Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 387) sorted by relevance

12345678910>>...16

/third_party/mbedtls/tests/suites/
Dtest_suite_pkparse.data77 Parse RSA Key #20 (PKCS#8 encrypted SHA1-3DES)
81 Parse RSA Key #20.1 (PKCS#8 encrypted SHA1-3DES, wrong PW)
85 Parse RSA Key #20.2 (PKCS#8 encrypted SHA1-3DES, no PW)
89 Parse RSA Key #21 (PKCS#8 encrypted SHA1-3DES, 2048-bit)
93 Parse RSA Key #21.1 (PKCS#8 encrypted SHA1-3DES, 2048-bit, wrong PW)
97 Parse RSA Key #21.2 (PKCS#8 encrypted SHA1-3DES, 2048-bit, no PW)
101 Parse RSA Key #22 (PKCS#8 encrypted SHA1-3DES, 4096-bit)
105 Parse RSA Key #22.1 (PKCS#8 encrypted SHA1-3DES, 4096-bit, wrong PW)
109 Parse RSA Key #22.2 (PKCS#8 encrypted SHA1-3DES, 4096-bit, no PW)
113 Parse RSA Key #23 (PKCS#8 encrypted SHA1-3DES DER)
[all …]
/third_party/e2fsprogs/tests/f_badsymlinks2/
Dmkimage.sh40 local encrypted=${2:-false}
44 if $encrypted; then
78 if $encrypted; then
85 if $encrypted; then
102 mv $dir ${dir}~encrypted
104 mv ${dir}~encrypted/* $dir
115 create_encrypted_symlinks mnt/encrypted
124 rm -rf debugfs_commands mnt/*~encrypted
Dexpect.124 Symlink /encrypted/empty (inode #25) is invalid.
27 Symlink /encrypted/fast_isize_too_large (inode #28) is invalid.
30 Symlink /encrypted/fast_isize_too_small (inode #27) is invalid.
33 Symlink /encrypted/one_too_long (inode #34) is invalid.
36 Symlink /encrypted/slow_isize_too_large (inode #32) is invalid.
39 Symlink /encrypted/slow_isize_too_small (inode #31) is invalid.
42 Symlink /encrypted/too_long (inode #35) is invalid.
/third_party/openssl/util/perl/TLSProxy/
DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
DRecord.pm109 $record->encrypted(1);
189 encrypted => 0,
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
/third_party/toybox/toys/lsb/
Dpasswd.c60 char *pass, *name, *encrypted = 0, salt[MAX_SALT_LEN]; in passwd_main() local
78 encrypted = xmprintf("!%s", pass); in passwd_main()
82 encrypted = pass+1; in passwd_main()
85 encrypted = ""; in passwd_main()
104 encrypted = crypt(toybuf, salt); in passwd_main()
109 name, encrypted); in passwd_main()
114 if (CFG_TOYBOX_FREE && (toys.optflags & FLAG_l)) free(encrypted); in passwd_main()
/third_party/node/test/parallel/
Dtest-crypto-padding-aes256.js50 let encrypted = encrypt(plaintext, false); variable
51 let decrypted = decrypt(encrypted, false);
58 encrypted = encrypt(plaintext, true);
59 decrypted = decrypt(encrypted, true);
Dtest-tls-securepair-server.js50 assert.ok(pair.encrypted.writable);
53 pair.encrypted.pipe(socket);
54 socket.pipe(pair.encrypted);
80 pair.encrypted.on('error', function(err) {
Dtest-crypto-private-decrypt-gh32240.js20 const encrypted = publicEncrypt(pair.publicKey, expected); constant
32 const decrypted = privateDecrypt(key, encrypted);
Dtest-http2-create-client-secure-session.js23 assert(stream.session.encrypted);
52 assert(client.encrypted);
/third_party/openssl/crypto/pkcs12/
Dp12_add.c113 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata()
114 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata()
115 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata()
116 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata()
135 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
138 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
/third_party/boost/libs/convert/test/
Dencryption.cpp35 std::string encrypted = boost::convert<std::string>("ABC", my_cypher).value(); in main() local
36 std::string decrypted = boost::convert<std::string>(encrypted, my_cypher).value(); in main()
38 BOOST_TEST(encrypted == "123"); in main()
/third_party/boost/libs/convert/doc/
Dother.qbk13 string encrypted = boost::convert<string>("ABC", my_cypher).value();
14 string decrypted = boost::convert<string>(encrypted, my_cypher).value();
16 BOOST_ASSERT(encrypted == "123");
