/external/chromium_org/sync/util/ |
H A D | cryptographer_unittest.cc | 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 45 sync_pb::EncryptedData encrypted; local 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); 55 sync_pb::EncryptedData encrypted; local 56 encrypted.set_key_name("foo"); 57 encrypted.set_blob("bar"); 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 72 sync_pb::EncryptedData encrypted; local 91 sync_pb::EncryptedData encrypted; local 149 sync_pb::EncryptedData encrypted; local 199 sync_pb::EncryptedData encrypted; local [all...] |
H A D | nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, 120 std::string encrypted; local [all...] |
H A D | cryptographer.h | 41 // SetPendingKeys should be called with the encrypted contents of that node. 46 // Whenever a update to an encrypted node is received from the server, 67 // Returns whether we can decrypt |encrypted| using the keys we currently know 69 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const; 71 // Returns whether |encrypted| can be decrypted using the default encryption 73 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const; 75 // Encrypts |message| into |encrypted|. Does not overwrite |encrypted| if 76 // |message| already matches the decrypted data within |encrypted| and 77 // |encrypted| wa [all...] |
H A D | cryptographer.cc | 58 sync_pb::EncryptedData* encrypted) const { 59 DCHECK(encrypted); 71 return EncryptString(serialized, encrypted); 76 sync_pb::EncryptedData* encrypted) const { 77 if (CanDecryptUsingDefaultKey(*encrypted)) { 78 const std::string& original_serialized = DecryptToString(*encrypted); 80 DVLOG(2) << "Re-encryption unnecessary, encrypted data already matches."; 92 encrypted->set_key_name(default_nigori_name_); 94 encrypted->mutable_blob())) { 101 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, argument 202 InstallKeys(const sync_pb::EncryptedData& encrypted) argument 216 SetPendingKeys(const sync_pb::EncryptedData& encrypted) argument [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | null_encrypter_test.cc | 27 scoped_ptr<QuicData> encrypted( 29 ASSERT_TRUE(encrypted.get()); 31 "encrypted data", encrypted->data(), encrypted->length(),
|
H A D | chacha20_poly1305_encrypter_test.cc | 80 scoped_ptr<QuicData> encrypted(EncryptWithNonce( 85 ASSERT_TRUE(encrypted.get()); 87 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(), 88 encrypted->length(), ct.data(),
|
H A D | aes_128_gcm_12_encrypter_test.cc | 257 scoped_ptr<QuicData> encrypted(EncryptWithNonce( 262 ASSERT_TRUE(encrypted.get()); 270 ASSERT_EQ(ct.length() + tag.length(), encrypted->length()); 271 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(), 274 "authentication tag", encrypted->data() + ct.length(), tag.length(),
|
/external/chromium_org/sync/internal_api/ |
H A D | syncapi_internal.cc | 29 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 32 if (!crypto->Decrypt(encrypted, data.get())) 80 // Note that we can't compare encrypted strings directly as they are seeded 84 if (!cryptographer->CanDecrypt(left.encrypted())) { 88 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 93 if (!cryptographer->CanDecrypt(right.encrypted())) { 97 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
/external/chromium_org/third_party/libvpx/source/libvpx/test/ |
H A D | vp8_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
|
H A D | vp9_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslhandler.h | 49 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) = 0;
|
H A D | plainsaslhandler.h | 46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument 48 if (!encrypted && !allow_plain_) {
|
/external/chromium_org/media/base/ |
H A D | decryptor.h | 23 // Decrypts (and decodes) encrypted buffer. 64 // - Set to kSuccess if the encrypted buffer is successfully decrypted and 66 // - Set to kNoKey if no decryption key is available to decrypt the encrypted 75 // Decrypts the |encrypted| buffer. The decrypt status and decrypted buffer 76 // are returned via the provided callback |decrypt_cb|. The |encrypted| buffer 82 const scoped_refptr<DecoderBuffer>& encrypted, 111 // - Set to kSuccess if the encrypted buffer is successfully decrypted and 117 // - Set to kNoKey if no decryption key is available to decrypt the encrypted 128 // Decrypts and decodes the |encrypted| buffer. The status and the decrypted 130 // The |encrypted| buffe [all...] |
/external/libvpx/libvpx/test/ |
H A D | vp8_decrypt_test.cc | 63 std::vector<uint8_t> encrypted(video.frame_size()); 64 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); 65 vp8_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
H A D | AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); 216 public Pair createPair(int clear, long encrypted) { argument 217 return new Pair(clear, encrypted); 223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { argument 227 this.encrypted = encrypted; 244 if (encrypted != pair.encrypted) { 254 result = 31 * result + (int) (encrypted [all...] |
/external/lzma/CPP/7zip/UI/Common/ |
H A D | IFileExtractCallback.h | 31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
|
/external/lzma/CPP/7zip/UI/Console/ |
H A D | ExtractCallbackConsole.h | 39 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted);
42 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
|
H A D | ExtractCallbackConsole.cpp | 43 static const char *kCrcFailedEncrypted = "CRC Failed in encrypted file. Wrong password?";
45 static const char *kDataErrorEncrypted = "Data Error in encrypted file. Wrong password?";
108 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted)
argument 125 (*OutStream) << (encrypted ? kCrcFailedEncrypted: kCrcFailed);
128 (*OutStream) << (encrypted ? kDataErrorEncrypted : kDataError);
168 HRESULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted)
argument 176 (*OutStream) << (encrypted ?
