/external/chromium/chrome/browser/sync/util/ |
cryptographer.h | 34 // SetPendingKeys should be called with the encrypted contents of that node. 39 // Whenever a update to an encrypted node is received from the server, 59 // Returns whether we can decrypt |encrypted| using the keys we currently know 61 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const; 63 // Returns whether |encrypted| can be decrypted using the default encryption 65 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const; 67 // Encrypts |message| into |encrypted|. Returns true unless encryption fails. 71 sync_pb::EncryptedData* encrypted) const; 73 // Decrypts |encrypted| into |message|. Returns true unless decryption fails, 75 bool Decrypt(const sync_pb::EncryptedData& encrypted, [all...] |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; local 22 encrypted.set_key_name("foo"); 23 encrypted.set_blob("bar"); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 54 sync_pb::EncryptedData encrypted; local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 102 sync_pb::EncryptedData encrypted; local [all...] |
cryptographer.cc | 45 sync_pb::EncryptedData* encrypted) const { 46 DCHECK(encrypted); 55 encrypted->set_key_name(default_nigori_->first); 57 encrypted->mutable_blob())) { 64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, 67 std::string plaintext = DecryptToString(encrypted); 72 const sync_pb::EncryptedData& encrypted) const { 73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name()); 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { 87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) const [all...] |
nigori.cc | 170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { 200 return Base64Encode(output, encrypted); 203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { 205 if (!Base64Decode(encrypted, &input))
|
nigori.h | 51 // Encrypts |value|. Note that on success, |encrypted| will be Base64 53 bool Encrypt(const std::string& value, std::string* encrypted) const;
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
saslhandler.h | 49 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) = 0;
|
plainsaslhandler.h | 46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { 48 if (!encrypted && !allow_plain_) {
|
xmppengineimpl.h | 119 //! Returns true if the connection is encrypted (under TLS) 197 std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted);
|
/external/chromium/chrome/browser/webdata/ |
token_service_table.cc | 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 56 if (!encrypted) {
|
/external/chromium/third_party/libjingle/source/talk/examples/login/ |
xmppauth.h | 60 bool encrypted);
|
xmppauth.cc | 55 bool encrypted) {
|
/libcore/support/src/test/java/tests/security/ |
CipherHelper.java | 57 byte[] encrypted = crypt(cipher, plainData.getBytes()); 65 byte[] decrypted = crypt(cipher, encrypted);
|
/external/openssl/crypto/pkcs12/ |
p12_add.c | 166 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 197 p7->d.encrypted->enc_data->algorithm = pbe; 198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 199 if (!(p7->d.encrypted->enc_data->enc_data = 212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 215 p7->d.encrypted->enc_data->enc_data, 1);
|
p12_npas.c | 123 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
|
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 138 int encrypted; 142 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 146 if (encrypted) { 180 if (encrypted) { 264 /* make sure the packet was encrypted after the beginning of phase 1. */ 276 "%s message must be encrypted\n", 297 msgid, encrypted); 302 msgid, encrypted); 392 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 396 int encrypted; 137 int encrypted; local [all...] |
/external/chromium/chrome/browser/sync/engine/ |
syncapi.cc | 209 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 212 if (!crypto->Decrypt(encrypted, data.get())) 231 // We assume any node with the encrypted field set has encrypted data. 235 const sync_pb::EncryptedData& encrypted = local 236 specifics.encrypted(); 238 DecryptToString(encrypted); 242 LOG(ERROR) << "Failed to decrypt encrypted node of type " << 438 DCHECK_NE(type, syncable::NIGORI); // Nigori is encrypted separately 454 sync_pb::EntitySpecifics encrypted; local 1450 const sync_pb::EncryptedData& encrypted = a.ref(SPECIFICS).encrypted(); local 1456 const sync_pb::EncryptedData& encrypted = b.Get(SPECIFICS).encrypted(); local 2397 const sync_pb::EncryptedData& encrypted = original_specifics.encrypted(); local [all...] |
/external/wpa_supplicant/ |
eap.h | 248 int encrypted);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.h | 264 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.h | 276 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
|
/external/dropbear/ |
keyimport.c | 355 int encrypted; member in struct:openssh_key 373 ret->encrypted = 0; 422 if (!strcmp(p, "ENCRYPTED\n")) 423 ret->encrypted = 1; 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { 468 errmsg = "Encrypted key blob is not a multiple of cipher block size"; 501 ret = key->encrypted; 529 if (key->encrypted) { 530 errmsg = "encrypted keys not supported currently"; 930 fprintf(stderr, "Encrypted keys aren't supported currently\n") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.h | 320 const u8 *encrypted; member in struct:ikev2_payloads 332 const u8 *encrypted, size_t encrypted_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 320 const u8 *encrypted; member in struct:ikev2_payloads 332 const u8 *encrypted, size_t encrypted_len,
|
/frameworks/base/cmds/keystore/ |
keystore.cpp | 45 * values are encrypted with checksums. The encryption key is protected by a 163 uint8_t encrypted[0]; member in struct:blob 166 int32_t length; // in network byte order when encrypted 208 // encrypted data includes the digest value 211 memmove(&mBlob.encrypted[encryptedLength], &mBlob.value[mBlob.length], mBlob.info); 220 AES_cbc_encrypt(mBlob.encrypted, mBlob.encrypted, encryptedLength, 224 size_t headerLength = (mBlob.encrypted - (uint8_t*) &mBlob); 255 size_t headerLength = (mBlob.encrypted - (uint8_t*) &mBlob); 264 AES_cbc_encrypt(mBlob.encrypted, mBlob.encrypted, encryptedLength, aes_key [all...] |
/external/chromium/chrome/browser/sync/protocol/ |
proto_value_conversions.cc | 244 SET(encrypted, EncryptedDataToValue); 252 SET(encrypted, EncryptedDataToValue);
|