/external/chromium_org/net/quic/crypto/ |
H A D | null_decrypter_test.cc | 28 NullDecrypter decrypter; local 30 decrypter.DecryptPacket(0, "hello world!", StringPiece(data, len))); 47 NullDecrypter decrypter; local 49 decrypter.DecryptPacket(0, "hello world!", StringPiece(data, len))); 62 NullDecrypter decrypter; local 64 decrypter.DecryptPacket(0, "hello world!", StringPiece(data, len)));
|
H A D | chacha20_poly1305_decrypter_test.cc | 71 // DecryptWithNonce wraps the |Decrypt| method of |decrypter| to allow passing 73 QuicData* DecryptWithNonce(ChaCha20Poly1305Decrypter* decrypter, argument 80 if (!decrypter->Decrypt(nonce, associated_data, ciphertext, 112 ChaCha20Poly1305Decrypter decrypter; local 113 ASSERT_TRUE(decrypter.SetKey(key)); 115 &decrypter, iv, 116 // This deliberately tests that the decrypter can handle an AAD that
|
H A D | crypto_secret_boxer.cc | 85 scoped_ptr<QuicDecrypter> decrypter(QuicDecrypter::Create(kAESG)); 86 if (!decrypter->SetKey(key_)) { 87 DLOG(DFATAL) << "CryptoSecretBoxer's decrypter->SetKey failed."; 90 if (!decrypter->Decrypt(StringPiece(nonce, kBoxNonceSize), StringPiece(),
|
H A D | aes_128_gcm_12_decrypter_test.cc | 253 // DecryptWithNonce wraps the |Decrypt| method of |decrypter| to allow passing 255 QuicData* DecryptWithNonce(Aes128Gcm12Decrypter* decrypter, argument 262 if (!decrypter->Decrypt(nonce, associated_data, ciphertext, 313 Aes128Gcm12Decrypter decrypter; local 314 ASSERT_TRUE(decrypter.SetKey(key)); 317 &decrypter, iv, 318 // This deliberately tests that the decrypter can handle an AAD that
|
H A D | crypto_utils.cc | 90 crypters->decrypter.reset(QuicDecrypter::Create(aead)); 108 !crypters->decrypter->SetKey(hkdf.client_write_key()) || 109 !crypters->decrypter->SetNoncePrefix(hkdf.client_write_iv())) { 115 !crypters->decrypter->SetKey(hkdf.server_write_key()) || 116 !crypters->decrypter->SetNoncePrefix(hkdf.server_write_iv())) {
|
H A D | crypto_handshake.h | 85 // A CrypterPair contains the encrypter and decrypter for an encryption level. 90 scoped_ptr<QuicDecrypter> decrypter; member in struct:net::CrypterPair
|
H A D | quic_crypto_server_config.cc | 693 scoped_ptr<QuicData> cetv_plaintext(crypters.decrypter->DecryptPacket(
|
/external/chromium_org/net/quic/ |
H A D | quic_framer.h | 329 // SetDecrypter sets the primary decrypter, replacing any that already exists, 330 // and takes ownership. If an alternative decrypter is in place then the 332 // packets will be using the new decrypter and the previous decrypter is now 333 // obsolete. |level| indicates the encryption level of the new decrypter. 334 void SetDecrypter(QuicDecrypter* decrypter, EncryptionLevel level); 336 // SetAlternativeDecrypter sets a decrypter that may be used to decrypt 338 // level of the decrypter. If |latch_once_used| is true, then the first time 339 // that the decrypter is successful it will replace the primary decrypter [all...] |
H A D | quic_crypto_server_stream.cc | 125 // Set the decrypter immediately so that we no longer accept unencrypted 128 crypto_negotiated_params_.initial_crypters.decrypter.release(), 147 crypto_negotiated_params_.forward_secure_crypters.decrypter.release(),
|
H A D | quic_connection.h | 476 // SetDecrypter sets the primary decrypter, replacing any that already exists, 477 // and takes ownership. If an alternative decrypter is in place then the 479 // packets will be using the new decrypter and the previous decrypter is now 480 // obsolete. |level| indicates the encryption level of the new decrypter. 481 void SetDecrypter(QuicDecrypter* decrypter, EncryptionLevel level); 483 // SetAlternativeDecrypter sets a decrypter that may be used to decrypt 485 // level of the decrypter. If |latch_once_used| is true, then the first time 486 // that the decrypter is successful it will replace the primary decrypter [all...] |
H A D | quic_crypto_client_stream.cc | 265 crypto_negotiated_params_.initial_crypters.decrypter.release(), 373 // decrypter latched and became the primary decrypter. That happens 390 // decrypter latched and became the primary decrypter. That happens 419 // TODO(agl): we don't currently latch this decrypter because the idea 424 crypters->decrypter.release(), ENCRYPTION_FORWARD_SECURE,
|
H A D | quic_connection.cc | 1033 // which decrypter will be used on an ack packet following a handshake 1649 void QuicConnection::SetDecrypter(QuicDecrypter* decrypter, argument 1651 framer_.SetDecrypter(decrypter, level); 1654 void QuicConnection::SetAlternativeDecrypter(QuicDecrypter* decrypter, argument 1657 framer_.SetAlternativeDecrypter(decrypter, level, latch_once_used); 1660 const QuicDecrypter* QuicConnection::decrypter() const { function in class:net::QuicConnection 1661 return framer_.decrypter();
|
H A D | quic_framer.cc | 1651 void QuicFramer::SetDecrypter(QuicDecrypter* decrypter, argument 1655 decrypter_.reset(decrypter); 1659 void QuicFramer::SetAlternativeDecrypter(QuicDecrypter* decrypter, argument 1662 alternative_decrypter_.reset(decrypter); 1667 const QuicDecrypter* QuicFramer::decrypter() const { function in class:net::QuicFramer 1756 // Switch to the alternative decrypter and latch so that we cannot 1762 // Switch the alternative decrypter so that we use it first next time.
|
/external/chromium_org/net/quic/test_tools/ |
H A D | crypto_test_utils.cc | 421 client->session()->connection()->decrypter()); 429 server->session()->connection()->decrypter());
|