Searched refs:decrypter (Results 1 - 14 of 14) sorted by relevance

/external/chromium_org/net/quic/crypto/
H A Dnull_decrypter_test.cc28 NullDecrypter decrypter; local
30 decrypter.DecryptPacket(0, "hello world!", StringPiece(data, len)));
47 NullDecrypter decrypter; local
49 decrypter.DecryptPacket(0, "hello world!", StringPiece(data, len)));
62 NullDecrypter decrypter; local
64 decrypter.DecryptPacket(0, "hello world!", StringPiece(data, len)));
H A Dchacha20_poly1305_decrypter_test.cc71 // DecryptWithNonce wraps the |Decrypt| method of |decrypter| to allow passing
73 QuicData* DecryptWithNonce(ChaCha20Poly1305Decrypter* decrypter, argument
80 if (!decrypter->Decrypt(nonce, associated_data, ciphertext,
112 ChaCha20Poly1305Decrypter decrypter; local
113 ASSERT_TRUE(decrypter.SetKey(key));
115 &decrypter, iv,
116 // This deliberately tests that the decrypter can handle an AAD that
H A Dcrypto_secret_boxer.cc85 scoped_ptr<QuicDecrypter> decrypter(QuicDecrypter::Create(kAESG));
86 if (!decrypter->SetKey(key_)) {
87 DLOG(DFATAL) << "CryptoSecretBoxer's decrypter->SetKey failed.";
90 if (!decrypter->Decrypt(StringPiece(nonce, kBoxNonceSize), StringPiece(),
H A Daes_128_gcm_12_decrypter_test.cc253 // DecryptWithNonce wraps the |Decrypt| method of |decrypter| to allow passing
255 QuicData* DecryptWithNonce(Aes128Gcm12Decrypter* decrypter, argument
262 if (!decrypter->Decrypt(nonce, associated_data, ciphertext,
313 Aes128Gcm12Decrypter decrypter; local
314 ASSERT_TRUE(decrypter.SetKey(key));
317 &decrypter, iv,
318 // This deliberately tests that the decrypter can handle an AAD that
H A Dcrypto_utils.cc90 crypters->decrypter.reset(QuicDecrypter::Create(aead));
108 !crypters->decrypter->SetKey(hkdf.client_write_key()) ||
109 !crypters->decrypter->SetNoncePrefix(hkdf.client_write_iv())) {
115 !crypters->decrypter->SetKey(hkdf.server_write_key()) ||
116 !crypters->decrypter->SetNoncePrefix(hkdf.server_write_iv())) {
H A Dcrypto_handshake.h85 // A CrypterPair contains the encrypter and decrypter for an encryption level.
90 scoped_ptr<QuicDecrypter> decrypter; member in struct:net::CrypterPair
H A Dquic_crypto_server_config.cc693 scoped_ptr<QuicData> cetv_plaintext(crypters.decrypter->DecryptPacket(
/external/chromium_org/net/quic/
H A Dquic_framer.h329 // SetDecrypter sets the primary decrypter, replacing any that already exists,
330 // and takes ownership. If an alternative decrypter is in place then the
332 // packets will be using the new decrypter and the previous decrypter is now
333 // obsolete. |level| indicates the encryption level of the new decrypter.
334 void SetDecrypter(QuicDecrypter* decrypter, EncryptionLevel level);
336 // SetAlternativeDecrypter sets a decrypter that may be used to decrypt
338 // level of the decrypter. If |latch_once_used| is true, then the first time
339 // that the decrypter is successful it will replace the primary decrypter
[all...]
H A Dquic_crypto_server_stream.cc125 // Set the decrypter immediately so that we no longer accept unencrypted
128 crypto_negotiated_params_.initial_crypters.decrypter.release(),
147 crypto_negotiated_params_.forward_secure_crypters.decrypter.release(),
H A Dquic_connection.h476 // SetDecrypter sets the primary decrypter, replacing any that already exists,
477 // and takes ownership. If an alternative decrypter is in place then the
479 // packets will be using the new decrypter and the previous decrypter is now
480 // obsolete. |level| indicates the encryption level of the new decrypter.
481 void SetDecrypter(QuicDecrypter* decrypter, EncryptionLevel level);
483 // SetAlternativeDecrypter sets a decrypter that may be used to decrypt
485 // level of the decrypter. If |latch_once_used| is true, then the first time
486 // that the decrypter is successful it will replace the primary decrypter
[all...]
H A Dquic_crypto_client_stream.cc265 crypto_negotiated_params_.initial_crypters.decrypter.release(),
373 // decrypter latched and became the primary decrypter. That happens
390 // decrypter latched and became the primary decrypter. That happens
419 // TODO(agl): we don't currently latch this decrypter because the idea
424 crypters->decrypter.release(), ENCRYPTION_FORWARD_SECURE,
H A Dquic_connection.cc1033 // which decrypter will be used on an ack packet following a handshake
1649 void QuicConnection::SetDecrypter(QuicDecrypter* decrypter, argument
1651 framer_.SetDecrypter(decrypter, level);
1654 void QuicConnection::SetAlternativeDecrypter(QuicDecrypter* decrypter, argument
1657 framer_.SetAlternativeDecrypter(decrypter, level, latch_once_used);
1660 const QuicDecrypter* QuicConnection::decrypter() const { function in class:net::QuicConnection
1661 return framer_.decrypter();
H A Dquic_framer.cc1651 void QuicFramer::SetDecrypter(QuicDecrypter* decrypter, argument
1655 decrypter_.reset(decrypter);
1659 void QuicFramer::SetAlternativeDecrypter(QuicDecrypter* decrypter, argument
1662 alternative_decrypter_.reset(decrypter);
1667 const QuicDecrypter* QuicFramer::decrypter() const { function in class:net::QuicFramer
1756 // Switch to the alternative decrypter and latch so that we cannot
1762 // Switch the alternative decrypter so that we use it first next time.
/external/chromium_org/net/quic/test_tools/
H A Dcrypto_test_utils.cc421 client->session()->connection()->decrypter());
429 server->session()->connection()->decrypter());

Completed in 2709 milliseconds