HomeSort by relevance Sort by last modified time
    Searched full:encrypted (Results 1 - 25 of 951) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/sync/util/
cryptographer_unittest.cc 35 sync_pb::EncryptedData encrypted; local
36 encrypted.set_key_name("foo");
37 encrypted.set_blob("bar");
39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted));
45 sync_pb::EncryptedData encrypted; local
47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted));
55 sync_pb::EncryptedData encrypted; local
56 encrypted.set_key_name("foo");
57 encrypted.set_blob("bar");
59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted));
72 sync_pb::EncryptedData encrypted; local
91 sync_pb::EncryptedData encrypted; local
149 sync_pb::EncryptedData encrypted; local
199 sync_pb::EncryptedData encrypted; local
    [all...]
nigori_unittest.cc 70 std::string encrypted = local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext));
87 std::string encrypted; local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
102 std::string encrypted; local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a');
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted))
120 std::string encrypted; local
    [all...]
cryptographer.h 41 // SetPendingKeys should be called with the encrypted contents of that node.
46 // Whenever a update to an encrypted node is received from the server,
67 // Returns whether we can decrypt |encrypted| using the keys we currently know
69 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const;
71 // Returns whether |encrypted| can be decrypted using the default encryption
73 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const;
75 // Encrypts |message| into |encrypted|. Does not overwrite |encrypted| if
76 // |message| already matches the decrypted data within |encrypted| and
77 // |encrypted| was encrypted with the current default key. This avoid
    [all...]
cryptographer.cc 58 sync_pb::EncryptedData* encrypted) const {
59 DCHECK(encrypted);
71 return EncryptString(serialized, encrypted);
76 sync_pb::EncryptedData* encrypted) const {
77 if (CanDecryptUsingDefaultKey(*encrypted)) {
78 const std::string& original_serialized = DecryptToString(*encrypted);
80 DVLOG(2) << "Re-encryption unnecessary, encrypted data already matches.";
92 encrypted->set_key_name(default_nigori_name_);
94 encrypted->mutable_blob())) {
101 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted,
    [all...]
DEPS 13 # of encrypted types.
  /external/chromium_org/sync/syncable/
nigori_util.h 24 const char kEncryptedString[] = "encrypted";
31 // Check if our unsyced changes are encrypted if they need to be based on
33 // Returns: true if all unsynced data that should be encrypted is.
34 // false if some unsynced changes need to be encrypted.
36 // modify the data and does not care if data is unnecessarily encrypted.
41 // Processes all unsynced changes and ensures they are appropriately encrypted
46 // Returns true if the entry requires encryption but is not encrypted, false
47 // otherwise. Note: this does not check that already encrypted entries are
48 // encrypted with the proper key.
57 // Verifies all data of type |type| is encrypted appropriately
    [all...]
  /external/chromium/chrome/browser/sync/syncable/
nigori_util.h 29 // Extract the set of encrypted datatypes from a nigori node.
33 // Set the encrypted datatypes on the nigori node.
37 // Check if our unsyced changes are encrypted if they need to be based on
39 // Returns: true if all unsynced data that should be encrypted is.
40 // false if some unsynced changes need to be encrypted.
42 // modify the data and does not care if data is unnecessarily encrypted.
47 // Processes all unsynced changes and ensures they are appropriately encrypted
54 // Verifies all data of type |type| is encrypted if |is_encrypted| is true or is
  /external/chromium/chrome/browser/sync/util/
nigori_unittest.cc 70 std::string encrypted = local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext));
87 std::string encrypted; local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
102 std::string encrypted; local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a');
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted))
120 std::string encrypted; local
    [all...]
cryptographer_unittest.cc 21 sync_pb::EncryptedData encrypted; local
22 encrypted.set_key_name("foo");
23 encrypted.set_blob("bar");
25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
35 sync_pb::EncryptedData encrypted; local
36 encrypted.set_key_name("foo");
37 encrypted.set_blob("bar");
39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
54 sync_pb::EncryptedData encrypted; local
55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted));
102 sync_pb::EncryptedData encrypted; local
    [all...]
cryptographer.h 34 // SetPendingKeys should be called with the encrypted contents of that node.
