Home
last modified time | relevance | path

Searched refs:decrypt (Results 126 – 150 of 15513) sorted by relevance

12345678910>>...621

/dports/games/omega/omega/tools/
H A Dmakefile8 all: crypt decrypt
13 decrypt: decrypt.c target
14 $(CC) $(CFLAGS) decrypt.c -o decrypt
17 rm -f crypt decrypt
/dports/security/s2n/s2n-tls-1.1.2/tls/
H A Ds2n_async_pkey.c49 struct s2n_async_pkey_decrypt_data decrypt; member
177 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_async() local
356 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_perform() local
358decrypt->rsa_failed = s2n_pkey_decrypt(pkey, &decrypt->encrypted, &decrypt->decrypted) != S2N_SUCC… in s2n_async_pkey_decrypt_perform()
368 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_apply() local
370 RESULT_GUARD_POSIX(decrypt->on_complete(conn, decrypt->rsa_failed, &decrypt->decrypted)); in s2n_async_pkey_decrypt_apply()
379 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_decrypt_free() local
506 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_get_input_size_decrypt() local
507 struct s2n_blob *in = &decrypt->encrypted; in s2n_async_pkey_get_input_size_decrypt()
548 struct s2n_async_pkey_decrypt_data *decrypt = &op->op.decrypt; in s2n_async_pkey_get_input_decrypt() local
[all …]
/dports/net/p5-Net-SSH-Perl/Net-SSH-Perl-2.14/lib/Net/SSH/Perl/Cipher/
H A DDES3.pm53 $ciph->{cbc2}->decrypt(
60 sub decrypt { subroutine
63 return $ciph->{cbc}->decrypt($text);
66 return $ciph->{cbc1}->decrypt(
68 $ciph->{cbc3}->decrypt($text)
99 $ede3->{des2}->decrypt(
105 sub decrypt { subroutine
107 $ede3->{des1}->decrypt(
109 $ede3->{des3}->decrypt($block)
/dports/www/firefox/firefox-99.0/third_party/rust/neqo-crypto/tests/
H A Daead.rs67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt()
73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt()
77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt()
82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt()
91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/neqo-crypto/tests/
H A Daead.rs67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt()
73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt()
77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt()
82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt()
91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/neqo-crypto/tests/
H A Daead.rs67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt()
73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt()
77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt()
82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt()
91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/rust/neqo-crypto/tests/
H A Daead.rs67 .decrypt(1, AAD, ciphertext, plaintext_buf) in aead_encrypt_decrypt()
73 let res = aead.decrypt(2, AAD, ciphertext, plaintext_buf); in aead_encrypt_decrypt()
77 let res = aead.decrypt(1, AAD, &ciphertext[1..], plaintext_buf); in aead_encrypt_decrypt()
82 let res = aead.decrypt(1, AAD, &ciphertext[..ciphertext_last], plaintext_buf); in aead_encrypt_decrypt()
91 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
97 let res = aead.decrypt(1, AAD, &scratch[..], plaintext_buf); in aead_encrypt_decrypt()
105 let res = aead.decrypt(1, &scratch[1..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
110 let res = aead.decrypt(1, &scratch[..aad_last], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
114 let res = aead.decrypt(1, &scratch[..], ciphertext, plaintext_buf); in aead_encrypt_decrypt()
/dports/emulators/mess/mame-mame0226/src/mame/machine/
H A Dsegacrpt_device.cpp319 decrypt(); in device_reset()
339 void sega_315_5132_device::decrypt() in decrypt() function in sega_315_5132_device
370 void sega_315_5155_device::decrypt() in decrypt() function in sega_315_5155_device
401 void sega_315_5110_device::decrypt() in decrypt() function in sega_315_5110_device
431 void sega_315_5135_device::decrypt() in decrypt() function in sega_315_5135_device
462 void sega_315_5051_device::decrypt() in decrypt() function in sega_315_5051_device
492 void sega_315_5098_device::decrypt() in decrypt() function in sega_315_5098_device