177 "Can not open encrypted archive. Wrong password?" :
|
/external/chromium_org/sync/engine/ |
H A D | conflict_resolver.cc | 70 // b) All unsynced changes have been re-encrypted with the default key ( 77 // encrypted with the default key, and all other visible properties match, 117 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted())); 119 specifics.encrypted()); 126 server_specifics.encrypted()); 128 server_specifics.encrypted()); 145 base_server_specifics.encrypted());
|
/external/chromium_org/media/cdm/ |
H A D | aes_decryptor.h | 26 // Decrypts an AES encrypted buffer into an unencrypted buffer. The AES 54 const scoped_refptr<DecoderBuffer>& encrypted, 62 const scoped_refptr<DecoderBuffer>& encrypted, 65 const scoped_refptr<DecoderBuffer>& encrypted,
|
H A D | aes_decryptor.cc | 188 // No need to decrypt if there is no encrypted data. 194 // The encrypted portions of all subsamples must form a contiguous block, 195 // such that an encrypted subsample that ends away from a block boundary is 196 // immediately followed by the start of the next encrypted subsample. We 197 // copy all encrypted subsamples to a contiguous buffer, decrypt them, then 198 // copy the decrypted bytes over the encrypted bytes in the output. 357 const scoped_refptr<DecoderBuffer>& encrypted, 359 CHECK(encrypted->decrypt_config()); 363 if (encrypted->decrypt_config()->iv().empty()) { 364 decrypted = DecoderBuffer::CopyFrom(encrypted 356 Decrypt(StreamType stream_type, const scoped_refptr<DecoderBuffer>& encrypted, const DecryptCB& decrypt_cb) argument 405 DecryptAndDecodeAudio( const scoped_refptr<DecoderBuffer>& encrypted, const AudioDecodeCB& audio_decode_cb) argument 411 DecryptAndDecodeVideo( const scoped_refptr<DecoderBuffer>& encrypted, const VideoDecodeCB& video_decode_cb) argument [all...] |
/external/chromium_org/net/quic/ |
H A D | quic_framer_test.cc | 408 bool CheckDecryption(const QuicEncryptedPacket& encrypted, argument 418 encrypted, PACKET_8BYTE_CONNECTION_ID, 423 encrypted, PACKET_8BYTE_CONNECTION_ID, 428 StringPiece ciphertext(encrypted.AsStringPiece().substr( 448 QuicEncryptedPacket encrypted(AsChars(packet), len, false); 449 EXPECT_FALSE(framer_.ProcessPacket(encrypted)) << "len: " << len; 619 QuicEncryptedPacket encrypted(packet, 0, false); 620 EXPECT_FALSE(framer_.ProcessPacket(encrypted)); 645 QuicEncryptedPacket encrypted(AsChars(packet), arraysize(packet), false); 646 EXPECT_FALSE(framer_.ProcessPacket(encrypted)); [all...] |
/external/chromium_org/components/signin/core/browser/webdata/ |
H A D | token_service_table.cc | 74 bool encrypted = OSCrypt::EncryptString(token, &encrypted_token); local 75 if (!encrypted) {
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/ |
H A D | CencSampleEncryptionInformationGroupEntry.java | 64 public void setEncrypted(int encrypted) { argument 65 isEncrypted = encrypted;
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 197 p7->d.encrypted->enc_data->algorithm = pbe; 198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 199 if (!(p7->d.encrypted->enc_data->enc_data = 212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 215 p7->d.encrypted->enc_data->enc_data, 1);
|