/external/chromium/chrome/browser/password_manager/ |
H A D | encryptor_unittest.cc | 30 string16 plaintext; local 37 EXPECT_TRUE(Encryptor::EncryptString16(plaintext, &ciphertext)); 39 EXPECT_EQ(plaintext, result); 42 plaintext = ASCIIToUTF16("hello"); 43 EXPECT_TRUE(Encryptor::EncryptString16(plaintext, &ciphertext)); 45 EXPECT_EQ(plaintext, result); 49 plaintext = ASCIIToUTF16("1234567890123456"); 50 EXPECT_TRUE(Encryptor::EncryptString16(plaintext, &ciphertext)); 52 EXPECT_EQ(plaintext, result); 61 plaintext 78 std::string plaintext; local 101 std::string plaintext; local 128 std::string plaintext; local [all...] |
H A D | encryptor.h | 21 static bool EncryptString16(const string16& plaintext, 29 string16* plaintext); 32 static bool EncryptString(const std::string& plaintext, 40 std::string* plaintext);
|
H A D | encryptor_win.cc | 13 bool Encryptor::EncryptString16(const string16& plaintext, argument 15 return EncryptString(UTF16ToUTF8(plaintext), ciphertext); 19 string16* plaintext) { 24 *plaintext = UTF8ToUTF16(utf8); 28 bool Encryptor::EncryptString(const std::string& plaintext, argument 32 reinterpret_cast<const BYTE*>(plaintext.data())); 33 input.cbData = static_cast<DWORD>(plaintext.length()); 50 std::string* plaintext) { 62 plaintext->assign(reinterpret_cast<char*>(output.pbData), output.cbData); 18 DecryptString16(const std::string& ciphertext, string16* plaintext) argument 49 DecryptString(const std::string& ciphertext, std::string* plaintext) argument
|
H A D | encryptor_linux.cc | 57 bool Encryptor::EncryptString16(const string16& plaintext, argument 59 return EncryptString(UTF16ToUTF8(plaintext), ciphertext); 63 string16* plaintext) { 68 *plaintext = UTF8ToUTF16(utf8); 72 bool Encryptor::EncryptString(const std::string& plaintext, argument 79 if (plaintext.empty()) { 93 if (!encryptor.Encrypt(plaintext, ciphertext)) 102 std::string* plaintext) { 109 *plaintext = std::string(); 119 *plaintext 62 DecryptString16(const std::string& ciphertext, string16* plaintext) argument 101 DecryptString(const std::string& ciphertext, std::string* plaintext) argument [all...] |
/external/srtp/crypto/include/ |
H A D | aes.h | 67 aes_encrypt(v128_t *plaintext, const aes_expanded_key_t exp_key); 70 aes_decrypt(v128_t *plaintext, const aes_expanded_key_t exp_key);
|
/external/chromium/chrome/browser/sync/util/ |
H A D | nigori_unittest.cc | 55 std::string plaintext("value"); 58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1)); 61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2)); 74 std::string plaintext; local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 78 EXPECT_EQ(expected, plaintext); 85 std::string plaintext("value"); 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 93 EXPECT_EQ(plaintext, decrypted); 100 std::string plaintext("tes 152 std::string plaintext; local [all...] |
H A D | cryptographer.cc | 67 std::string plaintext = DecryptToString(encrypted); local 68 return message->ParseFromString(plaintext); 79 std::string plaintext; local 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { 84 return plaintext; 158 std::string plaintext; local 159 if (!nigori.Decrypt(pending_keys_->blob(), &plaintext)) 163 if (!bag.ParseFromString(plaintext)) {
|
H A D | nigori.cc | 130 NigoriStream plaintext; local 131 plaintext << type << name; 139 if (!encryptor.Encrypt(plaintext.str(), &ciphertext)) 241 std::string plaintext;
|
/external/google-diff-match-patch/ |
H A D | Android.mk | 5 LOCAL_SRC_FILES := name/fraser/neil/plaintext/diff_match_patch.java
|
/external/chromium/crypto/ |
H A D | encryptor_mac.cc | 68 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { argument 69 return Crypt(kCCEncrypt, plaintext, ciphertext); 72 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { argument 73 return Crypt(kCCDecrypt, ciphertext, plaintext);
|
H A D | encryptor_nss.cc | 52 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { argument 60 size_t ciphertext_len = plaintext.size() + AES_BLOCK_SIZE; 69 const_cast<char*>(plaintext.data())), 70 plaintext.size()); 87 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { argument 120 plaintext->assign(reinterpret_cast<char *>(&buffer[0]),
|
H A D | encryptor_win.cc | 80 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { argument 81 DWORD data_len = plaintext.size(); 86 memcpy(&tmp[0], plaintext.data(), data_len); 97 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { argument 111 plaintext->assign(reinterpret_cast<char*>(&tmp[0]), data_len);
|
H A D | encryptor_openssl.cc | 72 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { argument 73 return Crypt(true, plaintext, ciphertext); 76 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { argument 77 return Crypt(false, ciphertext, plaintext);
|
H A D | encryptor.h | 35 // Encrypts |plaintext| into |ciphertext|. 36 bool Encrypt(const std::string& plaintext, std::string* ciphertext); 38 // Decrypts |ciphertext| into |plaintext|. 39 bool Decrypt(const std::string& ciphertext, std::string* plaintext);
|
