Searched defs:encrypted (Results 1 - 25 of 34) sorted by relevance

12

/external/chromium/chrome/browser/webdata/
H A Dtoken_service_table.cc55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local
56 if (!encrypted) {
/external/chromium/third_party/libjingle/source/talk/examples/login/
H A Dxmppauth.cc55 bool encrypted) {
53 ChooseBestSaslMechanism( const std::vector<std::string> & mechanisms, bool encrypted) argument
/external/chromium/chrome/browser/sync/util/
H A Dnigori_unittest.cc70 std::string encrypted = local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext));
87 std::string encrypted; local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
102 std::string encrypted; local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a');
109 EXPECT_TRUE(nigori.Decrypt(encrypted,
120 std::string encrypted; local
[all...]
H A Dcryptographer_unittest.cc21 sync_pb::EncryptedData encrypted; local
22 encrypted.set_key_name("foo");
23 encrypted.set_blob("bar");
25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
35 sync_pb::EncryptedData encrypted; local
36 encrypted.set_key_name("foo");
37 encrypted.set_blob("bar");
39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
54 sync_pb::EncryptedData encrypted; local
55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted));
102 sync_pb::EncryptedData encrypted; local
[all...]
H A Dcryptographer.cc45 sync_pb::EncryptedData* encrypted) const {
46 DCHECK(encrypted);
55 encrypted->set_key_name(default_nigori_->first);
57 encrypted->mutable_blob())) {
64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, argument
67 std::string plaintext = DecryptToString(encrypted);
72 const sync_pb::EncryptedData& encrypted) const {
73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name());
80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) {
87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) cons
133 SetKeys(const sync_pb::EncryptedData& encrypted) argument
144 SetPendingKeys(const sync_pb::EncryptedData& encrypted) argument
[all...]
H A Dnigori.cc170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const {
200 return Base64Encode(output, encrypted);
203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { argument
205 if (!Base64Decode(encrypted, &input))
/external/chromium/third_party/libjingle/source/talk/xmpp/
H A Dplainsaslhandler.h46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument
48 if (!encrypted && !allow_plain_) {
H A Dxmppengineimpl.cc405 XmppEngineImpl::ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument
406 return sasl_handler_->ChooseBestSaslMechanism(mechanisms, encrypted);
/external/dropbear/
H A Dkeyimport.c355 int encrypted; member in struct:openssh_key
373 ret->encrypted = 0;
423 ret->encrypted = 1;
467 if (ret->encrypted && ret->keyblob_len % 8 != 0) {
501 ret = key->encrypted;
529 if (key->encrypted) {
530 errmsg = "encrypted keys not supported currently";
987 * - string cipher-type (tells you if key is encrypted)
988 * - string encrypted-blob
995 * The encrypted blo
[all...]
/external/ipsec-tools/src/racoon/
H A Disakmp_inf.c138 int encrypted;
142 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
146 if (encrypted) {
180 if (encrypted) {
264 /* make sure the packet was encrypted after the beginning of phase 1. */
276 "%s message must be encrypted\n",
297 msgid, encrypted);
302 msgid, encrypted);
392 isakmp_info_recv_n(iph1, notify, msgid, encrypted)
396 int encrypted;
137 int encrypted; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dikev2_common.c272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
389 payloads->encrypted = pdata;
498 const u8 *encrypted, size_t encrypted_len,
510 if (encrypted == NULL) {
534 iv = encrypted;
536 end = encrypted + encrypted_len;
574 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Dikev2.c453 const u8 *encrypted,
463 hdr, encrypted, encrypted_len,
500 if (pl->encrypted) {
503 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
507 "encrypted payload");
727 &data->keys, 0, hdr, pl->encrypted,
451 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.c273 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
390 payloads->encrypted = pdata;
499 const u8 *encrypted, size_t encrypted_len,
511 if (encrypted == NULL) {
535 iv = encrypted;
537 end = encrypted + encrypted_len;
575 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
496 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c454 const u8 *encrypted,
464 hdr, encrypted, encrypted_len,
501 if (pl->encrypted) {
504 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
508 "encrypted payload");
728 &data->keys, 0, hdr, pl->encrypted,
452 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
/external/wpa_supplicant_8/src/eap_common/
H A Dikev2_common.c273 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
390 payloads->encrypted = pdata;
499 const u8 *encrypted, size_t encrypted_len,
511 if (encrypted == NULL) {
535 iv = encrypted;
537 end = encrypted + encrypted_len;
575 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
496 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c454 const u8 *encrypted,
464 hdr, encrypted, encrypted_len,
501 if (pl->encrypted) {
504 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
508 "encrypted payload");
728 &data->keys, 0, hdr, pl->encrypted,
452 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dikev2_common.c273 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
390 payloads->encrypted = pdata;
499 const u8 *encrypted, size_t encrypted_len,
511 if (encrypted == NULL) {
535 iv = encrypted;
537 end = encrypted + encrypted_len;
575 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
496 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c454 const u8 *encrypted,
464 hdr, encrypted, encrypted_len,
501 if (pl->encrypted) {
504 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
508 "encrypted payload");
728 &data->keys, 0, hdr, pl->encrypted,
452 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
/external/bluetooth/bluez/src/
H A Dattrib-server.c62 gboolean encrypted; member in struct:gatt_channel
165 /* FIXME: currently, it is assumed an encrypted link is enough for
169 if (!channel->encrypted)
170 channel->encrypted = g_attrib_is_encrypted(channel->attrib);
171 if (reqs == ATT_AUTHENTICATION && !channel->encrypted)
/external/qemu/
H A Dblock_int.h148 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
/external/wpa_supplicant/
H A Deap.c934 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
942 int encrypted)
961 } else if (!encrypted && config->anonymous_identity) {
941 eap_sm_buildIdentity(struct eap_sm *sm, int id, size_t *len, int encrypted) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap.c954 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
961 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument
979 } else if (!encrypted && config->anonymous_identity) {
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c963 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
970 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument
988 } else if (!encrypted && config->anonymous_identity) {
/external/wpa_supplicant_8/src/eap_peer/
H A Deap.c963 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
970 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument
988 } else if (!encrypted && config->anonymous_identity) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap.c963 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
970 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument
988 } else if (!encrypted && config->anonymous_identity) {

Completed in 2878 milliseconds

12