Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 - 25 of 134) sorted by relevance

123456

/third_party/toybox/toys/lsb/
H A Dpasswd.c60 char *pass, *name, *encrypted = 0, salt[MAX_SALT_LEN]; in passwd_main() local
78 encrypted = xmprintf("!%s", pass); in passwd_main()
82 encrypted = pass+1; in passwd_main()
85 encrypted = ""; in passwd_main()
104 encrypted = crypt(toybuf, salt); in passwd_main()
109 name, encrypted); in passwd_main()
114 if (CFG_TOYBOX_FREE && (toys.optflags & FLAG_l)) free(encrypted); in passwd_main()
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
H A DRecord.pm109 $record->encrypted(1);
189 encrypted => 0,
233 #respond with either an encrypted or an unencrypted alert.
236 #content type. If an alert is encrypted it will have a record
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
/third_party/openssl/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
H A DRecord.pm109 $record->encrypted(1);
189 encrypted => 0,
233 #respond with either an encrypted or an unencrypted alert.
236 #content type. If an alert is encrypted it will have a record
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
/third_party/node/test/parallel/
H A Dtest-crypto-padding-aes256.js50 let encrypted = encrypt(plaintext, false);
51 let decrypted = decrypt(encrypted, false);
58 encrypted = encrypt(plaintext, true);
59 decrypted = decrypt(encrypted, true);
H A Dtest-tls-securepair-server.js50 assert.ok(pair.encrypted.writable);
53 pair.encrypted.pipe(socket);
54 socket.pipe(pair.encrypted);
80 pair.encrypted.on('error', function(err) {
81 log('encrypted error: ');
H A Dtest-crypto-private-decrypt-gh32240.js20 const encrypted = publicEncrypt(pair.publicKey, expected);
32 const decrypted = privateDecrypt(key, encrypted);
H A Dtest-http2-create-client-secure-session.js23 assert(stream.session.encrypted);
52 assert(client.encrypted);
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_add.c90 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex()
128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex()
129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex()
130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex()
160 if (p7->d.encrypted == NULL) { in STACK_OF()
165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
/third_party/openssl/crypto/pkcs12/
H A Dp12_add.c90 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex()
128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex()
129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex()
130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex()
160 if (p7->d.encrypted == NULL) { in STACK_OF()
165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
/third_party/node/test/sequential/
H A Dtest-tls-securepair-client.js133 assert.ok(pair.encrypted.writable);
136 pair.encrypted.pipe(s);
137 s.pipe(pair.encrypted);
167 pair.encrypted.on('error', function(err) {
168 console.log(`encrypted error: ${err}`);
/third_party/toybox/toys/pending/
H A Dchsh.c32 char *user, *line, *shell, *encrypted; in chsh_main() local
51 if (!(encrypted = crypt(toybuf, shadow_info->sp_pwdp))) perror_exit("crypt"); in chsh_main()
54 if (strcmp(encrypted, shadow_info->sp_pwdp)) perror_exit("Bad password"); in chsh_main()
/third_party/rust/crates/rust-openssl/openssl/src/
H A Denvelope.rs18 //! let mut encrypted = vec![0; secret.len() + cipher.block_size()];
20 //! let mut enc_len = seal.update(secret, &mut encrypted).unwrap();
21 //! enc_len += seal.finalize(&mut encrypted[enc_len..]).unwrap();
22 //! encrypted.truncate(enc_len);
64 /// Returns the encrypted keys.
69 /// Feeds data from `input` through the cipher, writing encrypted bytes into `output`.
168 let mut encrypted = vec![0; secret.len() + cipher.block_size()]; in public_encrypt_private_decrypt() variables
169 let mut enc_len = seal.update(secret, &mut encrypted).unwrap(); in public_encrypt_private_decrypt()
170 enc_len += seal.finalize(&mut encrypted[enc_len..]).unwrap(); in public_encrypt_private_decrypt()
176 let mut dec_len = open.update(&encrypted[ in public_encrypt_private_decrypt()
[all...]
/third_party/ffmpeg/tests/fate/
H A Dlossless-audio.mak19 FATE_SAMPLES_LOSSLESS_AUDIO-$(call DEMDEC, TTA, TTA) += fate-lossless-tta-encrypted
20 fate-lossless-tta-encrypted: CMD = crc -password ffmpeg -i $(TARGET_SAMPLES)/lossless-audio/encrypted.tta
H A Dmov.mak8 fate-mov-3elist-encrypted \
