/external/openssh/ |
H A D | rijndael.h | 41 int decrypt; member in struct:__anon8320 44 u32 dk[4*(MAXNR + 1)]; /* decrypt key schedule */
|
H A D | rijndael.c | 1225 ctx->decrypt = 0; 1228 ctx->decrypt = 1;
|
/external/dropbear/libtomcrypt/demos/ |
H A D | encrypt.c | 100 unsigned long outlen, y, ivsize, x, decrypt; local 115 decrypt = 1; 120 decrypt = 0; 166 if (decrypt) {
|
/external/srtp/crypto/include/ |
H A D | cipher.h | 85 * and direction (i.e., encrypt or decrypt) 144 cipher_encrypt_func_t decrypt; member in struct:cipher_type_t 178 (((c)->type)->decrypt(((c)->state), (buf), (len)))
|
/external/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 232 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) 251 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) 263 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); 288 if (!ctx || !ctx->pmeth || !(ctx->pmeth->derive||ctx->pmeth->encrypt||ctx->pmeth->decrypt) || !ctx->pmeth->ctrl)
|
H A D | pmeth_lib.c | 232 pmeth->decrypt = 0; 282 dst->decrypt = src->decrypt; 572 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, 576 pmeth->decrypt = decrypt;
|
H A D | evp_locl.h | 333 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, member in struct:evp_pkey_method_st
|
H A D | evp.h | 313 const unsigned char *in, size_t inl);/* encrypt/decrypt data */ 394 /* Set the GCM invocation field, decrypt only */ 416 int encrypt; /* encrypt or decrypt */ 1234 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen,
|
/external/ipsec-tools/src/racoon/ |
H A D | algorithm.h | 157 vchar_t *(*decrypt) __P((vchar_t *, vchar_t *, vchar_t *)); member in struct:enc_algorithm
|
H A D | algorithm.c | 534 if (f == NULL || f->decrypt == NULL) 541 res = (f->decrypt)(buf, key, iv);
|
H A D | eaytest.c | 597 eay_func decrypt) 625 res2 = (decrypt)(res1, key, iv); 589 ciphertest_1(const char *name, vchar_t *data, size_t data_align, vchar_t *key, size_t min_keysize, vchar_t *iv0, size_t iv_length, eay_func encrypt, eay_func decrypt) argument
|
/external/webrtc/src/ |
H A D | common_types.h | 160 virtual void decrypt(
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | des.c | 281 static void deskey(const u8 *key, int decrypt, u32 *keyout) argument 294 if (decrypt)
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | des-internal.c | 273 static void deskey(const u8 *key, int decrypt, u32 *keyout) argument 286 if (decrypt)
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | des-internal.c | 273 static void deskey(const u8 *key, int decrypt, u32 *keyout) argument 286 if (decrypt)
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | des-internal.c | 273 static void deskey(const u8 *key, int decrypt, u32 *keyout) argument 286 if (decrypt)
|
/external/openssl/apps/ |
H A D | speed.c | 628 int decrypt=0; local 730 else if (argc > 0 && !strcmp(*argv,"-decrypt")) 732 decrypt=1; 1144 BIO_printf(bio_err,"-decrypt time decryption instead of encryption (only EVP).\n"); 1969 if(decrypt) 1976 if(decrypt) 1982 if(decrypt)
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 147 and store data in a format independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt 183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher: 443 These two functions will encrypt or decrypt (respectively) a single block of text\footnote{The size of which depends on 528 /* decrypt the block */ 529 blowfish_ecb_decrypt(ct, /* decrypt this 8-byte array */ 808 to encrypt whole blocks at a time. However, the library will buffer data allowing the user to encrypt or decrypt partial 819 buffer the output which will allow you to encrypt or decrypt partial blocks without delay. 831 accomplish this by buffering the data required to complete a block. This allows you to encrypt or decrypt any size 892 To actually encrypt or decrypt th [all...] |
/external/v8/benchmarks/ |
H A D | crypto.js | 36 new Benchmark("Decrypt", decrypt) 1654 // if(h) return this.decrypt(h); else return null; 1664 RSAKey.prototype.decrypt = RSADecrypt; 1690 function decrypt() { 1694 var decrypted = RSA.decrypt(encrypted);
|
/external/webkit/PerformanceTests/SunSpider/tests/v8-v4/ |
H A D | v8-crypto.js | 1646 // if(h) return this.decrypt(h); else return null; 1656 RSAKey.prototype.decrypt = RSADecrypt; 1682 function decrypt() { 1686 var decrypted = RSA.decrypt(encrypted); 1694 decrypt();
|
/external/webkit/PerformanceTests/SunSpider/tests/v8-v5/ |
H A D | v8-crypto.js | 1646 // if(h) return this.decrypt(h); else return null; 1656 RSAKey.prototype.decrypt = RSADecrypt; 1682 function decrypt() { 1686 var decrypted = RSA.decrypt(encrypted); 1694 decrypt();
|
/external/webkit/PerformanceTests/SunSpider/tests/v8-v6/ |
H A D | v8-crypto.js | 1646 // if(h) return this.decrypt(h); else return null; 1656 RSAKey.prototype.decrypt = RSADecrypt; 1682 function decrypt() { 1686 var decrypted = RSA.decrypt(encrypted); 1694 decrypt();
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.security_1.0.200.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/openssl/include/openssl/ |
H A D | evp.h | 313 const unsigned char *in, size_t inl);/* encrypt/decrypt data */ 394 /* Set the GCM invocation field, decrypt only */ 416 int encrypt; /* encrypt or decrypt */ 1234 int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen,
|