/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
D | cli.rst | 12 .. index:: pyrsa-keygen, pyrsa-encrypt, pyrsa-decrypt, pyrsa-sign 14 .. index:: pyrsa-decrypt-bigfile, pyrsa-decrypt-bigfile 24 | pyrsa-decrypt | Decrypts a file. | :py:func:`rsa.decrypt`… 40 | pyrsa-decrypt-bigfile | Decrypts an encrypted VARBLOCK file. | :py:func:`rsa.bigfile.…
|
D | upgrading.rst | 17 use an old version to decrypt your messages, and a new version to 23 decrypted = rsa200.decrypt(old_crypto, version_200_private_key)
|
/external/fonttools/Lib/fontTools/misc/ |
D | eexec.py | 21 def decrypt(cipherstring, R): function 50 print(decrypt, decrypt(testStr, 12321))
|
/external/opencv3/3rdparty/include/ffmpeg_/libavutil/ |
D | aes.h | 49 int av_aes_init(struct AVAES *a, const uint8_t *key, int key_bits, int decrypt); 59 …_aes_crypt(struct AVAES *a, uint8_t *dst, const uint8_t *src, int count, uint8_t *iv, int decrypt);
|
D | blowfish.h | 58 int decrypt); 71 int count, uint8_t *iv, int decrypt);
|
D | xtea.h | 56 int count, uint8_t *iv, int decrypt);
|
/external/srtp/crypto/include/ |
D | cipher.h | 144 cipher_encrypt_func_t decrypt; member 178 (((c)->type)->decrypt(((c)->state), (buf), (len)))
|
/external/pdfium/core/src/fdrm/crypto/ |
D | fx_crypt_aes.cpp | 32 void (*decrypt)(AESContext* ctx, unsigned int* block); member 699 ctx->encrypt = aes_encrypt_nb_8, ctx->decrypt = aes_decrypt_nb_8; in aes_setup() 701 ctx->encrypt = aes_encrypt_nb_6, ctx->decrypt = aes_decrypt_nb_6; in aes_setup() 703 ctx->encrypt = aes_encrypt_nb_4, ctx->decrypt = aes_decrypt_nb_4; in aes_setup() 756 ctx->decrypt(ctx, block); in aes_decrypt()
|
/external/fonttools/Lib/fontTools/ |
D | t1Lib.py | 92 charString, R = eexec.decrypt(charString, 4330) 96 charString, R = eexec.decrypt(subrs[i], 4330) 298 decrypted, R = eexec.decrypt(chunk, 55665) 325 plainText, R = eexec.decrypt(cypherText, 55665)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
D | test_pkcs1.py | 23 decrypted = pkcs1.decrypt(encrypted, self.priv) 39 self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
|
D | test_strings.py | 24 decrypted = rsa.decrypt(encrypted, self.priv)
|
/external/boringssl/src/crypto/evp/ |
D | evp_ctx.c | 317 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt_init() 334 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt() 342 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); in EVP_PKEY_decrypt() 364 !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) || in EVP_PKEY_derive_set_peer()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
D | __init__.py | 35 from rsa.pkcs1 import encrypt, decrypt, sign, verify, DecryptionError, \
|
D | bigfile.py | 83 cleartext = pkcs1.decrypt(block, priv_key)
|
/external/tpm2/ |
D | Object_spt.c | 364 && publicArea->objectAttributes.decrypt == SET in SchemeChecks() 384 || ( publicArea->objectAttributes.decrypt == SET in SchemeChecks() 419 && publicArea->objectAttributes.decrypt == SET) in SchemeChecks() 459 == publicArea->objectAttributes.decrypt) in SchemeChecks() 467 else if(publicArea->objectAttributes.decrypt) in SchemeChecks() 486 if( publicArea->objectAttributes.decrypt == CLEAR in SchemeChecks() 560 && ( publicArea->objectAttributes.decrypt in PublicAttributesValidation()
|
D | Unseal.c | 33 if( object->publicArea.objectAttributes.decrypt == SET in TPM2_Unseal()
|
D | EncryptDecrypt_fp.h | 14 TPMI_YES_NO decrypt; member
|
D | ActivateCredential.c | 47 || object->publicArea.objectAttributes.decrypt == CLEAR in TPM2_ActivateCredential()
|
D | MakeCredential.c | 39 || object->publicArea.objectAttributes.decrypt == CLEAR in TPM2_MakeCredential()
|
D | ECDH_ZGen.c | 39 || eccKey->publicArea.objectAttributes.decrypt != SET in TPM2_ECDH_ZGen()
|
D | ECDH_KeyGen.c | 36 || eccKey->publicArea.objectAttributes.decrypt != SET in TPM2_ECDH_KeyGen()
|
D | RSA_Encrypt.c | 43 if(rsaKey->publicArea.objectAttributes.decrypt != SET) in TPM2_RSA_Encrypt()
|
D | RSA_Decrypt.c | 45 || rsaKey->publicArea.objectAttributes.decrypt == CLEAR) in TPM2_RSA_Decrypt()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/ |
D | test_kms.py | 62 response = self.service_connection.decrypt(b'some arbitrary value')
|
/external/autotest/server/site_tests/network_WiFi_GTK/ |
D | control | 15 This test verifies that we can continue to decrypt broadcast traffic while
|