H A D | encryptor_unittest.cc | 26 std::string plaintext("this is the plaintext"); 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 35 EXPECT_EQ(plaintext, decypted); 100 std::string plaintext(reinterpret_cast<const char*>(raw_plaintext), 103 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 111 EXPECT_EQ(plaintext, decypted); 118 std::string plaintext = "Plain text with a g-clef U+1D11E \360\235\204\236"; local 133 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 139 EXPECT_EQ(plaintext, decypte 146 std::string plaintext = "Small text"; local 199 std::string plaintext; local [all...] |
/external/chromium/net/http/ |
H A D | des_unittest.cc | 17 // DES known plaintext (64-bits). 39 static const uint8 plaintext[] = { 0, 0, 0, 0, 0, 0, 0, 0 }; local 46 DESEncrypt(key, plaintext, ciphertext);
|
/external/openssl/crypto/evp/ |
H A D | evp_test.c | 138 const unsigned char *plaintext,int pn, 151 hexdump(stdout,"Plaintext",plaintext,pn); 171 if(!EVP_EncryptUpdate(&ctx,out,&outl,plaintext,pn)) 230 if(memcmp(out,plaintext,pn)) 234 hexdump(stderr,"Expected",plaintext,pn); 246 const unsigned char *plaintext,int pn, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 262 const unsigned char *plaintext,int pn, 275 hexdump(stdout,"Plaintext",plaintext,pn); 285 if(!EVP_DigestUpdate(&ctx,plaintext,p 136 test1(const EVP_CIPHER *c,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 244 test_cipher(const char *cipher,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 261 test_digest(const char *digest, const unsigned char *plaintext,int pn, const unsigned char *ciphertext, unsigned int cn) argument 369 unsigned char *iv,*key,*plaintext,*ciphertext; local [all...] |
/external/dbus/dbus/ |
H A D | dbus-auth.h | 65 const DBusString *plaintext, 70 DBusString *plaintext);
|
H A D | dbus-auth.c | 1150 DBusString plaintext; local 1152 if (!_dbus_string_init (&plaintext)) 1155 if (!_dbus_append_user_from_current_process (&plaintext)) 1158 if (!_dbus_string_hex_encode (&plaintext, 0, 1163 _dbus_string_free (&plaintext); 1168 _dbus_string_free (&plaintext); 1207 DBusString plaintext; local 1209 _dbus_string_init_const (&plaintext, "D-Bus " DBUS_VERSION_STRING); 1211 _dbus_string_hex_encode (&plaintext, 0, 1261 DBusString plaintext; local 2632 _dbus_auth_encode_data(DBusAuth *auth, const DBusString *plaintext, DBusString *encoded) argument 2695 _dbus_auth_decode_data(DBusAuth *auth, const DBusString *encoded, DBusString *plaintext) argument [all...] |
/external/dropbear/libtomcrypt/demos/ |
H A D | tv_gen.c | 168 "The output of step N is used as the key and plaintext for step N+1 (key bytes repeated as required to fill the key)\n\n"); 398 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 402 fprintf(out, "EAX Test Vectors. Uses the 00010203...NN-1 pattern for header/nonce/plaintext/key. The outputs\n" 424 plaintext[z] = (unsigned char)(z & 255); 429 if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) { 435 fprintf(out, "%02X", plaintext[z]); 458 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 462 fprintf(out, "OCB Test Vectors. Uses the 00010203...NN-1 pattern for nonce/plaintext/key. The outputs\n" 489 plaintext[ 522 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 584 unsigned char key[MAXBLOCKSIZE], plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local [all...] |
H A D | encrypt.c | 97 unsigned char plaintext[512],ciphertext[512]; local 182 if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) { 187 if (fwrite(plaintext,1,y,fdout) != y) {
|
/external/srtp/crypto/cipher/ |
H A D | cipher.c | 76 * plaintext, and ciphertext that is known to be good 126 /* copy plaintext into test buffer */ 132 buffer[i] = test_case->plaintext[i]; 134 debug_print(mod_cipher, "plaintext: %s", 220 debug_print(mod_cipher, "plaintext: %s", 224 /* compare the resulting plaintext with that in the test case */ 229 if (buffer[i] != test_case->plaintext[i]) { 240 octet_string_hex_string(test_case->plaintext, 278 debug_print(mod_cipher, "random plaintext length %d\n", length); 282 debug_print(mod_cipher, "plaintext [all...] |
/external/srtp/tables/ |
H A D | aes_tables.c | 323 uint8_t plaintext[16] = { local 335 v128_copy_octet_string(&x, plaintext); 342 v128_copy_octet_string(&y, plaintext);
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
H A D | crypto-aes.js | 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 162 * - cipherblock = plaintext xor outputblock 164 function AESEncryptCtr(plaintext, password, nBits) { 188 var blockCount = Math.ceil(plaintext.length/blockSize); 200 var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1; 203 for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter byte-by-byte -- 204 var plaintextByte = plaintext.charCodeAt(b*blockSize+i); 228 * - cipherblock = plaintext xor outputblock 250 var plaintext = new Array(ciphertext.length-1); 263 // -- xor plaintext wit [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
H A D | crypto-aes.js | 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 162 * - cipherblock = plaintext xor outputblock 164 function AESEncryptCtr(plaintext, password, nBits) { 188 var blockCount = Math.ceil(plaintext.length/blockSize); 200 var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1; 203 for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter byte-by-byte -- 204 var plaintextByte = plaintext.charCodeAt(b*blockSize+i); 228 * - cipherblock = plaintext xor outputblock 250 var plaintext = new Array(ciphertext.length-1); 263 // -- xor plaintext wit [all...] |