/aosp_15_r20/external/scapy/test/ |
H A D | ipsec.uts | 41 * after decryption the original packet payload should be unaltered 74 * after decryption the original packet payload should be unaltered 126 * after decryption the original packet payload should be unaltered 177 * after decryption the original packet payload should be unaltered 229 * after decryption original packet should be preserved 280 * after decryption original packet should be preserved 331 * after decryption original packet should be preserved 387 * after decryption the original packet payload should be unaltered 422 * after decryption the original packet payload should be unaltered 457 * after decryption the original packet payload should be unaltered [all …]
|
/aosp_15_r20/external/tink/cc/subtle/ |
H A D | hybrid_test_util.cc | 30 auto decryption = decrypter->Decrypt(ciphertext.value(), context_info); in HybridEncryptThenDecrypt() local 31 if (!decryption.ok()) return decryption.status(); in HybridEncryptThenDecrypt() 33 if (decryption.value() != plaintext) { in HybridEncryptThenDecrypt()
|
/aosp_15_r20/hardware/interfaces/drm/1.2/ |
H A D | ICryptoPlugin.hal | 43 * @param the keyId for the key that is used to do the the decryption. The 51 * @param source the input buffer for the decryption 54 * @param destination the output buffer for the decryption 60 * the decryption are not available 72 * is not able to perform decryption 75 * @return bytesWritten the number of bytes output from the decryption
|
/aosp_15_r20/external/openscreen/third_party/boringssl/ios-arm/crypto/fipsmodule/ |
H A D | vpaes-armv7.S | 235 Lk_dipt:@ decryption input transform 238 Lk_dsbo:@ decryption sbox final output 241 Lk_dsb9:@ decryption sbox output *9*u, *9*t 244 Lk_dsbd:@ decryption sbox output *D*u, *D*t 247 Lk_dsbb:@ decryption sbox output *B*u, *B*t 250 Lk_dsbe:@ decryption sbox output *E*u, *E*t 276 @ because decryption doesn't use those constants. The values are 466 Lk_dksd:@ decryption key schedule: invskew x*D 469 Lk_dksb:@ decryption key schedule: invskew x*B 472 Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/ios-arm/crypto/fipsmodule/ |
D | vpaes-armv7.S | 235 Lk_dipt:@ decryption input transform 238 Lk_dsbo:@ decryption sbox final output 241 Lk_dsb9:@ decryption sbox output *9*u, *9*t 244 Lk_dsbd:@ decryption sbox output *D*u, *D*t 247 Lk_dsbb:@ decryption sbox output *B*u, *B*t 250 Lk_dsbe:@ decryption sbox output *E*u, *E*t 276 @ because decryption doesn't use those constants. The values are 466 Lk_dksd:@ decryption key schedule: invskew x*D 469 Lk_dksb:@ decryption key schedule: invskew x*B 472 Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/ios-arm/crypto/fipsmodule/ |
D | vpaes-armv7.S | 235 Lk_dipt:@ decryption input transform 238 Lk_dsbo:@ decryption sbox final output 241 Lk_dsb9:@ decryption sbox output *9*u, *9*t 244 Lk_dsbd:@ decryption sbox output *D*u, *D*t 247 Lk_dsbb:@ decryption sbox output *B*u, *B*t 250 Lk_dsbe:@ decryption sbox output *E*u, *E*t 276 @ because decryption doesn't use those constants. The values are 466 Lk_dksd:@ decryption key schedule: invskew x*D 469 Lk_dksb:@ decryption key schedule: invskew x*B 472 Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/autotest/server/cros/chaos_lib/ |
H A D | chaos_capture_analyzer.py | 16 def get_output(self, display_filter=None, summaries=True, decryption=None): argument 32 decryption_key=decryption, 127 def get_filtered_packets(self, ap, dut, summaries, decryption): argument 142 decryption=decryption) 669 decryption = 'chromeos:%s' % ssid 672 bssids, dut_mac, False, decryption) 678 bssids, dut_mac, True, decryption)
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/gen/bcm/ |
