/external/boringssl/src/ssl/test/runner/ |
D | ticket.go | 174 encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size) 175 iv := encrypted[:aes.BlockSize] 176 macBytes := encrypted[len(encrypted)-sha256.Size:] 185 cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized) 188 mac.Write(encrypted[:len(encrypted)-sha256.Size]) 191 return encrypted, nil 194 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) { 195 if len(encrypted) < aes.BlockSize+sha256.Size { 199 iv := encrypted[:aes.BlockSize] 200 macBytes := encrypted[len(encrypted)-sha256.Size:] [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
D | test_pkcs1.py | 20 encrypted = pkcs1.encrypt(message, self.pub) 21 print("\tEncrypted: %r" % encrypted) 23 decrypted = pkcs1.decrypt(encrypted, self.priv) 31 encrypted = pkcs1.encrypt(message, self.pub) 34 a = encrypted[5] 37 encrypted = encrypted[:5] + byte(a + 1) + encrypted[6:] 39 self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
|
D | test_strings.py | 21 encrypted = rsa.encrypt(message, self.pub) 22 print("\tEncrypted: %s" % encrypted) 24 decrypted = rsa.decrypt(encrypted, self.priv)
|
D | test_integers.py | 17 encrypted = rsa.core.encrypt_int(message, self.pub.e, self.pub.n) 18 print("\tEncrypted: %d" % encrypted) 20 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n)
|
/external/toybox/toys/lsb/ |
D | passwd.c | 109 char *name = NULL, *pass = NULL, *encrypted = NULL, *newp = NULL, in passwd_main() local 164 encrypted = crypt(newp, salt); in passwd_main() 170 encrypted = xmprintf("!%s",pass); in passwd_main() 175 encrypted = xstrdup(&pass[1]); in passwd_main() 178 encrypted = xstrdup(""); //1 = "", 2 = '\0' in passwd_main() 183 ret = update_password("/etc/shadow", name, encrypted); in passwd_main() 184 else ret = update_password("/etc/passwd", name, encrypted); in passwd_main() 186 if ((toys.optflags & (FLAG_l | FLAG_u | FLAG_d))) free(encrypted); in passwd_main()
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
D | AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent() 216 public Pair createPair(int clear, long encrypted) { in createPair() argument 217 return new Pair(clear, encrypted); in createPair() 223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { in Pair() argument 227 this.encrypted = encrypted; in Pair() 244 if (encrypted != pair.encrypted) { in equals() 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode() 260 return "clr:" + clear + " enc:" + encrypted; in toString()
|
/external/libvpx/libvpx/test/ |
D | vp9_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST() 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST() 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
|
D | vp8_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST() 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST() 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
D | pkcs1.py | 169 encrypted = core.encrypt_int(payload, pub_key.e, pub_key.n) 170 block = transform.int2bytes(encrypted, keylength) 226 encrypted = transform.bytes2int(crypto) 227 decrypted = core.decrypt_int(encrypted, priv_key.d, priv_key.n) 274 encrypted = core.encrypt_int(payload, priv_key.d, priv_key.n) 275 block = transform.int2bytes(encrypted, keylength) 302 encrypted = transform.bytes2int(signature) 303 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ec2/ |
D | blockdevicemapping.py | 42 encrypted=None): argument 54 self.encrypted = encrypted 82 self.encrypted = (value == 'true') 159 if block_dev.encrypted is not None: 160 if block_dev.encrypted:
|
D | snapshot.py | 44 self.encrypted = None 70 self.encrypted = (value.lower() == 'true') 158 self.encrypted,
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
D | control | 7 PURPOSE = "Verify mount-encrypted operates as expected" 9 Fails if the mount-encrypted helper does not operated as expected 19 Ensures the mount-encrypted helper for mounting the encrypted statful
|
/external/autotest/server/site_tests/display_HDCPScreen/ |
D | display_HDCPScreen.py | 95 encrypted = chameleon_port.is_video_input_encrypted() 96 logging.info('Got Chameleon state: %r', encrypted) 97 if encrypted != expected_chameleon_state: 100 (expected_chameleon_state, encrypted)) 105 'enabled' if encrypted else 'disabled')
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/ec2/ |
D | test_blockdevicemapping.py | 46 self.assertEqual(self.block_device_type.encrypted, True) 50 self.assertEqual(self.block_device_type.encrypted, False) 68 b1.encrypted == b2.encrypted]) 109 … dev_sdg = BlockDeviceType(snapshot_id='snap-12346', delete_on_termination=True, encrypted=True)
