/system/vold/ |
vdc.rc | 4 # vold will set vold.decrypt to trigger_restart_framework (default 11 # vold will set vold.decrypt to trigger_restart_framework (default
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
cfb.go | 15 decrypt bool 25 if x.decrypt { 33 if !x.decrypt { 56 func newCFB(block Block, iv []byte, decrypt bool) Stream { 67 decrypt: decrypt,
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
cfb.go | 15 decrypt bool 25 if x.decrypt { 33 if !x.decrypt { 56 func newCFB(block Block, iv []byte, decrypt bool) Stream { 67 decrypt: decrypt,
|
/system/connectivity/shill/ |
crypto_des_cbc_unittest.cc | 101 TEST_F(CryptoDESCBCTest, Decrypt) { 106 EXPECT_TRUE(crypto_.Decrypt(kEmptyCipher, &plaintext)); 108 EXPECT_TRUE(crypto_.Decrypt(kCipherText, &plaintext)); 110 EXPECT_TRUE(crypto_.Decrypt(kCipherVersion1, &plaintext)); 113 EXPECT_FALSE(crypto_.Decrypt("random", &plaintext)); 114 EXPECT_FALSE(crypto_.Decrypt("02:random", &plaintext)); 115 EXPECT_FALSE(crypto_.Decrypt("~", &plaintext)); 116 EXPECT_FALSE(crypto_.Decrypt("02:~", &plaintext)); 117 EXPECT_FALSE(crypto_.Decrypt(kEmptyPlain, &plaintext)); 118 EXPECT_FALSE(crypto_.Decrypt(kEmptyCipherNoSentinel, &plaintext)) [all...] |
crypto_provider.cc | 59 string CryptoProvider::Decrypt(const string& ciphertext) { 66 if (!crypto->Decrypt(to_decrypt, &plaintext)) { 68 << " failed to decrypt."; 73 LOG(WARNING) << "Unable to decrypt text, returning as is.";
|
crypto_rot47_unittest.cc | 51 TEST_F(CryptoROT47Test, Decrypt) { 53 EXPECT_TRUE(crypto_.Decrypt(kCipherText, &text)); 55 EXPECT_TRUE(crypto_.Decrypt(kEmpty, &text));
|
crypto_provider_unittest.cc | 98 TEST_F(CryptoProviderTest, Decrypt) { 99 EXPECT_EQ(kPlainText, provider_.Decrypt(kPlainText)); 100 EXPECT_EQ(kEmptyText, provider_.Decrypt(kEmptyText)); 106 EXPECT_EQ(kPlainText, provider_.Decrypt(kROT47Text)); 107 EXPECT_EQ(kPlainText, provider_.Decrypt(kDESCBCText)); 108 EXPECT_EQ(kPlainText, provider_.Decrypt(kPlainText)); 109 EXPECT_EQ(kEmptyText, provider_.Decrypt(kEmptyText));
|
/external/opencv3/3rdparty/include/ffmpeg_/libavutil/ |
aes.h | 47 * @param decrypt 0 for encryption, 1 for decryption 49 int av_aes_init(struct AVAES *a, const uint8_t *key, int key_bits, int decrypt); 52 * Encrypt or decrypt a buffer using a previously initialized context. 57 * @param decrypt 0 for encryption, 1 for decryption 59 void av_aes_crypt(struct AVAES *a, uint8_t *dst, const uint8_t *src, int count, uint8_t *iv, int decrypt);
|
blowfish.h | 50 * Encrypt or decrypt a buffer using a previously initialized context. 55 * @param decrypt 0 for encryption, 1 for decryption 58 int decrypt); 61 * Encrypt or decrypt a buffer using a previously initialized context. 68 * @param decrypt 0 for encryption, 1 for decryption 71 int count, uint8_t *iv, int decrypt);
|
xtea.h | 46 * Encrypt or decrypt a buffer using a previously initialized context. 53 * @param decrypt 0 for encryption, 1 for decryption 56 int count, uint8_t *iv, int decrypt);
|
/external/tpm2/ |
ActivateCredential.c | 32 OBJECT *object; // decrypt key 39 // Get decrypt key pointer 45 // input decrypt key must be an asymmetric, restricted decryption key 47 || object->publicArea.objectAttributes.decrypt == CLEAR 53 // Decrypt input credential data via asymmetric decryption. A
|
StartAuthSession.c | 14 // TPM_RC_ATTRIBUTES tpmKey does not reference a decrypt key 17 // TPM_RC_HANDLE input decrypt key handle only has public portion loaded 24 // TPM_RC_VALUE secret size does not match decrypt key type; or the recovered secret 26 // RSA decrypt key, if encryptedSecret is greater than the public 36 OBJECT *tpmKey; // TPM key for decrypt salt 48 // If an decrypt key is passed in, check its validation 55 // Get pointer to loaded decrypt key 65 if(tpmKey->publicArea.objectAttributes.decrypt != SET)
|
ECDH_ZGen.c | 15 // TPM_RC_ATTRIBUTES key referenced by keyA is restricted or not a decrypt key 34 // Input key must be a non-restricted, decrypt ECC key 39 || eccKey->publicArea.objectAttributes.decrypt != SET
|
RSA_Decrypt.c | 16 // TPM_RC_KEY keyHandle does not reference an unrestricted decrypt key 18 // decrypt scheme 45 || rsaKey->publicArea.objectAttributes.decrypt == CLEAR) 64 // Select a scheme for decrypt.
