/dports/games/omega/omega/tools/ |
H A D | makefile | 8 all: crypt decrypt 13 decrypt: decrypt.c target 14 $(CC) $(CFLAGS) decrypt.c -o decrypt 17 rm -f crypt decrypt
|
/dports/security/s2n/s2n-tls-1.1.2/tls/ |
H A D | s2n_async_pkey.c | 49 struct s2n_async_pkey_decrypt_data decrypt; member 177 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_async() local 356 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_perform() local 358 …decrypt->rsa_failed = s2n_pkey_decrypt(pkey, &decrypt->encrypted, &decrypt->decrypted) != S2N_SUCC… in s2n_async_pkey_decrypt_perform() 368 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_apply() local 370 RESULT_GUARD_POSIX(decrypt->on_complete(conn, decrypt->rsa_failed, &decrypt->decrypted)); in s2n_async_pkey_decrypt_apply() 379 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_free() local 506 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_get_input_size_decrypt() local 507 struct s2n_blob *in = &decrypt->encrypted; in s2n_async_pkey_get_input_size_decrypt() 548 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_get_input_decrypt() local [all …]
|
/dports/net/p5-Net-SSH-Perl/Net-SSH-Perl-2.14/lib/Net/SSH/Perl/Cipher/ |
H A D | DES3.pm | 53 $ciph->{cbc2}->decrypt( 60 sub decrypt { subroutine 63 return $ciph->{cbc}->decrypt($text); 66 return $ciph->{cbc1}->decrypt( 68 $ciph->{cbc3}->decrypt($text) 99 $ede3->{des2}->decrypt( 105 sub decrypt { subroutine 107 $ede3->{des1}->decrypt( 109 $ede3->{des3}->decrypt($block)
|
/dports/www/firefox/firefox-99.0/third_party/rust/neqo-crypto/tests/ |
H A D | aead.rs | 67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt() 73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt() 77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt() 82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt() 91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
|
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/neqo-crypto/tests/ |
H A D | aead.rs | 67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt() 73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt() 77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt() 82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt() 91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
|
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/neqo-crypto/tests/ |
H A D | aead.rs | 67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt() 73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt() 77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt() 82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt() 91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
|
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/rust/neqo-crypto/tests/ |
H A D | aead.rs | 67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt() 73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt() 77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt() 82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt() 91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt() 105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt() 114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
|
/dports/emulators/mess/mame-mame0226/src/mame/machine/ |
H A D | segacrpt_device.cpp | 319 decrypt(); in device_reset() 339 void sega_315_5132_device::decrypt() in decrypt() function in sega_315_5132_device 370 void sega_315_5155_device::decrypt() in decrypt() function in sega_315_5155_device 401 void sega_315_5110_device::decrypt() in decrypt() function in sega_315_5110_device 431 void sega_315_5135_device::decrypt() in decrypt() function in sega_315_5135_device 462 void sega_315_5051_device::decrypt() in decrypt() function in sega_315_5051_device 492 void sega_315_5098_device::decrypt() in decrypt() function in sega_315_5098_device 524 void sega_315_5102_device::decrypt() in decrypt() function in sega_315_5102_device 553 void sega_315_5065_device::decrypt() in decrypt() function in sega_315_5065_device 582 void sega_315_5064_device::decrypt() in decrypt() function in sega_315_5064_device [all …]
|
