Home
last modified time | relevance | path

Searched refs:decrypt (Results 1 – 25 of 87) sorted by relevance

1234

/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
Dcli.rst12 .. index:: pyrsa-keygen, pyrsa-encrypt, pyrsa-decrypt, pyrsa-sign
14 .. index:: pyrsa-decrypt-bigfile, pyrsa-decrypt-bigfile
24 | pyrsa-decrypt | Decrypts a file. | :py:func:`rsa.decrypt`…
40 | pyrsa-decrypt-bigfile | Decrypts an encrypted VARBLOCK file. | :py:func:`rsa.bigfile.…
Dupgrading.rst17 use an old version to decrypt your messages, and a new version to
23 decrypted = rsa200.decrypt(old_crypto, version_200_private_key)
/external/fonttools/Lib/fontTools/misc/
Deexec.py21 def decrypt(cipherstring, R): function
50 print(decrypt, decrypt(testStr, 12321))
/external/opencv3/3rdparty/include/ffmpeg_/libavutil/
Daes.h49 int av_aes_init(struct AVAES *a, const uint8_t *key, int key_bits, int decrypt);
59 …_aes_crypt(struct AVAES *a, uint8_t *dst, const uint8_t *src, int count, uint8_t *iv, int decrypt);
Dblowfish.h58 int decrypt);
71 int count, uint8_t *iv, int decrypt);
Dxtea.h56 int count, uint8_t *iv, int decrypt);
/external/pdfium/core/src/fdrm/crypto/
Dfx_crypt_aes.cpp32 void (*decrypt)(AESContext* ctx, unsigned int* block); member
699 ctx->encrypt = aes_encrypt_nb_8, ctx->decrypt = aes_decrypt_nb_8; in aes_setup()
701 ctx->encrypt = aes_encrypt_nb_6, ctx->decrypt = aes_decrypt_nb_6; in aes_setup()
703 ctx->encrypt = aes_encrypt_nb_4, ctx->decrypt = aes_decrypt_nb_4; in aes_setup()
756 ctx->decrypt(ctx, block); in aes_decrypt()
/external/srtp/crypto/include/
Dcipher.h144 cipher_encrypt_func_t decrypt; member
178 (((c)->type)->decrypt(((c)->state), (buf), (len)))
/external/fonttools/Lib/fontTools/
Dt1Lib.py92 charString, R = eexec.decrypt(charString, 4330)
96 charString, R = eexec.decrypt(subrs[i], 4330)
298 decrypted, R = eexec.decrypt(chunk, 55665)
325 plainText, R = eexec.decrypt(cypherText, 55665)
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
Dtest_pkcs1.py23 decrypted = pkcs1.decrypt(encrypted, self.priv)
39 self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
Dtest_strings.py24 decrypted = rsa.decrypt(encrypted, self.priv)
/external/boringssl/src/crypto/evp/
Devp_ctx.c317 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt_init()
334 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt()
342 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); in EVP_PKEY_decrypt()
364 !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) || in EVP_PKEY_derive_set_peer()
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
D__init__.py35 from rsa.pkcs1 import encrypt, decrypt, sign, verify, DecryptionError, \
Dbigfile.py83 cleartext = pkcs1.decrypt(block, priv_key)
/external/tpm2/
DObject_spt.c364 && publicArea->objectAttributes.decrypt == SET in SchemeChecks()
384 || ( publicArea->objectAttributes.decrypt == SET in SchemeChecks()
419 && publicArea->objectAttributes.decrypt == SET) in SchemeChecks()
459 == publicArea->objectAttributes.decrypt) in SchemeChecks()
467 else if(publicArea->objectAttributes.decrypt) in SchemeChecks()
486 if( publicArea->objectAttributes.decrypt == CLEAR in SchemeChecks()
560 && ( publicArea->objectAttributes.decrypt in PublicAttributesValidation()
DUnseal.c33 if( object->publicArea.objectAttributes.decrypt == SET in TPM2_Unseal()
DEncryptDecrypt_fp.h14 TPMI_YES_NO decrypt; member
DActivateCredential.c47 || object->publicArea.objectAttributes.decrypt == CLEAR in TPM2_ActivateCredential()
DMakeCredential.c39 || object->publicArea.objectAttributes.decrypt == CLEAR in TPM2_MakeCredential()
DECDH_ZGen.c39 || eccKey->publicArea.objectAttributes.decrypt != SET in TPM2_ECDH_ZGen()
DECDH_KeyGen.c36 || eccKey->publicArea.objectAttributes.decrypt != SET in TPM2_ECDH_KeyGen()
DRSA_Encrypt.c43 if(rsaKey->publicArea.objectAttributes.decrypt != SET) in TPM2_RSA_Encrypt()
DRSA_Decrypt.c45 || rsaKey->publicArea.objectAttributes.decrypt == CLEAR) in TPM2_RSA_Decrypt()
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/
Dtest_kms.py62 response = self.service_connection.decrypt(b'some arbitrary value')
/external/autotest/server/site_tests/network_WiFi_GTK/
Dcontrol15 This test verifies that we can continue to decrypt broadcast traffic while

1234