/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_client/ |
H A D | cryptoclient.cpp | 71 Encrypt::encrypt(const CssmData *in, uint32 inCount, function in class:Encrypt 88 Encrypt::encrypt(const CssmData *in, uint32 inCount, function in class:Encrypt
|
H A D | securestorage.cpp | 246 // Generate a permanent 3DES key that we will use to encrypt the data. 356 Encrypt encrypt(csp, algorithm()); 357 encrypt.mode(CSSM_ALGMODE_CBCPadIV8); 358 encrypt.padding(CSSM_PADDING_PKCS1); 359 encrypt.initVector(iv); 360 encrypt.key(Key(this)); 361 encrypt.cred(AccessCredentials::overlay(cred)); 366 // @@@ Don't use staged encrypt once the AppleCSPDL can do combo 369 encrypt.encrypt(plainTex [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | cmscipher.c | 65 Boolean encrypt; /* encrypt / decrypt switch */ member in struct:SecCmsCipherContextStr 70 Boolean encrypt; /* encrypt / decrypt switch */ 160 SecCmsCipherContextStart(PRArenaPool *poolp, SecSymmetricKeyRef key, SECAlgorithmID *algid, Boolean encrypt) argument 232 if (encrypt) 374 if (encrypt) 386 cc->encrypt = encrypt; 485 cc->encrypt 619 SecCmsCipherContextLength(SecCmsCipherContextRef cc, unsigned int input_len, Boolean final, Boolean encrypt) argument 765 SecCmsCipherContextCrypt(SecCmsCipherContextRef cc, unsigned char *output, size_t *output_len_p, size_t max_output_len, const unsigned char *input, size_t input_len, Boolean final, Boolean encrypt) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_client/lib/ |
H A D | cryptoclient.cpp | 71 Encrypt::encrypt(const CssmData *in, uint32 inCount, function in class:Encrypt 88 Encrypt::encrypt(const CssmData *in, uint32 inCount, function in class:Encrypt
|
H A D | securestorage.cpp | 246 // Generate a permanent 3DES key that we will use to encrypt the data. 356 Encrypt encrypt(csp, algorithm()); 357 encrypt.mode(CSSM_ALGMODE_CBCPadIV8); 358 encrypt.padding(CSSM_PADDING_PKCS1); 359 encrypt.initVector(iv); 360 encrypt.key(Key(this)); 361 encrypt.cred(AccessCredentials::overlay(cred)); 366 // @@@ Don't use staged encrypt once the AppleCSPDL can do combo 369 encrypt.encrypt(plainTex [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | cmscipher.c | 65 Boolean encrypt; /* encrypt / decrypt switch */ member in struct:SecCmsCipherContextStr 70 Boolean encrypt; /* encrypt / decrypt switch */ 160 SecCmsCipherContextStart(PRArenaPool *poolp, SecSymmetricKeyRef key, SECAlgorithmID *algid, Boolean encrypt) argument 232 if (encrypt) 374 if (encrypt) 386 cc->encrypt = encrypt; 485 cc->encrypt 619 SecCmsCipherContextLength(SecCmsCipherContextRef cc, unsigned int input_len, Boolean final, Boolean encrypt) argument 765 SecCmsCipherContextCrypt(SecCmsCipherContextRef cc, unsigned char *output, size_t *output_len_p, size_t max_output_len, const unsigned char *input, size_t input_len, Boolean final, Boolean encrypt) argument [all...] |
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/ |
H A D | pppcrypt.c | 163 encrypt((char *)des_input, 0); 179 encrypt((char *)des_input, 1);
|
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | localdatabase.h | 73 void encrypt(const Context &context, Key &key, const CssmData &clear, CssmData &cipher); 96 void getOutputSize(const Context &context, Key &key, uint32 inputSize, bool encrypt, uint32 &result);
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | cipher.h | 71 int encrypt; member in struct:CipherContext
|
H A D | cipher-aes.c | 61 enc = ctx->encrypt; 87 if (ctx->encrypt) {
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | algorithm.h | 65 vchar_t *(*encrypt) (vchar_t *, vchar_t *, vchar_t *); member in struct:enc_algorithm
|
/macosx-10.9.5/remote_cmds-41.90.1/telnet.tproj/ |
H A D | authenc.c | 47 #include <libtelnet/encrypt.h>
|
/macosx-10.9.5/ruby-104/ruby/sample/openssl/ |
H A D | cipher.rb | 14 enc.encrypt
|
/macosx-10.9.5/xnu-2422.115.4/libkern/libkern/crypto/ |
H A D | aes.h | 57 aes_encrypt_ctx encrypt; member in struct:__anon15169
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/data/ |
H A D | gen-req.sh | 219 -encrypt \ 229 -encrypt \ 239 -encrypt \ 249 -encrypt \ 259 -encrypt \ 269 -encrypt \ 279 -encrypt \
|
/macosx-10.9.5/BerkeleyDB-21/db/test/ |
H A D | logtrack.tcl | 37 global encrypt passwd 44 if { $encrypt > 0 } {
|
H A D | rep001.tcl | 72 append args " -encrypt " 86 global encrypt 211 set encrypt 1
|
H A D | rep011.tcl | 54 append args " -encrypt " 68 global encrypt 178 set encrypt 1
|
H A D | test042.tcl | 22 global encrypt 35 if { $encrypt != 0 } {
|
H A D | test070.tcl | 18 global encrypt 31 if { $encrypt != 0 } {
|
H A D | rpc004.tcl | 57 -mode 0644} -env $env -encrypt $testfile1]
|
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | corecryptoSymmetricBridge.h | 218 typedef size_t (*ccpadlen_p) (int encrypt, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, size_t inputLength, bool final); 221 * How many bytes to reserve to enable padding - this is pre-encrypt/decrypt bytes. 224 typedef size_t (*ccreserve_p) (int encrypt, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj);
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | store.c | 120 bool encrypt) 172 if (encrypt) 115 kcm_store_io(krb5_context context, krb5_uuid uuid, void *ptr, size_t length, krb5_data *data, bool encrypt) argument
|
/macosx-10.9.5/securityd-55199.3/tests/ |
H A D | testcrypto.cpp | 138 // encrypt locally 146 size_t localLen = localCrypt.encrypt(clearText, localCipher, remData); 165 // encrypt remotely and compare 174 ss.encrypt(cryptoContext, keyRef, clearText, remoteCipher);
|
/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | gpg.vim | 27 \ edit-key encrypt-files export export-all 37 \ encrypt gen-key gen-revoke help list-packets 47 \ disable-pubkey-algo encrypt-to exec-path 75 \ no-encrypt-to no-expensive-trust-checks
|