H A D | segacrp2_device.cpp | 104 decrypt(); in device_start() 112 void nec_315_5136_device::decrypt() in decrypt() function in nec_315_5136_device 153 void sega_315_5177_device::decrypt() in decrypt() function in sega_315_5177_device 210 void sega_315_5176_device::decrypt() in decrypt() function in sega_315_5176_device 255 void sega_315_5162_device::decrypt() in decrypt() function in sega_315_5162_device 290 void sega_315_5178_device::decrypt() in decrypt() function in sega_315_5178_device 337 void sega_315_5179_device::decrypt() in decrypt() function in sega_315_5179_device 415 void sega_317_0004_device::decrypt() in decrypt() function in sega_317_0004_device 426 void sega_317_0005_device::decrypt() in decrypt() function in sega_317_0005_device 437 void sega_317_0006_device::decrypt() in decrypt() function in sega_317_0006_device [all …]
|
/dports/emulators/mame/mame-mame0226/src/mame/machine/ |
H A D | segacrpt_device.cpp | 319 decrypt(); in device_reset() 339 void sega_315_5132_device::decrypt() in decrypt() function in sega_315_5132_device 370 void sega_315_5155_device::decrypt() in decrypt() function in sega_315_5155_device 401 void sega_315_5110_device::decrypt() in decrypt() function in sega_315_5110_device 431 void sega_315_5135_device::decrypt() in decrypt() function in sega_315_5135_device 462 void sega_315_5051_device::decrypt() in decrypt() function in sega_315_5051_device 492 void sega_315_5098_device::decrypt() in decrypt() function in sega_315_5098_device 524 void sega_315_5102_device::decrypt() in decrypt() function in sega_315_5102_device 553 void sega_315_5065_device::decrypt() in decrypt() function in sega_315_5065_device 582 void sega_315_5064_device::decrypt() in decrypt() function in sega_315_5064_device [all …]
|
H A D | segacrp2_device.cpp | 104 decrypt(); in device_start() 112 void nec_315_5136_device::decrypt() in decrypt() function in nec_315_5136_device 153 void sega_315_5177_device::decrypt() in decrypt() function in sega_315_5177_device 210 void sega_315_5176_device::decrypt() in decrypt() function in sega_315_5176_device 255 void sega_315_5162_device::decrypt() in decrypt() function in sega_315_5162_device 290 void sega_315_5178_device::decrypt() in decrypt() function in sega_315_5178_device 337 void sega_315_5179_device::decrypt() in decrypt() function in sega_315_5179_device 415 void sega_317_0004_device::decrypt() in decrypt() function in sega_317_0004_device 426 void sega_317_0005_device::decrypt() in decrypt() function in sega_317_0005_device 437 void sega_317_0006_device::decrypt() in decrypt() function in sega_317_0006_device [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/testing/web-platform/meta/WebCryptoAPI/generateKey/ |
H A D | test_failures_RSASSA-PKCS1-v1_5.html.ini | 5 [Bad algorithm: generateKey(AES, false, [decrypt\])] 11 [Bad algorithm: generateKey(AES, RED, [decrypt\])] 14 [Bad algorithm: generateKey(AES, 7, [decrypt\])] 101 [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] 104 [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] 107 [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] 110 [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])] 209 …[Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveB… 212 …[Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBi… 215 …[Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBit… [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/assemble/tasks/ |
H A D | main.yml | 63 - name: test assemble with all fragments and decrypt=True 67 - name: assert the fragments were assembled with decrypt=True 74 - name: test assemble with all fragments and decrypt=True 78 - name: assert that the same assemble made no changes with decrypt=True 95 - name: test assemble with fragments matching a regex and decrypt=True 99 - name: assert the fragments were assembled with a regex and decrypt=True 115 - name: test assemble with a delimiter and decrypt=True 119 - name: assert the fragments were assembled with a delimiter and decrypt=True 135 - name: test assemble with remote_src=False and decrypt=True 139 - name: assert the fragments were assembled without remote and decrypt=True [all …]
