/third_party/mbedtls/tests/suites/ |
D | test_suite_pkparse.data | 77 Parse RSA Key #20 (PKCS#8 encrypted SHA1-3DES) 81 Parse RSA Key #20.1 (PKCS#8 encrypted SHA1-3DES, wrong PW) 85 Parse RSA Key #20.2 (PKCS#8 encrypted SHA1-3DES, no PW) 89 Parse RSA Key #21 (PKCS#8 encrypted SHA1-3DES, 2048-bit) 93 Parse RSA Key #21.1 (PKCS#8 encrypted SHA1-3DES, 2048-bit, wrong PW) 97 Parse RSA Key #21.2 (PKCS#8 encrypted SHA1-3DES, 2048-bit, no PW) 101 Parse RSA Key #22 (PKCS#8 encrypted SHA1-3DES, 4096-bit) 105 Parse RSA Key #22.1 (PKCS#8 encrypted SHA1-3DES, 4096-bit, wrong PW) 109 Parse RSA Key #22.2 (PKCS#8 encrypted SHA1-3DES, 4096-bit, no PW) 113 Parse RSA Key #23 (PKCS#8 encrypted SHA1-3DES DER) [all …]
|
/third_party/e2fsprogs/tests/f_badsymlinks2/ |
D | mkimage.sh | 40 local encrypted=${2:-false} 44 if $encrypted; then 78 if $encrypted; then 85 if $encrypted; then 102 mv $dir ${dir}~encrypted 104 mv ${dir}~encrypted/* $dir 115 create_encrypted_symlinks mnt/encrypted 124 rm -rf debugfs_commands mnt/*~encrypted
|
D | expect.1 | 24 Symlink /encrypted/empty (inode #25) is invalid. 27 Symlink /encrypted/fast_isize_too_large (inode #28) is invalid. 30 Symlink /encrypted/fast_isize_too_small (inode #27) is invalid. 33 Symlink /encrypted/one_too_long (inode #34) is invalid. 36 Symlink /encrypted/slow_isize_too_large (inode #32) is invalid. 39 Symlink /encrypted/slow_isize_too_small (inode #31) is invalid. 42 Symlink /encrypted/too_long (inode #35) is invalid.
|
/third_party/openssl/util/perl/TLSProxy/ |
D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
D | Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
/third_party/toybox/toys/lsb/ |
D | passwd.c | 60 char *pass, *name, *encrypted = 0, salt[MAX_SALT_LEN]; in passwd_main() local 78 encrypted = xmprintf("!%s", pass); in passwd_main() 82 encrypted = pass+1; in passwd_main() 85 encrypted = ""; in passwd_main() 104 encrypted = crypt(toybuf, salt); in passwd_main() 109 name, encrypted); in passwd_main() 114 if (CFG_TOYBOX_FREE && (toys.optflags & FLAG_l)) free(encrypted); in passwd_main()
|
/third_party/node/test/parallel/ |
D | test-crypto-padding-aes256.js | 50 let encrypted = encrypt(plaintext, false); variable 51 let decrypted = decrypt(encrypted, false); 58 encrypted = encrypt(plaintext, true); 59 decrypted = decrypt(encrypted, true);
|
D | test-tls-securepair-server.js | 50 assert.ok(pair.encrypted.writable); 53 pair.encrypted.pipe(socket); 54 socket.pipe(pair.encrypted); 80 pair.encrypted.on('error', function(err) {
|
D | test-crypto-private-decrypt-gh32240.js | 20 const encrypted = publicEncrypt(pair.publicKey, expected); constant 32 const decrypted = privateDecrypt(key, encrypted);
|
D | test-http2-create-client-secure-session.js | 23 assert(stream.session.encrypted); 52 assert(client.encrypted);
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_add.c | 113 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata() 114 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata() 115 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata() 116 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata() 135 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 138 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
|
/third_party/boost/libs/convert/test/ |
D | encryption.cpp | 35 std::string encrypted = boost::convert<std::string>("ABC", my_cypher).value(); in main() local 36 std::string decrypted = boost::convert<std::string>(encrypted, my_cypher).value(); in main() 38 BOOST_TEST(encrypted == "123"); in main()
|
/third_party/boost/libs/convert/doc/ |
D | other.qbk | 13 string encrypted = boost::convert<string>("ABC", my_cypher).value(); 14 string decrypted = boost::convert<string>(encrypted, my_cypher).value(); 16 BOOST_ASSERT(encrypted == "123"); 19 The original "ABC" string is "encrypted" as "123" first and then "123" is "decrypted" back to its o…
|
/third_party/node/test/sequential/ |
D | test-tls-securepair-client.js | 129 assert.ok(pair.encrypted.writable); 132 pair.encrypted.pipe(s); 133 s.pipe(pair.encrypted); 163 pair.encrypted.on('error', function(err) {
|
/third_party/openssl/doc/man3/ |
D | EVP_SealInit.pod | 23 encrypted using this key. 27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted 28 using one or more public keys, this allows the same encrypted data to be 30 buffers where the public key encrypted secret key will be written, each buffer 31 must contain enough room for the corresponding encrypted key: that is 33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
|
/third_party/python/Doc/library/ |
D | pwd.rst | 22 | 1 | ``pw_passwd`` | Optional encrypted password | 43 encrypted with a DES derived algorithm (see module :mod:`crypt`). However most 46 where the encrypted password is stored in a file :file:`/etc/shadow` which is 49 access to the encrypted password is required.