524 void sega_315_5102_device::decrypt() in decrypt() function in sega_315_5102_device
553 void sega_315_5065_device::decrypt() in decrypt() function in sega_315_5065_device
582 void sega_315_5064_device::decrypt() in decrypt() function in sega_315_5064_device
[all …]
H A Dsegacrp2_device.cpp104 decrypt(); in device_start()
112 void nec_315_5136_device::decrypt() in decrypt() function in nec_315_5136_device
153 void sega_315_5177_device::decrypt() in decrypt() function in sega_315_5177_device
210 void sega_315_5176_device::decrypt() in decrypt() function in sega_315_5176_device
255 void sega_315_5162_device::decrypt() in decrypt() function in sega_315_5162_device
290 void sega_315_5178_device::decrypt() in decrypt() function in sega_315_5178_device
337 void sega_315_5179_device::decrypt() in decrypt() function in sega_315_5179_device
415 void sega_317_0004_device::decrypt() in decrypt() function in sega_317_0004_device
426 void sega_317_0005_device::decrypt() in decrypt() function in sega_317_0005_device
437 void sega_317_0006_device::decrypt() in decrypt() function in sega_317_0006_device
[all …]
/dports/emulators/mame/mame-mame0226/src/mame/machine/
H A Dsegacrpt_device.cpp319 decrypt(); in device_reset()
339 void sega_315_5132_device::decrypt() in decrypt() function in sega_315_5132_device
370 void sega_315_5155_device::decrypt() in decrypt() function in sega_315_5155_device
401 void sega_315_5110_device::decrypt() in decrypt() function in sega_315_5110_device
431 void sega_315_5135_device::decrypt() in decrypt() function in sega_315_5135_device
462 void sega_315_5051_device::decrypt() in decrypt() function in sega_315_5051_device
492 void sega_315_5098_device::decrypt() in decrypt() function in sega_315_5098_device
524 void sega_315_5102_device::decrypt() in decrypt() function in sega_315_5102_device
553 void sega_315_5065_device::decrypt() in decrypt() function in sega_315_5065_device
582 void sega_315_5064_device::decrypt() in decrypt() function in sega_315_5064_device
[all …]
H A Dsegacrp2_device.cpp104 decrypt(); in device_start()
112 void nec_315_5136_device::decrypt() in decrypt() function in nec_315_5136_device
153 void sega_315_5177_device::decrypt() in decrypt() function in sega_315_5177_device
210 void sega_315_5176_device::decrypt() in decrypt() function in sega_315_5176_device
255 void sega_315_5162_device::decrypt() in decrypt() function in sega_315_5162_device
290 void sega_315_5178_device::decrypt() in decrypt() function in sega_315_5178_device
337 void sega_315_5179_device::decrypt() in decrypt() function in sega_315_5179_device
415 void sega_317_0004_device::decrypt() in decrypt() function in sega_317_0004_device
426 void sega_317_0005_device::decrypt() in decrypt() function in sega_317_0005_device
437 void sega_317_0006_device::decrypt() in decrypt() function in sega_317_0006_device
[all …]
/dports/www/firefox-legacy/firefox-52.8.0esr/testing/web-platform/meta/WebCryptoAPI/generateKey/
H A Dtest_failures_RSASSA-PKCS1-v1_5.html.ini5 [Bad algorithm: generateKey(AES, false, [decrypt\])]
11 [Bad algorithm: generateKey(AES, RED, [decrypt\])]
14 [Bad algorithm: generateKey(AES, 7, [decrypt\])]
101 [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
104 [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
107 [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
110 [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
209 …[Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveB…
212 …[Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBi…
215 …[Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBit…
[all …]
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/assemble/tasks/
H A Dmain.yml63 - name: test assemble with all fragments and decrypt=True
67 - name: assert the fragments were assembled with decrypt=True
74 - name: test assemble with all fragments and decrypt=True
78 - name: assert that the same assemble made no changes with decrypt=True
95 - name: test assemble with fragments matching a regex and decrypt=True
99 - name: assert the fragments were assembled with a regex and decrypt=True
115 - name: test assemble with a delimiter and decrypt=True
119 - name: assert the fragments were assembled with a delimiter and decrypt=True
