/external/boringssl/src/ssl/test/runner/ |
D | ticket.go | 162 encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size) 163 iv := encrypted[:aes.BlockSize] 164 macBytes := encrypted[len(encrypted)-sha256.Size:] 173 cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized) 176 mac.Write(encrypted[:len(encrypted)-sha256.Size]) 179 return encrypted, nil 182 func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) { 183 if len(encrypted) < aes.BlockSize+sha256.Size { 187 iv := encrypted[:aes.BlockSize] 188 macBytes := encrypted[len(encrypted)-sha256.Size:] [all …]
|
/external/boringssl/src/third_party/wycheproof_testvectors/ |
D | aes_cbc_pkcs5_test.txt | 209 # The ciphertext in this test vector is the message encrypted with an invalid or 220 # The ciphertext in this test vector is the message encrypted with an invalid or 231 # The ciphertext in this test vector is the message encrypted with an invalid or 242 # The ciphertext in this test vector is the message encrypted with an invalid or 253 # The ciphertext in this test vector is the message encrypted with an invalid or 264 # The ciphertext in this test vector is the message encrypted with an invalid or 275 # The ciphertext in this test vector is the message encrypted with an invalid or 286 # The ciphertext in this test vector is the message encrypted with an invalid or 297 # The ciphertext in this test vector is the message encrypted with an invalid or 308 # The ciphertext in this test vector is the message encrypted with an invalid or [all …]
|
/external/e2fsprogs/tests/f_badsymlinks2/ |
D | mkimage.sh | 40 local encrypted=${2:-false} 44 if $encrypted; then 78 if $encrypted; then 85 if $encrypted; then 102 mv $dir ${dir}~encrypted 104 mv ${dir}~encrypted/* $dir 115 create_encrypted_symlinks mnt/encrypted 124 rm -rf debugfs_commands mnt/*~encrypted
|
D | expect.1 | 24 Symlink /encrypted/empty (inode #25) is invalid. 27 Symlink /encrypted/fast_isize_too_large (inode #28) is invalid. 30 Symlink /encrypted/fast_isize_too_small (inode #27) is invalid. 33 Symlink /encrypted/one_too_long (inode #34) is invalid. 36 Symlink /encrypted/slow_isize_too_large (inode #32) is invalid. 39 Symlink /encrypted/slow_isize_too_small (inode #31) is invalid. 42 Symlink /encrypted/too_long (inode #35) is invalid.
|
/external/python/rsa/tests/ |
D | test_pkcs1.py | 35 encrypted = pkcs1.encrypt(message, self.pub) 36 print("\tEncrypted: %r" % encrypted) 38 decrypted = pkcs1.decrypt(encrypted, self.priv) 45 encrypted = pkcs1.encrypt(message, self.pub) 48 a = encrypted[5] 52 encrypted = encrypted[:5] + byte(altered_a) + encrypted[6:] 54 self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
|
D | test_strings.py | 36 encrypted = rsa.encrypt(message, self.pub) 37 print("\tEncrypted: %s" % encrypted) 39 decrypted = rsa.decrypt(encrypted, self.priv)
|
D | test_integers.py | 33 encrypted = rsa.core.encrypt_int(message, self.pub.e, self.pub.n) 34 print("\tEncrypted: %d" % encrypted) 36 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n)
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_test.cc | 204 bssl::UniquePtr<X509_SIG> encrypted(PKCS8_encrypt( in TestRoundTrip() local 206 ASSERT_TRUE(encrypted); in TestRoundTrip() 209 PKCS8_decrypt(encrypted.get(), password, -1)); in TestRoundTrip() 303 bssl::UniquePtr<X509_SIG> encrypted(PKCS8_encrypt( in TEST() local 305 EXPECT_FALSE(encrypted); in TEST() 307 encrypted.reset(PKCS8_encrypt(NID_undef, nullptr, "password", -1, nullptr, 0, in TEST() 309 EXPECT_FALSE(encrypted); in TEST() 311 encrypted.reset(PKCS8_encrypt(NID_rsaEncryption, nullptr, "password", -1, in TEST() 313 EXPECT_FALSE(encrypted); in TEST()
|
/external/toybox/toys/lsb/ |
D | passwd.c | 60 char *pass, *name, *encrypted = 0, salt[MAX_SALT_LEN]; in passwd_main() local 78 encrypted = xmprintf("!%s", pass); in passwd_main() 82 encrypted = pass+1; in passwd_main() 85 encrypted = ""; in passwd_main() 104 encrypted = crypt(toybuf, salt); in passwd_main() 109 name, encrypted); in passwd_main() 114 if (CFG_TOYBOX_FREE && (toys.optflags & FLAG_l)) free(encrypted); in passwd_main()
|
/external/python/rsa/rsa/ |
D | pkcs1.py | 175 encrypted = core.encrypt_int(payload, pub_key.e, pub_key.n) 176 block = transform.int2bytes(encrypted, keylength) 233 encrypted = transform.bytes2int(crypto) 234 decrypted = priv_key.blinded_decrypt(encrypted) 278 encrypted = priv_key.blinded_encrypt(payload) 279 block = transform.int2bytes(encrypted, keylength) 322 encrypted = transform.bytes2int(signature) 323 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n) 353 encrypted = transform.bytes2int(signature) 354 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n)
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
D | AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent() 216 public Pair createPair(int clear, long encrypted) { in createPair() argument 217 return new Pair(clear, encrypted); in createPair() 223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { in Pair() argument 227 this.encrypted = encrypted; in Pair() 244 if (encrypted != pair.encrypted) { in equals() 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode() 260 return "clr:" + clear + " enc:" + encrypted; in toString()
|
/external/libvpx/libvpx/test/ |
D | vp9_decrypt_test.cc | 60 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local 61 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST() 62 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST() 65 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
|
