Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 114) sorted by relevance

12345

/external/boringssl/src/ssl/test/runner/
Dticket.go174 encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size)
175 iv := encrypted[:aes.BlockSize]
176 macBytes := encrypted[len(encrypted)-sha256.Size:]
185 cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized)
188 mac.Write(encrypted[:len(encrypted)-sha256.Size])
191 return encrypted, nil
194 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) {
195 if len(encrypted) < aes.BlockSize+sha256.Size {
199 iv := encrypted[:aes.BlockSize]
200 macBytes := encrypted[len(encrypted)-sha256.Size:]
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
Dtest_pkcs1.py20 encrypted = pkcs1.encrypt(message, self.pub)
21 print("\tEncrypted: %r" % encrypted)
23 decrypted = pkcs1.decrypt(encrypted, self.priv)
31 encrypted = pkcs1.encrypt(message, self.pub)
34 a = encrypted[5]
37 encrypted = encrypted[:5] + byte(a + 1) + encrypted[6:]
39 self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
Dtest_strings.py21 encrypted = rsa.encrypt(message, self.pub)
22 print("\tEncrypted: %s" % encrypted)
24 decrypted = rsa.decrypt(encrypted, self.priv)
Dtest_integers.py17 encrypted = rsa.core.encrypt_int(message, self.pub.e, self.pub.n)
18 print("\tEncrypted: %d" % encrypted)
20 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n)
/external/toybox/toys/lsb/
Dpasswd.c109 char *name = NULL, *pass = NULL, *encrypted = NULL, *newp = NULL, in passwd_main() local
164 encrypted = crypt(newp, salt); in passwd_main()
170 encrypted = xmprintf("!%s",pass); in passwd_main()
175 encrypted = xstrdup(&pass[1]); in passwd_main()
178 encrypted = xstrdup(""); //1 = "", 2 = '\0' in passwd_main()
183 ret = update_password("/etc/shadow", name, encrypted); in passwd_main()
184 else ret = update_password("/etc/passwd", name, encrypted); in passwd_main()
186 if ((toys.optflags & (FLAG_l | FLAG_u | FLAG_d))) free(encrypted); in passwd_main()
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
DAbstractSampleEncryptionBox.java165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent()
216 public Pair createPair(int clear, long encrypted) { in createPair() argument
217 return new Pair(clear, encrypted); in createPair()
223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair
225 public Pair(int clear, long encrypted) { in Pair() argument
227 this.encrypted = encrypted; in Pair()
244 if (encrypted != pair.encrypted) { in equals()
254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode()
260 return "clr:" + clear + " enc:" + encrypted; in toString()
/external/libvpx/libvpx/test/
Dvp9_decrypt_test.cc62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST()
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST()
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
Dvp8_decrypt_test.cc62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST()
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST()
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
Dpkcs1.py169 encrypted = core.encrypt_int(payload, pub_key.e, pub_key.n)
170 block = transform.int2bytes(encrypted, keylength)
226 encrypted = transform.bytes2int(crypto)
227 decrypted = core.decrypt_int(encrypted, priv_key.d, priv_key.n)
274 encrypted = core.encrypt_int(payload, priv_key.d, priv_key.n)
275 block = transform.int2bytes(encrypted, keylength)
302 encrypted = transform.bytes2int(signature)
303 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n)
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ec2/
Dblockdevicemapping.py42 encrypted=None): argument
54 self.encrypted = encrypted
82 self.encrypted = (value == 'true')
159 if block_dev.encrypted is not None:
160 if block_dev.encrypted:
Dsnapshot.py44 self.encrypted = None
70 self.encrypted = (value.lower() == 'true')
158 self.encrypted,
/external/autotest/client/site_tests/platform_EncryptedStateful/
Dcontrol7 PURPOSE = "Verify mount-encrypted operates as expected"
9 Fails if the mount-encrypted helper does not operated as expected
19 Ensures the mount-encrypted helper for mounting the encrypted statful
/external/autotest/server/site_tests/display_HDCPScreen/
Ddisplay_HDCPScreen.py95 encrypted = chameleon_port.is_video_input_encrypted()
96 logging.info('Got Chameleon state: %r', encrypted)
97 if encrypted != expected_chameleon_state:
100 (expected_chameleon_state, encrypted))
105 'enabled' if encrypted else 'disabled')
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/ec2/