|
/third_party/mindspore/mindspore/lite/java/java/fl_client/src/main/java/com/mindspore/flclient/cipher/ |
D | AESEncrypt.java | 111 byte[] encrypted = cipher.doFinal(data); in encrypt() 112 byte[] encryptedAddIv = new byte[encrypted.length + iVec.length]; in encrypt() 114 System.arraycopy(encrypted, 0, encryptedAddIv, iVec.length, encrypted.length); in encrypt()
|
/third_party/ffmpeg/tests/fate/ |
D | mov.mak | 8 fate-mov-3elist-encrypted \ 9 fate-mov-frag-encrypted \ 10 fate-mov-tenc-only-encrypted \ 49 fate-mov-3elist-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TAR… 52 fate-mov-frag-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGE… 55 …-mov-tenc-only-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TAR…
|
D | lossless-audio.mak | 19 FATE_SAMPLES_LOSSLESS_AUDIO-$(call DEMDEC, TTA, TTA) += fate-lossless-tta-encrypted 20 fate-lossless-tta-encrypted: CMD = crc -password ffmpeg -i $(TARGET_SAMPLES)/lossless-audio/encrypt…
|
/third_party/node/benchmark/tls/ |
D | secure-pair.js | 87 conn.pipe(serverPair.encrypted); 88 serverPair.encrypted.pipe(conn);
|
/third_party/node/test/common/ |
D | tls.js | 125 const encrypted = Buffer.concat([encrypted1, bob.final()]); 128 length.writeUInt16BE(nonce.length + encrypted.length + tag.length, 0); 129 return Buffer.concat([type, version, length, nonce, encrypted, tag]);
|
/third_party/openssl/doc/man1/ |
D | pkcs8.pod | 72 option is not specified. If the key is encrypted a pass phrase will be 169 not used) then the input file must be in PKCS#8 format. An encrypted 180 file in a format specified by B<-inform>. The output file will be encrypted 193 The encrypted form of a PEM encode PKCS#8 files uses the following 204 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 205 counts are more secure that those encrypted using the traditional 209 It is possible to write out DER encoded encrypted private keys in 274 Convert a private key from any PKCS#8 encrypted format to traditional format:
|
/third_party/pulseaudio/src/modules/rtp/ |
D | rfc2974.txt | 93 an authentication header. The session description MAY be encrypted 262 encrypted). The session itself, as distinct from the session 354 the SAP packet is encrypted. If this bit is 0 the packet is not 355 encrypted. See section 7 for details of the encryption process. 359 payload is to be compressed and encrypted, the compression MUST be 412 the payload type and payload are encrypted and/or compressed. 463 is sent. If an announcement is encrypted, and many of the receivers 466 received. For this reason, the use of encrypted SAP announcements is 471 The opinion of the authors is that encrypted SAP is useful in special 472 cases only, and that the vast majority of scenarios where encrypted [all …]
|
/third_party/e2fsprogs/tests/f_encrypted_lpf/ |
D | name | 1 encrypted lost+found directory
|
/third_party/e2fsprogs/tests/f_short_encrypted_dirent/ |
D | name | 1 short encrypted directory entry
|