Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 75) sorted by relevance

123

/external/boringssl/src/ssl/test/runner/
Dticket.go174 encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size)
175 iv := encrypted[:aes.BlockSize]
176 macBytes := encrypted[len(encrypted)-sha256.Size:]
185 cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized)
188 mac.Write(encrypted[:len(encrypted)-sha256.Size])
191 return encrypted, nil
194 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) {
195 if len(encrypted) < aes.BlockSize+sha256.Size {
199 iv := encrypted[:aes.BlockSize]
200 macBytes := encrypted[len(encrypted)-sha256.Size:]
[all …]
Dkey_agreement.go153encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), preMasterSec…
159 ckx.ciphertext = make([]byte, len(encrypted)+2)
160 ckx.ciphertext[0] = byte(len(encrypted) >> 8)
161 ckx.ciphertext[1] = byte(len(encrypted))
162 copy(ckx.ciphertext[2:], encrypted)
164 ckx.ciphertext = encrypted
/external/toybox/toys/lsb/
Dpasswd.c102 char *name = NULL, *pass = NULL, *encrypted = NULL, *newp = NULL, in passwd_main() local
158 encrypted = crypt(newp, salt); in passwd_main()
164 encrypted = xmprintf("!%s",pass); in passwd_main()
169 encrypted = xstrdup(&pass[1]); in passwd_main()
172 encrypted = xstrdup(""); //1 = "", 2 = '\0' in passwd_main()
177 ret = update_password("/etc/shadow", name, encrypted); in passwd_main()
178 else ret = update_password("/etc/passwd", name, encrypted); in passwd_main()
180 if ((toys.optflags & (FLAG_l | FLAG_u | FLAG_d))) free(encrypted); in passwd_main()
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
DAbstractSampleEncryptionBox.java165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent()
216 public Pair createPair(int clear, long encrypted) { in createPair() argument
217 return new Pair(clear, encrypted); in createPair()
223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair
225 public Pair(int clear, long encrypted) { in Pair() argument
227 this.encrypted = encrypted; in Pair()
244 if (encrypted != pair.encrypted) { in equals()
254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode()
260 return "clr:" + clear + " enc:" + encrypted; in toString()
/external/libvpx/libvpx/test/
Dvp8_decrypt_test.cc62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST()
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST()
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
Dvp9_decrypt_test.cc62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST()
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST()
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
/external/lzma/CPP/7zip/UI/Console/
DExtractCallbackConsole.cpp108 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted) in SetOperationResult() argument
125 (*OutStream) << (encrypted ? kCrcFailedEncrypted: kCrcFailed); in SetOperationResult()
128 (*OutStream) << (encrypted ? kDataErrorEncrypted : kDataError); in SetOperationResult()
168 …ULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted) in OpenResult() argument
176 (*OutStream) << (encrypted ? in OpenResult()
DExtractCallbackConsole.h39 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted);
42 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
/external/openssh/
DPROTOCOL.key6 an encrypted list of matching private keys.
19 string encrypted, padded list of private keys
51 Before the key is encrypted, a random integer is assigned
Dsshkey.c3056 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local
3078 (encrypted = sshbuf_new()) == NULL) { in sshkey_private_to_blob2()
3122 if ((r = sshbuf_put_u32(encrypted, check)) != 0 || in sshkey_private_to_blob2()
3123 (r = sshbuf_put_u32(encrypted, check)) != 0) in sshkey_private_to_blob2()
3127 if ((r = sshkey_private_serialize(prv, encrypted)) != 0 || in sshkey_private_to_blob2()
3128 (r = sshbuf_put_cstring(encrypted, comment)) != 0) in sshkey_private_to_blob2()
3133 while (sshbuf_len(encrypted) % blocksize) { in sshkey_private_to_blob2()
3134 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0) in sshkey_private_to_blob2()
3139 if ((r = sshbuf_put_u32(encoded, sshbuf_len(encrypted))) != 0) in sshkey_private_to_blob2()
3144 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2()
[all …]
/external/lzma/CPP/7zip/UI/Common/
DIFileExtractCallback.h31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/
DCencSampleEncryptionInformationGroupEntry.java64 public void setEncrypted(int encrypted) { in setEncrypted() argument
65 isEncrypted = encrypted; in setEncrypted()
/external/mockftpserver/tags/2.x_Before_IDEA/src/main/groovy/org/mockftpserver/fake/user/
DUserAccount.groovy26 * If you want to provide a custom comparison, for instance using encrypted passwords, you can
43 * custom comparison behavior, for instance using encrypted password values, by overriding this
67 * custom comparison behavior, for instance using encrypted password values, by overriding this
/external/ipsec-tools/src/racoon/
Disakmp_inf.c138 int encrypted; local
142 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
146 if (encrypted) {
179 if (encrypted) {
294 msgid, encrypted);
299 msgid, encrypted);
330 isakmp_info_recv_n(iph1, notify, msgid, encrypted) in isakmp_info_recv_n() argument
334 int encrypted;
354 if (encrypted)
360 if (encrypted)
[all …]
/external/toybox/lib/
Dpending.h6 int update_password(char *filename, char* username, char* encrypted);
/external/wpa_supplicant_8/src/eap_common/
Dikev2_common.c323 payloads->encrypted = pdata; in ikev2_parse_payloads()
432 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument
444 if (encrypted == NULL) { in ikev2_decrypt_payload()
468 iv = encrypted; in ikev2_decrypt_payload()
470 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
Dikev2_common.h310 const u8 *encrypted; member
322 const u8 *encrypted, size_t encrypted_len,
/external/sepolicy/
Dblkid.te5 # Allowed read-only access to encrypted devices to extract UUID/label
/external/boringssl/src/crypto/pkcs8/
Dpkcs8.c787 X509_SIG *encrypted = NULL; in PKCS12_handle_content_info() local
797 encrypted = d2i_X509_SIG(NULL, &inp, CBS_len(&wrapped_contents)); in PKCS12_handle_content_info()
798 if (encrypted == NULL) { in PKCS12_handle_content_info()
806 X509_SIG_free(encrypted); in PKCS12_handle_content_info()
810 pki = PKCS8_decrypt_pbe(encrypted, ctx->password, ctx->password_len); in PKCS12_handle_content_info()
811 X509_SIG_free(encrypted); in PKCS12_handle_content_info()
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/
Dssvnc27 you have specified) to use that encrypted tunnel to connect to the VNC
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c448 const u8 *encrypted, in ikev2_process_sa_init_encr() argument
458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr()
495 if (pl->encrypted) { in ikev2_process_sa_init()
498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, in ikev2_process_sa_init()
722 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth()
/external/wpa_supplicant_8/src/eap_peer/
Deap.h318 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
/external/ipsec-tools/src/racoon/doc/
DREADME.plainrsa6 encrypted by a public key can be decrypted only by the corresponding
9 parties. Similarly, any data encrypted by the private key can be
/external/mdnsresponder/
DPrivateDNS.txt6 for secure, encrypted, and authorized communications. Private data sent
7 from a client to a DNS server is encrypted using Transport Layer
77 encrypted TLS channel. To accommodate service providers who don't want
/external/libvncserver/webclients/java-applet/ssl/
DREADME146 VNC session password in encrypted in DES with KNOWN FIXED
195 encrypted, then the website can safely put oneTimeKey=... on the
219 encrypted, then the website can safely put serverCert=... on the

123