/freebsd/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 292 krb5_data decrypt; in krb_enc() local 295 krb5_data_zero(&decrypt); in krb_enc() 302 &decrypt); in krb_enc() 309 if (decrypt.length != clear->length || in krb_enc() 310 memcmp(decrypt.data, clear->data, decrypt.length) != 0) { in krb_enc() 315 krb5_data_free(&decrypt); in krb_enc() 328 krb5_data decrypt; in krb_enc_iov2() local 375 ret = krb5_decrypt(context, crypto, usage, p, len, &decrypt); in krb_enc_iov2() 379 krb5_data_free(&decrypt); in krb_enc_iov2() 530 krb5_data decrypt; in krb_enc_mit() local [all …]
|
/freebsd/sys/contrib/openzfs/include/sys/ |
H A D | dmu_objset.h | 214 int dmu_objset_hold_flags(const char *name, boolean_t decrypt, const void *tag, 217 boolean_t readonly, boolean_t decrypt, const void *tag, objset_t **osp); 219 dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt, 222 struct dsl_dataset **newds, boolean_t decrypt, const void *tag); 224 void dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, const void *tag); 225 void dmu_objset_disown(objset_t *os, boolean_t decrypt, const void *tag);
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | pkey.dot | 11 decrypt [fontcolor="#425F06", color="#425F06"] 32 newed -> decrypt [label="EVP_PKEY_decrypt_init", fontcolor="#425F06", color="#425F06"]; 33 decrypt -> decrypt [label="EVP_PKEY_decrypt", fontcolor="#425F06", color="#425F06"];
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 27 =item decrypt 29 This state represents the PKEY when it is ready to decrypt some ciphertext. 103 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt | 149 …start newed digest verify verify encrypt decrypt derive … 167 … decrypt decrypt decrypt decrypt decrypt decrypt decrypt … 168 …crypt decrypt 186 … newed digest verify verify encrypt decrypt derive … 188 … newed digest verify verify encrypt decrypt derive … 190 … newed digest verify verify encrypt decrypt derive … 192 … newed digest verify verify encrypt decrypt derive … [all …]
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_rsa.c | 182 int ossl_cms_rsa_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_rsa_envelope() argument 184 assert(decrypt == 0 || decrypt == 1); in ossl_cms_rsa_envelope() 186 if (decrypt == 1) in ossl_cms_rsa_envelope() 189 if (decrypt == 0) in ossl_cms_rsa_envelope()
|
H A D | cms_dh.c | 331 int ossl_cms_dh_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_dh_envelope() argument 333 assert(decrypt == 0 || decrypt == 1); in ossl_cms_dh_envelope() 335 if (decrypt == 1) in ossl_cms_dh_envelope() 338 if (decrypt == 0) in ossl_cms_dh_envelope()
|
H A D | cms_ec.c | 382 int ossl_cms_ecdh_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_ecdh_envelope() argument 384 assert(decrypt == 0 || decrypt == 1); in ossl_cms_ecdh_envelope() 386 if (decrypt == 1) in ossl_cms_ecdh_envelope() 389 if (decrypt == 0) in ossl_cms_ecdh_envelope()
|
/freebsd/tests/sys/opencrypto/ |
H A D | cryptotest.py | 98 curfun = Crypto.decrypt 151 c.decrypt, *args) 154 rpt, rtag = c.decrypt(*args) 178 curfun = Crypto.decrypt 210 curfun = Crypto.decrypt 313 c.decrypt, payload, nonce, aad, tag) 315 r, tag = Crypto.decrypt(c, payload, nonce,
|
H A D | cryptodev.py | 345 def decrypt(self, data, iv, aad=None, tag=None): member in Crypto 601 dec = c.decrypt(ct, iv) 622 dec = c.decrypt(ct, iv) 642 dec = c.decrypt(ct, iv) 673 dec, dectag = c.decrypt(ct, iv, aad=aad, tag=enctag) 724 dec = c.decrypt(enc, iv)
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | BIO_f_cipher.pod | 51 decrypt. 54 return value from the read operation. A successful decrypt followed 56 should be called to determine if the decrypt was successful. 67 BIO_get_cipher_status() returns 1 for a successful decrypt and <=0
|
H A D | PKCS12_item_decrypt_d2i.pod | 7 encrypt/decrypt functions 34 PKCS12_item_decrypt_d2i() and PKCS12_item_decrypt_d2i_ex() decrypt an octet 37 buffer will zeroed after the decrypt.
