/external/dropbear/libtomcrypt/demos/ |
D | encrypt.c | 100 unsigned long outlen, y, ivsize, x, decrypt; in main() local 115 decrypt = 1; in main() 120 decrypt = 0; in main() 166 if (decrypt) { in main()
|
/external/openssl/crypto/evp/ |
D | pmeth_fn.c | 232 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) in EVP_PKEY_decrypt_init() 251 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) in EVP_PKEY_decrypt() 263 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); in EVP_PKEY_decrypt() 288 …if (!ctx || !ctx->pmeth || !(ctx->pmeth->derive||ctx->pmeth->encrypt||ctx->pmeth->decrypt) || !ctx… in EVP_PKEY_derive_set_peer()
|
D | pmeth_lib.c | 232 pmeth->decrypt = 0; in EVP_PKEY_meth_new() 282 dst->decrypt = src->decrypt; in EVP_PKEY_meth_copy() 572 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, in EVP_PKEY_meth_set_decrypt() 576 pmeth->decrypt = decrypt; in EVP_PKEY_meth_set_decrypt()
|
D | evptests.txt | 1 #cipher:key:iv:plaintext:ciphertext:0/1(decrypt/encrypt) 32 # AES 128 ECB tests (from NIST test vectors, decrypt) 36 # AES 192 ECB tests (from NIST test vectors, decrypt) 40 # AES 256 ECB tests (from NIST test vectors, decrypt) 56 # AES 128 CBC tests (from NIST test vectors, decrypt)
|
D | evp_locl.h | 333 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member
|
/external/srtp/crypto/include/ |
D | cipher.h | 144 cipher_encrypt_func_t decrypt; member 178 (((c)->type)->decrypt(((c)->state), (buf), (len)))
|
/external/openssh/ |
D | rijndael.h | 41 int decrypt; member
|
D | rijndael.c | 1225 ctx->decrypt = 0; in rijndael_set_key() 1228 ctx->decrypt = 1; in rijndael_set_key()
|
/external/openssl/crypto/des/ |
D | des.pod | 5 des - encrypt or decrypt data using Data Encryption Standard 49 (for decrypt) must be specified. 54 in conjunction or instead of the a encrypt/decrypt option to generate 205 not decrypt filename (the B<-u> option will gobble the B<-d> option).
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | des.c | 281 static void deskey(const u8 *key, int decrypt, u32 *keyout) in deskey() argument 294 if (decrypt) in deskey()
|
/external/wpa_supplicant_8/src/crypto/ |
D | des-internal.c | 273 static void deskey(const u8 *key, int decrypt, u32 *keyout) in deskey() argument 286 if (decrypt) in deskey()
|
/external/ipsec-tools/src/racoon/ |
D | algorithm.h | 157 vchar_t *(*decrypt) __P((vchar_t *, vchar_t *, vchar_t *)); member
|
D | algorithm.c | 534 if (f == NULL || f->decrypt == NULL) 541 res = (f->decrypt)(buf, key, iv);
|
D | eaytest.c | 597 eay_func decrypt) in ciphertest_1() argument 625 res2 = (decrypt)(res1, key, iv); in ciphertest_1()
|
/external/webrtc/src/ |
D | common_types.h | 160 virtual void decrypt(
|
/external/openssl/apps/ |
D | speed.c | 628 int decrypt=0; in MAIN() local 732 decrypt=1; in MAIN() 1969 if(decrypt) in MAIN() 1976 if(decrypt) in MAIN() 1982 if(decrypt) in MAIN()
|
/external/v8/benchmarks/ |
D | crypto.js | 36 new Benchmark("Decrypt", decrypt) 1664 RSAKey.prototype.decrypt = RSADecrypt; method in RSAKey 1690 function decrypt() { function 1694 var decrypted = RSA.decrypt(encrypted);
|
/external/webkit/PerformanceTests/SunSpider/tests/v8-v6/ |
D | v8-crypto.js | 1656 RSAKey.prototype.decrypt = RSADecrypt; method in RSAKey 1682 function decrypt() { function 1686 var decrypted = RSA.decrypt(encrypted); 1694 decrypt();
|
/external/webkit/PerformanceTests/SunSpider/tests/v8-v5/ |
D | v8-crypto.js | 1656 RSAKey.prototype.decrypt = RSADecrypt; method in RSAKey 1682 function decrypt() { function 1686 var decrypted = RSA.decrypt(encrypted); 1694 decrypt();
|
/external/webkit/PerformanceTests/SunSpider/tests/v8-v4/ |
D | v8-crypto.js | 1656 RSAKey.prototype.decrypt = RSADecrypt; method in RSAKey 1682 function decrypt() { function 1686 var decrypted = RSA.decrypt(encrypted); 1694 decrypt();
|
/external/srtp/googlepatches/ |
D | vidyo-1-srtp-win.patch | 111 /* decrypt the Encrypted Master Key field */
|
/external/srtp/ |
D | README | 98 -e encrypt/decrypt (for data confidentiality)
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 147 …at independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt 183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode… 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher: 443 These two functions will encrypt or decrypt (respectively) a single block of text\footnote{The size… 528 /* decrypt the block */ 529 blowfish_ecb_decrypt(ct, /* decrypt this 8-byte array */ 808 …s at a time. However, the library will buffer data allowing the user to encrypt or decrypt partial 819 buffer the output which will allow you to encrypt or decrypt partial blocks without delay. 831 …y buffering the data required to complete a block. This allows you to encrypt or decrypt any size 892 To actually encrypt or decrypt the following routines are provided: [all …]
|
D | changes | 118 -- lrw_process now checks the return of the cipher ecb encrypt/decrypt calls 180 …ed. It does carry some advantages over RSA (slightly smaller public key, faster decrypt) but also 185 …-- Made the cipher ecb encrypt/decrypt return an int as well, changed ALL dependent code to check … 196 -- Added encrypt/decrypt to the DSA side (basically DH with DSA parameters) 393 …m_exptmod() completely, updated several RSA functions (notably v15 and the decrypt/verify) so they 408 -- Fixed up RSA's decrypt functions changing "res" to "stat" to be more in sync 423 …-- Changed RSA decrypt functions to change the output length variable name from "keylen" to "outle… 581 … -- updated ECB, OCB and CBC decrypt functions to detect when "encrypt only" descriptor is used. 961 -- Sped up the RSA decrypt/sign routines 1056 …-- The ECB/CBC/OFB/CFB/CTR wrappers now check that the cipher is valid in the encrypt/decrypt calls [all …]
|
/external/openssl/crypto/des/asm/ |
D | readme | 16 They encrypt/decrypt the 64 bits held in 'data' using
|