/prebuilts/go/darwin-x86/src/crypto/aes/ |
cipher.go | 63 func (c *aesCipher) Decrypt(dst, src []byte) {
|
cipher_amd64.go | 58 func (c *aesCipherAsm) Decrypt(dst, src []byte) {
|
cipher_s390x.go | 71 func (c *aesCipherAsm) Decrypt(dst, src []byte) { 78 // The decrypt function code is equal to the function code + 128.
|
modes_test.go | 27 func (*testBlock) Decrypt(a, b []byte) {}
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
ctr_test.go | 17 func (noopBlock) Decrypt(dst, src []byte) { copy(dst, src) }
|
gcm_test.go | 326 func (w *wrapper) Decrypt(dst, src []byte) { w.block.Decrypt(dst, src) }
|
/prebuilts/go/darwin-x86/src/crypto/des/ |
cipher.go | 41 func (c *desCipher) Decrypt(dst, src []byte) { decryptBlock(c.subkeys[:], dst, src) } 65 c.cipher2.Decrypt(dst, dst) 69 func (c *tripleDESCipher) Decrypt(dst, src []byte) { 70 c.cipher3.Decrypt(dst, src) 72 c.cipher1.Decrypt(dst, dst)
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
cipher.go | 63 func (c *aesCipher) Decrypt(dst, src []byte) {
|
cipher_amd64.go | 58 func (c *aesCipherAsm) Decrypt(dst, src []byte) {
|
cipher_s390x.go | 71 func (c *aesCipherAsm) Decrypt(dst, src []byte) { 78 // The decrypt function code is equal to the function code + 128.
|
modes_test.go | 27 func (*testBlock) Decrypt(a, b []byte) {}
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
ctr_test.go | 17 func (noopBlock) Decrypt(dst, src []byte) { copy(dst, src) }
|
gcm_test.go | 326 func (w *wrapper) Decrypt(dst, src []byte) { w.block.Decrypt(dst, src) }
|
/prebuilts/go/linux-x86/src/crypto/des/ |
cipher.go | 41 func (c *desCipher) Decrypt(dst, src []byte) { decryptBlock(c.subkeys[:], dst, src) } 65 c.cipher2.Decrypt(dst, dst) 69 func (c *tripleDESCipher) Decrypt(dst, src []byte) { 70 c.cipher3.Decrypt(dst, src) 72 c.cipher1.Decrypt(dst, dst)
|
/system/keymaster/ |
ecies_kem.cpp | 129 bool EciesKem::Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) { 130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(), 135 bool EciesKem::Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len,
|
key_blob_test.cpp | 72 keymaster_error_t Decrypt() { 151 ASSERT_EQ(KM_ERROR_INVALID_KEY_BLOB, Decrypt()); 168 ASSERT_EQ(KM_ERROR_INVALID_KEY_BLOB, Decrypt()); 185 ASSERT_EQ(KM_ERROR_INVALID_KEY_BLOB, Decrypt()); 222 ASSERT_EQ(KM_ERROR_INVALID_KEY_BLOB, Decrypt()); 245 ASSERT_EQ(KM_ERROR_INVALID_KEY_BLOB, Decrypt());
|
/system/tpm/attestation/client/ |
dbus_proxy.cc | 132 void DBusProxy::Decrypt(const DecryptRequest& request,
|
/device/linaro/bootloader/edk2/CryptoPkg/Application/Cryptest/ |
BlockCipherVerify.c | 149 UINT8 Decrypt[256];
166 ZeroMem (Decrypt, sizeof (Decrypt));
180 Status = TdesEcbDecrypt (CipherCtx, Encrypt, 8, Decrypt);
191 if (CompareMem (Decrypt, TdesEcbData, 8) != 0) {
202 ZeroMem (Decrypt, sizeof (Decrypt));
216 Status = TdesEcbDecrypt (CipherCtx, Encrypt, 8, Decrypt);
227 if (CompareMem (Decrypt, TdesEcbData, 8) != 0) {
238 ZeroMem (Decrypt, 256); [all...] |
/external/pdfium/core/fpdfapi/parser/ |
cpdf_crypto_handler.cpp | 231 void CPDF_CryptoHandler::Decrypt(uint32_t objnum,
|
/frameworks/av/drm/mediacas/plugins/clearkey/ |
ecm.cpp | 62 status_t Ecm::Decrypt( 65 // Invariant: asset has id. These are postconditions for Emm::Decrypt().
|
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
rsa.go | 108 // Decrypt decrypts ciphertext with priv. If opts is nil or of type 111 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) { 135 return nil, errors.New("crypto/rsa: invalid options for Decrypt") 363 // public key is used to decrypt two types of messages then distinct label 414 // ErrDecryption represents a failure to decrypt a message. 477 // decrypt performs an RSA decryption, resulting in a plaintext integer. If a 479 func decrypt(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) { func 559 m, err = decrypt(random, priv, c) 597 m, err := decrypt(random, priv, c)
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
rsa.go | 108 // Decrypt decrypts ciphertext with priv. If opts is nil or of type 111 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) { 135 return nil, errors.New("crypto/rsa: invalid options for Decrypt") 363 // public key is used to decrypt two types of messages then distinct label 414 // ErrDecryption represents a failure to decrypt a message. 477 // decrypt performs an RSA decryption, resulting in a plaintext integer. If a 479 func decrypt(random io.Reader, priv *PrivateKey, c *big.Int) (m *big.Int, err error) { func 559 m, err = decrypt(random, priv, c) 597 m, err := decrypt(random, priv, c)
|
/system/security/keystore/ |
keystore_cli_v2.cpp | 419 int Decrypt(const std::string& key_name, const std::string& input_filename, 468 } else if (args[0] == "decrypt") { 469 return Decrypt(command_line->GetSwitchValueASCII("name"),
|
/system/tpm/attestation/server/ |
attestation_service.cc | 373 void AttestationService::Decrypt(const DecryptRequest& request,
|
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-kms/1.11.18/ |
aws-java-sdk-kms-1.11.18.jar | |