Home
last modified time | relevance | path

Searched refs:decrypt (Results 1 – 25 of 169) sorted by relevance

1234567

/netbsd-src/crypto/external/bsd/netpgp/dist/src/lib/
H A Dsymmetric.c107 std_resync(pgp_crypt_t *decrypt) in std_resync() argument
109 if ((size_t) decrypt->num == decrypt->blocksize) { in std_resync()
113 memmove(decrypt->civ + decrypt->blocksize - decrypt->num, decrypt->civ, in std_resync()
114 (unsigned)decrypt->num); in std_resync()
115 (void) memcpy(decrypt->civ, decrypt->siv + decrypt->num, in std_resync()
116 decrypt->blocksize - decrypt->num); in std_resync()
117 decrypt->num = 0; in std_resync()
765 pgp_decrypt_init(pgp_crypt_t *decrypt) in pgp_decrypt_init() argument
767 decrypt->base_init(decrypt); in pgp_decrypt_init()
768 decrypt->block_encrypt(decrypt, decrypt->siv, decrypt->iv); in pgp_decrypt_init()
[all …]
H A Dkeyring.c233 decrypt_t *decrypt; in decrypt_cb() local
236 decrypt = pgp_callback_arg(cbinfo); in decrypt_cb()
247 if (pgp_getpassphrase(decrypt->passfp, pass, sizeof(pass)) == 0) { in decrypt_cb()
276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) { in decrypt_cb()
280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE); in decrypt_cb()
281 *decrypt->seckey = content->seckey; in decrypt_cb()
323 decrypt_t decrypt; in pgp_decrypt_seckey() local
326 (void) memset(&decrypt, 0x0, sizeof(decrypt)); in pgp_decrypt_seckey()
327 decrypt.key = key; in pgp_decrypt_seckey()
330 pgp_set_callback(stream, decrypt_cb_empty, &decrypt); in pgp_decrypt_seckey()
[all …]
H A Dpacket-parse.c2405 pgp_crypt_t decrypt; in parse_seckey() local
2609 pgp_crypt_any(&decrypt, pkt.u.seckey.alg); in parse_seckey()
2614 decrypt.set_iv(&decrypt, pkt.u.seckey.iv); in parse_seckey()
2615 decrypt.set_crypt_key(&decrypt, key); in parse_seckey()
2619 pgp_reader_push_decrypt(stream, &decrypt, region); in parse_seckey()
2923 pgp_crypt_any(&stream->decrypt, pkt.u.pk_sesskey.symm_alg); in parse_pk_sesskey()
2924 iv = calloc(1, stream->decrypt.blocksize); in parse_pk_sesskey()
2929 stream->decrypt.set_iv(&stream->decrypt, iv); in parse_pk_sesskey()
2930 stream->decrypt.set_crypt_key(&stream->decrypt, pkt.u.pk_sesskey.key); in parse_pk_sesskey()
2931 pgp_encrypt_init(&stream->decrypt); in parse_pk_sesskey()
[all …]
H A Dreader.c1404 pgp_crypt_t *decrypt; member
1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt); in encrypted_data_reader()
1496 pgp_decrypt_se_ip(encrypted->decrypt, in encrypted_data_reader()
1534 pgp_reader_push_decrypt(pgp_stream_t *stream, pgp_crypt_t *decrypt, in pgp_reader_push_decrypt() argument
1542 encrypted->decrypt = decrypt; in pgp_reader_push_decrypt()
1544 pgp_decrypt_init(encrypted->decrypt); in pgp_reader_push_decrypt()
1561 encrypted->decrypt->decrypt_finish(encrypted->decrypt); in pgp_reader_pop_decrypt()
1576 pgp_crypt_t *decrypt; member
1637 hexdump(stderr, "preamble", buf, se_ip->decrypt->blocksize); in se_ip_data_reader()
1639 b = se_ip->decrypt->blocksize; in se_ip_data_reader()
[all …]
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Daes-test.c315 krb5_data decrypt; in krb_enc() local
318 krb5_data_zero(&decrypt); in krb_enc()
325 &decrypt); in krb_enc()
332 if (decrypt.length != clear->length || in krb_enc()
333 (decrypt.length && in krb_enc()
334 memcmp(decrypt.data, clear->data, decrypt.length) != 0)) { in krb_enc()
339 krb5_data_free(&decrypt); in krb_enc()
352 krb5_data decrypt; in krb_enc_iov2() local
399 ret = krb5_decrypt(context, crypto, usage, p, len, &decrypt); in krb_enc_iov2()
403 krb5_data_free(&decrypt); in krb_enc_iov2()
[all …]
/netbsd-src/crypto/external/bsd/netpgp/dist/tests/
H A Dcrypt.at12 AT_CHECK([netpgp --homedir $testhomedir --decrypt file1.gpg],
16 AT_CHECK([netpgp --homedir $testhomedir --decrypt --output=file1.copy file1.gpg],
20 # deliberately corrupt file1.gpg and attempt to decrypt
22 #AT_CHECK([netpgp --homedir $testhomedir --decrypt file2.gpg],
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/
H A Dlife_cycle-pkey.pod27 =item decrypt
29 This state represents the PKEY when it is ready to decrypt some ciphertext.
103 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt |
149 …start newed digest verify verify encrypt decrypt derive …
167decrypt decrypt decrypt decrypt decrypt decrypt decrypt
168 …crypt decrypt
186 … newed digest verify verify encrypt decrypt derive …
188 … newed digest verify verify encrypt decrypt derive …
190 … newed digest verify verify encrypt decrypt derive …
192 … newed digest verify verify encrypt decrypt derive …
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/life-cycles/
H A Dpkey.dot11 decrypt [fontcolor="#425F06", color="#425F06"]
32 newed -> decrypt [label="EVP_PKEY_decrypt_init", fontcolor="#425F06", color="#425F06"];
33 decrypt -> decrypt [label="EVP_PKEY_decrypt", fontcolor="#425F06", color="#425F06"];
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/cms/
H A Dcms_rsa.c182 int ossl_cms_rsa_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_rsa_envelope() argument