Dtest_blockdevicemapping.py46 self.assertEqual(self.block_device_type.encrypted, True)
50 self.assertEqual(self.block_device_type.encrypted, False)
68 b1.encrypted == b2.encrypted])
109 … dev_sdg = BlockDeviceType(snapshot_id='snap-12346', delete_on_termination=True, encrypted=True)
/external/tcpdump/tests/
Disakmp5-v.out36 10.0.0.1.500 > 10.0.0.2.500: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [encrypted id]
38 10.0.0.2.500 > 10.0.0.1.500: isakmp 1.0 msgid 00000000: phase 1 R ident[E]: [encrypted id]
40 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash]
42 …2.500 > 10.0.0.1.500: isakmp 1.0 msgid 0f2b7862: phase 2/others R oakley-quick[E]: [encrypted hash]
44 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash]
/external/lzma/CPP/7zip/UI/Common/
DIFileExtractCallback.h32 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
38 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
64 STDMETHOD(SetOperationResult7)(Int32 resultEOperationResult, bool encrypted) x; \
/external/lzma/CPP/7zip/UI/Console/
DExtractCallbackConsole.cpp131 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted) in SetOperationResult() argument
149 s = (encrypted ? kCrcFailedEncrypted : kCrcFailed); in SetOperationResult()
152 s = (encrypted ? kDataErrorEncrypted : kDataError); in SetOperationResult()
215 …ULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted) in OpenResult() argument
223 (*OutStream) << (encrypted ? in OpenResult()
DExtractCallbackConsole.h43 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted);
46 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
/external/lzma/CPP/7zip/UI/GUI/
DExtract.rc11 IDS_CANT_OPEN_ENCRYPTED_ARCHIVE "Can not open encrypted archive '{0}'. Wrong password?"
32 IDS_EXTRACT_MESSAGE_DATA_ERROR_ENCRYPTED "Data error in encrypted file '{0}'. Wrong password?"
33 IDS_EXTRACT_MESSAGE_CRC_ERROR_ENCRYPTED "CRC failed in encrypted file '{0}'. Wrong password?"
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
Dcli.rst22 | | the key length in order to be encrypted. | …
35 | pyrsa-encrypt-bigfile | Encrypts a file to an encrypted VARBLOCK file. | :py:func:`rsa.bigfile.…
40 | pyrsa-decrypt-bigfile | Decrypts an encrypted VARBLOCK file. | :py:func:`rsa.bigfile.…
Dusage.rst135 encrypted message.
157 Altering the encrypted information will *likely* cause a
253 the random key with RSA. You would send the encrypted file along with
254 the encrypted key to the recipient. The complete flow is:
266 #. Send the encrypted file together with ``encrypted_aes_key``
267 #. The recipient now reverses this process to obtain the encrypted
285 then encrypted using RSA, and the encrypted blocks are assembled into
289 Decrypting works in reverse. The encrypted file is separated into
290 encrypted blocks. Those are decrypted, and assembled into the original
295 The file will get larger after encryption, as each encrypted block
/external/webrtc/webrtc/libjingle/xmpp/
Dplainsaslhandler.h31 … std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { in ChooseBestSaslMechanism() argument
33 if (!encrypted && !allow_plain_) { in ChooseBestSaslMechanism()
/external/lzma/CPP/7zip/UI/FileManager/
DExtractCallback.cpp211 STDMETHODIMP CExtractCallbackImp::SetOperationResult(Int32 opRes, bool encrypted) in SetOperationResult() argument
229 messageID = encrypted ? in SetOperationResult()
235 messageID = encrypted ? in SetOperationResult()
295 if (encrypted) in SetOperationResult()
360 HRESULT CExtractCallbackImp::OpenResult(const wchar_t *name, HRESULT result, bool encrypted) in OpenResult() argument
366 s = MyFormatNew(encrypted ? IDS_CANT_OPEN_ENCRYPTED_ARCHIVE : IDS_CANT_OPEN_ARCHIVE, name); in OpenResult()
786 STDMETHODIMP CExtractCallbackImp::SetOperationResult7(Int32 opRes, bool encrypted) in SetOperationResult7() argument
809 return SetOperationResult(opRes, encrypted); in SetOperationResult7()
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/
DCencSampleEncryptionInformationGroupEntry.java64 public void setEncrypted(int encrypted) { in setEncrypted() argument
65 isEncrypted = encrypted; in setEncrypted()
/external/mockftpserver/tags/2.x_Before_IDEA/src/main/groovy/org/mockftpserver/fake/user/
DUserAccount.groovy26 * If you want to provide a custom comparison, for instance using encrypted passwords, you can
43 * custom comparison behavior, for instance using encrypted password values, by overriding this
67 * custom comparison behavior, for instance using encrypted password values, by overriding this

12345