H A D | vpaes-armv7-linux.S | 221 .Lk_dipt:@ decryption input transform 224 .Lk_dsbo:@ decryption sbox final output 227 .Lk_dsb9:@ decryption sbox output *9*u, *9*t 230 .Lk_dsbd:@ decryption sbox output *D*u, *D*t 233 .Lk_dsbb:@ decryption sbox output *B*u, *B*t 236 .Lk_dsbe:@ decryption sbox output *E*u, *E*t 260 @ because decryption doesn't use those constants. The values are 448 .Lk_dksd:@ decryption key schedule: invskew x*D 451 .Lk_dksb:@ decryption key schedule: invskew x*B 454 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/linux-arm/crypto/fipsmodule/ |
D | vpaes-armv7.S | 230 .Lk_dipt:@ decryption input transform 233 .Lk_dsbo:@ decryption sbox final output 236 .Lk_dsb9:@ decryption sbox output *9*u, *9*t 239 .Lk_dsbd:@ decryption sbox output *D*u, *D*t 242 .Lk_dsbb:@ decryption sbox output *B*u, *B*t 245 .Lk_dsbe:@ decryption sbox output *E*u, *E*t 269 @ because decryption doesn't use those constants. The values are 457 .Lk_dksd:@ decryption key schedule: invskew x*D 460 .Lk_dksb:@ decryption key schedule: invskew x*B 463 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/boringssl/src/gen/bcm/ |
H A D | vpaes-armv7-linux.S | 221 .Lk_dipt:@ decryption input transform 224 .Lk_dsbo:@ decryption sbox final output 227 .Lk_dsb9:@ decryption sbox output *9*u, *9*t 230 .Lk_dsbd:@ decryption sbox output *D*u, *D*t 233 .Lk_dsbb:@ decryption sbox output *B*u, *B*t 236 .Lk_dsbe:@ decryption sbox output *E*u, *E*t 260 @ because decryption doesn't use those constants. The values are 448 .Lk_dksd:@ decryption key schedule: invskew x*D 451 .Lk_dksb:@ decryption key schedule: invskew x*B 454 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/linux-arm/crypto/fipsmodule/ |
D | vpaes-armv7.S | 230 .Lk_dipt:@ decryption input transform 233 .Lk_dsbo:@ decryption sbox final output 236 .Lk_dsb9:@ decryption sbox output *9*u, *9*t 239 .Lk_dsbd:@ decryption sbox output *D*u, *D*t 242 .Lk_dsbb:@ decryption sbox output *B*u, *B*t 245 .Lk_dsbe:@ decryption sbox output *E*u, *E*t 269 @ because decryption doesn't use those constants. The values are 457 .Lk_dksd:@ decryption key schedule: invskew x*D 460 .Lk_dksb:@ decryption key schedule: invskew x*B 463 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/openscreen/third_party/boringssl/linux-arm/crypto/fipsmodule/ |
H A D | vpaes-armv7.S | 230 .Lk_dipt:@ decryption input transform 233 .Lk_dsbo:@ decryption sbox final output 236 .Lk_dsb9:@ decryption sbox output *9*u, *9*t 239 .Lk_dsbd:@ decryption sbox output *D*u, *D*t 242 .Lk_dsbb:@ decryption sbox output *B*u, *B*t 245 .Lk_dsbe:@ decryption sbox output *E*u, *E*t 269 @ because decryption doesn't use those constants. The values are 457 .Lk_dksd:@ decryption key schedule: invskew x*D 460 .Lk_dksb:@ decryption key schedule: invskew x*B 463 .Lk_dkse:@ decryption key schedule: invskew x*E + 0x63 [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/tests/suites/ |
H A D | test_suite_psa_crypto_driver_wrappers.data | 418 PSA symmetric decryption multipart: AES-CTR, 11+5 bytes 422 PSA symmetric decryption multipart: AES-CTR, 16+16 bytes 426 PSA symmetric decryption multipart: AES-CTR, 12+20 bytes 430 PSA symmetric decryption multipart: AES-CTR, 20+12 bytes 434 PSA symmetric decryption multipart: AES-CTR, 12+10 bytes 438 PSA symmetric decryption multipart: AES-CTR, 0+15 bytes 442 PSA symmetric decryption multipart: AES-CTR, 15+0 bytes 446 PSA symmetric decryption multipart: AES-CTR, 0+16 bytes 450 PSA symmetric decryption multipart: AES-CTR, 16+0 bytes 680 PSA encrypt-decrypt transparent driver: fake decryption output RSA PKCS#1 v1.5 [all …]
|
/aosp_15_r20/external/mbedtls/tests/suites/ |