184 assert(decrypt == 0 || decrypt == 1); in ossl_cms_rsa_envelope()
186 if (decrypt == 1) in ossl_cms_rsa_envelope()
189 if (decrypt == 0) in ossl_cms_rsa_envelope()
H A Dcms_dh.c331 int ossl_cms_dh_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_dh_envelope() argument
333 assert(decrypt == 0 || decrypt == 1); in ossl_cms_dh_envelope()
335 if (decrypt == 1) in ossl_cms_dh_envelope()
338 if (decrypt == 0) in ossl_cms_dh_envelope()
H A Dcms_ec.c382 int ossl_cms_ecdh_envelope(CMS_RecipientInfo *ri, int decrypt) in ossl_cms_ecdh_envelope() argument
384 assert(decrypt == 0 || decrypt == 1); in ossl_cms_ecdh_envelope()
386 if (decrypt == 1) in ossl_cms_ecdh_envelope()
389 if (decrypt == 0) in ossl_cms_ecdh_envelope()
/netbsd-src/external/bsd/elftosb/dist/
H A Delftosb.ccscc4 ..\decrypt\decrypt.vcproj
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DBIO_f_cipher.pod51 decrypt.
54 return value from the read operation. A successful decrypt followed
56 should be called to determine if the decrypt was successful.
67 BIO_get_cipher_status() returns 1 for a successful decrypt and 0
H A DCMS_decrypt.pod5 CMS_decrypt - decrypt content from a CMS envelopedData structure
26 Although the recipients certificate is not needed to decrypt the data it is
33 not. If no recipient succeeds then a random symmetric key is used to decrypt
36 error when all recipient encrypted keys failed to decrypt an attacker could
H A DEVP_OpenInit.pod20 decryption. They decrypt a public key encrypted symmetric key and
21 then decrypt data using it.
52 EVP_OpenFinal() returns 0 if the decrypt failed or 1 for success.
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DBIO_f_cipher.pod51 decrypt.
54 return value from the read operation. A successful decrypt followed
56 should be called to determine if the decrypt was successful.
67 BIO_get_cipher_status() returns 1 for a successful decrypt and <=0
H A DPKCS12_item_decrypt_d2i.pod7 encrypt/decrypt functions
34 PKCS12_item_decrypt_d2i() and PKCS12_item_decrypt_d2i_ex() decrypt an octet
37 buffer will zeroed after the decrypt.
H A DCMS_decrypt.pod7 - decrypt content from a CMS envelopedData structure
25 It uses CMS_decrypt_set1_pkey() to decrypt the content
56 Although the recipients certificate is not needed to decrypt the data it is
63 not. If no recipient succeeds then a random symmetric key is used to decrypt
66 error when all recipient encrypted keys failed to decrypt an attacker could
H A DEVP_OpenInit.pod20 decryption. They decrypt a public key encrypted symmetric key and
21 then decrypt data using it.
52 EVP_OpenFinal() returns 0 if the decrypt failed or 1 for success.
H A Db2i_PVK_bio_ex.pod25 I<cb> is called with the user data I<u> in order to obtain a password to decrypt
27 string I<propq> are used in any decrypt operation.
36 property query string I<propq> are used in any decrypt operation.
/netbsd-src/crypto/external/bsd/openssl/dist/demos/
H A DREADME.txt11 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt
12 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt
13 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/modes/
H A Docb128.c131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument
138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new()
152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument
169 ctx->decrypt = decrypt; in CRYPTO_ocb128_init()
468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec); in CRYPTO_ocb128_decrypt()
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/modes/
H A Docb128.c131 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_new() argument
138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, in CRYPTO_ocb128_new()
152 block128_f encrypt, block128_f decrypt, in CRYPTO_ocb128_init() argument
169 ctx->decrypt = decrypt; in CRYPTO_ocb128_init()
468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec); in CRYPTO_ocb128_decrypt()
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/evp/
H A Dpmeth_fn.c173 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt_init()
191 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { in EVP_PKEY_decrypt()
201 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); in EVP_PKEY_decrypt()
225 || !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) in EVP_PKEY_derive_set_peer()
/netbsd-src/sys/opencrypto/
H A Dcryptosoft.c145 exf->decrypt(sw->sw_kschedule, buf + i); in swcr_encdec()
167 exf->decrypt(sw->sw_kschedule, buf + i); in swcr_encdec()
204 exf->decrypt(sw->sw_kschedule, in swcr_encdec()
230 exf->decrypt(sw->sw_kschedule, blk); in swcr_encdec()
282 exf->decrypt(sw->sw_kschedule, in swcr_encdec()
302 exf->decrypt(sw->sw_kschedule, idat); in swcr_encdec()
347 exf->decrypt(sw->sw_kschedule, in swcr_encdec()
373 exf->decrypt(sw->sw_kschedule, blk); in swcr_encdec()
416 exf->decrypt(sw->sw_kschedule, in swcr_encdec()
436 exf->decrypt(sw->sw_kschedule, idat); in swcr_encdec()
[all …]

1234567