Home
last modified time | relevance | path

Searched refs:decrypt (Results 1 – 8 of 8) sorted by relevance

/PHP-7.2/ext/zip/lib/
H A Dzip_source_pkware.c51 static void decrypt(struct trad_pkware *, zip_uint8_t *,
85 decrypt(ctx, NULL, (const zip_uint8_t *)password, strlen(password), 1); in zip_source_pkware()
97 decrypt(struct trad_pkware *ctx, zip_uint8_t *out, const zip_uint8_t *in, in decrypt() function
145 decrypt(ctx, header, header, HEADERLEN, 0); in decrypt_header()
184decrypt((struct trad_pkware *)ud, (zip_uint8_t *)data, (zip_uint8_t *)data, (zip_uint64_t)n, 0); in pkware_decrypt()
/PHP-7.2/ext/openssl/tests/
H A Dbug73833.phpt21 echo "Failed to decrypt.\n";
H A Dbug74720_1.phpt2 Bug #74720 pkcs7_en/decrypt does not work if \x1a is used in content, variant 1
H A Dbug74720_0.phpt2 Bug #74720 pkcs7_en/decrypt does not work if \x1a is used in content, variant 0
H A Dbug74798.phpt2 Bug #74798 pkcs7_en/decrypt does not work if \x0a is used in content
H A Dopenssl_error_string_basic.phpt116 // private decrypt with failed padding check
119 // public encrypt and decrypt with failed padding check and padding
/PHP-7.2/ext/openssl/
H A DREADME8 NEW: support for S/MIME encrypt/decrypt/sign/verify, as well as more
199 keys and ekeys can decrypt and read the data. Returns the length of the
269 // seal data, only owners of $pk1 and $pk2 can decrypt $sealed with keys
275 // now we try to decrypt data for one of the recipients
/PHP-7.2/
H A DNEWS1908 . Fixed bug #74798 (pkcs7_en/decrypt does not work if \x0a is used in content).
1978 . Fixed bug #74720 (pkcs7_en/decrypt does not work if \x1a is used in

Completed in 22 milliseconds