|
RSA_Encrypt.c | 15 // TPM_RC_ATTRIBUTES decrypt attribute is not SET in key referenced by keyHandle 18 // decrypt scheme 43 if(rsaKey->publicArea.objectAttributes.decrypt != SET) 64 // not have the decrypt attribute but that was checked above.
|
/prebuilts/go/darwin-x86/src/crypto/des/ |
cipher.go | 41 func (c *desCipher) Decrypt(dst, src []byte) { decryptBlock(c.subkeys[:], dst, src) } 65 c.cipher2.Decrypt(dst, dst) 69 func (c *tripleDESCipher) Decrypt(dst, src []byte) { 70 c.cipher3.Decrypt(dst, src) 72 c.cipher1.Decrypt(dst, dst)
|
/prebuilts/go/linux-x86/src/crypto/des/ |
cipher.go | 41 func (c *desCipher) Decrypt(dst, src []byte) { decryptBlock(c.subkeys[:], dst, src) } 65 c.cipher2.Decrypt(dst, dst) 69 func (c *tripleDESCipher) Decrypt(dst, src []byte) { 70 c.cipher3.Decrypt(dst, src) 72 c.cipher1.Decrypt(dst, dst)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
AESWrapEngine.java | 13 * Create a regular AESWrapEngine specifying the encrypt for wrapping, decrypt for unwrapping. 21 * Create an AESWrapEngine where the underlying cipher is set to decrypt for wrapping, encrypt for unwrapping.
|
/system/keymaster/ |
kem.h | 45 // Decrypt takes an encrypted key, and outputs its clear text. 46 // Decrypt takes ownership of \p private_key. 47 virtual bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) = 0; 48 virtual bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/ |
setup.py | 35 'pyrsa-decrypt = rsa.cli:decrypt', 39 'pyrsa-decrypt-bigfile = rsa.cli:decrypt_bigfile',
|
/external/fonttools/Lib/fontTools/misc/ |
eexec.py | 21 def decrypt(cipherstring, R): function 50 print(decrypt, decrypt(testStr, 12321))
|
/external/autotest/server/site_tests/network_WiFi_GTK/ |
control | 15 This test verifies that we can continue to decrypt broadcast traffic while
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
InputDecryptor.java | 9 * an InputStream that will decrypt a stream of encrypted data.
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
test_strings.py | 24 decrypted = rsa.decrypt(encrypted, self.priv)
|
/frameworks/av/include/drm/ |
drm_framework_common.h | 226 * Decrypt API set for non encrypted content 230 * Decrypt API set for ES based DRM 234 * POSIX based Decrypt API set for container based DRM 238 * Decrypt API for Widevine streams 272 * Defines which decryption pattern should be used to decrypt the given content 274 * 1. Decrypt APIs for elementary stream based DRM 280 * initializeDecryptUnit(), decrypt(), and finalizeDecryptUnit() 281 * 2. Decrypt APIs for container based DRM (file format itself is encrypted) 295 * Information required to decrypt content
|