/dports/security/py-ctypescrypto/ctypescrypto-0.5/tests/ |
H A D | testcipher.py | 70 decryptkey=encryptkey[0:5]+encryptkey[5:] 77 d=cipher.new("AES-256-OFB",decryptkey,encrypt=False) 96 decryptkey=encryptkey[0:5]+encryptkey[5:] 97 d=cipher.new("bf-ofb",decryptkey,encrypt=False,iv=iv)
|
/dports/security/razorback-api/api-0.5.0/libssh/src/ |
H A D | dh.c | 843 crypto->decryptkey = malloc(crypto->digest_len); in generate_session_keys() 847 crypto->encryptkey == NULL || crypto->decryptkey == NULL || in generate_session_keys() 873 if (generate_one_key(k_string, crypto, crypto->decryptkey, 'D') < 0) { in generate_session_keys() 877 if (generate_one_key(k_string, crypto, crypto->decryptkey, 'C') < 0) { in generate_session_keys() 902 crypto->decryptkey = realloc(crypto->decryptkey, crypto->digest_len *2); in generate_session_keys() 903 if(crypto->decryptkey == NULL) in generate_session_keys() 909 ssh_mac_update(ctx, crypto->decryptkey, crypto->digest_len); in generate_session_keys() 910 ssh_mac_final(crypto->decryptkey + crypto->digest_len, ctx); in generate_session_keys() 933 ssh_print_hexa("Decryption key", crypto->decryptkey, in generate_session_keys()
|
H A D | kex1.c | 209 if(session->next_crypto->decryptkey != NULL) in encrypt_session_key() 210 SAFE_FREE(session->next_crypto->decryptkey); in encrypt_session_key() 216 session->next_crypto->decryptkey = malloc(32); in encrypt_session_key() 220 session->next_crypto->decryptkey == NULL || in encrypt_session_key() 229 memcpy(session->next_crypto->decryptkey, session->next_crypto->encryptkey, 32); in encrypt_session_key()
|
H A D | wrapper.c | 147 if(crypto->decryptkey){ in crypto_free() 148 memset(crypto->decryptkey, 0, crypto->digest_len); in crypto_free() 149 SAFE_FREE(crypto->decryptkey); in crypto_free()
|
H A D | packet_crypt.c | 70 if (crypto->set_decrypt_key(crypto, session->current_crypto->decryptkey, in packet_decrypt()
|
/dports/security/razorback-api/api-0.5.0/libssh/include/libssh/ |
H A D | crypto.h | 68 unsigned char *decryptkey; member
|
/dports/security/libssh/libssh-0.9.6/src/ |
H A D | wrapper.c | 215 if (crypto->decryptkey != NULL) { in crypto_free() 216 explicit_bzero(crypto->decryptkey, crypto->in_cipher->keysize / 8); in crypto_free() 217 SAFE_FREE(crypto->decryptkey); in crypto_free()
|
H A D | kex.c | 1405 crypto->decryptkey = enckey_srv_to_cli; in ssh_generate_session_keys() 1412 crypto->decryptkey = enckey_cli_to_srv; in ssh_generate_session_keys()
|
H A D | packet.c | 1976 session->next_crypto->decryptkey, in ssh_packet_set_newkeys()
|
/dports/security/libssh/libssh-0.9.6/tests/unittests/ |
H A D | torture_session_keys.c | 83 assert_memory_equal(test_crypto.decryptkey, dK, 24); in torture_session_keys()
|
H A D | torture_packet.c | 89 crypto->decryptkey = copy_data(key, sizeof(key)); in torture_packet() 97 session->current_crypto->decryptkey, in torture_packet()
|
/dports/security/libssh/libssh-0.9.6/include/libssh/ |
H A D | crypto.h | 135 unsigned char *decryptkey; member
|
/dports/net/megacmd/MEGAcmd-1.4.1_Win/sdk/include/mega/ |
H A D | megaclient.h | 1423 bool decryptkey(const char*, byte*, int, SymmCipher*, int, handle);
|
/dports/net/megacmd/MEGAcmd-1.4.1_Win/sdk/src/ |
H A D | node.cpp | 956 if (client->decryptkey(k, key, keylength, sc, 0, nodehandle)) in applykey()
|
H A D | megaclient.cpp | 89 bool MegaClient::decryptkey(const char* sk, byte* tk, int tl, SymmCipher* sc, int type, handle node) in decryptkey() function in mega::MegaClient 5413 if (!decryptkey(k, sharekey, sizeof sharekey, &key, 1, h)) in sc_shares() 7727 decryptkey(sk, buf, sizeof buf, &key, 1, h); in readnodes() 7900 if (decryptkey(k, buf, SymmCipher::KEYLENGTH, &key, 1, h)) in readokelement()
|
H A D | megaapi_impl.cpp | 12698 if (client->decryptkey(nodekeystr, nodekey, sizeof(nodekey), &cipher, 0, UNDEF)) in folderlinkinfo_result()
|
/dports/net/megacmd/MEGAcmd-1.4.1_Win/sdk/examples/ |
H A D | megacli.cpp | 7193 if (client->decryptkey(nodekeystr, nodekey, sizeof(nodekey), &cipher, 0, UNDEF)) in folderlinkinfo_result()
|