/external/chromium/chrome/browser/password_manager/ |
encryptor_unittest.cc | 30 string16 plaintext; local 37 EXPECT_TRUE(Encryptor::EncryptString16(plaintext, &ciphertext)); 39 EXPECT_EQ(plaintext, result); 42 plaintext = ASCIIToUTF16("hello"); 43 EXPECT_TRUE(Encryptor::EncryptString16(plaintext, &ciphertext)); 45 EXPECT_EQ(plaintext, result); 49 plaintext = ASCIIToUTF16("1234567890123456"); 50 EXPECT_TRUE(Encryptor::EncryptString16(plaintext, &ciphertext)); 52 EXPECT_EQ(plaintext, result); 61 plaintext = wchars 78 std::string plaintext; local 101 std::string plaintext; local 128 std::string plaintext; local [all...] |
encryptor.h | 21 static bool EncryptString16(const string16& plaintext, 29 string16* plaintext); 32 static bool EncryptString(const std::string& plaintext, 40 std::string* plaintext);
|
encryptor_win.cc | 13 bool Encryptor::EncryptString16(const string16& plaintext, 15 return EncryptString(UTF16ToUTF8(plaintext), ciphertext); 19 string16* plaintext) { 24 *plaintext = UTF8ToUTF16(utf8); 28 bool Encryptor::EncryptString(const std::string& plaintext, 32 reinterpret_cast<const BYTE*>(plaintext.data())); 33 input.cbData = static_cast<DWORD>(plaintext.length()); 50 std::string* plaintext) { 62 plaintext->assign(reinterpret_cast<char*>(output.pbData), output.cbData);
|
encryptor_linux.cc | 57 bool Encryptor::EncryptString16(const string16& plaintext, 59 return EncryptString(UTF16ToUTF8(plaintext), ciphertext); 63 string16* plaintext) { 68 *plaintext = UTF8ToUTF16(utf8); 72 bool Encryptor::EncryptString(const std::string& plaintext, 79 if (plaintext.empty()) { 93 if (!encryptor.Encrypt(plaintext, ciphertext)) 102 std::string* plaintext) { 109 *plaintext = std::string(); 119 *plaintext = ciphertext [all...] |
/external/srtp/crypto/include/ |
aes.h | 67 aes_encrypt(v128_t *plaintext, const aes_expanded_key_t exp_key); 70 aes_decrypt(v128_t *plaintext, const aes_expanded_key_t exp_key);
|
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 55 std::string plaintext("value"); 58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1)); 61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2)); 74 std::string plaintext; local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 78 EXPECT_EQ(expected, plaintext); 85 std::string plaintext("value"); 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 93 EXPECT_EQ(plaintext, decrypted); 100 std::string plaintext("test") 152 std::string plaintext; local [all...] |
cryptographer.cc | 67 std::string plaintext = DecryptToString(encrypted); local 68 return message->ParseFromString(plaintext); 79 std::string plaintext; local 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { 84 return plaintext; 158 std::string plaintext; local 159 if (!nigori.Decrypt(pending_keys_->blob(), &plaintext)) 163 if (!bag.ParseFromString(plaintext)) {
|
nigori.cc | 130 NigoriStream plaintext; local 131 plaintext << type << name; 139 if (!encryptor.Encrypt(plaintext.str(), &ciphertext)) 241 std::string plaintext;
|
/external/google-diff-match-patch/ |
Android.mk | 5 LOCAL_SRC_FILES := name/fraser/neil/plaintext/diff_match_patch.java
|
/external/chromium/crypto/ |
encryptor_mac.cc | 68 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { 69 return Crypt(kCCEncrypt, plaintext, ciphertext); 72 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { 73 return Crypt(kCCDecrypt, ciphertext, plaintext);
|
encryptor_nss.cc | 52 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { 60 size_t ciphertext_len = plaintext.size() + AES_BLOCK_SIZE; 69 const_cast<char*>(plaintext.data())), 70 plaintext.size()); 87 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { 120 plaintext->assign(reinterpret_cast<char *>(&buffer[0]),
|
encryptor.h | 35 // Encrypts |plaintext| into |ciphertext|. 36 bool Encrypt(const std::string& plaintext, std::string* ciphertext); 38 // Decrypts |ciphertext| into |plaintext|. 39 bool Decrypt(const std::string& ciphertext, std::string* plaintext);
|
encryptor_win.cc | 80 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { 81 DWORD data_len = plaintext.size(); 86 memcpy(&tmp[0], plaintext.data(), data_len); 97 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { 111 plaintext->assign(reinterpret_cast<char*>(&tmp[0]), data_len);
|
