Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 180) sorted by relevance

12345678

/external/boringssl/src/ssl/test/runner/
Dticket.go162 encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size)
163 iv := encrypted[:aes.BlockSize]
164 macBytes := encrypted[len(encrypted)-sha256.Size:]
173 cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized)
176 mac.Write(encrypted[:len(encrypted)-sha256.Size])
179 return encrypted, nil
182 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) {
183 if len(encrypted) < aes.BlockSize+sha256.Size {
187 iv := encrypted[:aes.BlockSize]
188 macBytes := encrypted[len(encrypted)-sha256.Size:]
[all …]
/external/boringssl/src/third_party/wycheproof_testvectors/
Daes_cbc_pkcs5_test.txt209 # The ciphertext in this test vector is the message encrypted with an invalid or
220 # The ciphertext in this test vector is the message encrypted with an invalid or
231 # The ciphertext in this test vector is the message encrypted with an invalid or
242 # The ciphertext in this test vector is the message encrypted with an invalid or
253 # The ciphertext in this test vector is the message encrypted with an invalid or
264 # The ciphertext in this test vector is the message encrypted with an invalid or
275 # The ciphertext in this test vector is the message encrypted with an invalid or
286 # The ciphertext in this test vector is the message encrypted with an invalid or
297 # The ciphertext in this test vector is the message encrypted with an invalid or
308 # The ciphertext in this test vector is the message encrypted with an invalid or
[all …]
/external/e2fsprogs/tests/f_badsymlinks2/
Dmkimage.sh40 local encrypted=${2:-false}
44 if $encrypted; then
78 if $encrypted; then
85 if $encrypted; then
102 mv $dir ${dir}~encrypted
104 mv ${dir}~encrypted/* $dir
115 create_encrypted_symlinks mnt/encrypted
124 rm -rf debugfs_commands mnt/*~encrypted
Dexpect.124 Symlink /encrypted/empty (inode #25) is invalid.
27 Symlink /encrypted/fast_isize_too_large (inode #28) is invalid.
30 Symlink /encrypted/fast_isize_too_small (inode #27) is invalid.
33 Symlink /encrypted/one_too_long (inode #34) is invalid.
36 Symlink /encrypted/slow_isize_too_large (inode #32) is invalid.
39 Symlink /encrypted/slow_isize_too_small (inode #31) is invalid.
42 Symlink /encrypted/too_long (inode #35) is invalid.
/external/python/rsa/tests/
Dtest_pkcs1.py35 encrypted = pkcs1.encrypt(message, self.pub)
36 print("\tEncrypted: %r" % encrypted)
38 decrypted = pkcs1.decrypt(encrypted, self.priv)
45 encrypted = pkcs1.encrypt(message, self.pub)
48 a = encrypted[5]
52 encrypted = encrypted[:5] + byte(altered_a) + encrypted[6:]
54 self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
Dtest_strings.py36 encrypted = rsa.encrypt(message, self.pub)
37 print("\tEncrypted: %s" % encrypted)
39 decrypted = rsa.decrypt(encrypted, self.priv)
Dtest_integers.py33 encrypted = rsa.core.encrypt_int(message, self.pub.e, self.pub.n)
34 print("\tEncrypted: %d" % encrypted)
36 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n)
/external/boringssl/src/crypto/pkcs8/
Dpkcs8_test.cc204 bssl::UniquePtr<X509_SIG> encrypted(PKCS8_encrypt( in TestRoundTrip() local
206 ASSERT_TRUE(encrypted); in TestRoundTrip()
209 PKCS8_decrypt(encrypted.get(), password, -1)); in TestRoundTrip()
303 bssl::UniquePtr<X509_SIG> encrypted(PKCS8_encrypt( in TEST() local
305 EXPECT_FALSE(encrypted); in TEST()
307 encrypted.reset(PKCS8_encrypt(NID_undef, nullptr, "password", -1, nullptr, 0, in TEST()
309 EXPECT_FALSE(encrypted); in TEST()
311 encrypted.reset(PKCS8_encrypt(NID_rsaEncryption, nullptr, "password", -1, in TEST()
313 EXPECT_FALSE(encrypted); in TEST()
/external/toybox/toys/lsb/
Dpasswd.c60 char *pass, *name, *encrypted = 0, salt[MAX_SALT_LEN]; in passwd_main() local
78 encrypted = xmprintf("!%s", pass); in passwd_main()
82 encrypted = pass+1; in passwd_main()
85 encrypted = ""; in passwd_main()
104 encrypted = crypt(toybuf, salt); in passwd_main()
109 name, encrypted); in passwd_main()
114 if (CFG_TOYBOX_FREE && (toys.optflags & FLAG_l)) free(encrypted); in passwd_main()
/external/python/rsa/rsa/
Dpkcs1.py175 encrypted = core.encrypt_int(payload, pub_key.e, pub_key.n)
176 block = transform.int2bytes(encrypted, keylength)
233 encrypted = transform.bytes2int(crypto)
234 decrypted = priv_key.blinded_decrypt(encrypted)
278 encrypted = priv_key.blinded_encrypt(payload)
279 block = transform.int2bytes(encrypted, keylength)
322 encrypted = transform.bytes2int(signature)
323 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n)
353 encrypted = transform.bytes2int(signature)
354 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n)
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
DAbstractSampleEncryptionBox.java165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent()
216 public Pair createPair(int clear, long encrypted) { in createPair() argument
217 return new Pair(clear, encrypted); in createPair()
223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair
225 public Pair(int clear, long encrypted) { in Pair() argument
227 this.encrypted = encrypted; in Pair()
244 if (encrypted != pair.encrypted) { in equals()
254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode()
260 return "clr:" + clear + " enc:" + encrypted; in toString()
/external/libvpx/libvpx/test/
Dvp9_decrypt_test.cc60 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local