|
/external/tcpdump/tests/ |
D | isakmp5-v.out | 36 10.0.0.1.500 > 10.0.0.2.500: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [encrypted id] 38 10.0.0.2.500 > 10.0.0.1.500: isakmp 1.0 msgid 00000000: phase 1 R ident[E]: [encrypted id] 40 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash] 42 …2.500 > 10.0.0.1.500: isakmp 1.0 msgid 0f2b7862: phase 2/others R oakley-quick[E]: [encrypted hash] 44 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash]
|
/external/lzma/CPP/7zip/UI/Common/ |
D | IFileExtractCallback.h | 32 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE; 38 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0; 64 STDMETHOD(SetOperationResult7)(Int32 resultEOperationResult, bool encrypted) x; \
|
/external/lzma/CPP/7zip/UI/Console/ |
D | ExtractCallbackConsole.cpp | 131 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted) in SetOperationResult() argument 149 s = (encrypted ? kCrcFailedEncrypted : kCrcFailed); in SetOperationResult() 152 s = (encrypted ? kDataErrorEncrypted : kDataError); in SetOperationResult() 215 …ULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted) in OpenResult() argument 223 (*OutStream) << (encrypted ? in OpenResult()
|
D | ExtractCallbackConsole.h | 43 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted); 46 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
|
/external/lzma/CPP/7zip/UI/GUI/ |
D | Extract.rc | 11 IDS_CANT_OPEN_ENCRYPTED_ARCHIVE "Can not open encrypted archive '{0}'. Wrong password?" 32 IDS_EXTRACT_MESSAGE_DATA_ERROR_ENCRYPTED "Data error in encrypted file '{0}'. Wrong password?" 33 IDS_EXTRACT_MESSAGE_CRC_ERROR_ENCRYPTED "CRC failed in encrypted file '{0}'. Wrong password?"
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
D | cli.rst | 22 | | the key length in order to be encrypted. | … 35 | pyrsa-encrypt-bigfile | Encrypts a file to an encrypted VARBLOCK file. | :py:func:`rsa.bigfile.… 40 | pyrsa-decrypt-bigfile | Decrypts an encrypted VARBLOCK file. | :py:func:`rsa.bigfile.…
|
D | usage.rst | 135 encrypted message. 157 Altering the encrypted information will *likely* cause a 253 the random key with RSA. You would send the encrypted file along with 254 the encrypted key to the recipient. The complete flow is: 266 #. Send the encrypted file together with ``encrypted_aes_key`` 267 #. The recipient now reverses this process to obtain the encrypted 285 then encrypted using RSA, and the encrypted blocks are assembled into 289 Decrypting works in reverse. The encrypted file is separated into 290 encrypted blocks. Those are decrypted, and assembled into the original 295 The file will get larger after encryption, as each encrypted block
|
/external/webrtc/webrtc/libjingle/xmpp/ |
D | plainsaslhandler.h | 31 … std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { in ChooseBestSaslMechanism() argument 33 if (!encrypted && !allow_plain_) { in ChooseBestSaslMechanism()
|
/external/lzma/CPP/7zip/UI/FileManager/ |
D | ExtractCallback.cpp | 211 STDMETHODIMP CExtractCallbackImp::SetOperationResult(Int32 opRes, bool encrypted) in SetOperationResult() argument 229 messageID = encrypted ? in SetOperationResult() 235 messageID = encrypted ? in SetOperationResult() 295 if (encrypted) in SetOperationResult() 360 HRESULT CExtractCallbackImp::OpenResult(const wchar_t *name, HRESULT result, bool encrypted) in OpenResult() argument 366 s = MyFormatNew(encrypted ? IDS_CANT_OPEN_ENCRYPTED_ARCHIVE : IDS_CANT_OPEN_ARCHIVE, name); in OpenResult() 786 STDMETHODIMP CExtractCallbackImp::SetOperationResult7(Int32 opRes, bool encrypted) in SetOperationResult7() argument 809 return SetOperationResult(opRes, encrypted); in SetOperationResult7()
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/ |
D | CencSampleEncryptionInformationGroupEntry.java | 64 public void setEncrypted(int encrypted) { in setEncrypted() argument 65 isEncrypted = encrypted; in setEncrypted()
|
/external/mockftpserver/tags/2.x_Before_IDEA/src/main/groovy/org/mockftpserver/fake/user/ |
D | UserAccount.groovy | 26 * If you want to provide a custom comparison, for instance using encrypted passwords, you can 43 * custom comparison behavior, for instance using encrypted password values, by overriding this 67 * custom comparison behavior, for instance using encrypted password values, by overriding this
|