H A D | test_suite_psa_crypto_driver_wrappers.data | 418 PSA symmetric decryption multipart: AES-CTR, 11+5 bytes 422 PSA symmetric decryption multipart: AES-CTR, 16+16 bytes 426 PSA symmetric decryption multipart: AES-CTR, 12+20 bytes 430 PSA symmetric decryption multipart: AES-CTR, 20+12 bytes 434 PSA symmetric decryption multipart: AES-CTR, 12+10 bytes 438 PSA symmetric decryption multipart: AES-CTR, 0+15 bytes 442 PSA symmetric decryption multipart: AES-CTR, 15+0 bytes 446 PSA symmetric decryption multipart: AES-CTR, 0+16 bytes 450 PSA symmetric decryption multipart: AES-CTR, 16+0 bytes 680 PSA encrypt-decrypt transparent driver: fake decryption output RSA PKCS#1 v1.5 [all …]
|
/aosp_15_r20/external/tink/cc/experimental/pqcrypto/kem/ |
H A D | cecpq2_aead_hkdf_private_key_manager_test.cc | 253 auto decryption = in TEST() local 255 ASSERT_THAT(decryption, IsOk()); in TEST() 256 ASSERT_EQ(decryption.value(), plaintext); in TEST() 280 auto decryption = in TEST() local 282 ASSERT_THAT(decryption, Not(IsOk())); in TEST()
|
/aosp_15_r20/hardware/interfaces/drm/1.0/ |
H A D | ICryptoPlugin.hal | 84 * the decryption. The keyId refers to a key in the associated 92 * @param source the input buffer for the decryption 95 * @param destination the output buffer for the decryption 100 * decryption are not available, ERROR_DRM_INSUFFICIENT_OUTPUT_PROTECTION 105 * @return bytesWritten the number of bytes output from the decryption
|
/aosp_15_r20/external/tink/cc/core/ |
H A D | key_type_manager_test.cc | 121 std::string decryption = aead->Decrypt(encryption, "aad").value(); in TEST() local 122 EXPECT_THAT(decryption, Eq("Hi")); in TEST() 195 std::string decryption = aead->Decrypt(encryption, "aad").value(); in TEST() local 196 EXPECT_THAT(decryption, Eq("Hi")); in TEST()
|
H A D | key_manager_impl_test.cc | 306 std::string decryption = aead->Decrypt(encryption, "aad").value(); in TEST() local 307 EXPECT_THAT(decryption, Eq("Hi")); in TEST() 340 std::string decryption = aead->Decrypt(encryption, "aad").value(); in TEST() local 341 EXPECT_THAT(decryption, Eq("Hi")); in TEST() 497 std::string decryption = aead->Decrypt(encryption, "aad").value(); in TEST() local 498 EXPECT_THAT(decryption, Eq("Hi")); in TEST()
|
/aosp_15_r20/external/zlib/contrib/minizip/ |
H A D | README.chromium | 20 - Enable traditional PKWARE decryption in zlib/contrib/minizip 23 0015-minizip-unzip-enable-decryption.patch
|
/aosp_15_r20/external/python/rsa/doc/ |
D | index.rst | 10 encryption and decryption, signing and verifying signatures, and key 29 you'll leak information about the reason why decryption or
|
/aosp_15_r20/external/tink/java_src/examples/gcs/ |
H A D | README.md | 26 rename or move it to a different bucket, decryption will fail. 31 * local-output-file: Write the decryption result to this local file.
|
/aosp_15_r20/external/tink/python/examples/gcs/ |
H A D | README.md | 23 * When `--mode decrypt`, write the decryption result to this local file. 28 you rename or move it to a different bucket, decryption will fail.
|
/aosp_15_r20/external/libwebsockets/READMEs/ |
H A D | README.crypto-apis.md | 78 …kets/tree/include/libwebsockets/lws-genrsa.h)|Provides RSA encryption, decryption, signing, verifi… 79 …lude/libwebsockets/lws-genaes.h)|Provides AES in all common variants for encryption and decryption| 80 …ude/libwebsockets/lws-genec.h)|Provides Elliptic Curve for encryption, decryption, signing, verifi…
|
/aosp_15_r20/external/webrtc/pc/g3doc/ |
H A D | srtp.md | 35 The [`cricket::SrtpSession`][3] is providing encryption and decryption of SRTP 40 Encryption and decryption happens in-place in the [`ProtectRtp`][6],
|
/aosp_15_r20/external/tink/cc/hybrid/internal/ |
H A D | hpke_decrypt_test.cc | 124 util::StatusOr<std::string> decryption = in TEST_P() local 127 EXPECT_THAT(decryption.status(), in TEST_P()
|