Searched refs:encrypted (Results 1 - 25 of 125) sorted by relevance

12345

/external/chromium_org/sync/util/
H A Dcryptographer_unittest.cc35 sync_pb::EncryptedData encrypted; local
36 encrypted.set_key_name("foo");
37 encrypted.set_blob("bar");
39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted));
45 sync_pb::EncryptedData encrypted; local
47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted));
55 sync_pb::EncryptedData encrypted; local
56 encrypted.set_key_name("foo");
57 encrypted.set_blob("bar");
59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted));
72 sync_pb::EncryptedData encrypted; local
91 sync_pb::EncryptedData encrypted; local
149 sync_pb::EncryptedData encrypted; local
199 sync_pb::EncryptedData encrypted; local
[all...]
H A Dnigori_unittest.cc70 std::string encrypted = local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext));
87 std::string encrypted; local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
102 std::string encrypted; local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a');
109 EXPECT_TRUE(nigori.Decrypt(encrypted,
120 std::string encrypted; local
[all...]
H A Dcryptographer.h41 // SetPendingKeys should be called with the encrypted contents of that node.
46 // Whenever a update to an encrypted node is received from the server,
67 // Returns whether we can decrypt |encrypted| using the keys we currently know
69 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const;
71 // Returns whether |encrypted| can be decrypted using the default encryption
73 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const;
75 // Encrypts |message| into |encrypted|. Does not overwrite |encrypted| if
76 // |message| already matches the decrypted data within |encrypted| and
77 // |encrypted| wa
[all...]
H A Dcryptographer.cc58 sync_pb::EncryptedData* encrypted) const {
59 DCHECK(encrypted);
71 return EncryptString(serialized, encrypted);
76 sync_pb::EncryptedData* encrypted) const {
77 if (CanDecryptUsingDefaultKey(*encrypted)) {
78 const std::string& original_serialized = DecryptToString(*encrypted);
80 DVLOG(2) << "Re-encryption unnecessary, encrypted data already matches.";
92 encrypted->set_key_name(default_nigori_name_);
94 encrypted->mutable_blob())) {
101 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, argument
202 InstallKeys(const sync_pb::EncryptedData& encrypted) argument
216 SetPendingKeys(const sync_pb::EncryptedData& encrypted) argument
[all...]
/external/chromium_org/net/quic/crypto/
H A Dnull_encrypter_test.cc27 scoped_ptr<QuicData> encrypted(
29 ASSERT_TRUE(encrypted.get());
31 "encrypted data", encrypted->data(), encrypted->length(),
H A Dchacha20_poly1305_encrypter_test.cc80 scoped_ptr<QuicData> encrypted(EncryptWithNonce(
85 ASSERT_TRUE(encrypted.get());
87 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(),
88 encrypted->length(), ct.data(),
H A Daes_128_gcm_12_encrypter_test.cc257 scoped_ptr<QuicData> encrypted(EncryptWithNonce(
262 ASSERT_TRUE(encrypted.get());
270 ASSERT_EQ(ct.length() + tag.length(), encrypted->length());
271 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(),
274 "authentication tag", encrypted->data() + ct.length(), tag.length(),
/external/chromium_org/sync/internal_api/
H A Dsyncapi_internal.cc29 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local
32 if (!crypto->Decrypt(encrypted, data.get()))
80 // Note that we can't compare encrypted strings directly as they are seeded
84 if (!cryptographer->CanDecrypt(left.encrypted())) {
88 left_plaintext = cryptographer->DecryptToString(left.encrypted());
93 if (!cryptographer->CanDecrypt(right.encrypted())) {
97 right_plaintext = cryptographer->DecryptToString(right.encrypted());
/external/chromium_org/third_party/libvpx/source/libvpx/test/
H A Dvp8_decrypt_test.cc62 std::vector<uint8_t> encrypted(video.frame_size());
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0);
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
H A Dvp9_decrypt_test.cc62 std::vector<uint8_t> encrypted(video.frame_size());
63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0);
64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
/external/chromium_org/third_party/libjingle/source/talk/xmpp/
H A Dsaslhandler.h49 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) = 0;
H A Dplainsaslhandler.h46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument
48 if (!encrypted && !allow_plain_) {
/external/chromium_org/media/base/
H A Ddecryptor.h23 // Decrypts (and decodes) encrypted buffer.
64 // - Set to kSuccess if the encrypted buffer is successfully decrypted and
66 // - Set to kNoKey if no decryption key is available to decrypt the encrypted
75 // Decrypts the |encrypted| buffer. The decrypt status and decrypted buffer
76 // are returned via the provided callback |decrypt_cb|. The |encrypted| buffer
82 const scoped_refptr<DecoderBuffer>& encrypted,
111 // - Set to kSuccess if the encrypted buffer is successfully decrypted and
