/external/rust/crates/quiche/src/ |
D | crypto.rs | 196 pub struct Seal { struct 206 impl Seal { argument 209 ) -> Result<Seal> { in new() argument 210 Ok(Seal { in new() 228 pub fn from_secret(aead: Algorithm, secret: &[u8]) -> Result<Seal> { in from_secret() argument 240 Seal::new(aead, &key, &iv, &pn_key) in from_secret() 292 ) -> Result<(Open, Seal)> { in derive_initial_key_material() argument 325 Seal::new(aead, &server_key, &server_iv, &server_hp_key)?, in derive_initial_key_material() 330 Seal::new(aead, &client_key, &client_iv, &client_hp_key)?, in derive_initial_key_material()
|
D | packet.rs | 521 b: &mut octets::OctetsMut, pn_len: usize, payload: &[u8], aead: &crypto::Seal, in encrypt_hdr() argument 547 payload_offset: usize, aead: &crypto::Seal, in encrypt_pkt() argument 709 pub crypto_seal: Option<crypto::Seal>, 712 pub crypto_0rtt_seal: Option<crypto::Seal>, 2150 let aead = crypto::Seal::from_secret(alg, &secret).unwrap(); in encrypt_chacha20()
|
D | tls.rs | 639 let seal = match crypto::Seal::from_secret(aead, &secret) { in set_write_secret()
|
/external/boringssl/src/ssl/test/runner/ |
D | cipher_suites.go | 245 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { func 247 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData) 295 func (x *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { func 297 ret := x.aead.Seal(out, x.sealNonce, plaintext, additionalData)
|
D | conn.go | 635 c.Seal(payload[:0], nonce, payload, additionalData)
|
/external/boringssl/src/ssl/test/runner/hpke/ |
D | hpke_test.go | 62 ciphertext := senderContext.Seal(nil, plaintext) 170 ciphertext := senderContext.Seal(e.AdditionalData, e.Plaintext)
|
D | hpke.go | 116 func (c *Context) Seal(additionalData, plaintext []byte) []byte { func 117 ciphertext := c.aead.Seal(nil, c.computeNonce(), plaintext, additionalData)
|
/external/rust/crates/ring/tests/ |
D | aead_tests.rs | 99 fn test_aead<Seal, Open>( in test_aead() argument 101 seal: Seal, in test_aead() argument 105 Seal: Fn( in test_aead()
|
/external/libchrome/mojo/public/cpp/bindings/lib/ |
D | buffer.h | 101 void Seal(); in COMPONENT_EXPORT()
|
D | buffer.cc | 104 void Buffer::Seal() { in Seal() function in mojo::internal::Buffer
|
D | message.cc | 153 payload_buffer.Seal(); in SerializeUnserializedContext() 361 payload_buffer_.Seal(); in TakeMojoMessage()
|
/external/rust/crates/csv/examples/data/ |
D | uspop-null.csv | 20 Seal Beach,CA,24404,33.7413889,-118.1038889
|
D | uspop-latin1.csv | 20 Seal Beach,CA,24404,33.7413889,-118.1038889
|
D | uspop.csv | 20 Seal Beach,CA,24404,33.7413889,-118.1038889
|
/external/boringssl/src/ssl/ |
D | dtls_record.cc | 340 if (!aead->Seal(out + DTLS1_RT_HEADER_LENGTH, &len_copy, in dtls_seal_record()
|
D | ssl_aead_ctx.cc | 399 bool SSLAEADContext::Seal(uint8_t *out, size_t *out_len, size_t max_out_len, in Seal() function in SSLAEADContext
|
D | internal.h | 830 bool Seal(uint8_t *out, size_t *out_len, size_t max_out, uint8_t type,
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | dtls_record.cc | 340 if (!aead->Seal(out + DTLS1_RT_HEADER_LENGTH, &len_copy, in dtls_seal_record()
|
D | ssl_aead_ctx.cc | 399 bool SSLAEADContext::Seal(uint8_t *out, size_t *out_len, size_t max_out_len, in Seal() function in SSLAEADContext
|
D | internal.h | 825 bool Seal(uint8_t *out, size_t *out_len, size_t max_out, uint8_t type,
|
/external/rust/crates/byteorder/ |
D | CHANGELOG.md | 133 Seal the `ByteOrder` trait to prevent out-of-crate implementations.
|
/external/toybox/www/ |
D | 0bsd-mckusick.txt | 13 ARC-Seal: i=1; a=rsa-sha256; t=1539798983; cv=none;
|
/external/cpuinfo/test/dmesg/ |
D | xperia-sl.log | 419 <6>[ 8.670262] bq27520 3-0055: Seal firmware successful
|
/external/python/pybind11/docs/ |
D | changelog.rst | 145 * Seal a leak in ``def_buffer``, cleaning up the ``capture`` object after the
|
/external/python/cpython3/Doc/library/ |
D | unittest.mock.rst | 2755 Seal will disable the automatic creation of mocks when accessing an attribute of
|