/external/chromium_org/net/quic/crypto/ |
H A D | null_decrypter.cc | 24 StringPiece ciphertext, 27 QuicDataReader reader(ciphertext.data(), ciphertext.length()); 49 StringPiece ciphertext) { 52 QuicDataReader reader(ciphertext.data(), ciphertext.length()); 22 Decrypt(StringPiece , StringPiece associated_data, StringPiece ciphertext, unsigned char* output, size_t* output_length) argument 47 DecryptPacket(QuicPacketSequenceNumber , StringPiece associated_data, StringPiece ciphertext) argument
|
H A D | aead_base_decrypter_nss.cc | 52 StringPiece ciphertext, 55 if (ciphertext.length() < auth_tag_size_ || 60 // the ciphertext (NSS bug 63 // |ciphertext| on entry. 64 size_t plaintext_size = ciphertext.length() - auth_tag_size_; 104 output, &output_len, ciphertext.length(), 105 reinterpret_cast<const unsigned char*>(ciphertext.data()), 106 ciphertext.length()) != SECSuccess) { 121 StringPiece ciphertext) { 122 if (ciphertext 50 Decrypt(StringPiece nonce, StringPiece associated_data, StringPiece ciphertext, uint8* output, size_t* output_length) argument 118 DecryptPacket( QuicPacketSequenceNumber sequence_number, StringPiece associated_data, StringPiece ciphertext) argument [all...] |
H A D | null_decrypter.h | 29 base::StringPiece ciphertext, 34 base::StringPiece ciphertext) OVERRIDE;
|
H A D | quic_decrypter.h | 42 // Decrypt authenticates |associated_data| and |ciphertext| and then decrypts 43 // |ciphertext| into |output|, using |nonce|. |nonce| must be 8 bytes longer 45 // encrypter). |output| must be as long as |ciphertext| on entry and, on 50 base::StringPiece ciphertext, 55 // |ciphertext| or NULL if there is an error. |sequence_number| is 62 base::StringPiece ciphertext) = 0;
|
H A D | chacha20_poly1305_decrypter_test.cc | 39 // Modify the ciphertext (ChaCha20 encryption output). 47 // Modify the ciphertext (Poly1305 authenticator). 76 StringPiece ciphertext) { 77 size_t plaintext_size = ciphertext.length(); 80 if (!decrypter->Decrypt(nonce, associated_data, ciphertext, 73 DecryptWithNonce(ChaCha20Poly1305Decrypter* decrypter, StringPiece nonce, StringPiece associated_data, StringPiece ciphertext) argument
|
H A D | chacha20_poly1305_encrypter_test.cc | 43 // in an nonce and also to allocate the buffer needed for the ciphertext. 49 scoped_ptr<char[]> ciphertext(new char[ciphertext_size]); 52 reinterpret_cast<unsigned char*>(ciphertext.get()))) { 56 return new QuicData(ciphertext.release(), ciphertext_size, true); 87 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(),
|
H A D | crypto_secret_boxer.h | 32 // returns the resulting ciphertext. Since an authenticator and nonce are 36 // Unbox takes the result of a previous call to |Box| in |ciphertext| and 37 // authenticates+decrypts it. If |ciphertext| is not authentic then it 41 bool Unbox(base::StringPiece ciphertext,
|
H A D | aes_128_gcm_12_decrypter_test.cc | 258 StringPiece ciphertext) { 259 size_t plaintext_size = ciphertext.length(); 262 if (!decrypter->Decrypt(nonce, associated_data, ciphertext, 311 string ciphertext = ct + tag; local 320 aad.length() ? aad : StringPiece(), ciphertext)); 255 DecryptWithNonce(Aes128Gcm12Decrypter* decrypter, StringPiece nonce, StringPiece associated_data, StringPiece ciphertext) argument
|
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
H A D | aes.py | 26 #CBC-Mode encryption, returns ciphertext 33 def decrypt(self, ciphertext): 34 assert(len(ciphertext) % 16 == 0
|
H A D | openssl_rc4.py | 27 def decrypt(self, ciphertext): 28 return bytearray(self.encrypt(ciphertext))
|