135 - name: test assemble with remote_src=False and decrypt=True
139 - name: assert the fragments were assembled without remote and decrypt=True
[all …]
/dports/sysutils/py-ansible-base/ansible-base-2.10.15/test/integration/targets/assemble/tasks/
H A Dmain.yml63 - name: test assemble with all fragments and decrypt=True
67 - name: assert the fragments were assembled with decrypt=True
74 - name: test assemble with all fragments and decrypt=True
78 - name: assert that the same assemble made no changes with decrypt=True
95 - name: test assemble with fragments matching a regex and decrypt=True
99 - name: assert the fragments were assembled with a regex and decrypt=True
115 - name: test assemble with a delimiter and decrypt=True
119 - name: assert the fragments were assembled with a delimiter and decrypt=True
135 - name: test assemble with remote_src=False and decrypt=True
139 - name: assert the fragments were assembled without remote and decrypt=True
[all …]
/dports/sysutils/py-ansible-core/ansible-core-2.11.6/test/integration/targets/assemble/tasks/
H A Dmain.yml63 - name: test assemble with all fragments and decrypt=True
67 - name: assert the fragments were assembled with decrypt=True
74 - name: test assemble with all fragments and decrypt=True
78 - name: assert that the same assemble made no changes with decrypt=True
95 - name: test assemble with fragments matching a regex and decrypt=True
99 - name: assert the fragments were assembled with a regex and decrypt=True
115 - name: test assemble with a delimiter and decrypt=True
119 - name: assert the fragments were assembled with a delimiter and decrypt=True
135 - name: test assemble with remote_src=False and decrypt=True
139 - name: assert the fragments were assembled without remote and decrypt=True
[all …]
/dports/www/p5-CGI-EncryptForm/CGI-EncryptForm-1.02/
H A Dtest.pl43 if (defined($hash = $cfo->decrypt($enc)) && $hash->{x} eq $stuff->{x}) {
50 if (! defined($hash = $cfo->decrypt($enc))) {
62 if (!defined $cfo->decrypt('')) {
68 if (!defined $cfo->decrypt(' ')) {
74 if (!defined $cfo->decrypt('dwdj$edewD$#D$Dewd')) {
93 if (defined($xa = $cfo->decrypt($xz) && $xa->{c} eq 'ededwwDSded' &&
/dports/security/R-cran-digest/digest/inst/tinytest/
H A Dtest_aes.R23 expect_true(identical(plaintext, aes$decrypt(aes128, raw=TRUE)))
32 expect_true(identical(plaintext, aes$decrypt(aes192, raw=TRUE)))
40 expect_true(identical(plaintext, aes$decrypt(aes256, raw=TRUE)))
58 expect_true(identical(plaintext, aes$decrypt(ecb128, raw=TRUE)))
70 expect_true(identical(plaintext, aes$decrypt(cbc128, raw=TRUE)))
82 expect_true(identical(plaintext, aes$decrypt(ctr128, raw=TRUE)))
98 expect_true(identical(text, aes$decrypt(cfb128, raw=FALSE)))
109 expect_true(identical(plaintext, aes$decrypt(cfb128, raw=TRUE)))
114 expect_error(aes$decrypt(plaintext))
118 expect_error(aes$decrypt(plaintext))
/dports/security/p5-Crypt-RC5/Crypt-RC5-2.00/
H A DRC5.pm57 sub decrypt ($$) {
73 my ( $self, $text, $decrypt ) = @_;
78 $processed .= Process( $1, $decrypt );
81 $processed .= Process( $last, $decrypt );
100 my ( $block, $decrypt ) = @_;
103 $decrypt || eval;
105 if ( $decrypt ) {
112 $decrypt && ( y/+/-/, eval );
/dports/net-im/libsignal-client/libsignal-client-0.9.6/java/tests/src/test/java/org/whispersystems/libsignal/
H A DSimultaneousInitiateTests.java59 …byte[] bobPlaintext = bobSessionCipher.decrypt(new PreKeySignalMessage(messageForBob.serialize()… in testBasicSimultaneousInitiate()
73 … byte[] responsePlaintext = bobSessionCipher.decrypt(new SignalMessage(aliceResponse.serialize())); in testBasicSimultaneousInitiate()
82 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testBasicSimultaneousInitiate()
112 …byte[] bobPlaintext = bobSessionCipher.decrypt(new PreKeySignalMessage(messageForBob.serialize()… in testLostSimultaneousInitiate()
130 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testLostSimultaneousInitiate()
189 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testSimultaneousInitiateLostMessage()
256 … byte[] responsePlaintext = bobSessionCipher.decrypt(new SignalMessage(aliceResponse.serialize())); in testSimultaneousInitiateRepeatedMessages()
