Home
last modified time | relevance | path

Searched refs:decryption (Results 1 – 25 of 57) sorted by relevance

123

/external/scapy/test/
Dipsec.uts41 * after decryption the original packet payload should be unaltered
74 * after decryption the original packet payload should be unaltered
126 * after decryption the original packet payload should be unaltered
177 * after decryption the original packet payload should be unaltered
229 * after decryption original packet should be preserved
280 * after decryption original packet should be preserved
331 * after decryption original packet should be preserved
387 * after decryption the original packet payload should be unaltered
422 * after decryption the original packet payload should be unaltered
457 * after decryption the original packet payload should be unaltered
[all …]
/external/autotest/server/cros/chaos_lib/
Dchaos_capture_analyzer.py16 def get_output(self, display_filter=None, summaries=True, decryption=None): argument
32 decryption_key=decryption,
127 def get_filtered_packets(self, ap, dut, summaries, decryption): argument
142 decryption=decryption)
669 decryption = 'chromeos:%s' % ssid
672 bssids, dut_mac, False, decryption)
678 bssids, dut_mac, True, decryption)
/external/rust/crates/quiche/deps/boringssl/ios-arm/crypto/fipsmodule/
Dvpaes-armv7.S235 Lk_dipt:@ decryption input transform
238 Lk_dsbo:@ decryption sbox final output
241 Lk_dsb9:@ decryption sbox output *9*u, *9*t
244 Lk_dsbd:@ decryption sbox output *D*u, *D*t
247 Lk_dsbb:@ decryption sbox output *B*u, *B*t
250 Lk_dsbe:@ decryption sbox output *E*u, *E*t
276 @ because decryption doesn't use those constants. The values are
466 Lk_dksd:@ decryption key schedule: invskew x*D
469 Lk_dksb:@ decryption key schedule: invskew x*B
472 Lk_dkse:@ decryption key schedule: invskew x*E + 0x63
[all …]
/external/openscreen/third_party/boringssl/ios-arm/crypto/fipsmodule/
Dvpaes-armv7.S235 Lk_dipt:@ decryption input transform
238 Lk_dsbo:@ decryption sbox final output
241 Lk_dsb9:@ decryption sbox output *9*u, *9*t
244 Lk_dsbd:@ decryption sbox output *D*u, *D*t
247 Lk_dsbb:@ decryption sbox output *B*u, *B*t
250 Lk_dsbe:@ decryption sbox output *E*u, *E*t
276 @ because decryption doesn't use those constants. The values are
466 Lk_dksd:@ decryption key schedule: invskew x*D
469 Lk_dksb:@ decryption key schedule: invskew x*B
472 Lk_dkse:@ decryption key schedule: invskew x*E + 0x63
[all …]
/external/boringssl/ios-arm/crypto/fipsmodule/
Dvpaes-armv7.S235 Lk_dipt:@ decryption input transform
238 Lk_dsbo:@ decryption sbox final output
241 Lk_dsb9:@ decryption sbox output *9*u, *9*t
244 Lk_dsbd:@ decryption sbox output *D*u, *D*t
247 Lk_dsbb:@ decryption sbox output *B*u, *B*t
250 Lk_dsbe:@ decryption sbox output *E*u, *E*t
276 @ because decryption doesn't use those constants. The values are
466 Lk_dksd:@ decryption key schedule: invskew x*D
469 Lk_dksb:@ decryption key schedule: invskew x*B
472 Lk_dkse:@ decryption key schedule: invskew x*E + 0x63
[all …]
/external/python/cryptography/docs/
Dglossary.rst17 decryption
26 Cryptographic operations where encryption and decryption use the same
31 Cryptographic operations where encryption and decryption use different
32 keys. There are separate encryption and decryption keys. Typically
78 operations such as encryption, decryption, signing, and verification,
/external/boringssl/linux-arm/crypto/fipsmodule/
Dvpaes-armv7.S230 .Lk_dipt:@ decryption input transform
233 .Lk_dsbo:@ decryption sbox final output
236 .Lk_dsb9:@ decryption sbox output *9*u, *9*t
239 .Lk_dsbd:@ decryption sbox output *D*u, *D*t
242 .Lk_dsbb:@ decryption sbox output *B*u, *B*t
245 .Lk_dsbe:@ decryption sbox output *E*u, *E*t
269 @ because decryption doesn't use those constants. The values are
457 .Lk_dksd:@ decryption key schedule: invskew x*D