H A D | rc4.py | 18 def decrypt(self, ciphertext):
|
H A D | python_aes.py | 47 def decrypt(self, ciphertext): 48 AES.decrypt(self, ciphertext) 50 ciphertextBytes = ciphertext[:]
|
H A D | python_rc4.py | 40 def decrypt(self, ciphertext): 41 return self.encrypt(ciphertext)
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | crypto_verify_impl.cc | 73 std::vector<uint8> ciphertext; local 75 public_key_data, data, &ciphertext)) { 80 base::Base64Encode(std::string(ciphertext.begin(), ciphertext.end()),
|
H A D | networking_private_credentials_getter_mac.cc | 60 std::vector<uint8> ciphertext; local 62 public_key_data, key_data, &ciphertext)) { 68 base::Base64Encode(std::string(ciphertext.begin(), ciphertext.end()),
|
H A D | networking_private_credentials_getter_win.cc | 81 std::vector<uint8> ciphertext; local 83 public_key_, key_data, &ciphertext)) { 89 base::Base64Encode(std::string(ciphertext.begin(), ciphertext.end()),
|
/external/chromium_org/chrome/browser/net/ |
H A D | cookie_store_util.cc | 133 std::string* ciphertext) OVERRIDE; 134 virtual bool DecryptString(const std::string& ciphertext, 139 std::string* ciphertext) { 140 return OSCrypt::EncryptString(plaintext, ciphertext); 143 bool CookieOSCryptoDelegate::DecryptString(const std::string& ciphertext, argument 145 return OSCrypt::DecryptString(ciphertext, plaintext); 138 EncryptString(const std::string& plaintext, std::string* ciphertext) argument
|
/external/chromium_org/crypto/ |
H A D | encryptor_nss.cc | 75 std::string* ciphertext) { 85 CryptCTR(context.get(), plaintext, ciphertext) : 86 Crypt(context.get(), plaintext, ciphertext); 89 bool Encryptor::Decrypt(const base::StringPiece& ciphertext, argument 91 CHECK(!ciphertext.empty()); 99 return CryptCTR(context.get(), ciphertext, plaintext); 101 if (ciphertext.size() % AES_BLOCK_SIZE != 0) { 109 return Crypt(context.get(), ciphertext, plaintext); 74 Encrypt(const base::StringPiece& plaintext, std::string* ciphertext) argument
|
H A D | encryptor_openssl.cc | 74 std::string* ciphertext) { 77 CryptCTR(true, plaintext, ciphertext) : 78 Crypt(true, plaintext, ciphertext); 81 bool Encryptor::Decrypt(const base::StringPiece& ciphertext, argument 83 CHECK(!ciphertext.empty()); 85 CryptCTR(false, ciphertext, plaintext) : 86 Crypt(false, ciphertext, plaintext); 73 Encrypt(const base::StringPiece& plaintext, std::string* ciphertext) argument
|
H A D | encryptor_unittest.cc | 27 std::string ciphertext; local 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 30 EXPECT_LT(0U, ciphertext.size()); 33 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decrypted)); 71 std::string ciphertext; local 72 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 81 ASSERT_EQ(arraysize(expected_ciphertext), ciphertext.size()); 82 for (size_t i = 0; i < ciphertext.size(); ++i) { 84 static_cast<unsigned char>(ciphertext[i])); 98 EXPECT_FALSE(decryptor.Decrypt(ciphertext, 183 TestAESCTREncrypt( const unsigned char* key, size_t key_size, const unsigned char* init_counter, size_t init_counter_size, const unsigned char* plaintext, size_t plaintext_size, const unsigned char* ciphertext, size_t ciphertext_size) argument 215 TestAESCTRMultipleDecrypt( const unsigned char* key, size_t key_size, const unsigned char* init_counter, size_t init_counter_size, const unsigned char* plaintext, size_t plaintext_size, const unsigned char* ciphertext, size_t ciphertext_size) argument 295 std::string ciphertext; local 419 std::string ciphertext; local 449 std::string ciphertext; local 501 std::string ciphertext; local [all...] |
