/external/chromium/chrome/browser/importer/ |
firefox_importer_unittest_utils.h | 42 string16 Decrypt(const std::string& crypt); 80 string16 FFUnitTestDecryptorProxy::Decrypt(const std::string& crypt) { 81 return decryptor_.Decrypt(crypt);
|
nss_decryptor_null.h | 21 // A NULL wrapper for Firefox NSS decrypt component, for use in builds where 27 string16 Decrypt(const std::string& crypt) const { return string16(); }
|
nss_decryptor_system_nss.h | 22 // A wrapper for Firefox NSS decrypt component. 33 string16 Decrypt(const std::string& crypt) const;
|
nss_decryptor.cc | 64 string16 NSSDecryptor::Decrypt(const std::string& crypt) const { 70 // by a leading '~'. Otherwise, we should decrypt the text. 208 form.username_value = Decrypt(lines[begin++]); 212 form.password_value = Decrypt(lines[begin++]); 291 form.username_value = Decrypt(s2.ColumnString(5)); 293 form.password_value = Decrypt(s2.ColumnString(6));
|
nss_decryptor_mac.h | 112 // A wrapper for Firefox NSS decrypt component. 127 string16 Decrypt(const std::string& crypt) const;
|
nss_decryptor_win.h | 111 // A wrapper for Firefox NSS decrypt component. 127 std::wstring Decrypt(const std::string& crypt) const;
|
firefox_importer_unittest.cc | 38 decryptor_proxy.Decrypt("MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECBJ" 42 decryptor_proxy.Decrypt("MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECN9" 63 decryptor_proxy.Decrypt("MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECKa" 67 decryptor_proxy.Decrypt("MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECLW"
|
firefox_importer_unittest_utils_mac.cc | 198 string16 FFUnitTestDecryptorProxy::Decrypt(const std::string& crypt) { 227 string16 unencrypted_str = decryptor_.Decrypt(crypt);
|
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 66 TEST(NigoriTest, Decrypt) { 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 156 EXPECT_TRUE(nigori2.Decrypt(ciphertext, &plaintext)); 160 EXPECT_TRUE(nigori1.Decrypt(ciphertext, &plaintext));
|
cryptographer.cc | 64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, 75 NOTREACHED() << "Cannot decrypt message"; 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { 137 if (!Decrypt(encrypted, &bag)) { 159 if (!nigori.Decrypt(pending_keys_->blob(), &plaintext))
|
cryptographer.h | 29 // This class manages the Nigori objects used to encrypt and decrypt sensitive 40 // CanDecrypt should be used to verify whether the Cryptographer can decrypt 59 // Returns whether we can decrypt |encrypted| using the keys we currently know 75 bool Decrypt(const sync_pb::EncryptedData& encrypted, 101 // Attempts to decrypt the set of keys that was copied in the previous call to 106 // Returns whether this Cryptographer is ready to encrypt and decrypt data.
|
nigori.h | 21 // for your secret (basically a map key), and |Encrypt| and |Decrypt| to store 57 bool Decrypt(const std::string& value, std::string* decrypted) const;
|
cryptographer_unittest.cc | 58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
|
nigori.cc | 203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { 242 if (!encryptor.Decrypt(ciphertext, value))
|
/external/chromium/crypto/ |
encryptor.h | 39 bool Decrypt(const std::string& ciphertext, std::string* plaintext); 48 bool Crypt(bool encrypt, // Pass true to encrypt, false to decrypt.
|
encryptor_mac.cc | 72 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) {
|
encryptor_unittest.cc | 33 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decypted)); 109 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decypted)); 138 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decypted)); 164 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decypted)); 231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted));
|
encryptor_nss.cc | 87 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) {
|
encryptor_openssl.cc | 76 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) {
|
encryptor_win.cc | 97 bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) {
|
/external/chromium/chrome/browser/password_manager/ |
encryptor_linux.cc | 135 if (!encryptor.Decrypt(raw_ciphertext, plaintext))
|
/external/chromium/chrome/browser/sync/syncable/ |
nigori_util.cc | 109 if (!cryptographer->Decrypt(entry_specifics.encrypted(), 111 LOG(ERROR) << "Could not decrypt data for newly unencrypted type " <<
|
/external/chromium/chrome/browser/sync/engine/ |
syncapi.cc | 212 if (!crypto->Decrypt(encrypted, data.get())) 242 LOG(ERROR) << "Failed to decrypt encrypted node of type " << [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | 147 and store data in a format independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt 183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher: 433 \index{Cipher Encrypt} \index{Cipher Decrypt} 443 These two functions will encrypt or decrypt (respectively) a single block of text\footnote{The size of which depends on 528 /* decrypt the block */ 529 blowfish_ecb_decrypt(ct, /* decrypt this 8-byte array */ [all...] |
/cts/suite/pts/hostTests/browser/browserlauncher/assets/octane/ |
pdfjs.js | [all...] |