19 The original "ABC" string is "encrypted" as "123" first and then "123" is "decrypted" back to its o…
/third_party/node/test/sequential/
Dtest-tls-securepair-client.js129 assert.ok(pair.encrypted.writable);
132 pair.encrypted.pipe(s);
133 s.pipe(pair.encrypted);
163 pair.encrypted.on('error', function(err) {
/third_party/openssl/doc/man3/
DEVP_SealInit.pod23 encrypted using this key.
27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted
28 using one or more public keys, this allows the same encrypted data to be
30 buffers where the public key encrypted secret key will be written, each buffer
31 must contain enough room for the corresponding encrypted key: that is
33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
/third_party/python/Doc/library/
Dpwd.rst22 | 1 | ``pw_passwd`` | Optional encrypted password |
43 encrypted with a DES derived algorithm (see module :mod:`crypt`). However most
46 where the encrypted password is stored in a file :file:`/etc/shadow` which is
49 access to the encrypted password is required.
/third_party/mindspore/mindspore/lite/java/java/fl_client/src/main/java/com/mindspore/flclient/cipher/
DAESEncrypt.java111 byte[] encrypted = cipher.doFinal(data); in encrypt()
112 byte[] encryptedAddIv = new byte[encrypted.length + iVec.length]; in encrypt()
114 System.arraycopy(encrypted, 0, encryptedAddIv, iVec.length, encrypted.length); in encrypt()
/third_party/ffmpeg/tests/fate/
Dmov.mak8 fate-mov-3elist-encrypted \
9 fate-mov-frag-encrypted \
10 fate-mov-tenc-only-encrypted \
49 fate-mov-3elist-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TAR…
52 fate-mov-frag-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGE…
55 …-mov-tenc-only-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TAR…
Dlossless-audio.mak19 FATE_SAMPLES_LOSSLESS_AUDIO-$(call DEMDEC, TTA, TTA) += fate-lossless-tta-encrypted
20 fate-lossless-tta-encrypted: CMD = crc -password ffmpeg -i $(TARGET_SAMPLES)/lossless-audio/encrypt…
/third_party/node/benchmark/tls/
Dsecure-pair.js87 conn.pipe(serverPair.encrypted);
88 serverPair.encrypted.pipe(conn);
/third_party/node/test/common/
Dtls.js125 const encrypted = Buffer.concat([encrypted1, bob.final()]);
128 length.writeUInt16BE(nonce.length + encrypted.length + tag.length, 0);
129 return Buffer.concat([type, version, length, nonce, encrypted, tag]);
/third_party/openssl/doc/man1/
Dpkcs8.pod72 option is not specified. If the key is encrypted a pass phrase will be
169 not used) then the input file must be in PKCS#8 format. An encrypted
180 file in a format specified by B<-inform>. The output file will be encrypted
193 The encrypted form of a PEM encode PKCS#8 files uses the following
204 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
205 counts are more secure that those encrypted using the traditional
209 It is possible to write out DER encoded encrypted private keys in
274 Convert a private key from any PKCS#8 encrypted format to traditional format:
/third_party/pulseaudio/src/modules/rtp/
Drfc2974.txt93 an authentication header. The session description MAY be encrypted
262 encrypted). The session itself, as distinct from the session
354 the SAP packet is encrypted. If this bit is 0 the packet is not
355 encrypted. See section 7 for details of the encryption process.
359 payload is to be compressed and encrypted, the compression MUST be
412 the payload type and payload are encrypted and/or compressed.
463 is sent. If an announcement is encrypted, and many of the receivers
466 received. For this reason, the use of encrypted SAP announcements is
471 The opinion of the authors is that encrypted SAP is useful in special
472 cases only, and that the vast majority of scenarios where encrypted
[all …]
/third_party/e2fsprogs/tests/f_encrypted_lpf/
Dname1 encrypted lost+found directory
/third_party/e2fsprogs/tests/f_short_encrypted_dirent/
Dname1 short encrypted directory entry

12345678910>>...16