|
/dports/sysutils/py-ansible-base/ansible-base-2.10.15/test/integration/targets/assemble/tasks/ |
H A D | main.yml | 63 - name: test assemble with all fragments and decrypt=True 67 - name: assert the fragments were assembled with decrypt=True 74 - name: test assemble with all fragments and decrypt=True 78 - name: assert that the same assemble made no changes with decrypt=True 95 - name: test assemble with fragments matching a regex and decrypt=True 99 - name: assert the fragments were assembled with a regex and decrypt=True 115 - name: test assemble with a delimiter and decrypt=True 119 - name: assert the fragments were assembled with a delimiter and decrypt=True 135 - name: test assemble with remote_src=False and decrypt=True 139 - name: assert the fragments were assembled without remote and decrypt=True [all …]
|
/dports/sysutils/py-ansible-core/ansible-core-2.11.6/test/integration/targets/assemble/tasks/ |
H A D | main.yml | 63 - name: test assemble with all fragments and decrypt=True 67 - name: assert the fragments were assembled with decrypt=True 74 - name: test assemble with all fragments and decrypt=True 78 - name: assert that the same assemble made no changes with decrypt=True 95 - name: test assemble with fragments matching a regex and decrypt=True 99 - name: assert the fragments were assembled with a regex and decrypt=True 115 - name: test assemble with a delimiter and decrypt=True 119 - name: assert the fragments were assembled with a delimiter and decrypt=True 135 - name: test assemble with remote_src=False and decrypt=True 139 - name: assert the fragments were assembled without remote and decrypt=True [all …]
|
/dports/www/p5-CGI-EncryptForm/CGI-EncryptForm-1.02/ |
H A D | test.pl | 43 if (defined($hash = $cfo->decrypt($enc)) && $hash->{x} eq $stuff->{x}) { 50 if (! defined($hash = $cfo->decrypt($enc))) { 62 if (!defined $cfo->decrypt('')) { 68 if (!defined $cfo->decrypt(' ')) { 74 if (!defined $cfo->decrypt('dwdj$edewD$#D$Dewd')) { 93 if (defined($xa = $cfo->decrypt($xz) && $xa->{c} eq 'ededwwDSded' &&
|
/dports/security/R-cran-digest/digest/inst/tinytest/ |
H A D | test_aes.R | 23 expect_true(identical(plaintext, aes$decrypt(aes128, raw=TRUE))) 32 expect_true(identical(plaintext, aes$decrypt(aes192, raw=TRUE))) 40 expect_true(identical(plaintext, aes$decrypt(aes256, raw=TRUE))) 58 expect_true(identical(plaintext, aes$decrypt(ecb128, raw=TRUE))) 70 expect_true(identical(plaintext, aes$decrypt(cbc128, raw=TRUE))) 82 expect_true(identical(plaintext, aes$decrypt(ctr128, raw=TRUE))) 98 expect_true(identical(text, aes$decrypt(cfb128, raw=FALSE))) 109 expect_true(identical(plaintext, aes$decrypt(cfb128, raw=TRUE))) 114 expect_error(aes$decrypt(plaintext)) 118 expect_error(aes$decrypt(plaintext))
|
/dports/security/p5-Crypt-RC5/Crypt-RC5-2.00/ |
H A D | RC5.pm | 57 sub decrypt ($$) { 73 my ( $self, $text, $decrypt ) = @_; 78 $processed .= Process( $1, $decrypt ); 81 $processed .= Process( $last, $decrypt ); 100 my ( $block, $decrypt ) = @_; 103 $decrypt || eval; 105 if ( $decrypt ) { 112 $decrypt && ( y/+/-/, eval );
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/java/tests/src/test/java/org/whispersystems/libsignal/ |
H A D | SimultaneousInitiateTests.java | 59 …byte[] bobPlaintext = bobSessionCipher.decrypt(new PreKeySignalMessage(messageForBob.serialize()… in testBasicSimultaneousInitiate() 73 … byte[] responsePlaintext = bobSessionCipher.decrypt(new SignalMessage(aliceResponse.serialize())); in testBasicSimultaneousInitiate() 82 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testBasicSimultaneousInitiate() 112 …byte[] bobPlaintext = bobSessionCipher.decrypt(new PreKeySignalMessage(messageForBob.serialize()… in testLostSimultaneousInitiate() 130 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testLostSimultaneousInitiate() 189 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testSimultaneousInitiateLostMessage() 256 … byte[] responsePlaintext = bobSessionCipher.decrypt(new SignalMessage(aliceResponse.serialize())); in testSimultaneousInitiateRepeatedMessages() 265 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testSimultaneousInitiateRepeatedMessages() 335 … byte[] responsePlaintext = bobSessionCipher.decrypt(new SignalMessage(aliceResponse.serialize())); in testRepeatedSimultaneousInitiateRepeatedMessages() 344 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testRepeatedSimultaneousInitiateRepeatedMessages() [all …]