39 // Whenever a update to an encrypted node is received from the server,
59 // Returns whether we can decrypt |encrypted| using the keys we currently know
61 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const;
63 // Returns whether |encrypted| can be decrypted using the default encryption
65 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const;
67 // Encrypts |message| into |encrypted|. Returns true unless encryption fails.
71 sync_pb::EncryptedData* encrypted) const;
73 // Decrypts |encrypted| into |message|. Returns true unless decryption fails,
75 bool Decrypt(const sync_pb::EncryptedData& encrypted,
    [all...]
cryptographer.cc 45 sync_pb::EncryptedData* encrypted) const {
46 DCHECK(encrypted);
55 encrypted->set_key_name(default_nigori_->first);
57 encrypted->mutable_blob())) {
64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted,
67 std::string plaintext = DecryptToString(encrypted);
72 const sync_pb::EncryptedData& encrypted) const {
73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name());
80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) {
87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) const
    [all...]
  /external/chromium/chrome/browser/sync/protocol/
nigori_specifics.proto 33 optional EncryptedData encrypted = 1;
34 // True if |encrypted| is encrypted using a passphrase
38 // Booleans corresponding to whether a datatype should be encrypted.
39 // Passwords are always encrypted, so we don't need a field here.
password_specifics.proto 20 // These are the properties that get serialized into the |encrypted| field of
38 // PasswordSpecificsData that is encrypted into |encrypted|.
40 optional EncryptedData encrypted = 1;
encryption.proto 5 // Common sync protocol for encrypted data.
17 // Encrypted sync data consists of two parts: a key name and a blob. Key name is
18 // the name of the key that was used to encrypt blob and blob is encrypted data
  /external/chromium_org/net/quic/crypto/
null_encrypter_test.cc 25 scoped_ptr<QuicData> encrypted(
27 ASSERT_TRUE(encrypted.get());
29 "encrypted data", encrypted->data(), encrypted->length(),
  /external/chromium_org/sync/internal_api/
syncapi_internal.cc 21 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local
24 if (!crypto->Decrypt(encrypted, data.get()))
58 // Note that we can't compare encrypted strings directly as they are seeded
62 if (!cryptographer->CanDecrypt(left.encrypted())) {
66 left_plaintext = cryptographer->DecryptToString(left.encrypted());
71 if (!cryptographer->CanDecrypt(right.encrypted())) {
75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
  /external/openssh/regress/
dsa_ssh2.prv 1 ---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ----
14 ---- END SSH2 ENCRYPTED PRIVATE KEY ----
rsa_ssh2.prv 1 ---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ----
15 ---- END SSH2 ENCRYPTED PRIVATE KEY ----
  /external/chromium_org/media/webm/
webm_crypto_helpers.h 20 // the stream has potentially encrypted frames. Every encrypted Block has a
21 // signal byte, and if the frame is encrypted, an initialization vector
23 // frame is unencrypted. Returns NULL if |data| is invalid. Current encrypted
  /frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/
FwdLockGlue.h 43 * Returns the length of the encrypted key, given the length of the plaintext key.
47 * @return The length in bytes of the encrypted key.
56 * @param[out] pEncryptedKey A reference to the buffer containing the encrypted key.
57 * @param[in] encryptedKeyLength The length in bytes of the encrypted key.
69 * @param[in] pEncryptedKey A reference to the buffer containing the encrypted key.
70 * @param[in] encryptedKeyLength The length in bytes of the encrypted key.
  /external/lzma/CPP/7zip/UI/Common/
IFileExtractCallback.h 31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
message 2 Proc-Type: 4,ENCRYPTED
  /external/openssl/crypto/pem/
message 2 Proc-Type: 4,ENCRYPTED
  /external/chromium_org/sync/protocol/
encryption.proto 5 // Common sync protocol for encrypted data.
17 // Encrypted sync data consists of two parts: a key name and a blob. Key name is
18 // the name of the key that was used to encrypt blob and blob is encrypted data
password_specifics.proto 19 // These are the properties that get serialized into the |encrypted| field of
38 // The actual password data. Contains an encrypted PasswordSpecificsData
40 optional EncryptedData encrypted = 1;

Completed in 179 milliseconds

1 2 3 4 5 6 7 8 91011>>