117 // - Set to kNoKey if no decryption key is available to decrypt the encrypted
128 // Decrypts and decodes the |encrypted| buffer. The status and the decrypted
130 // The |encrypted| buffe
[all...]
/external/libvpx/libvpx/test/
H A Dvp8_decrypt_test.cc63 std::vector<uint8_t> encrypted(video.frame_size());
64 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0);
65 vp8_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
H A DAbstractSampleEncryptionBox.java165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted);
216 public Pair createPair(int clear, long encrypted) { argument
217 return new Pair(clear, encrypted);
223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair
225 public Pair(int clear, long encrypted) { argument
227 this.encrypted = encrypted;
244 if (encrypted != pair.encrypted) {
254 result = 31 * result + (int) (encrypted
[all...]
/external/lzma/CPP/7zip/UI/Common/
H A DIFileExtractCallback.h31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
/external/lzma/CPP/7zip/UI/Console/
H A DExtractCallbackConsole.h39 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted);
42 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
H A DExtractCallbackConsole.cpp43 static const char *kCrcFailedEncrypted = "CRC Failed in encrypted file. Wrong password?";
45 static const char *kDataErrorEncrypted = "Data Error in encrypted file. Wrong password?";
108 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted) argument
125 (*OutStream) << (encrypted ? kCrcFailedEncrypted: kCrcFailed);
128 (*OutStream) << (encrypted ? kDataErrorEncrypted : kDataError);
168 HRESULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted) argument
176 (*OutStream) << (encrypted ?
177 "Can not open encrypted archive. Wrong password?" :
/external/chromium_org/sync/engine/
H A Dconflict_resolver.cc70 // b) All unsynced changes have been re-encrypted with the default key (
77 // encrypted with the default key, and all other visible properties match,
117 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted()));
119 specifics.encrypted());
126 server_specifics.encrypted());
128 server_specifics.encrypted());
145 base_server_specifics.encrypted());
/external/chromium_org/media/cdm/
H A Daes_decryptor.h26 // Decrypts an AES encrypted buffer into an unencrypted buffer. The AES
54 const scoped_refptr<DecoderBuffer>& encrypted,
62 const scoped_refptr<DecoderBuffer>& encrypted,
65 const scoped_refptr<DecoderBuffer>& encrypted,
H A Daes_decryptor.cc188 // No need to decrypt if there is no encrypted data.
194 // The encrypted portions of all subsamples must form a contiguous block,
195 // such that an encrypted subsample that ends away from a block boundary is
196 // immediately followed by the start of the next encrypted subsample. We
197 // copy all encrypted subsamples to a contiguous buffer, decrypt them, then
198 // copy the decrypted bytes over the encrypted bytes in the output.
357 const scoped_refptr<DecoderBuffer>& encrypted,
359 CHECK(encrypted->decrypt_config());
363 if (encrypted->decrypt_config()->iv().empty()) {
364 decrypted = DecoderBuffer::CopyFrom(encrypted
356 Decrypt(StreamType stream_type, const scoped_refptr<DecoderBuffer>& encrypted, const DecryptCB& decrypt_cb) argument
405 DecryptAndDecodeAudio( const scoped_refptr<DecoderBuffer>& encrypted, const AudioDecodeCB& audio_decode_cb) argument
411 DecryptAndDecodeVideo( const scoped_refptr<DecoderBuffer>& encrypted, const VideoDecodeCB& video_decode_cb) argument
[all...]
/external/chromium_org/net/quic/
H A Dquic_framer_test.cc408 bool CheckDecryption(const QuicEncryptedPacket& encrypted, argument
418 encrypted, PACKET_8BYTE_CONNECTION_ID,
423 encrypted, PACKET_8BYTE_CONNECTION_ID,
428 StringPiece ciphertext(encrypted.AsStringPiece().substr(
448 QuicEncryptedPacket encrypted(AsChars(packet), len, false);
449 EXPECT_FALSE(framer_.ProcessPacket(encrypted)) << "len: " << len;
619 QuicEncryptedPacket encrypted(packet, 0, false);
620 EXPECT_FALSE(framer_.ProcessPacket(encrypted));
645 QuicEncryptedPacket encrypted(AsChars(packet), arraysize(packet), false);
646 EXPECT_FALSE(framer_.ProcessPacket(encrypted));
[all...]
/external/chromium_org/components/signin/core/browser/webdata/
H A Dtoken_service_table.cc74 bool encrypted = OSCrypt::EncryptString(token, &encrypted_token); local
75 if (!encrypted) {
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/
H A DCencSampleEncryptionInformationGroupEntry.java64 public void setEncrypted(int encrypted) { argument
65 isEncrypted = encrypted;
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
H A Dp12_add.c166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm);
197 p7->d.encrypted->enc_data->algorithm = pbe;
198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data);
199 if (!(p7->d.encrypted->enc_data->enc_data =
212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
215 p7->d.encrypted->enc_data->enc_data, 1);

Completed in 1287 milliseconds

12345