|
H A D | EVP_OpenInit.pod | 20 decryption. They decrypt a public key encrypted symmetric key and 21 then decrypt data using it. 52 EVP_OpenFinal() returns 0 if the decrypt failed or 1 for success.
|
H A D | CMS_decrypt.pod | 7 - decrypt content from a CMS envelopedData structure 25 It uses CMS_decrypt_set1_pkey() to decrypt the content 56 Although the recipients certificate is not needed to decrypt the data it is 63 not. If no recipient succeeds then a random symmetric key is used to decrypt 66 error when all recipient encrypted keys failed to decrypt an attacker could
|
H A D | b2i_PVK_bio_ex.pod | 25 I<cb> is called with the user data I<u> in order to obtain a password to decrypt 27 string I<propq> are used in any decrypt operation. 36 property query string I<propq> are used in any decrypt operation.
|
H A D | PKCS7_decrypt.pod | 5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure 22 Although the recipients certificate is not needed to decrypt the data it is needed
|
/freebsd/crypto/openssl/demos/ |
H A D | README.txt | 11 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt 12 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt 13 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt
|
/freebsd/crypto/openssl/crypto/modes/ |
H A D | ocb128.c | 131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new() 152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument 169 ctx->decrypt = decrypt; in CRYPTO_ocb128_init() 468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec); in CRYPTO_ocb128_decrypt()
|
/freebsd/tools/tools/net80211/w00t/ |
H A D | README | 14 redir Gives ability to decrypt in real-time on a WEP network, via Internet. 15 expand Gives ability to decrypt locally on a WEP network. 72 decrypt it. The clear-text packet is sent to a tap interface.
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | asymcipher.c | 288 ret = ctx->op.ciph.cipher->decrypt(ctx->op.ciph.algctx, out, outlen, in EVP_PKEY_decrypt() 293 if (ctx->pmeth == NULL || ctx->pmeth->decrypt == NULL) { in EVP_PKEY_decrypt() 298 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); in EVP_PKEY_decrypt() 370 if (cipher->decrypt != NULL) in evp_asym_cipher_from_algorithm() 372 cipher->decrypt = OSSL_FUNC_asym_cipher_decrypt(fns); in evp_asym_cipher_from_algorithm()
|
/freebsd/sys/opencrypto/ |
H A D | xform_aes_icm.c | 92 .decrypt = aes_icm_crypt, 112 .decrypt = aes_icm_crypt, 133 .decrypt = aes_icm_crypt,
|
H A D | xform_chacha20_poly1305.c | 166 .decrypt = chacha20_poly1305_crypt, 223 .decrypt = chacha20_poly1305_crypt,
|
/freebsd/crypto/openssh/ |
H A D | rijndael.h | 45 int decrypt; member
|
/freebsd/sys/contrib/openzfs/module/zfs/ |
H A D | dmu_objset.c | 745 dmu_objset_hold_flags(const char *name, boolean_t decrypt, const void *tag, in dmu_objset_hold_flags() argument 753 flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE; in dmu_objset_hold_flags() 780 boolean_t readonly, boolean_t decrypt, const void *tag, objset_t **osp) in dmu_objset_own_impl() argument 791 } else if (!readonly && decrypt && in dmu_objset_own_impl() 797 if (decrypt && arc_is_unauthenticated((*osp)->os_phys_buf)) { in dmu_objset_own_impl() 820 boolean_t readonly, boolean_t decrypt, const void *tag, objset_t **osp) in dmu_objset_own() argument 827 flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE; in dmu_objset_own() 836 err = dmu_objset_own_impl(ds, type, readonly, decrypt, tag, osp); in dmu_objset_own() 850 (ds->ds_dir->dd_crypto_obj == 0 || decrypt)) { in dmu_objset_own() 865 boolean_t readonly, boolean_t decrypt, const void *tag, objset_t **osp) in dmu_objset_own_obj() argument [all …]
|
/freebsd/sys/contrib/openzfs/module/icp/algs/aes/ |
H A D | aes_impl_x86-64.c | 57 .decrypt = &aes_decrypt_amd64,
|
/freebsd/sys/crypto/rijndael/ |
H A D | rijndael.h | 37 int decrypt; member
|