9 fate-mov-frag-encrypted \
10 fate-mov-tenc-only-encrypted \
51 fate-mov-3elist-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGET_SAMPLES)/mov/mov-3elist-encrypted.mov
54 fate-mov-frag-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGET_SAMPLES)/mov/mov-frag-encrypted.mp4
57 fate-mov-tenc-only-encrypted: CMD = framemd5 -decryption_key 12345678901234567890123456789012 -i $(TARGET_SAMPLES)/mov/mov-tenc-only-encrypted.mp4
/third_party/lzma/CPP/7zip/UI/Common/
H A DIFileExtractCallback.h61 x(SetOperationResult(Int32 opRes, Int32 encrypted)) \
66 x(ReportExtractResult(Int32 opRes, Int32 encrypted, const wchar_t *name)) \
106 x(SetOperationResult8(Int32 resultEOperationResult, Int32 encrypted, UInt64 size)) \
/third_party/lzma/CPP/7zip/UI/FileManager/
H A DExtractCallback.cpp265 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, const wchar_t *fileName, UString &s);
266 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, const wchar_t *fileName, UString &s) in SetExtractErrorMessage() argument
288 messageID = encrypted ? in SetExtractErrorMessage()
296 messageID = encrypted ? in SetExtractErrorMessage()
352 if (encrypted && opRes != NArchive::NExtract::NOperationResult::kWrongPassword) in SetExtractErrorMessage()
364 Z7_COM7F_IMF(CExtractCallbackImp::SetOperationResult(Int32 opRes, Int32 encrypted)) in SetOperationResult() argument
373 SetExtractErrorMessage(opRes, encrypted, _currentFilePath, s); in SetOperationResult()
390 Z7_COM7F_IMF(CExtractCallbackImp::ReportExtractResult(Int32 opRes, Int32 encrypted, const wchar_t *name)) in ReportExtractResult() argument
395 SetExtractErrorMessage(opRes, encrypted, name, s); in ReportExtractResult()
944 Z7_COM7F_IMF(CExtractCallbackImp::SetOperationResult8(Int32 opRes, Int32 encrypted, UInt6 argument
[all...]
/third_party/lzma/CPP/7zip/UI/Console/
H A DExtractCallbackConsole.cpp213 static const char * const kCrcFailedEncrypted = "CRC Failed in encrypted file. Wrong password?";
215 static const char * const kDataErrorEncrypted = "Data Error in encrypted file. Wrong password?";
227 , "Headers Error in encrypted archive. Wrong password?"
416 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, AString &dest);
417 void SetExtractErrorMessage(Int32 opRes, Int32 encrypted, AString &dest) in SetExtractErrorMessage() argument
428 s = (encrypted ? kCrcFailedEncrypted : kCrcFailed); in SetExtractErrorMessage()
431 s = (encrypted ? kDataErrorEncrypted : kDataError); in SetExtractErrorMessage()
463 Z7_COM7F_IMF(CExtractCallbackConsole::SetOperationResult(Int32 opRes, Int32 encrypted)) in SetOperationResult() argument
486 SetExtractErrorMessage(opRes, encrypted, s); in SetOperationResult()
502 Z7_COM7F_IMF(CExtractCallbackConsole::ReportExtractResult(Int32 opRes, Int32 encrypted, cons argument
[all...]
/third_party/node/lib/internal/tls/
H A Dsecure-pair.js68 this.encrypted = socket1;
81 this.encrypted.destroy();
/third_party/node/test/common/
H A Dtls.js125 const encrypted = Buffer.concat([encrypted1, bob.final()]);
128 length.writeUInt16BE(nonce.length + encrypted.length + tag.length, 0);
129 return Buffer.concat([type, version, length, nonce, encrypted, tag]);
/third_party/node/benchmark/tls/
H A Dsecure-pair.js89 conn.pipe(serverPair.encrypted);
90 serverPair.encrypted.pipe(conn);
/third_party/toybox/lib/
H A Dpending.h6 int update_password(char *filename, char* username, char* encrypted);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dikev2_common.c322 payloads->encrypted = pdata; in ikev2_parse_payloads()
431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload()
443 if (encrypted == NULL) { in ikev2_decrypt_payload()
467 iv = encrypted; in ikev2_decrypt_payload()
469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
507 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " in ikev2_decrypt_payload()
428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dikev2_common.c322 payloads->encrypted = pdata; in ikev2_parse_payloads()
431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload()
443 if (encrypted == NULL) { in ikev2_decrypt_payload()
467 iv = encrypted; in ikev2_decrypt_payload()
469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
507 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " in ikev2_decrypt_payload()
428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) ikev2_decrypt_payload() argument

Completed in 10 milliseconds

123456