/external/chromium/chrome/browser/webdata/ |
H A D | token_service_table.cc | 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 56 if (!encrypted) {
|
/external/chromium/third_party/libjingle/source/talk/examples/login/ |
H A D | xmppauth.cc | 55 bool encrypted) { 53 ChooseBestSaslMechanism( const std::vector<std::string> & mechanisms, bool encrypted) argument
|
/external/chromium/chrome/browser/sync/util/ |
H A D | nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, 120 std::string encrypted; local [all...] |
H A D | cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; local 22 encrypted.set_key_name("foo"); 23 encrypted.set_blob("bar"); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 54 sync_pb::EncryptedData encrypted; local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 102 sync_pb::EncryptedData encrypted; local [all...] |
H A D | cryptographer.cc | 45 sync_pb::EncryptedData* encrypted) const { 46 DCHECK(encrypted); 55 encrypted->set_key_name(default_nigori_->first); 57 encrypted->mutable_blob())) { 64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, argument 67 std::string plaintext = DecryptToString(encrypted); 72 const sync_pb::EncryptedData& encrypted) const { 73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name()); 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { 87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) cons 133 SetKeys(const sync_pb::EncryptedData& encrypted) argument 144 SetPendingKeys(const sync_pb::EncryptedData& encrypted) argument [all...] |
H A D | nigori.cc | 170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { 200 return Base64Encode(output, encrypted); 203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { argument 205 if (!Base64Decode(encrypted, &input))
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
H A D | plainsaslhandler.h | 46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument 48 if (!encrypted && !allow_plain_) {
|
H A D | xmppengineimpl.cc | 405 XmppEngineImpl::ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument 406 return sasl_handler_->ChooseBestSaslMechanism(mechanisms, encrypted);
|
/external/dropbear/ |
H A D | keyimport.c | 355 int encrypted; member in struct:openssh_key 373 ret->encrypted = 0; 423 ret->encrypted = 1; 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { 501 ret = key->encrypted; 529 if (key->encrypted) { 530 errmsg = "encrypted keys not supported currently"; 987 * - string cipher-type (tells you if key is encrypted) 988 * - string encrypted-blob 995 * The encrypted blo [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_inf.c | 138 int encrypted; 142 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 146 if (encrypted) { 180 if (encrypted) { 264 /* make sure the packet was encrypted after the beginning of phase 1. */ 276 "%s message must be encrypted\n", 297 msgid, encrypted); 302 msgid, encrypted); 392 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 396 int encrypted; 137 int encrypted; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " 389 payloads->encrypted = pdata; 498 const u8 *encrypted, size_t encrypted_len, 510 if (encrypted == NULL) { 534 iv = encrypted; 536 end = encrypted + encrypted_len; 574 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 453 const u8 *encrypted, 463 hdr, encrypted, encrypted_len, 500 if (pl->encrypted) { 503 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 507 "encrypted payload"); 727 &data->keys, 0, hdr, pl->encrypted, 451 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 273 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " 390 payloads->encrypted = pdata; 499 const u8 *encrypted, size_t encrypted_len, 511 if (encrypted == NULL) { 535 iv = encrypted; 537 end = encrypted + encrypted_len; 575 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " 496 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 454 const u8 *encrypted, 464 hdr, encrypted, encrypted_len, 501 if (pl->encrypted) { 504 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 508 "encrypted payload"); 728 &data->keys, 0, hdr, pl->encrypted, 452 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 273 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " 390 payloads->encrypted = pdata; 499 const u8 *encrypted, size_t encrypted_len, 511 if (encrypted == NULL) { 535 iv = encrypted; 537 end = encrypted + encrypted_len; 575 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " 496 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 454 const u8 *encrypted, 464 hdr, encrypted, encrypted_len, 501 if (pl->encrypted) { 504 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 508 "encrypted payload"); 728 &data->keys, 0, hdr, pl->encrypted, 452 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 273 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " 390 payloads->encrypted = pdata; 499 const u8 *encrypted, size_t encrypted_len, 511 if (encrypted == NULL) { 535 iv = encrypted; 537 end = encrypted + encrypted_len; 575 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " 496 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 454 const u8 *encrypted, 464 hdr, encrypted, encrypted_len, 501 if (pl->encrypted) { 504 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 508 "encrypted payload"); 728 &data->keys, 0, hdr, pl->encrypted, 452 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
|
/external/bluetooth/bluez/src/ |
H A D | attrib-server.c | 62 gboolean encrypted; member in struct:gatt_channel 165 /* FIXME: currently, it is assumed an encrypted link is enough for 169 if (!channel->encrypted) 170 channel->encrypted = g_attrib_is_encrypted(channel->attrib); 171 if (reqs == ATT_AUTHENTICATION && !channel->encrypted)
|
/external/qemu/ |
H A D | block_int.h | 148 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
|
/external/wpa_supplicant/ |
H A D | eap.c | 934 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 942 int encrypted) 961 } else if (!encrypted && config->anonymous_identity) { 941 eap_sm_buildIdentity(struct eap_sm *sm, int id, size_t *len, int encrypted) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 954 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 961 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument 979 } else if (!encrypted && config->anonymous_identity) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 963 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 970 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument 988 } else if (!encrypted && config->anonymous_identity) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 963 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 970 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument 988 } else if (!encrypted && config->anonymous_identity) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 963 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 970 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument 988 } else if (!encrypted && config->anonymous_identity) {
|