/freebsd-13-stable/crypto/openssh/ |
H A D | rijndael.h | 46 int decrypt; member in struct:__anon6884 49 u32 dk[4*(AES_MAXROUNDS + 1)]; /* decrypt key schedule */
|
/freebsd-13-stable/sys/crypto/rijndael/ |
H A D | rijndael.h | 38 int decrypt; member in struct:__anon11205 41 uint32_t dk[4 * (RIJNDAEL_MAXNR + 1)]; /* decrypt key schedule */
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/algs/aes/ |
H A D | aes_impl_x86-64.c | 57 .decrypt = &aes_decrypt_amd64,
|
H A D | aes_impl_aesni.c | 118 .decrypt = &aes_aesni_decrypt,
|
/freebsd-13-stable/sys/contrib/openzfs/tests/zfs-tests/tests/functional/fault/ |
H A D | decrypt_fault.ksh | 48 log_must zinject -a -t data -e decrypt -f 20 $mntpt/file1
|
/freebsd-13-stable/sys/opencrypto/ |
H A D | xform_cml.c | 70 .decrypt = cml_decrypt,
|
H A D | xform_rijndael.c | 70 .decrypt = rijndael128_decrypt,
|
H A D | xform_aes_icm.c | 73 .decrypt = aes_icm_crypt, 90 .decrypt = aes_icm_crypt, 106 .decrypt = aes_icm_crypt,
|
H A D | xform_enc.h | 59 * Encrypt/decrypt a single block. For stream ciphers this 63 void (*decrypt) (void *, const uint8_t *, uint8_t *); member in struct:enc_xform 68 * For stream ciphers, encrypt/decrypt the final partial block
|
H A D | xform_null.c | 74 .decrypt = null_crypt,
|
H A D | xform_aes_xts.c | 71 .decrypt = aes_xts_decrypt,
|
/freebsd-13-stable/sys/contrib/openzfs/include/sys/ |
H A D | dmu_objset.h | 209 int dmu_objset_hold_flags(const char *name, boolean_t decrypt, void *tag, 212 boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp); 214 dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt, 217 struct dsl_dataset **newds, boolean_t decrypt, void *tag); 219 void dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, void *tag); 220 void dmu_objset_disown(objset_t *os, boolean_t decrypt, void *tag);
|
/freebsd-13-stable/crypto/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 173 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { 191 if (!ctx || !ctx->pmeth || !ctx->pmeth->decrypt) { 201 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); 225 || !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt)
|
/freebsd-13-stable/sys/crypto/chacha20/ |
H A D | chacha-sw.c | 52 .decrypt = chacha20_xform_crypt,
|
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 292 krb5_data decrypt; local 295 krb5_data_zero(&decrypt); 302 &decrypt); 309 if (decrypt.length != clear->length || 310 memcmp(decrypt.data, clear->data, decrypt.length) != 0) { 315 krb5_data_free(&decrypt); 328 krb5_data decrypt; local 366 * Plain decrypt 375 ret = krb5_decrypt(context, crypto, usage, p, len, &decrypt); 530 krb5_data decrypt; local [all...] |
/freebsd-13-stable/tests/sys/opencrypto/ |
H A D | cryptotest.py | 99 curfun = Crypto.decrypt 152 c.decrypt, *args) 155 rpt, rtag = c.decrypt(*args) 179 curfun = Crypto.decrypt 211 curfun = Crypto.decrypt 320 c.decrypt, payload, nonce, aad, tag) 322 r = Crypto.decrypt(c, payload, nonce,
|
H A D | cryptodev.py | 321 def decrypt(self, data, iv, aad=None, tag=None): member in class:Crypto 411 # XXX - special case GCM decrypt 578 dec = c.decrypt(ct, iv) 599 dec = c.decrypt(ct, iv) 619 dec = c.decrypt(ct, iv) 650 dec, dectag = c.decrypt(ct, iv, aad=aad, tag=enctag) 701 dec = c.decrypt(enc, iv)
|
/freebsd-13-stable/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 150 serf_ssl_stream_t decrypt; member in struct:serf_ssl_context_t 176 /* Status of a fatal error, returned on subsequent encrypt or decrypt 280 status = serf_bucket_read(ctx->decrypt.pending, inlen, &data, &len); 282 ctx->decrypt.status = status; 769 ssl_len, bufsize, ctx->decrypt.status, 775 status = serf_bucket_read(ctx->decrypt.stream, bufsize, &data, &priv_len); 785 ctx->decrypt.pending->allocator); 787 serf_bucket_aggregate_append(ctx->decrypt.pending, tmp); 799 status = ctx->decrypt.status; 984 to fail. ### This can be a decrypt erro [all...] |
/freebsd-13-stable/crypto/openssl/crypto/modes/ |
H A D | ocb128.c | 131 block128_f encrypt, block128_f decrypt, 138 ret = CRYPTO_ocb128_init(octx, keyenc, keydec, encrypt, decrypt, 152 block128_f encrypt, block128_f decrypt, 169 ctx->decrypt = decrypt; 468 ctx->decrypt(tmp.c, tmp.c, ctx->keydec); 130 CRYPTO_ocb128_new(void *keyenc, void *keydec, block128_f encrypt, block128_f decrypt, ocb128_f stream) argument 151 CRYPTO_ocb128_init(OCB128_CONTEXT *ctx, void *keyenc, void *keydec, block128_f encrypt, block128_f decrypt, ocb128_f stream) argument
|
/freebsd-13-stable/stand/libsa/geli/ |
H A D | geliboot_crypto.c | 74 enc ? "decrypt" : "encrypt", 89 enc_xform_aes_xts.decrypt(ctxp, data + i,
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | modes.h | 183 block128_f encrypt, block128_f decrypt, 186 block128_f encrypt, block128_f decrypt,
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/algs/modes/ |
H A D | cbc.c | 144 int (*decrypt)(const void *, const uint8_t *, uint8_t *), 191 decrypt(ctx->cbc_keysched, blockp,
|
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/ |
H A D | dmu_objset.c | 679 dmu_objset_hold_flags(const char *name, boolean_t decrypt, void *tag, argument 687 flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE; 714 boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) 725 } else if (!readonly && decrypt && 731 if (decrypt && arc_is_unauthenticated((*osp)->os_phys_buf)) { 754 boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) 761 flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE; 770 err = dmu_objset_own_impl(ds, type, readonly, decrypt, tag, osp); 784 (ds->ds_dir->dd_crypto_obj == 0 || decrypt)) { 799 boolean_t readonly, boolean_t decrypt, voi 713 dmu_objset_own_impl(dsl_dataset_t *ds, dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) argument 753 dmu_objset_own(const char *name, dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) argument 798 dmu_objset_own_obj(dsl_pool_t *dp, uint64_t obj, dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) argument 820 dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, void *tag) argument 848 dmu_objset_refresh_ownership(dsl_dataset_t *ds, dsl_dataset_t **newds, boolean_t decrypt, void *tag) argument 869 dmu_objset_disown(objset_t *os, boolean_t decrypt, void *tag) argument [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/icp/include/aes/ |
H A D | aes_impl.h | 189 aes_decrypt_f decrypt; member in struct:aes_impl_ops
|
/freebsd-13-stable/sbin/decryptcore/ |
H A D | decryptcore.c | 119 decrypt(int ofd, const char *privkeyfile, const char *keyfile, function 240 pjdlog_error("Unable to decrypt key: %s", 279 pjdlog_error("Unable to decrypt core."); 284 pjdlog_error("Unable to decrypt core."); 420 if (!decrypt(ofd, privatekey, keyfile, encryptedcore)) {
|