/third_party/toybox/toys/lsb/ |
H A D | passwd.c | 60 char *pass, *name, *encrypted = 0, salt[MAX_SALT_LEN]; in passwd_main() local 78 encrypted = xmprintf("!%s", pass); in passwd_main() 82 encrypted = pass+1; in passwd_main() 85 encrypted = ""; in passwd_main() 104 encrypted = crypt(toybuf, salt); in passwd_main() 109 name, encrypted); in passwd_main() 114 if (CFG_TOYBOX_FREE && (toys.optflags & FLAG_l)) free(encrypted); in passwd_main()
|
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
H A D | Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 233 #respond with either an encrypted or an unencrypted alert. 236 #content type. If an alert is encrypted it will have a record 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
/third_party/openssl/util/perl/TLSProxy/ |
H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
H A D | Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 233 #respond with either an encrypted or an unencrypted alert. 236 #content type. If an alert is encrypted it will have a record 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
/third_party/node/test/parallel/ |
H A D | test-crypto-padding-aes256.js | 50 let encrypted = encrypt(plaintext, false); 51 let decrypted = decrypt(encrypted, false); 58 encrypted = encrypt(plaintext, true); 59 decrypted = decrypt(encrypted, true);
|
H A D | test-tls-securepair-server.js | 50 assert.ok(pair.encrypted.writable); 53 pair.encrypted.pipe(socket); 54 socket.pipe(pair.encrypted); 80 pair.encrypted.on('error', function(err) { 81 log('encrypted error: ');
|
H A D | test-crypto-private-decrypt-gh32240.js | 20 const encrypted = publicEncrypt(pair.publicKey, expected); 32 const decrypted = privateDecrypt(key, encrypted);
|
H A D | test-http2-create-client-secure-session.js | 23 assert(stream.session.encrypted); 52 assert(client.encrypted);
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 90 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex() 128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex() 129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex() 130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex() 160 if (p7->d.encrypted == NULL) { in STACK_OF() 165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 90 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex() 128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex() 129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex() 130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex() 160 if (p7->d.encrypted == NULL) { in STACK_OF() 165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
|
/third_party/node/test/sequential/ |
H A D | test-tls-securepair-client.js | 133 assert.ok(pair.encrypted.writable); 136 pair.encrypted.pipe(s); 137 s.pipe(pair.encrypted); 167 pair.encrypted.on('error', function(err) { 168 console.log(`encrypted error: ${err}`);
|
/third_party/toybox/toys/pending/ |
H A D | chsh.c | 32 char *user, *line, *shell, *encrypted; in chsh_main() local 51 if (!(encrypted = crypt(toybuf, shadow_info->sp_pwdp))) perror_exit("crypt"); in chsh_main() 54 if (strcmp(encrypted, shadow_info->sp_pwdp)) perror_exit("Bad password"); in chsh_main()
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | envelope.rs | 18 //! let mut encrypted = vec![0; secret.len() + cipher.block_size()]; 20 //! let mut enc_len = seal.update(secret, &mut encrypted).unwrap(); 21 //! enc_len += seal.finalize(&mut encrypted[enc_len..]).unwrap(); 22 //! encrypted.truncate(enc_len); 64 /// Returns the encrypted keys. 69 /// Feeds data from `input` through the cipher, writing encrypted bytes into `output`. 168 let mut encrypted = vec![0; secret.len() + cipher.block_size()]; in public_encrypt_private_decrypt() variables 169 let mut enc_len = seal.update(secret, &mut encrypted).unwrap(); in public_encrypt_private_decrypt() 170 enc_len += seal.finalize(&mut encrypted[enc_len..]).unwrap(); in public_encrypt_private_decrypt() 176 let mut dec_len = open.update(&encrypted[ in public_encrypt_private_decrypt() [all...] |
/third_party/ffmpeg/tests/fate/ |
H A D | lossless-audio.mak | 19 FATE_SAMPLES_LOSSLESS_AUDIO-$(call DEMDEC, TTA, TTA) += fate-lossless-tta-encrypted 20 fate-lossless-tta-encrypted: CMD = crc -password ffmpeg -i $(TARGET_SAMPLES)/lossless-audio/encrypted.tta
|
H A D | mov.mak | 8 fate-mov-3elist-encrypted \ 9 fate-mov-frag-encrypted \ 10 fate-mov-tenc-only-encrypted \ 51 fate-mov-3elist-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGET_SAMPLES)/mov/mov-3elist-encrypted.mov 54 fate-mov-frag-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGET_SAMPLES)/mov/mov-frag-encrypted.mp4 57 fate-mov-tenc-only-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGET_SAMPLES)/mov/mov-tenc-only-encrypted.mp4
|
/third_party/lzma/CPP/7zip/UI/Common/ |
H A D | IFileExtractCallback.h | 61 x(SetOperationResult(Int32 opRes, Int32 encrypted)) \
66 x(ReportExtractResult(Int32 opRes, Int32 encrypted, const wchar_t *name)) \
106 x(SetOperationResult8(Int32 resultEOperationResult, Int32 encrypted, UInt64 size)) \
|
/third_party/lzma/CPP/7zip/UI/FileManager/ |
H A D | ExtractCallback.cpp | 265 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, const wchar_t *fileName, UString &s);
266 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, const wchar_t *fileName, UString &s)
in SetExtractErrorMessage() argument 288 messageID = encrypted ?
