Searched refs:encrypted (Results 1 - 25 of 74) sorted by relevance

123

/external/chromium/chrome/browser/sync/util/
H A Dcryptographer.h34 // SetPendingKeys should be called with the encrypted contents of that node.
39 // Whenever a update to an encrypted node is received from the server,
59 // Returns whether we can decrypt |encrypted| using the keys we currently know
61 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const;
63 // Returns whether |encrypted| can be decrypted using the default encryption
65 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const;
67 // Encrypts |message| into |encrypted|. Returns true unless encryption fails.
71 sync_pb::EncryptedData* encrypted) const;
73 // Decrypts |encrypted| into |message|. Returns true unless decryption fails,
75 bool Decrypt(const sync_pb::EncryptedData& encrypted,
[all...]
H A Dnigori_unittest.cc70 std::string encrypted = local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext));
87 std::string encrypted; local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
102 std::string encrypted; local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a');
109 EXPECT_TRUE(nigori.Decrypt(encrypted,
120 std::string encrypted; local
[all...]
H A Dcryptographer_unittest.cc21 sync_pb::EncryptedData encrypted; local
22 encrypted.set_key_name("foo");
23 encrypted.set_blob("bar");
25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
35 sync_pb::EncryptedData encrypted; local
36 encrypted.set_key_name("foo");
37 encrypted.set_blob("bar");
39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
54 sync_pb::EncryptedData encrypted; local
55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted));
102 sync_pb::EncryptedData encrypted; local
[all...]
H A Dcryptographer.cc45 sync_pb::EncryptedData* encrypted) const {
46 DCHECK(encrypted);
55 encrypted->set_key_name(default_nigori_->first);
57 encrypted->mutable_blob())) {
64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, argument
67 std::string plaintext = DecryptToString(encrypted);
72 const sync_pb::EncryptedData& encrypted) const {
73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name());
80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) {
87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) cons
133 SetKeys(const sync_pb::EncryptedData& encrypted) argument
144 SetPendingKeys(const sync_pb::EncryptedData& encrypted) argument
[all...]
H A Dnigori.cc170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const {
200 return Base64Encode(output, encrypted);
203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { argument
205 if (!Base64Decode(encrypted, &input))
H A Dnigori.h51 // Encrypts |value|. Note that on success, |encrypted| will be Base64
53 bool Encrypt(const std::string& value, std::string* encrypted) const;
/external/chromium/third_party/libjingle/source/talk/xmpp/
H A Dsaslhandler.h49 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) = 0;
H A Dplainsaslhandler.h46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument
48 if (!encrypted && !allow_plain_) {
/external/chromium/chrome/browser/webdata/
H A Dtoken_service_table.cc55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local
56 if (!encrypted) {
/external/chromium/third_party/libjingle/source/talk/examples/login/
H A Dxmppauth.h60 bool encrypted);
H A Dxmppauth.cc55 bool encrypted) {
53 ChooseBestSaslMechanism( const std::vector<std::string> & mechanisms, bool encrypted) argument
/external/openssl/crypto/pkcs12/
H A Dp12_add.c166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm);
197 p7->d.encrypted->enc_data->algorithm = pbe;
198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data);
199 if (!(p7->d.encrypted->enc_data->enc_data =
212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
215 p7->d.encrypted->enc_data->enc_data, 1);
H A Dp12_npas.c123 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
/external/openssh/
H A Dauthfile.c88 Buffer buffer, encrypted; local
117 * will be stored in plain text, and storing them also in encrypted
125 /* Pad the part to be encrypted until its size is a multiple of 8. */
130 buffer_init(&encrypted);
134 buffer_put_char(&encrypted, authfile_id_string[i]);
135 buffer_put_char(&encrypted, 0);
138 buffer_put_char(&encrypted, cipher_num);
139 buffer_put_int(&encrypted, 0); /* For future extension */
142 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n));
143 buffer_put_bignum(&encrypted, ke
[all...]
/external/chromium/chrome/browser/sync/engine/
H A Dsyncapi.cc209 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local
212 if (!crypto->Decrypt(encrypted, data.get()))
231 // We assume any node with the encrypted field set has encrypted data.
235 const sync_pb::EncryptedData& encrypted = local
236 specifics.encrypted();
238 DecryptToString(encrypted);
242 LOG(ERROR) << "Failed to decrypt encrypted node of type " <<
438 DCHECK_NE(type, syncable::NIGORI); // Nigori is encrypted separatel
454 sync_pb::EntitySpecifics encrypted; local
1450 const sync_pb::EncryptedData& encrypted = a.ref(SPECIFICS).encrypted(); local
1456 const sync_pb::EncryptedData& encrypted = b.Get(SPECIFICS).encrypted(); local
2397 const sync_pb::EncryptedData& encrypted = original_specifics.encrypted(); local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap.h264 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.h275 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap.h275 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap.h275 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
/external/dropbear/
H A Dkeyimport.c355 int encrypted; member in struct:openssh_key
373 ret->encrypted = 0;
423 ret->encrypted = 1;
467 if (ret->encrypted && ret->keyblob_len % 8 != 0) {
501 ret = key->encrypted;
529 if (key->encrypted) {
530 errmsg = "encrypted keys not supported currently";
987 * - string cipher-type (tells you if key is encrypted)
988 * - string encrypted-blob
995 * The encrypted blo
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dikev2_common.h320 const u8 *encrypted; member in struct:ikev2_payloads
332 const u8 *encrypted, size_t encrypted_len,
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.h314 const u8 *encrypted; member in struct:ikev2_payloads
326 const u8 *encrypted, size_t encrypted_len,
/external/wpa_supplicant_8/src/eap_common/
H A Dikev2_common.h314 const u8 *encrypted; member in struct:ikev2_payloads
326 const u8 *encrypted, size_t encrypted_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dikev2_common.h314 const u8 *encrypted; member in struct:ikev2_payloads
326 const u8 *encrypted, size_t encrypted_len,
/external/ipsec-tools/src/racoon/
H A Disakmp_inf.c139 int encrypted;
143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
147 if (encrypted) {
180 if (encrypted) {
262 /* make sure the packet was encrypted after the beginning of phase 1. */
274 "%s message must be encrypted\n",
295 msgid, encrypted);
300 msgid, encrypted);
331 isakmp_info_recv_n(iph1, notify, msgid, encrypted)
335 int encrypted;
138 int encrypted; local
[all...]

Completed in 529 milliseconds

123