|
/dports/security/py-cryptography/cryptography-3.3.2/tests/hazmat/primitives/ |
H A D | test_aead.py | 106 chacha.decrypt(b"00", b"hello", b"") 112 chacha.decrypt(b"0" * 12, b"0", None) 121 pt1 = chacha.decrypt(nonce, ct1, None) 122 pt2 = chacha.decrypt(nonce, ct2, b"") 182 computed_pt = chacha.decrypt(nonce, ct, ad) 264 aesccm.decrypt(nonce, ct, adata) 324 pt1 = aesccm.decrypt(nonce, ct1, None) 325 pt2 = aesccm.decrypt(nonce, ct2, b"") 332 aesccm.decrypt(b"0" * 12, b"0", None) 457 pt1 = aesgcm.decrypt(nonce, ct1, None) [all …]
|
/dports/sysutils/plasma-pass/plasma-pass-1.2.0/po/en_GB/ |
H A D | plasma_applet_org.kde.plasma.pass.po | 32 msgid "Failed to decrypt password: GPG is not available" 33 msgstr "Failed to decrypt password: GPG is not available" 37 msgid "Failed to decrypt password: Failed to start GPG" 38 msgstr "Failed to decrypt password: Failed to start GPG" 42 msgid "Failed to decrypt password" 43 msgstr "Failed to decrypt password" 47 msgid "Failed to decrypt password: %1" 48 msgstr "Failed to decrypt password: %1"
|
/dports/net-im/ktp-common-internals/ktp-common-internals-21.12.3/otr-proxy/test/ |
H A D | otr-test.cpp | 246 QCOMPARE(bob.decrypt(mes), CryptResult::OTR); in testSimpleSession() 280 QCOMPARE(alice.decrypt(helloMsg), CryptResult::CHANGED); in testSimpleSession() 290 QCOMPARE(bob.decrypt(responseMsg), CryptResult::CHANGED); in testSimpleSession() 312 QCOMPARE(bob.decrypt(initMes), CryptResult::UNCHANGED); in testSessionPolicyNever() 340 QCOMPARE(alice.decrypt(helloMsg), CryptResult::CHANGED); in testSessionPolicyOpportunistic() 347 QCOMPARE(alice.decrypt(helloMsg), CryptResult::CHANGED); in testSessionPolicyOpportunistic() 378 QCOMPARE(alice.decrypt(helloMsg), CryptResult::OTR); in testSessionPolicyAlways() 393 QCOMPARE(alice.decrypt(initMsg), CryptResult::OTR); in testSessionPolicyAlways() 420 QCOMPARE(bob.decrypt(mes), CryptResult::OTR); in startSession() 473 QCOMPARE(alice.decrypt(mes), CryptResult::OTR); in testEncUnencryptedErrors() [all …]
|
/dports/security/seal/SEAL-3.7.2/native/tests/seal/ |
H A D | evaluator.cpp | 46 decryptor.decrypt(encrypted, plain); in TEST() 55 decryptor.decrypt(encrypted, plain); in TEST() 62 decryptor.decrypt(encrypted, plain); in TEST() 69 decryptor.decrypt(encrypted, plain); in TEST() 76 decryptor.decrypt(encrypted, plain); in TEST() 83 decryptor.decrypt(encrypted, plain); in TEST() 3677 decryptor.decrypt(sum, plain); in TEST() 3693 decryptor.decrypt(sum, plain); in TEST() 3707 decryptor.decrypt(sum, plain); in TEST() 3724 decryptor.decrypt(sum, plain); in TEST() [all …]
|
/dports/security/py-scrypt/scrypt-0.8.18/scrypt/tests/ |
H A D | test_scrypt.py | 35 m = scrypt.decrypt(s, self.password) 47 m = scrypt.decrypt(s, self.password) 67 m = scrypt.decrypt(s, self.password) 73 m = scrypt.decrypt(s, self.password) 80 m = scrypt.decrypt(s, self.password) 86 m = scrypt.decrypt(s, self.password) 95 m = scrypt.decrypt(s, self.password) 105 m = scrypt.decrypt(s, self.password) 112 m = scrypt.decrypt(s, self.password) 120 m = scrypt.decrypt(s, self.password) [all …]
|
/dports/security/p5-CryptX/CryptX-0.075/t/ |
H A D | cipher_safer_k128.t | 55 …ipher::SAFER_K128->new($min_key)->decrypt(pack('H*', $block_encrypted_min_key_hex)), $block_plain,… 58 …ipher->new('SAFER_K128', $min_key)->decrypt(pack('H*', $block_encrypted_min_key_hex)), $block_plai… 61 …ipher::SAFER_K128->new($max_key)->decrypt(pack('H*', $block_encrypted_max_key_hex)), $block_plain,… 64 …ipher->new('SAFER_K128', $max_key)->decrypt(pack('H*', $block_encrypted_max_key_hex)), $block_plai… 72 …128->new($spec_key, $spec_rounds)->decrypt(pack('H*', $spec_block_encrypted_hex)), $block_plain, '… 75 …FER_K128', $spec_key, $spec_rounds)->decrypt(pack('H*', $spec_block_encrypted_hex)), $block_plain,…
|