/system/connectivity/shill/ |
H A D | crypto_rot47_unittest.cc | 43 TEST_F(CryptoROT47Test, Encrypt) { 45 EXPECT_TRUE(crypto_.Encrypt(kPlainText, &text)); 47 EXPECT_TRUE(crypto_.Encrypt(kEmpty, &text));
|
H A D | crypto_rot47.cc | 31 bool CryptoROT47::Encrypt(const string& plaintext, string* ciphertext) { function in class:shill::CryptoROT47 50 return Encrypt(ciphertext, plaintext);
|
H A D | crypto_interface.h | 33 virtual bool Encrypt(const std::string& plaintext,
|
H A D | crypto_des_cbc.h | 50 virtual bool Encrypt(const std::string& plaintext, std::string* ciphertext); 58 FRIEND_TEST(CryptoDESCBCTest, Encrypt);
|
H A D | crypto_rot47.h | 37 virtual bool Encrypt(const std::string& plaintext, std::string* ciphertext);
|
H A D | crypto_provider_unittest.cc | 84 TEST_F(CryptoProviderTest, Encrypt) { 85 EXPECT_EQ(kPlainText, provider_.Encrypt(kPlainText)); 86 EXPECT_EQ(kEmptyText, provider_.Encrypt(kEmptyText)); 89 EXPECT_EQ(kROT47Text, provider_.Encrypt(kPlainText)); 95 EXPECT_EQ(kROT47Text, provider_.Encrypt(kPlainText));
|
H A D | crypto_provider.cc | 47 string CryptoProvider::Encrypt(const string& plaintext) { function in class:shill::CryptoProvider 50 if (crypto->Encrypt(plaintext, &ciphertext)) {
|
H A D | crypto_provider.h | 39 std::string Encrypt(const std::string& plaintext);
|
H A D | crypto_des_cbc_unittest.cc | 93 TEST_F(CryptoDESCBCTest, Encrypt) { 98 EXPECT_FALSE(crypto_.Encrypt(kPlainText, &ciphertext));
|
H A D | crypto_des_cbc.cc | 42 bool CryptoDESCBC::Encrypt(const string& plaintext, string* ciphertext) { function in class:shill::CryptoDESCBC
|
H A D | key_file_store.cc | 387 return SetString(group, key, crypto_.Encrypt(value));
|
H A D | json_store.cc | 626 if (!rot47.Encrypt(value, &encrypted_value)) {
|
/system/keymaster/ |
H A D | kem.h | 40 virtual bool Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, 42 virtual bool Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len,
|
H A D | ecies_kem.h | 42 bool Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, 44 bool Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len,
|
H A D | key_blob_test.cpp | 67 keymaster_error_t Encrypt() { function in class:keymaster::test::KeyBlobTest 100 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 128 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 138 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 155 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 172 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 189 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 203 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 226 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 249 ASSERT_EQ(KM_ERROR_OK, Encrypt()); [all...] |
H A D | ecies_kem.cpp | 75 bool EciesKem::Encrypt(const Buffer& peer_public_value, Buffer* output_clear_key, function in class:keymaster::EciesKem 77 return Encrypt(peer_public_value.peek_read(), peer_public_value.available_read(), 82 bool EciesKem::Encrypt(const uint8_t* peer_public_value, size_t peer_public_value_len, function in class:keymaster::EciesKem
|
H A D | ecies_kem_test.cpp | 59 ASSERT_TRUE(kem->Encrypt(peer_public_value, &output_clear_key, &output_encrypted_key));
|
/system/security/keystore/ |
H A D | keystore_cli_v2.cpp | 186 {"RSA-2048 Encrypt", true, GetRSAEncryptParameters(2048)}, 187 {"RSA-3072 Encrypt", false, GetRSAEncryptParameters(3072)}, 188 {"RSA-4096 Encrypt", false, GetRSAEncryptParameters(4096)}, 399 int Encrypt(const std::string& key_name, const std::string& input_filename, function in namespace:__anon1900 457 return Encrypt(command_line->GetSwitchValueASCII("name"),
|
/system/tpm/attestation/client/ |
H A D | main.cc | 201 task = base::Bind(&ClientLoop::Encrypt, 401 void Encrypt(const std::string& label, function in class:attestation::ClientLoop
|