D | vp8_decrypt_test.cc | 60 std::vector<uint8_t> encrypted(video.frame_size()); in TEST() local 61 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); in TEST() 62 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; in TEST() 65 res = decoder.DecodeFrame(&encrypted[0], encrypted.size()); in TEST()
|
/external/autotest/client/site_tests/platform_EncryptedStateful/ |
D | control | 7 PURPOSE = "Verify mount-encrypted operates as expected" 9 Fails if the mount-encrypted helper does not operated as expected 18 Ensures the mount-encrypted helper for mounting the encrypted statful
|
/external/autotest/server/site_tests/display_HDCPScreen/ |
D | display_HDCPScreen.py | 95 encrypted = chameleon_port.is_video_input_encrypted() 96 logging.info('Got Chameleon state: %r', encrypted) 97 if encrypted != expected_chameleon_state: 100 (expected_chameleon_state, encrypted)) 105 'enabled' if encrypted else 'disabled')
|
/external/tcpdump/tests/ |
D | isakmp5-v.out | 36 10.0.0.1.500 > 10.0.0.2.500: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [encrypted id] 38 10.0.0.2.500 > 10.0.0.1.500: isakmp 1.0 msgid 00000000: phase 1 R ident[E]: [encrypted id] 40 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash] 42 …2.500 > 10.0.0.1.500: isakmp 1.0 msgid 0f2b7862: phase 2/others R oakley-quick[E]: [encrypted hash] 44 …1.500 > 10.0.0.2.500: isakmp 1.0 msgid 0f2b7862: phase 2/others I oakley-quick[E]: [encrypted hash]
|
/external/python/cpython2/Doc/library/ |
D | pwd.rst | 22 | 1 | ``pw_passwd`` | Optional encrypted password | 43 encrypted with a DES derived algorithm (see module :mod:`crypt`). However most 46 where the encrypted password is stored in a file :file:`/etc/shadow` which is 49 access to the encrypted password is required.
|
/external/python/cpython3/Doc/library/ |
D | pwd.rst | 22 | 1 | ``pw_passwd`` | Optional encrypted password | 43 encrypted with a DES derived algorithm (see module :mod:`crypt`). However most 46 where the encrypted password is stored in a file :file:`/etc/shadow` which is 49 access to the encrypted password is required.
|
/external/lzma/CPP/7zip/UI/Common/ |
D | IFileExtractCallback.h | 52 STDMETHOD(SetOperationResult)(Int32 opRes, Int32 encrypted) x; \ 60 STDMETHOD(ReportExtractResult)(Int32 opRes, Int32 encrypted, const wchar_t *name) x; \ 106 STDMETHOD(SetOperationResult7)(Int32 resultEOperationResult, Int32 encrypted) x; \
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/ |
D | CipherTest.java | 2561 byte[] encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2563 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2566 encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2568 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2590 byte[] encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2592 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2596 encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2598 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2625 byte[] encrypted = c.doFinal(RSA_2048_Vector1, i, RSA_2048_Vector1.length - i); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success() 2627 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success() [all …]
|
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/crypto/ |
D | CipherTest.java | 2563 byte[] encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2565 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2568 encrypted = c.doFinal(RSA_2048_Vector1); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2570 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_OnlyDoFinal_Success() 2592 byte[] encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2594 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2598 encrypted = c.doFinal(); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2600 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_UpdateThenEmptyDoFinal_Success() 2627 byte[] encrypted = c.doFinal(RSA_2048_Vector1, i, RSA_2048_Vector1.length - i); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success() 2629 Arrays.equals(RSA_Vector1_Encrypt_Private, encrypted)); in testRSA_ECB_NoPadding_Private_SingleByteUpdateThenEmptyDoFinal_Success() [all …]
|
/external/u-boot/doc/ |
D | README.mxc_hab | 4 To enable the authenticated or encrypted boot mode of U-Boot, it is 105 Encrypted Boot. The image is encrypted by i.MX Code Signing 107 u-boot-dtb.imx with the encrypted data. The Initial Vector Table, 110 The image data is encrypted with a Encryption Key (DEK). 123 Note: The encrypted boot feature is only supported by HABv4 or 132 The resulting DEK blob then is used to construct the encrypted 140 cat u-boot-signed-pad.imx DEK_blob.bin > u-boot-encrypted.imx
|
/external/lzma/CPP/7zip/UI/GUI/ |
D | Extract.rc | 11 IDS_CANT_OPEN_ENCRYPTED_ARCHIVE "Can not open encrypted archive '{0}'. Wrong password?" 38 IDS_EXTRACT_MESSAGE_DATA_ERROR_ENCRYPTED "Data error in encrypted file '{0}'. Wrong password?" 39 IDS_EXTRACT_MESSAGE_CRC_ERROR_ENCRYPTED "CRC failed in encrypted file '{0}'. Wrong password?"
|
/external/openssh/ |
D | PROTOCOL.key | 6 an encrypted list of matching private keys. 19 string encrypted, padded list of private keys 51 Before the key is encrypted, a random integer is assigned
|
/external/libese/tools/ese_ls_provision/ |
D | README.md | 7 PN80T and later secure elements include a "loader service" which runs signed, encrypted scripts to 11 the certificate for the signing key. This tool takes those signed, encrypted scripts and sends 23 - `<script>` is the compiled, encrypted, signed scrypt as generated by `ls-cgt.jar`.
|