/external/boringssl/src/ssl/test/runner/ |
D | ticket.go | 174 encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size) 175 iv := encrypted[:aes.BlockSize] 176 macBytes := encrypted[len(encrypted)-sha256.Size:] 185 cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized) 188 mac.Write(encrypted[:len(encrypted)-sha256.Size]) 191 return encrypted, nil 194 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) { 195 if len(encrypted) < aes.BlockSize+sha256.Size { 199 iv := encrypted[:aes.BlockSize] 200 macBytes := encrypted[len(encrypted)-sha256.Size:] [all …]
|
D | key_agreement.go | 153 …encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSec… 159 ckx.ciphertext = make([]byte, len(encrypted)+2) 160 ckx.ciphertext[0] = byte(len(encrypted) >> 8) 161 ckx.ciphertext[1] = byte(len(encrypted)) 162 copy(ckx.ciphertext[2:], encrypted) 164 ckx.ciphertext = encrypted
|
/external/toybox/toys/lsb/ |
D | passwd.c | 102 char *name = NULL, *pass = NULL, *encrypted = NULL, *newp = NULL, in passwd_main() local 158 encrypted = crypt(newp, salt); in passwd_main() 164 encrypted = xmprintf("!%s",pass); in passwd_main() 169 encrypted = xstrdup(&pass[1]); in passwd_main() 172 encrypted = xstrdup(""); //1 = "", 2 = '\0' in passwd_main() 177 ret = update_password("/etc/shadow", name, encrypted); in passwd_main() 178 else ret = update_password("/etc/passwd", name, encrypted); in passwd_main() 180 if ((toys.optflags & (FLAG_l | FLAG_u | FLAG_d))) free(encrypted); in passwd_main()
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
D | AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent() 216 public Pair createPair(int clear, long encrypted) { in createPair() argument 217 return new Pair(clear, encrypted); in createPair() 223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { in Pair() argument 227 this.encrypted = encrypted; in Pair() 244 if (encrypted != pair.encrypted) { in equals() 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode() 260 return "clr:" + clear + " enc:" + encrypted; in toString()
|
/external/libvpx/libvpx/test/ |
D | vp8_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST() 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST() 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
|
D | vp9_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST() 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST() 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
|
/external/lzma/CPP/7zip/UI/Console/ |
D | ExtractCallbackConsole.cpp | 108 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted) in SetOperationResult() argument 125 (*OutStream) << (encrypted ? kCrcFailedEncrypted: kCrcFailed); in SetOperationResult() 128 (*OutStream) << (encrypted ? kDataErrorEncrypted : kDataError); in SetOperationResult() 168 …ULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted) in OpenResult() argument 176 (*OutStream) << (encrypted ? in OpenResult()
|
D | ExtractCallbackConsole.h | 39 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted); 42 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
|
/external/openssh/ |
D | PROTOCOL.key | 6 an encrypted list of matching private keys. 19 string encrypted, padded list of private keys 51 Before the key is encrypted, a random integer is assigned
|
D | sshkey.c | 3056 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local 3078 (encrypted = sshbuf_new()) == NULL) { in sshkey_private_to_blob2() 3122 if ((r = sshbuf_put_u32(encrypted, check)) != 0 || in sshkey_private_to_blob2() 3123 (r = sshbuf_put_u32(encrypted, check)) != 0) in sshkey_private_to_blob2() 3127 if ((r = sshkey_private_serialize(prv, encrypted)) != 0 || in sshkey_private_to_blob2() 3128 (r = sshbuf_put_cstring(encrypted, comment)) != 0) in sshkey_private_to_blob2() 3133 while (sshbuf_len(encrypted) % blocksize) { in sshkey_private_to_blob2() 3134 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0) in sshkey_private_to_blob2() 3139 if ((r = sshbuf_put_u32(encoded, sshbuf_len(encrypted))) != 0) in sshkey_private_to_blob2() 3144 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2() [all …]
|
/external/lzma/CPP/7zip/UI/Common/ |
D | IFileExtractCallback.h | 31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE; 37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/ |
D | CencSampleEncryptionInformationGroupEntry.java | 64 public void setEncrypted(int encrypted) { in setEncrypted() argument 65 isEncrypted = encrypted; in setEncrypted()
|
/external/mockftpserver/tags/2.x_Before_IDEA/src/main/groovy/org/mockftpserver/fake/user/ |
D | UserAccount.groovy | 26 * If you want to provide a custom comparison, for instance using encrypted passwords, you can 43 * custom comparison behavior, for instance using encrypted password values, by overriding this 67 * custom comparison behavior, for instance using encrypted password values, by overriding this
|
/external/ipsec-tools/src/racoon/ |
D | isakmp_inf.c | 138 int encrypted; local 142 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 146 if (encrypted) { 179 if (encrypted) { 294 msgid, encrypted); 299 msgid, encrypted); 330 isakmp_info_recv_n(iph1, notify, msgid, encrypted) in isakmp_info_recv_n() argument 334 int encrypted; 354 if (encrypted) 360 if (encrypted) [all …]
|
/external/toybox/lib/ |
D | pending.h | 6 int update_password(char *filename, char* username, char* encrypted);
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 323 payloads->encrypted = pdata; in ikev2_parse_payloads() 432 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument 444 if (encrypted == NULL) { in ikev2_decrypt_payload() 468 iv = encrypted; in ikev2_decrypt_payload() 470 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
|
D | ikev2_common.h | 310 const u8 *encrypted; member 322 const u8 *encrypted, size_t encrypted_len,
|
/external/sepolicy/ |
D | blkid.te | 5 # Allowed read-only access to encrypted devices to extract UUID/label
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 787 X509_SIG *encrypted = NULL; in PKCS12_handle_content_info() local 797 encrypted = d2i_X509_SIG(NULL, &inp, CBS_len(&wrapped_contents)); in PKCS12_handle_content_info() 798 if (encrypted == NULL) { in PKCS12_handle_content_info() 806 X509_SIG_free(encrypted); in PKCS12_handle_content_info() 810 pki = PKCS8_decrypt_pbe(encrypted, ctx->password, ctx->password_len); in PKCS12_handle_content_info() 811 X509_SIG_free(encrypted); in PKCS12_handle_content_info()
|
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/ |
D | ssvnc | 27 you have specified) to use that encrypted tunnel to connect to the VNC
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 448 const u8 *encrypted, in ikev2_process_sa_init_encr() argument 458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr() 495 if (pl->encrypted) { in ikev2_process_sa_init() 498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, in ikev2_process_sa_init() 722 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.h | 318 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
|
/external/ipsec-tools/src/racoon/doc/ |
D | README.plainrsa | 6 encrypted by a public key can be decrypted only by the corresponding 9 parties. Similarly, any data encrypted by the private key can be
|
/external/mdnsresponder/ |
D | PrivateDNS.txt | 6 for secure, encrypted, and authorized communications. Private data sent 7 from a client to a DNS server is encrypted using Transport Layer 77 encrypted TLS channel. To accommodate service providers who don't want
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | README | 146 VNC session password in encrypted in DES with KNOWN FIXED 195 encrypted, then the website can safely put oneTimeKey=... on the 219 encrypted, then the website can safely put serverCert=... on the
|