/netbsd-src/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | symmetric.c | 107 std_resync(pgp_crypt_t *decrypt) in std_resync() argument 109 if ((size_t) decrypt->num == decrypt->blocksize) { in std_resync() 113 memmove(decrypt->civ + decrypt->blocksize - decrypt->num, decrypt->civ, in std_resync() 114 (unsigned)decrypt->num); in std_resync() 115 (void) memcpy(decrypt->civ, decrypt->siv + decrypt->num, in std_resync() 116 decrypt->blocksize - decrypt->num); in std_resync() 117 decrypt->num = 0; in std_resync() 765 pgp_decrypt_init(pgp_crypt_t *decrypt) in pgp_decrypt_init() argument 767 decrypt->base_init(decrypt); in pgp_decrypt_init() 768 decrypt->block_encrypt(decrypt, decrypt->siv, decrypt->iv); in pgp_decrypt_init() [all …]
|
H A D | keyring.c | 233 decrypt_t *decrypt; in decrypt_cb() local 236 decrypt = pgp_callback_arg(cbinfo); in decrypt_cb() 247 if (pgp_getpassphrase(decrypt->passfp, pass, sizeof(pass)) == 0) { in decrypt_cb() 276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) { in decrypt_cb() 280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE); in decrypt_cb() 281 *decrypt->seckey = content->seckey; in decrypt_cb() 323 decrypt_t decrypt; in pgp_decrypt_seckey() local 326 (void) memset(&decrypt, 0x0, sizeof(decrypt)); in pgp_decrypt_seckey() 327 decrypt.key = key; in pgp_decrypt_seckey() 330 pgp_set_callback(stream, decrypt_cb_empty, &decrypt); in pgp_decrypt_seckey() [all …]
|
H A D | packet-parse.c | 2405 pgp_crypt_t decrypt; in parse_seckey() local 2609 pgp_crypt_any(&decrypt, pkt.u.seckey.alg); in parse_seckey() 2614 decrypt.set_iv(&decrypt, pkt.u.seckey.iv); in parse_seckey() 2615 decrypt.set_crypt_key(&decrypt, key); in parse_seckey() 2619 pgp_reader_push_decrypt(stream, &decrypt, region); in parse_seckey() 2923 pgp_crypt_any(&stream->decrypt, pkt.u.pk_sesskey.symm_alg); in parse_pk_sesskey() 2924 iv = calloc(1, stream->decrypt.blocksize); in parse_pk_sesskey() 2929 stream->decrypt.set_iv(&stream->decrypt, iv); in parse_pk_sesskey() 2930 stream->decrypt.set_crypt_key(&stream->decrypt, pkt.u.pk_sesskey.key); in parse_pk_sesskey() 2931 pgp_encrypt_init(&stream->decrypt); in parse_pk_sesskey() [all …]
|
H A D | reader.c | 1404 pgp_crypt_t *decrypt; member 1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt); in encrypted_data_reader() 1496 pgp_decrypt_se_ip(encrypted->decrypt, in encrypted_data_reader() 1534 pgp_reader_push_decrypt(pgp_stream_t *stream, pgp_crypt_t *decrypt, in pgp_reader_push_decrypt() argument 1542 encrypted->decrypt = decrypt; in pgp_reader_push_decrypt() 1544 pgp_decrypt_init(encrypted->decrypt); in pgp_reader_push_decrypt() 1561 encrypted->decrypt->decrypt_finish(encrypted->decrypt); in pgp_reader_pop_decrypt() 1576 pgp_crypt_t *decrypt; member 1637 hexdump(stderr, "preamble", buf, se_ip->decrypt->blocksize); in se_ip_data_reader() 1639 b = se_ip->decrypt->blocksize; in se_ip_data_reader() [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | aes-test.c | 315 krb5_data decrypt; in krb_enc() local 318 krb5_data_zero(&decrypt); in krb_enc() 325 &decrypt); in krb_enc() 332 if (decrypt.length != clear->length || in krb_enc() 333 (decrypt.length && in krb_enc() 334 memcmp(decrypt.data, clear->data, decrypt.length) != 0)) { in krb_enc() 339 krb5_data_free(&decrypt); in krb_enc() 352 krb5_data decrypt; in krb_enc_iov2() local 399 ret = krb5_decrypt(context, crypto, usage, p, len, &decrypt); in krb_enc_iov2() 403 krb5_data_free(&decrypt); in krb_enc_iov2() [all …]
|
/netbsd-src/crypto/external/bsd/netpgp/dist/tests/ |
H A D | crypt.at | 12 AT_CHECK([netpgp --homedir $testhomedir --decrypt file1.gpg], 16 AT_CHECK([netpgp --homedir $testhomedir --decrypt --output=file1.copy file1.gpg], 20 # deliberately corrupt file1.gpg and attempt to decrypt 22 #AT_CHECK([netpgp --homedir $testhomedir --decrypt file2.gpg],
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | life_cycle-pkey.pod | 27 =item decrypt 29 This state represents the PKEY when it is ready to decrypt some ciphertext. 103 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt | 149 …start newed digest verify verify encrypt decrypt derive … 167 … decrypt decrypt decrypt decrypt decrypt decrypt decrypt … 168 …crypt decrypt 186 … newed digest verify verify encrypt decrypt derive … 188 … newed digest verify verify encrypt decrypt derive … 190 … newed digest verify verify encrypt decrypt derive … 192 … newed digest verify verify encrypt decrypt derive … [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/life-cycles/ |
H A D | pkey.dot | 11 decrypt [fontcolor="#425F06", color="#425F06"] 32 newed -> decrypt [label="EVP_PKEY_decrypt_init", fontcolor="#425F06", color="#425F06"]; 33 decrypt -> decrypt [label="EVP_PKEY_decrypt", fontcolor="#425F06", color="#425F06"];
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/cms/ |
