : ALG_OP_DECRYPT; in tst_alg_sendmsg()
|
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/ |
D | masking.cc | 47 AESEncrypt encrypt(secret, secret_len, ivec, AES_IV_SIZE, AES_CTR); 48 if (encrypt.EncryptData(data.data(), size, encrypt_data.data(), &encrypt_len) != 0) {
|
/third_party/openssl/crypto/idea/ |
D | i_cfb64.c | 21 unsigned char *ivec, int *num, int encrypt) in IDEA_cfb64_encrypt() argument 30 if (encrypt) { in IDEA_cfb64_encrypt()
|