61 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST()
62 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST()
65 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
Dvp8_decrypt_test.cc60 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local
61 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST()
62 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST()
65 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
/external/autotest/client/site_tests/platform_EncryptedStateful/
Dcontrol7 PURPOSE = "Verify mount-encrypted operates as expected"
9 Fails if the mount-encrypted helper does not operated as expected
18 Ensures the mount-encrypted helper for mounting the encrypted statful
/external/autotest/server/site_tests/display_HDCPScreen/
Ddisplay_HDCPScreen.py95 encrypted = chameleon_port.is_video_input_encrypted()
96 logging.info('Got Chameleon state: %r', encrypted)
97 if encrypted != expected_chameleon_state:
100 (expected_chameleon_state, encrypted))
105 'enabled' if encrypted else 'disabled')
/external/tcpdump/tests/
Disakmp5-v.out36 10.0.0.1.500 > 10.0.0.2.500: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [encrypted id]
38 10.0.0.2.500 > 10.0.0.1.500: isakmp 1.0 msgid 00000000: phase 1 R ident[E]: [encrypted id]
40 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash]
42 …2.500 > 10.0.0.1.500: isakmp 1.0 msgid 0f2b7862: phase 2/others R oakley-quick[E]: [encrypted hash]
44 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash]
/external/python/cpython2/Doc/library/
Dpwd.rst22 | 1 | ``pw_passwd`` | Optional encrypted password |
43 encrypted with a DES derived algorithm (see module :mod:`crypt`). However most
46 where the encrypted password is stored in a file :file:`/etc/shadow` which is
49 access to the encrypted password is required.
/external/python/cpython3/Doc/library/
Dpwd.rst22 | 1 | ``pw_passwd`` | Optional encrypted password |
43 encrypted with a DES derived algorithm (see module :mod:`crypt`). However most
46 where the encrypted password is stored in a file :file:`/etc/shadow` which is
49 access to the encrypted password is required.
/external/lzma/CPP/7zip/UI/Common/
DIFileExtractCallback.h52 STDMETHOD(SetOperationResult)(Int32 opRes, Int32 encrypted) x; \
60 STDMETHOD(ReportExtractResult)(Int32 opRes, Int32 encrypted, const wchar_t *name) x; \
106 STDMETHOD(SetOperationResult7)(Int32 resultEOperationResult, Int32 encrypted) x; \
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/
DCipherTest.java2561 byte[] encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2563 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2566 encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2568 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2590 byte[] encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2592 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2596 encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2598 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2625 byte[] encrypted = c.doFinal(RSA_2048_Vector1, i, RSA_2048_Vector1.length - i); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success()
2627 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success()
[all …]
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/crypto/
DCipherTest.java2563 byte[] encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2565 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2568 encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2570 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success()
2592 byte[] encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2594 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2598 encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2600 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success()
2627 byte[] encrypted = c.doFinal(RSA_2048_Vector1, i, RSA_2048_Vector1.length - i); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success()
2629 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success()
[all …]
/external/u-boot/doc/
DREADME.mxc_hab4 To enable the authenticated or encrypted boot mode of U-Boot, it is
105 Encrypted Boot. The image is encrypted by i.MX Code Signing
107 u-boot-dtb.imx with the encrypted data. The Initial Vector Table,
110 The image data is encrypted with a Encryption Key (DEK).
123 Note: The encrypted boot feature is only supported by HABv4 or
132 The resulting DEK blob then is used to construct the encrypted
140 cat u-boot-signed-pad.imx DEK_blob.bin > u-boot-encrypted.imx
/external/lzma/CPP/7zip/UI/GUI/
DExtract.rc11 IDS_CANT_OPEN_ENCRYPTED_ARCHIVE "Can not open encrypted archive '{0}'. Wrong password?"
38 IDS_EXTRACT_MESSAGE_DATA_ERROR_ENCRYPTED "Data error in encrypted file '{0}'. Wrong password?"
39 IDS_EXTRACT_MESSAGE_CRC_ERROR_ENCRYPTED "CRC failed in encrypted file '{0}'. Wrong password?"
/external/openssh/
DPROTOCOL.key6 an encrypted list of matching private keys.
19 string encrypted, padded list of private keys
51 Before the key is encrypted, a random integer is assigned
/external/libese/tools/ese_ls_provision/
DREADME.md7 PN80T and later secure elements include a "loader service" which runs signed, encrypted scripts to
11 the certificate for the signing key. This tool takes those signed, encrypted scripts and sends
23 - `<script>` is the compiled, encrypted, signed scrypt as generated by `ls-cgt.jar`.

12345678