/prebuilts/go/linux-x86/src/crypto/cipher/ |
cbc.go | 112 x.b.Decrypt(dst[start:end], src[start:end]) 121 x.b.Decrypt(dst[start:end], src[start:end])
|
/prebuilts/go/linux-x86/src/crypto/ |
crypto.go | 140 // Decrypt decrypts msg. The opts argument should be appropriate for 143 Decrypt(rand io.Reader, msg []byte, opts DecrypterOpts) (plaintext []byte, err error)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
_version200.py | 483 Used by 'decrypt' and 'verify'. 490 mpart = funcref(cpart, key, n) #Decrypt each chop 509 def decrypt(cypher, key): function 512 raise Exception("You must use the private key with decrypt") 528 __all__ = ["newkeys", "encrypt", "decrypt", "sign", "verify"]
|
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 84 * {@link MediaCodec.#configure} method to enable the codec to decrypt content. 362 * The key is currently usable to decrypt media data 367 * The key is no longer usable to decrypt media data because its 373 * The key is not currently usable to decrypt media data because its 386 * The key is not currently usable to decrypt media data because of an 736 * to obtain or release keys used to decrypt encrypted content. 1105 public byte[] decrypt( method in class:CryptoSession [all...] |
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
rsa.go | 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type 93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) { 117 return nil, errors.New("crypto/rsa: invalid options for Decrypt") 368 // ErrDecryption represents a failure to decrypt a message. 431 // decrypt performs an RSA decryption, resulting in a plaintext integer. If a 433 func decrypt(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) { 524 m, err := decrypt(random, priv, c)
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
rsa.go | 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type 93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) { 117 return nil, errors.New("crypto/rsa: invalid options for Decrypt") 368 // ErrDecryption represents a failure to decrypt a message. 431 // decrypt performs an RSA decryption, resulting in a plaintext integer. If a 433 func decrypt(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) { 524 m, err := decrypt(random, priv, c)
|
/system/core/rootdir/ |
init.rc | 284 # Now we can mount /data. File encryption requires keymaster to decrypt 599 on property:vold.decrypt=trigger_reset_main 602 on property:vold.decrypt=trigger_load_persist_props 607 on property:vold.decrypt=trigger_post_fs_data 610 on property:vold.decrypt=trigger_restart_min_framework 615 on property:vold.decrypt=trigger_restart_framework 621 on property:vold.decrypt=trigger_shutdown_framework
|
/development/samples/Vault/src/com/example/android/vault/ |
EncryptedDocument.java | 129 * Decrypt and return parsed metadata section from this document. 166 * Decrypt and read content section of this document, writing it into the 266 * Read and decrypt the section starting at the current file offset.
|
/device/google/marlin/recovery/oem-recovery/ |
dec.cpp | 262 static int decrypt(int smcmod_fd, struct ion_buf_handle *buf, uint32_t len, function 279 fprintf(stderr, "decrypt ioctl failed (%s)\n", strerror(errno)); 372 ret = decrypt(smcmod_fd, &ionbuf, fsize, md_ctx, offset);
|
/external/boringssl/src/crypto/cipher/ |
cipher_test.cc | 253 } else if (str == "DECRYPT") { 271 if (!TestOperation(t, cipher, false /* decrypt */, false /* single-shot */, 273 !TestOperation(t, cipher, false /* decrypt */, true /* streaming */,
|
/external/boringssl/src/ssl/ |
ssl_rsa.c | 400 return ssl->cert->key_method->decrypt(ssl, out, out_len, max_out, in, 406 /* Decrypt operations are only supported for RSA keys. */ 411 /* Decrypt with no padding. PKCS#1 padding will be removed as part
|
/external/srtp/crypto/cipher/ |
cipher.c | 182 * test the decrypt function 212 /* decrypt */ 325 * decrypt the ciphertext
|
null_cipher.c | 137 * note: the decrypt function is idential to the encrypt function
|
/development/ndk/platforms/android-21/include/media/ |
NdkMediaDrm.h | 156 * to obtain or release keys used to decrypt encrypted content. 391 * root of trust, and then perform encrypt, decrypt, sign and verify operations 397 * Generic encrypt/decrypt/sign/verify methods are based on the established session 417 * Decrypt the data referenced by input of length dataSize using algorithm specified
|
/device/google/contexthub/firmware/src/ |
appSec.c | 166 //if needed, decrypt and hash incoming data 186 // decrypt if encryption is on 201 // decrypt 417 //we now have the pubKey. decrypt over time
|
/docs/source.android.com/src/security/encryption/ |
index.jd | 32 decrypt data before returning it to the calling process. Encryption ensures that
|
/external/ImageMagick/utilities/ |
compare.1 | 15 \-authenticate value decrypt image with this password
|
compare.1.in | 15 \-authenticate value decrypt image with this password
|
stream.1 | 13 \-authenticate value decrypt image with this password
|
stream.1.in | 13 \-authenticate value decrypt image with this password
|
/external/boringssl/src/crypto/evp/ |
evp_ctx.c | 317 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { 334 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { 342 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); 364 !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) ||
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
compatibility.rst | 49 $ openssl rsautl -in testfile.rsa -inkey privatekey.pem -decrypt
|
/external/libweave/include/weave/provider/ |
config_store.h | 46 // implementation should decrypt the data before returning it to libweave.
|
/external/okhttp/okio/okio/src/main/java/okio/ |
Source.java | 24 * be layered to transform supplied data, such as to decompress, decrypt, or
|
/frameworks/av/drm/common/ |
DrmEngineBase.cpp | 156 status_t DrmEngineBase::decrypt( function in class:DrmEngineBase
|