H A D | cms_rsa.c | 182 int ossl_cms_rsa_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_rsa_envelope() argument 184 assert(decrypt == 0 || decrypt == 1); in ossl_cms_rsa_envelope() 186 if (decrypt == 1) in ossl_cms_rsa_envelope() 189 if (decrypt == 0) in ossl_cms_rsa_envelope()
|
H A D | cms_dh.c | 331 int ossl_cms_dh_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_dh_envelope() argument 333 assert(decrypt == 0 || decrypt == 1); in ossl_cms_dh_envelope() 335 if (decrypt == 1) in ossl_cms_dh_envelope() 338 if (decrypt == 0) in ossl_cms_dh_envelope()
|
H A D | cms_ec.c | 382 int ossl_cms_ecdh_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_ecdh_envelope() argument 384 assert(decrypt == 0 || decrypt == 1); in ossl_cms_ecdh_envelope() 386 if (decrypt == 1) in ossl_cms_ecdh_envelope() 389 if (decrypt == 0) in ossl_cms_ecdh_envelope()
|
/netbsd-src/external/bsd/elftosb/dist/ |
H A D | elftosb.ccscc | 4 ..\decrypt\decrypt.vcproj
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | BIO_f_cipher.pod | 51 decrypt. 54 return value from the read operation. A successful decrypt followed 56 should be called to determine if the decrypt was successful. 67 BIO_get_cipher_status() returns 1 for a successful decrypt and 0
|
H A D | CMS_decrypt.pod | 5 CMS_decrypt - decrypt content from a CMS envelopedData structure 26 Although the recipients certificate is not needed to decrypt the data it is 33 not. If no recipient succeeds then a random symmetric key is used to decrypt 36 error when all recipient encrypted keys failed to decrypt an attacker could
|
H A D | EVP_OpenInit.pod | 20 decryption. They decrypt a public key encrypted symmetric key and 21 then decrypt data using it. 52 EVP_OpenFinal() returns 0 if the decrypt failed or 1 for success.
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | BIO_f_cipher.pod | 51 decrypt. 54 return value from the read operation. A successful decrypt followed 56 should be called to determine if the decrypt was successful. 67 BIO_get_cipher_status() returns 1 for a successful decrypt and <=0
|
H A D | PKCS12_item_decrypt_d2i.pod | 7 encrypt/decrypt functions 34 PKCS12_item_decrypt_d2i() and PKCS12_item_decrypt_d2i_ex() decrypt an octet 37 buffer will zeroed after the decrypt.
|
H A D | CMS_decrypt.pod | 7 - decrypt content from a CMS envelopedData structure 25 It uses CMS_decrypt_set1_pkey() to decrypt the content 56 Although the recipients certificate is not needed to decrypt the data it is 63 not. If no recipient succeeds then a random symmetric key is used to decrypt 66 error when all recipient encrypted keys failed to decrypt an attacker could
|
H A D | EVP_OpenInit.pod | 20 decryption. They decrypt a public key encrypted symmetric key and 21 then decrypt data using it. 52 EVP_OpenFinal() returns 0 if the decrypt failed or 1 for success.
|
H A D | b2i_PVK_bio_ex.pod | 25 I<cb> is called with the user data I<u> in order to obtain a password to decrypt 27 string I<propq> are used in any decrypt operation. 36 property query string I<propq> are used in any decrypt operation.
|
/netbsd-src/crypto/external/bsd/openssl/dist/demos/ |
H A D | README.txt | 11 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt 12 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt 13 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/modes/ |
H A D | ocb128.c | 131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new() 152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument 169 ctx->decrypt = decrypt; in CRYPTO_ocb128_init() 468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec); in CRYPTO_ocb128_decrypt()
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/modes/ |
H A D | ocb128.c | 131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new() 152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument 169 ctx->decrypt = decrypt; in CRYPTO_ocb128_init() 468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec); in CRYPTO_ocb128_decrypt()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
H A D | pmeth_fn.c | 173 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt_init() 191 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt() 201 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); in EVP_PKEY_decrypt() 225 || !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) in EVP_PKEY_derive_set_peer()
|
/netbsd-src/sys/opencrypto/ |
H A D | cryptosoft.c | 145 exf->decrypt(sw->sw_kschedule, buf + i); in swcr_encdec() 167 exf->decrypt(sw->sw_kschedule, buf + i); in swcr_encdec() 204 exf->decrypt(sw->sw_kschedule, in swcr_encdec() 230 exf->decrypt(sw->sw_kschedule, blk); in swcr_encdec() 282 exf->decrypt(sw->sw_kschedule, in swcr_encdec() 302 exf->decrypt(sw->sw_kschedule, idat); in swcr_encdec() 347 exf->decrypt(sw->sw_kschedule, in swcr_encdec() 373 exf->decrypt(sw->sw_kschedule, blk); in swcr_encdec() 416 exf->decrypt(sw->sw_kschedule, in swcr_encdec() 436 exf->decrypt(sw->sw_kschedule, idat); in swcr_encdec() [all …]
|