/external/chromium_org/net/quic/crypto/ |
H A D | null_encrypter_test.cc | 27 scoped_ptr<QuicData> encrypted( 29 ASSERT_TRUE(encrypted.get()); 31 "encrypted data", encrypted->data(), encrypted->length(),
|
H A D | chacha20_poly1305_encrypter_test.cc | 80 scoped_ptr<QuicData> encrypted(EncryptWithNonce( 85 ASSERT_TRUE(encrypted.get()); 87 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(), 88 encrypted->length(), ct.data(),
|
H A D | aes_128_gcm_12_encrypter_test.cc | 257 scoped_ptr<QuicData> encrypted(EncryptWithNonce( 262 ASSERT_TRUE(encrypted.get()); 270 ASSERT_EQ(ct.length() + tag.length(), encrypted->length()); 271 test::CompareCharArraysWithHexError("ciphertext", encrypted->data(), 274 "authentication tag", encrypted->data() + ct.length(), tag.length(),
|
/external/chromium_org/sync/util/ |
H A D | nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, 120 std::string encrypted; local [all...] |
H A D | cryptographer.h | 41 // SetPendingKeys should be called with the encrypted contents of that node. 46 // Whenever a update to an encrypted node is received from the server, 68 // Returns whether we can decrypt |encrypted| using the keys we currently know 70 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const; 72 // Returns whether |encrypted| can be decrypted using the default encryption 74 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const; 76 // Encrypts |message| into |encrypted|. Does not overwrite |encrypted| if 77 // |message| already matches the decrypted data within |encrypted| and 78 // |encrypted| wa [all...] |
H A D | cryptographer_unittest.cc | 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 45 sync_pb::EncryptedData encrypted; local 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); 55 sync_pb::EncryptedData encrypted; local 56 encrypted.set_key_name("foo"); 57 encrypted.set_blob("bar"); 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 72 sync_pb::EncryptedData encrypted; local 91 sync_pb::EncryptedData encrypted; local 149 sync_pb::EncryptedData encrypted; local 199 sync_pb::EncryptedData encrypted; local [all...] |
H A D | cryptographer.cc | 76 sync_pb::EncryptedData* encrypted) const { 77 DCHECK(encrypted); 89 return EncryptString(serialized, encrypted); 94 sync_pb::EncryptedData* encrypted) const { 95 if (CanDecryptUsingDefaultKey(*encrypted)) { 96 const std::string& original_serialized = DecryptToString(*encrypted); 98 DVLOG(2) << "Re-encryption unnecessary, encrypted data already matches."; 110 encrypted->set_key_name(default_nigori_name_); 112 encrypted->mutable_blob())) { 119 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, argument 220 InstallKeys(const sync_pb::EncryptedData& encrypted) argument 234 SetPendingKeys(const sync_pb::EncryptedData& encrypted) argument [all...] |
/external/chromium_org/sync/internal_api/ |
H A D | syncapi_internal.cc | 30 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 33 if (!crypto->Decrypt(encrypted, data.get())) 81 // Note that we can't compare encrypted strings directly as they are seeded 85 if (!cryptographer->CanDecrypt(left.encrypted())) { 89 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 94 if (!cryptographer->CanDecrypt(right.encrypted())) { 98 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
/external/chromium_org/third_party/libvpx/source/libvpx/test/ |
H A D | vp8_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
|
H A D | vp9_decrypt_test.cc | 62 std::vector<uint8_t> encrypted(video.frame_size()); 63 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); 64 vpx_decrypt_init di = { test_decrypt_cb, &encrypted[0] }; 67 res = decoder.DecodeFrame(&encrypted[0], encrypted.size());
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslhandler.h | 49 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) = 0;
|
H A D | plainsaslhandler.h | 48 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument 50 if (!encrypted && !allow_plain_) {
|
/external/chromium_org/media/base/ |
H A D | decryptor.h | 23 // Decrypts (and decodes) encrypted buffer. 64 // - Set to kSuccess if the encrypted buffer is successfully decrypted and 66 // - Set to kNoKey if no decryption key is available to decrypt the encrypted 75 // Decrypts the |encrypted| buffer. The decrypt status and decrypted buffer 76 // are returned via the provided callback |decrypt_cb|. The |encrypted| buffer 82 const scoped_refptr<DecoderBuffer>& encrypted, 111 // - Set to kSuccess if the encrypted buffer is successfully decrypted and 117 // - Set to kNoKey if no decryption key is available to decrypt the encrypted 128 // Decrypts and decodes the |encrypted| buffer. The status and the decrypted 130 // The |encrypted| buffe [all...] |