H A D | encryptor.h | 66 // Encrypts |plaintext| into |ciphertext|. |plaintext| may only be empty if 68 bool Encrypt(const base::StringPiece& plaintext, std::string* ciphertext); 70 // Decrypts |ciphertext| into |plaintext|. |ciphertext| must not be empty. 74 // tampered ciphertext or a wrong decryption key. But successful decryption 76 // must either authenticate the ciphertext before decrypting it, or take 79 bool Decrypt(const base::StringPiece& ciphertext, std::string* plaintext); 107 // |ciphertext|. |ciphertext| must have at least |plaintext_len| bytes. 111 void* ciphertext) cons [all...] |
/external/openssl/crypto/evp/ |
H A D | evp_test.c | 139 const unsigned char *ciphertext,int cn, 152 hexdump(stdout,"Ciphertext",ciphertext,cn); 191 if(memcmp(out,ciphertext,cn)) 195 hexdump(stderr,"Expected",ciphertext,cn); 210 if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn)) 247 const unsigned char *ciphertext,int cn, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 263 const unsigned char *ciphertext, unsigned int cn) 276 hexdump(stdout,"Digest",ciphertext,cn); 305 if(memcmp(md,ciphertext,c 136 test1(const EVP_CIPHER *c,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 244 test_cipher(const char *cipher,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 261 test_digest(const char *digest, const unsigned char *plaintext,int pn, const unsigned char *ciphertext, unsigned int cn) argument 369 unsigned char *iv,*key,*plaintext,*ciphertext; local [all...] |
/external/chromium_org/sync/util/ |
H A D | nigori.cc | 133 std::string ciphertext; 134 if (!encryptor.Encrypt(plaintext.str(), &ciphertext)) 146 if (!hmac.Sign(ciphertext, &hash[0], hash.size())) 150 output.assign(ciphertext); 169 std::string ciphertext; 170 if (!encryptor.Encrypt(value, &ciphertext)) 182 if (!hmac.Sign(ciphertext, &hash[0], hash.size())) 187 output.append(ciphertext); 204 // * ciphertext (multiple of 16 bytes) 207 std::string ciphertext(inpu [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/modes/ |
H A D | gcm_test.c | 64 const char *ciphertext; member in struct:test_case 317 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local 328 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, 329 "ciphertext") || 335 fprintf(stderr, "%u: plaintext and ciphertext have differing lengths.\n", 366 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { 369 hexdump("want", ciphertext, plaintext_len); 378 if (ciphertext) { [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | cipher_test.c | 127 const uint8_t *ciphertext, int cn, const uint8_t *aad, int an, 141 hexdump(stdout, "Ciphertext", ciphertext, cn); 201 if (memcmp(out, ciphertext, cn)) { 204 hexdump(stderr, "Expected", ciphertext, cn); 260 if (!EVP_DecryptUpdate(&ctx, out, &outl, ciphertext, cn)) { 293 int pn, const uint8_t *ciphertext, int cn, 325 test1(c, key, kn, iv, in, plaintext, pn, ciphertext, cn, aad, an, tag, tn, 356 uint8_t *iv, *key, *plaintext, *ciphertext, *aad, *tag; local 373 ciphertext = ustrsep(&p, ":"); 397 cn = convert(ciphertext); 125 test1(const EVP_CIPHER *c, const uint8_t *key, int kn, const uint8_t *iv, int in, const uint8_t *plaintext, int pn, const uint8_t *ciphertext, int cn, const uint8_t *aad, int an, const uint8_t *tag, int tn, int encdec) argument 291 test_cipher(const char *cipher, const uint8_t *key, int kn, const uint8_t *iv, int in, const uint8_t *plaintext, int pn, const uint8_t *ciphertext, int cn, const uint8_t *aad, int an, const uint8_t *tag, int tn, int encdec) argument [all...] |