HomeSort by relevance Sort by last modified time
    Searched full:decrypt (Results 151 - 175 of 707) sorted by null

1 2 3 4 5 67 8 91011>>

  /prebuilts/go/linux-x86/src/crypto/cipher/
cbc.go 112 x.b.Decrypt(dst[start:end], src[start:end])
121 x.b.Decrypt(dst[start:end], src[start:end])
  /prebuilts/go/linux-x86/src/crypto/
crypto.go 140 // Decrypt decrypts msg. The opts argument should be appropriate for
143 Decrypt(rand io.Reader, msg []byte, opts DecrypterOpts) (plaintext []byte, err error)
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
_version200.py 483 Used by 'decrypt' and 'verify'.
490 mpart = funcref(cpart, key, n) #Decrypt each chop
509 def decrypt(cypher, key): function
512 raise Exception("You must use the private key with decrypt")
528 __all__ = ["newkeys", "encrypt", "decrypt", "sign", "verify"]
  /frameworks/base/media/java/android/media/
MediaDrm.java 84 * {@link MediaCodec.#configure} method to enable the codec to decrypt content.
362 * The key is currently usable to decrypt media data
367 * The key is no longer usable to decrypt media data because its
373 * The key is not currently usable to decrypt media data because its
386 * The key is not currently usable to decrypt media data because of an
736 * to obtain or release keys used to decrypt encrypted content.
1105 public byte[] decrypt( method in class:CryptoSession
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/rsa/
rsa.go 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type
93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) {
117 return nil, errors.New("crypto/rsa: invalid options for Decrypt")
368 // ErrDecryption represents a failure to decrypt a message.
431 // decrypt performs an RSA decryption, resulting in a plaintext integer. If a
433 func decrypt(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) {
524 m, err := decrypt(random, priv, c)
  /prebuilts/go/linux-x86/src/crypto/rsa/
rsa.go 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type
93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) {
117 return nil, errors.New("crypto/rsa: invalid options for Decrypt")
368 // ErrDecryption represents a failure to decrypt a message.
431 // decrypt performs an RSA decryption, resulting in a plaintext integer. If a
433 func decrypt(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) {
524 m, err := decrypt(random, priv, c)
  /system/core/rootdir/
init.rc 284 # Now we can mount /data. File encryption requires keymaster to decrypt
599 on property:vold.decrypt=trigger_reset_main
602 on property:vold.decrypt=trigger_load_persist_props
607 on property:vold.decrypt=trigger_post_fs_data
610 on property:vold.decrypt=trigger_restart_min_framework
615 on property:vold.decrypt=trigger_restart_framework
621 on property:vold.decrypt=trigger_shutdown_framework
  /development/samples/Vault/src/com/example/android/vault/
EncryptedDocument.java 129 * Decrypt and return parsed metadata section from this document.
166 * Decrypt and read content section of this document, writing it into the
266 * Read and decrypt the section starting at the current file offset.
  /device/google/marlin/recovery/oem-recovery/
dec.cpp 262 static int decrypt(int smcmod_fd, struct ion_buf_handle *buf, uint32_t len, function
279 fprintf(stderr, "decrypt ioctl failed (%s)\n", strerror(errno));
372 ret = decrypt(smcmod_fd, &ionbuf, fsize, md_ctx, offset);
  /external/boringssl/src/crypto/cipher/
cipher_test.cc 253 } else if (str == "DECRYPT") {
271 if (!TestOperation(t, cipher, false /* decrypt */, false /* single-shot */,
273 !TestOperation(t, cipher, false /* decrypt */, true /* streaming */,
  /external/boringssl/src/ssl/
ssl_rsa.c 400 return ssl->cert->key_method->decrypt(ssl, out, out_len, max_out, in,
406 /* Decrypt operations are only supported for RSA keys. */
411 /* Decrypt with no padding. PKCS#1 padding will be removed as part
  /external/srtp/crypto/cipher/
cipher.c 182 * test the decrypt function
212 /* decrypt */
325 * decrypt the ciphertext
null_cipher.c 137 * note: the decrypt function is idential to the encrypt function
  /development/ndk/platforms/android-21/include/media/
NdkMediaDrm.h 156 * to obtain or release keys used to decrypt encrypted content.
391 * root of trust, and then perform encrypt, decrypt, sign and verify operations
397 * Generic encrypt/decrypt/sign/verify methods are based on the established session
417 * Decrypt the data referenced by input of length dataSize using algorithm specified
  /device/google/contexthub/firmware/src/
appSec.c 166 //if needed, decrypt and hash incoming data
186 // decrypt if encryption is on
201 // decrypt
417 //we now have the pubKey. decrypt over time
  /docs/source.android.com/src/security/encryption/
index.jd 32 decrypt data before returning it to the calling process. Encryption ensures that
  /external/ImageMagick/utilities/
compare.1 15 \-authenticate value decrypt image with this password
compare.1.in 15 \-authenticate value decrypt image with this password
stream.1 13 \-authenticate value decrypt image with this password
stream.1.in 13 \-authenticate value decrypt image with this password
  /external/boringssl/src/crypto/evp/
evp_ctx.c 317 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) {
334 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) {
342 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen);
364 !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) ||
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
compatibility.rst 49 $ openssl rsautl -in testfile.rsa -inkey privatekey.pem -decrypt
  /external/libweave/include/weave/provider/
config_store.h 46 // implementation should decrypt the data before returning it to libweave.
  /external/okhttp/okio/okio/src/main/java/okio/
Source.java 24 * be layered to transform supplied data, such as to decompress, decrypt, or
  /frameworks/av/drm/common/
DrmEngineBase.cpp 156 status_t DrmEngineBase::decrypt( function in class:DrmEngineBase

Completed in 4303 milliseconds

1 2 3 4 5 67 8 91011>>