/external/libvpx/libvpx/test/ |
H A D | vp8_decrypt_test.cc | 63 std::vector<uint8_t> encrypted(video.frame_size()); 64 encrypt_buffer(video.cxdata(), &encrypted[0], video.frame_size(), 0); 65 vp8_decrypt_init di = { test_decrypt_cb, &encrypted[0] };
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
H A D | AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); 216 public Pair createPair(int clear, long encrypted) { argument 217 return new Pair(clear, encrypted); 223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { argument 227 this.encrypted = encrypted; 244 if (encrypted != pair.encrypted) { 254 result = 31 * result + (int) (encrypted [all...] |
/external/lzma/CPP/7zip/UI/Common/ |
H A D | IFileExtractCallback.h | 31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
|
/external/lzma/CPP/7zip/UI/Console/ |
H A D | ExtractCallbackConsole.h | 39 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted);
42 HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted);
|
H A D | ExtractCallbackConsole.cpp | 43 static const char *kCrcFailedEncrypted = "CRC Failed in encrypted file. Wrong password?";
45 static const char *kDataErrorEncrypted = "Data Error in encrypted file. Wrong password?";
108 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted)
argument 125 (*OutStream) << (encrypted ? kCrcFailedEncrypted: kCrcFailed);
128 (*OutStream) << (encrypted ? kDataErrorEncrypted : kDataError);
168 HRESULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted)
argument 176 (*OutStream) << (encrypted ?
177 "Can not open encrypted archive. Wrong password?" :
|
/external/chromium_org/net/quic/ |
H A D | quic_framer_test.cc | 408 bool CheckDecryption(const QuicEncryptedPacket& encrypted, argument 418 encrypted, PACKET_8BYTE_CONNECTION_ID, 423 encrypted, PACKET_8BYTE_CONNECTION_ID, 428 StringPiece ciphertext(encrypted.AsStringPiece().substr( 448 QuicEncryptedPacket encrypted(AsChars(packet), len, false); 449 EXPECT_FALSE(framer_.ProcessPacket(encrypted)) << "len: " << len; 618 QuicEncryptedPacket encrypted(packet, 0, false); 619 EXPECT_FALSE(framer_.ProcessPacket(encrypted)); 644 QuicEncryptedPacket encrypted(AsChars(packet), arraysize(packet), false); 645 EXPECT_FALSE(framer_.ProcessPacket(encrypted)); [all...] |
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto_unittest.cc | 14 // Verify that decryption of |encrypted| data using |private_key_pem| matches 18 const std::vector<uint8>& encrypted) { 21 private_key_pem, encrypted, &decrypted)) 16 VerifyByteString(const std::string& private_key_pem, const std::string& plain, const std::vector<uint8>& encrypted) argument
|
/external/chromium_org/components/signin/core/browser/webdata/ |
H A D | token_service_table.cc | 74 bool encrypted = OSCrypt::EncryptString(token, &encrypted_token); local 75 if (!encrypted) {
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/ |
H A D | CencSampleEncryptionInformationGroupEntry.java | 64 public void setEncrypted(int encrypted) { argument 65 isEncrypted = encrypted;
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 197 p7->d.encrypted->enc_data->algorithm = pbe; 198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 199 if (!(p7->d.encrypted->enc_data->enc_data = 212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 215 p7->d.encrypted->enc_data->enc_data, 1);
|
/external/chromium_org/sync/engine/ |
H A D | conflict_resolver.cc | 103 // b) All unsynced changes have been re-encrypted with the default key ( 110 // encrypted with the default key, and all other visible properties match, 150 DCHECK(cryptographer->CanDecryptUsingDefaultKey(specifics.encrypted())); 152 specifics.encrypted()); 159 server_specifics.encrypted()); 161 server_specifics.encrypted()); 178 base_server_specifics.encrypted());
|
/external/chromium_org/content/renderer/media/crypto/ |
H A D | ppapi_decryptor.h | 81 const scoped_refptr<media::DecoderBuffer>& encrypted, 89 const scoped_refptr<media::DecoderBuffer>& encrypted, 92 const scoped_refptr<media::DecoderBuffer>& encrypted,
|