encryptor_openssl.cc | 72 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) { 73 return Crypt(true, plaintext, ciphertext); 76 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) { 77 return Crypt(false, ciphertext, plaintext);
|
encryptor_unittest.cc | 26 std::string plaintext("this is the plaintext"); 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 35 EXPECT_EQ(plaintext, decypted); 100 std::string plaintext(reinterpret_cast<const char*>(raw_plaintext), 103 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 111 EXPECT_EQ(plaintext, decypted); 118 std::string plaintext = "Plain text with a g-clef U+1D11E \360\235\204\236"; local 133 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 139 EXPECT_EQ(plaintext, decypted) 146 std::string plaintext = "Small text"; local 199 std::string plaintext; local [all...] |
/external/chromium/net/http/ |
des_unittest.cc | 17 // DES known plaintext (64-bits). 39 static const uint8 plaintext[] = { 0, 0, 0, 0, 0, 0, 0, 0 }; local 46 DESEncrypt(key, plaintext, ciphertext);
|
/external/openssl/crypto/evp/ |
evp_test.c | 138 const unsigned char *plaintext,int pn, 151 hexdump(stdout,"Plaintext",plaintext,pn); 171 if(!EVP_EncryptUpdate(&ctx,out,&outl,plaintext,pn)) 225 fprintf(stderr,"Plaintext length mismatch got %d expected %d\n", 230 if(memcmp(out,plaintext,pn)) 232 fprintf(stderr,"Plaintext mismatch\n"); 234 hexdump(stderr,"Expected",plaintext,pn); 246 const unsigned char *plaintext,int pn, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 369 unsigned char *iv,*key,*plaintext,*ciphertext; local [all...] |
/external/dbus/dbus/ |
dbus-auth.h | 65 const DBusString *plaintext, 70 DBusString *plaintext);
|
dbus-auth.c | 1150 DBusString plaintext; local 1207 DBusString plaintext; local 1261 DBusString plaintext; local [all...] |
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 168 "The output of step N is used as the key and plaintext for step N+1 (key bytes repeated as required to fill the key)\n\n"); 398 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 402 fprintf(out, "EAX Test Vectors. Uses the 00010203...NN-1 pattern for header/nonce/plaintext/key. The outputs\n" 424 plaintext[z] = (unsigned char)(z & 255); 429 if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) { 435 fprintf(out, "%02X", plaintext[z]); 458 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 462 fprintf(out, "OCB Test Vectors. Uses the 00010203...NN-1 pattern for nonce/plaintext/key. The outputs\n" 489 plaintext[z] = (unsigned char)(z & 255) 522 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 584 unsigned char key[MAXBLOCKSIZE], plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local [all...] |
encrypt.c | 97 unsigned char plaintext[512],ciphertext[512]; local 182 if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) { 187 if (fwrite(plaintext,1,y,fdout) != y) {
|
/external/openssh/ |
cipher.h | 66 int plaintext; member in struct:CipherContext
|
/external/srtp/crypto/cipher/ |
cipher.c | 76 * plaintext, and ciphertext that is known to be good 126 /* copy plaintext into test buffer */ 132 buffer[i] = test_case->plaintext[i]; 134 debug_print(mod_cipher, "plaintext: %s", 220 debug_print(mod_cipher, "plaintext: %s", 224 /* compare the resulting plaintext with that in the test case */ 229 if (buffer[i] != test_case->plaintext[i]) { 240 octet_string_hex_string(test_case->plaintext, 278 debug_print(mod_cipher, "random plaintext length %d\n", length); 282 debug_print(mod_cipher, "plaintext: %s" [all...] |
/external/srtp/tables/ |
aes_tables.c | 323 uint8_t plaintext[16] = { local 335 v128_copy_octet_string(&x, plaintext); 342 v128_copy_octet_string(&y, plaintext);
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
crypto-aes.js | 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 162 * - cipherblock = plaintext xor outputblock 164 function AESEncryptCtr(plaintext, password, nBits) { 188 var blockCount = Math.ceil(plaintext.length/blockSize); 200 var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1; 203 for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter byte-by-byte -- 204 var plaintextByte = plaintext.charCodeAt(b*blockSize+i); 228 * - cipherblock = plaintext xor outputblock 250 var plaintext = new Array(ciphertext.length-1); 263 // -- xor plaintext with ciphered counter byte-by-byte - [all...] |