265 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testSimultaneousInitiateRepeatedMessages()
335 … byte[] responsePlaintext = bobSessionCipher.decrypt(new SignalMessage(aliceResponse.serialize())); in testRepeatedSimultaneousInitiateRepeatedMessages()
344 byte[] finalPlaintext = aliceSessionCipher.decrypt(new SignalMessage(finalMessage.serialize())); in testRepeatedSimultaneousInitiateRepeatedMessages()
[all …]
/dports/security/py-cryptography/cryptography-3.3.2/tests/hazmat/primitives/
H A Dtest_aead.py106 chacha.decrypt(b"00", b"hello", b"")
112 chacha.decrypt(b"0" * 12, b"0", None)
121 pt1 = chacha.decrypt(nonce, ct1, None)
122 pt2 = chacha.decrypt(nonce, ct2, b"")
182 computed_pt = chacha.decrypt(nonce, ct, ad)
264 aesccm.decrypt(nonce, ct, adata)
324 pt1 = aesccm.decrypt(nonce, ct1, None)
325 pt2 = aesccm.decrypt(nonce, ct2, b"")
332 aesccm.decrypt(b"0" * 12, b"0", None)
457 pt1 = aesgcm.decrypt(nonce, ct1, None)
[all …]
/dports/sysutils/plasma-pass/plasma-pass-1.2.0/po/en_GB/
H A Dplasma_applet_org.kde.plasma.pass.po32 msgid "Failed to decrypt password: GPG is not available"
33 msgstr "Failed to decrypt password: GPG is not available"
37 msgid "Failed to decrypt password: Failed to start GPG"
38 msgstr "Failed to decrypt password: Failed to start GPG"
42 msgid "Failed to decrypt password"
43 msgstr "Failed to decrypt password"
47 msgid "Failed to decrypt password: %1"
48 msgstr "Failed to decrypt password: %1"
/dports/net-im/ktp-common-internals/ktp-common-internals-21.12.3/otr-proxy/test/
H A Dotr-test.cpp246 QCOMPARE(bob.decrypt(mes), CryptResult::OTR); in testSimpleSession()
280 QCOMPARE(alice.decrypt(helloMsg), CryptResult::CHANGED); in testSimpleSession()
290 QCOMPARE(bob.decrypt(responseMsg), CryptResult::CHANGED); in testSimpleSession()
312 QCOMPARE(bob.decrypt(initMes), CryptResult::UNCHANGED); in testSessionPolicyNever()
340 QCOMPARE(alice.decrypt(helloMsg), CryptResult::CHANGED); in testSessionPolicyOpportunistic()
347 QCOMPARE(alice.decrypt(helloMsg), CryptResult::CHANGED); in testSessionPolicyOpportunistic()
378 QCOMPARE(alice.decrypt(helloMsg), CryptResult::OTR); in testSessionPolicyAlways()
393 QCOMPARE(alice.decrypt(initMsg), CryptResult::OTR); in testSessionPolicyAlways()
420 QCOMPARE(bob.decrypt(mes), CryptResult::OTR); in startSession()
473 QCOMPARE(alice.decrypt(mes), CryptResult::OTR); in testEncUnencryptedErrors()
[all …]
/dports/security/seal/SEAL-3.7.2/native/tests/seal/
H A Devaluator.cpp46 decryptor.decrypt(encrypted, plain); in TEST()
55 decryptor.decrypt(encrypted, plain); in TEST()
62 decryptor.decrypt(encrypted, plain); in TEST()
69 decryptor.decrypt(encrypted, plain); in TEST()
76 decryptor.decrypt(encrypted, plain); in TEST()
83 decryptor.decrypt(encrypted, plain); in TEST()
3677 decryptor.decrypt(sum, plain); in TEST()
3693 decryptor.decrypt(sum, plain); in TEST()
3707 decryptor.decrypt(sum, plain); in TEST()
3724 decryptor.decrypt(sum, plain); in TEST()
[all …]
/dports/security/py-scrypt/scrypt-0.8.18/scrypt/tests/
H A Dtest_scrypt.py35 m = scrypt.decrypt(s, self.password)
47 m = scrypt.decrypt(s, self.password)
67 m = scrypt.decrypt(s, self.password)
73 m = scrypt.decrypt(s, self.password)
80 m = scrypt.decrypt(s, self.password)
86 m = scrypt.decrypt(s, self.password)
95 m = scrypt.decrypt(s, self.password)
105 m = scrypt.decrypt(s, self.password)
112 m = scrypt.decrypt(s, self.password)
120 m = scrypt.decrypt(s, self.password)
[all …]
/dports/security/p5-CryptX/CryptX-0.075/t/
H A Dcipher_safer_k128.t55 …ipher::SAFER_K128->new($min_key)->decrypt(pack('H*', $block_encrypted_min_key_hex)), $block_plain,…
58 …ipher->new('SAFER_K128', $min_key)->decrypt(pack('H*', $block_encrypted_min_key_hex)), $block_plai…
61 …ipher::SAFER_K128->new($max_key)->decrypt(pack('H*', $block_encrypted_max_key_hex)), $block_plain,…
64 …ipher->new('SAFER_K128', $max_key)->decrypt(pack('H*', $block_encrypted_max_key_hex)), $block_plai…
72 …128->new($spec_key, $spec_rounds)->decrypt(pack('H*', $spec_block_encrypted_hex)), $block_plain, '…
75 …FER_K128', $spec_key, $spec_rounds)->decrypt(pack('H*', $spec_block_encrypted_hex)), $block_plain,…

12345678910>>...621