in SetExtractErrorMessage() 296 messageID = encrypted ?
in SetExtractErrorMessage() 352 if (encrypted && opRes != NArchive::NExtract::NOperationResult::kWrongPassword)
in SetExtractErrorMessage() 364 Z7_COM7F_IMF(CExtractCallbackImp::SetOperationResult(Int32 opRes, Int32 encrypted))
in SetOperationResult() argument 373 SetExtractErrorMessage(opRes, encrypted, _currentFilePath, s);
in SetOperationResult() 390 Z7_COM7F_IMF(CExtractCallbackImp::ReportExtractResult(Int32 opRes, Int32 encrypted, const wchar_t *name))
in ReportExtractResult() argument 395 SetExtractErrorMessage(opRes, encrypted, name, s);
in ReportExtractResult() 944 Z7_COM7F_IMF(CExtractCallbackImp::SetOperationResult8(Int32 opRes, Int32 encrypted, UInt6 argument [all...] |
/third_party/lzma/CPP/7zip/UI/Console/ |
H A D | ExtractCallbackConsole.cpp | 213 static const char * const kCrcFailedEncrypted = "CRC Failed in encrypted file. Wrong password?";
215 static const char * const kDataErrorEncrypted = "Data Error in encrypted file. Wrong password?";
227 , "Headers Error in encrypted archive. Wrong password?"
416 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, AString &dest);
417 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, AString &dest)
in SetExtractErrorMessage() argument 428 s = (encrypted ? kCrcFailedEncrypted : kCrcFailed);
in SetExtractErrorMessage() 431 s = (encrypted ? kDataErrorEncrypted : kDataError);
in SetExtractErrorMessage() 463 Z7_COM7F_IMF(CExtractCallbackConsole::SetOperationResult(Int32 opRes, Int32 encrypted))
in SetOperationResult() argument 486 SetExtractErrorMessage(opRes, encrypted, s);
in SetOperationResult() 502 Z7_COM7F_IMF(CExtractCallbackConsole::ReportExtractResult(Int32 opRes, Int32 encrypted, cons argument [all...] |
/third_party/node/lib/internal/tls/ |
H A D | secure-pair.js | 68 this.encrypted = socket1; 81 this.encrypted.destroy();
|
/third_party/node/test/common/ |
H A D | tls.js | 125 const encrypted = Buffer.concat([encrypted1, bob.final()]); 128 length.writeUInt16BE(nonce.length + encrypted.length + tag.length, 0); 129 return Buffer.concat([type, version, length, nonce, encrypted, tag]);
|
/third_party/node/benchmark/tls/ |
H A D | secure-pair.js | 89 conn.pipe(serverPair.encrypted); 90 serverPair.encrypted.pipe(conn);
|
/third_party/toybox/lib/ |
H A D | pending.h | 6 int update_password(char *filename, char* username, char* encrypted);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 322 payloads->encrypted = pdata; in ikev2_parse_payloads() 431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() 443 if (encrypted == NULL) { in ikev2_decrypt_payload() 467 iv = encrypted; in ikev2_decrypt_payload() 469 end = encrypted + encrypted_len; in ikev2_decrypt_payload() 507 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " in ikev2_decrypt_payload() 428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.c | 322 payloads->encrypted = pdata; in ikev2_parse_payloads() 431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() 443 if (encrypted == NULL) { in ikev2_decrypt_payload() 467 iv = encrypted; in ikev2_decrypt_payload() 469 end = encrypted + encrypted_len; in ikev2_decrypt_payload() 507 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " in ikev2_decrypt_payload() 428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument
|