460 .Lk_dksb:@ decryption key schedule: invskew x*B
463 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63
[all …]
/external/openscreen/third_party/boringssl/linux-arm/crypto/fipsmodule/
Dvpaes-armv7.S230 .Lk_dipt:@ decryption input transform
233 .Lk_dsbo:@ decryption sbox final output
236 .Lk_dsb9:@ decryption sbox output *9*u, *9*t
239 .Lk_dsbd:@ decryption sbox output *D*u, *D*t
242 .Lk_dsbb:@ decryption sbox output *B*u, *B*t
245 .Lk_dsbe:@ decryption sbox output *E*u, *E*t
269 @ because decryption doesn't use those constants. The values are
457 .Lk_dksd:@ decryption key schedule: invskew x*D
460 .Lk_dksb:@ decryption key schedule: invskew x*B
463 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63
[all …]
/external/rust/crates/quiche/deps/boringssl/linux-arm/crypto/fipsmodule/
Dvpaes-armv7.S230 .Lk_dipt:@ decryption input transform
233 .Lk_dsbo:@ decryption sbox final output
236 .Lk_dsb9:@ decryption sbox output *9*u, *9*t
239 .Lk_dsbd:@ decryption sbox output *D*u, *D*t
242 .Lk_dsbb:@ decryption sbox output *B*u, *B*t
245 .Lk_dsbe:@ decryption sbox output *E*u, *E*t
269 @ because decryption doesn't use those constants. The values are
457 .Lk_dksd:@ decryption key schedule: invskew x*D
460 .Lk_dksb:@ decryption key schedule: invskew x*B
463 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63
[all …]
/external/python/rsa/doc/
Dindex.rst10 encryption and decryption, signing and verifying signatures, and key
29 you'll leak information about the reason why decryption or
Dintro.rst13 encryption, decryption, signing and verification using those large
Dcompatibility.rst46 Encryption and decryption is also compatible::
Dusage.rst19 the private key, hence it's also called the *decryption key*.
94 Encryption and decryption
/external/fonttools/Doc/source/misc/
Deexec.rst2 eexec: PostScript charstring encryption and decryption routines
/external/python/rsa/
DMETADATA2 description: "Python-RSA is a pure-Python RSA implementation. It supports encryption and decryption
DREADME.md10 encryption and decryption, signing and verifying signatures, and key
DCHANGELOG.md6 CVE-2020-25658 - Bleichenbacher-style timing oracle in PKCS#1 v1.5 decryption
203 - Added random-padded encryption and decryption using PKCS#1 version 1.5
/external/python/cryptography/vectors/cryptography_vectors/asymmetric/RSA/pkcs-1v2-1d2-vec/
Dreadme.txt13 encryption and RSA decryption with CRT.
/external/wycheproof/doc/
Dindex.md25 failures during decryption should not contain information about the
26 reason why a decryption failed.
/external/libwebsockets/READMEs/
DREADME.crypto-apis.md78 …kets/tree/include/libwebsockets/lws-genrsa.h)|Provides RSA encryption, decryption, signing, verifi…
79 …lude/libwebsockets/lws-genaes.h)|Provides AES in all common variants for encryption and decryption|
80 …ude/libwebsockets/lws-genec.h)|Provides Elliptic Curve for encryption, decryption, signing, verifi…
/external/openssh/
DPROTOCOL.key52 to both checkint fields so successful decryption can be
DPROTOCOL.chacha20poly130551 as a decryption oracle can learn nothing about the payload contents or
72 before decryption. A per-packet Poly1305 key is generated as described
/external/python/cryptography/vectors/cryptography_vectors/keywrap/kwtestvectors/
DReadme.txt9 …authenticated decryption of ciphertext that has been *encrypted using AES inverse cipher function*)
/external/python/cryptography/docs/hazmat/primitives/
Dsymmetric-encryption.rst375 until decryption is complete.
408 :param bytes tag: The tag bytes to verify during decryption. When
449 # it must also be passed in on decryption.
634 it is an encryption or decryption context it will additionally be an
688 :param bytes tag: The tag bytes to verify after decryption.
821 decryption.
/external/ukey2/src/main/proto/
Dsecuremessage.proto53 // Identifies the decryption key

123