/external/chromium/chrome/browser/sync/util/ |
nigori.cc | 139 if (!encryptor.Encrypt(plaintext.str(), &ciphertext)) 170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { 180 if (!encryptor.Encrypt(value, &ciphertext))
|
/external/chromium_org/sync/util/ |
nigori.cc | 134 if (!encryptor.Encrypt(plaintext.str(), &ciphertext)) 157 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { 169 if (!encryptor.Encrypt(value, &ciphertext))
|
cryptographer.cc | 56 bool Cryptographer::Encrypt( 61 LOG(ERROR) << "Cryptographer not ready, failed to encrypt."; 93 if (!default_nigori->second->Encrypt(serialized, 95 LOG(ERROR) << "Failed to encrypt data."; 113 return std::string(); // Caller should have called CanDecrypt(encrypt). 140 // Encrypt the bag with the default Nigori. 141 return Encrypt(bag, encrypted);
|
/external/chromium_org/third_party/WebKit/Source/modules/crypto/ |
SubtleCrypto.cpp | 57 case Encrypt: 139 case Encrypt: 140 platformCrypto->encrypt(algorithm, key->key(), result); 171 PassRefPtr<CryptoOperation> SubtleCrypto::encrypt(const Dictionary& rawAlgorithm, Key* key, ExceptionState& es) function in class:WebCore::SubtleCrypto 173 return createCryptoOperation(rawAlgorithm, key, Encrypt, 0, es);
|
NormalizeAlgorithm.cpp | 82 {WebKit::WebCryptoAlgorithmIdAesCbc, Encrypt, WebKit::WebCryptoAlgorithmParamsTypeAesCbcParams},
|
/external/chromium/crypto/ |
encryptor_unittest.cc | 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 44 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt. 46 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt. 103 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 133 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 159 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 212 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
|
encryptor_nss.cc | 52 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) {
|
encryptor_openssl.cc | 72 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) {
|
encryptor_win.cc | 80 bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) {
|
/external/chromium_org/sync/engine/ |
apply_updates_and_resolve_conflicts_command_unittest.cc | 336 cryptographer->Encrypt(data, 385 cryptographer->Encrypt(data, 400 other_cryptographer.Encrypt(data,
|
/external/chromium_org/crypto/ |
encryptor_unittest.cc | 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 72 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 118 // - F.5.1 CTR-AES128.Encrypt 119 // - F.5.6 CTR-AES256.Encrypt 203 EXPECT_TRUE(encryptor.Encrypt(plaintext_str, &encrypted)); 296 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 306 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 361 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt. 363 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt. 420 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)) [all...] |
openpgp_symmetric_encryption_unittest.cc | 101 TEST(OpenPGPSymmetricEncrytionTest, Encrypt) { 104 OpenPGPSymmetricEncrytion::Encrypt("Hello world\n", "testing");
|
encryptor_nss.cc | 74 bool Encryptor::Encrypt(const base::StringPiece& plaintext,
|
encryptor_openssl.cc | 74 bool Encryptor::Encrypt(const base::StringPiece& plaintext,
|
openpgp_symmetric_encryption.cc | 620 static ByteString Encrypt(base::StringPiece plaintext, 785 std::string OpenPGPSymmetricEncrytion::Encrypt( 791 Encrypter::Encrypt(plaintext, passphrase);
|
/external/chromium_org/third_party/WebKit/Source/testing/runner/ |
MockWebCrypto.cpp | 45 Encrypt, 132 void MockWebCrypto::encrypt(const WebKit::WebCryptoAlgorithm& algorithm, const WebKit::WebCryptoKey& key, WebKit::WebCryptoOperationResult& result) function in class:WebTestRunner::MockWebCrypto 134 result.initializationSucceeded(new MockCryptoOperation(algorithm, Encrypt, result));
|
/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_encrypter_nss.cc | 286 bool Aes128Gcm12Encrypter::Encrypt(StringPiece nonce, 363 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), sizeof(nonce)),
|
/external/chromium/chrome/browser/sync/engine/ |
apply_updates_command_unittest.cc | 236 cryptographer->Encrypt(data, 286 cryptographer->Encrypt(data, 301 cryptographer.Encrypt(data, 497 // We encrypt with new keys, triggering the local cryptographer to be unready
|
syncapi.cc | 449 LOG(WARNING) << "Attempted to encrypt an already encrypted entity" 458 if (!GetTransaction()->GetCryptographer()->Encrypt( 461 LOG(ERROR) << "Could not encrypt data for node of type " << 578 if (!cryptographer->Encrypt(data, new_value.mutable_encrypted())) { [all...] |
/external/chromium/chrome/browser/sync/syncable/ |
nigori_util.cc | 94 if (!cryptographer->Encrypt( 97 LOG(ERROR) << "Could not encrypt data for newly encrypted type " <<
|
/external/chromium_org/chromeos/cryptohome/ |
cryptohome_library.cc | 131 LOG(WARNING) << "System salt key is not available for encrypt."; 191 if (!encryptor.Encrypt(token, &encoded_token)) { 192 LOG(WARNING) << "Failed to encrypt token.";
|
/external/chromium_org/sync/syncable/ |
nigori_util.cc | 33 // Note: we do not attempt to re-encrypt data with a new key here as key 71 return false; // We don't encrypt unique server nodes. 132 // We don't encrypt the server's permanent items. 170 // No encryption required or we are unable to encrypt. 173 // Encrypt new_specifics into generated_specifics. 186 // encrypted. The first time we encrypt a node we start from scratch, hence 197 if (!cryptographer->Encrypt(new_specifics, 199 NOTREACHED() << "Could not encrypt data for node of type "
|
/external/chromium/net/socket/ |
dns_cert_provenance_checker.cc | 315 encryptor.Encrypt(plaintext, &ciphertext);
|
/external/chromium_org/sync/internal_api/ |
write_node.cc | 167 if (!cryptographer->Encrypt(data, password_specifics->mutable_encrypted())) { 168 NOTREACHED() << "Failed to encrypt password, possibly due to sync node "
|
sync_manager_impl_unittest.cc | [all...] |