/external/chromium_org/sync/util/ |
cryptographer_unittest.cc | 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 45 sync_pb::EncryptedData encrypted; local 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); 55 sync_pb::EncryptedData encrypted; local 56 encrypted.set_key_name("foo"); 57 encrypted.set_blob("bar"); 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 72 sync_pb::EncryptedData encrypted; local 91 sync_pb::EncryptedData encrypted; local 149 sync_pb::EncryptedData encrypted; local 199 sync_pb::EncryptedData encrypted; local [all...] |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
cryptographer.h | 41 // SetPendingKeys should be called with the encrypted contents of that node. 46 // Whenever a update to an encrypted node is received from the server, 67 // Returns whether we can decrypt |encrypted| using the keys we currently know 69 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const; 71 // Returns whether |encrypted| can be decrypted using the default encryption 73 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const; 75 // Encrypts |message| into |encrypted|. Does not overwrite |encrypted| if 76 // |message| already matches the decrypted data within |encrypted| and 77 // |encrypted| was encrypted with the current default key. This avoid [all...] |
cryptographer.cc | 58 sync_pb::EncryptedData* encrypted) const { 59 DCHECK(encrypted); 71 return EncryptString(serialized, encrypted); 76 sync_pb::EncryptedData* encrypted) const { 77 if (CanDecryptUsingDefaultKey(*encrypted)) { 78 const std::string& original_serialized = DecryptToString(*encrypted); 80 DVLOG(2) << "Re-encryption unnecessary, encrypted data already matches."; 92 encrypted->set_key_name(default_nigori_name_); 94 encrypted->mutable_blob())) { 101 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, [all...] |
DEPS | 13 # of encrypted types.
|
/external/chromium_org/sync/syncable/ |
nigori_util.h | 24 const char kEncryptedString[] = "encrypted"; 31 // Check if our unsyced changes are encrypted if they need to be based on 33 // Returns: true if all unsynced data that should be encrypted is. 34 // false if some unsynced changes need to be encrypted. 36 // modify the data and does not care if data is unnecessarily encrypted. 41 // Processes all unsynced changes and ensures they are appropriately encrypted 46 // Returns true if the entry requires encryption but is not encrypted, false 47 // otherwise. Note: this does not check that already encrypted entries are 48 // encrypted with the proper key. 57 // Verifies all data of type |type| is encrypted appropriately [all...] |
/external/chromium/chrome/browser/sync/syncable/ |
nigori_util.h | 29 // Extract the set of encrypted datatypes from a nigori node. 33 // Set the encrypted datatypes on the nigori node. 37 // Check if our unsyced changes are encrypted if they need to be based on 39 // Returns: true if all unsynced data that should be encrypted is. 40 // false if some unsynced changes need to be encrypted. 42 // modify the data and does not care if data is unnecessarily encrypted. 47 // Processes all unsynced changes and ensures they are appropriately encrypted 54 // Verifies all data of type |type| is encrypted if |is_encrypted| is true or is
|
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; local 22 encrypted.set_key_name("foo"); 23 encrypted.set_blob("bar"); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 54 sync_pb::EncryptedData encrypted; local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 102 sync_pb::EncryptedData encrypted; local [all...] |
cryptographer.h | 34 // SetPendingKeys should be called with the encrypted contents of that node. 39 // Whenever a update to an encrypted node is received from the server, 59 // Returns whether we can decrypt |encrypted| using the keys we currently know 61 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const; 63 // Returns whether |encrypted| can be decrypted using the default encryption 65 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const; 67 // Encrypts |message| into |encrypted|. Returns true unless encryption fails. 71 sync_pb::EncryptedData* encrypted) const; 73 // Decrypts |encrypted| into |message|. Returns true unless decryption fails, 75 bool Decrypt(const sync_pb::EncryptedData& encrypted, [all...] |
cryptographer.cc | 45 sync_pb::EncryptedData* encrypted) const { 46 DCHECK(encrypted); 55 encrypted->set_key_name(default_nigori_->first); 57 encrypted->mutable_blob())) { 64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, 67 std::string plaintext = DecryptToString(encrypted); 72 const sync_pb::EncryptedData& encrypted) const { 73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name()); 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { 87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) const [all...] |
/external/chromium/chrome/browser/sync/protocol/ |
nigori_specifics.proto | 33 optional EncryptedData encrypted = 1; 34 // True if |encrypted| is encrypted using a passphrase 38 // Booleans corresponding to whether a datatype should be encrypted. 39 // Passwords are always encrypted, so we don't need a field here.
|
password_specifics.proto | 20 // These are the properties that get serialized into the |encrypted| field of 38 // PasswordSpecificsData that is encrypted into |encrypted|. 40 optional EncryptedData encrypted = 1;
|
encryption.proto | 5 // Common sync protocol for encrypted data. 17 // Encrypted sync data consists of two parts: a key name and a blob. Key name is 18 // the name of the key that was used to encrypt blob and blob is encrypted data
|
/external/chromium_org/net/quic/crypto/ |
null_encrypter_test.cc | 25 scoped_ptr<QuicData> encrypted( 27 ASSERT_TRUE(encrypted.get()); 29 "encrypted data", encrypted->data(), encrypted->length(),
|
/external/chromium_org/sync/internal_api/ |
syncapi_internal.cc | 21 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 24 if (!crypto->Decrypt(encrypted, data.get())) 58 // Note that we can't compare encrypted strings directly as they are seeded 62 if (!cryptographer->CanDecrypt(left.encrypted())) { 66 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 71 if (!cryptographer->CanDecrypt(right.encrypted())) { 75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
/external/openssh/regress/ |
dsa_ssh2.prv | 1 ---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ---- 14 ---- END SSH2 ENCRYPTED PRIVATE KEY ----
|
rsa_ssh2.prv | 1 ---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ---- 15 ---- END SSH2 ENCRYPTED PRIVATE KEY ----
|
/external/chromium_org/media/webm/ |
webm_crypto_helpers.h | 20 // the stream has potentially encrypted frames. Every encrypted Block has a 21 // signal byte, and if the frame is encrypted, an initialization vector 23 // frame is unencrypted. Returns NULL if |data| is invalid. Current encrypted
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/ |
FwdLockGlue.h | 43 * Returns the length of the encrypted key, given the length of the plaintext key. 47 * @return The length in bytes of the encrypted key. 56 * @param[out] pEncryptedKey A reference to the buffer containing the encrypted key. 57 * @param[in] encryptedKeyLength The length in bytes of the encrypted key. 69 * @param[in] pEncryptedKey A reference to the buffer containing the encrypted key. 70 * @param[in] encryptedKeyLength The length in bytes of the encrypted key.
|
/external/lzma/CPP/7zip/UI/Common/ |
IFileExtractCallback.h | 31 STDMETHOD(SetOperationResult)(Int32 operationResult, bool encrypted) PURE;
37 virtual HRESULT OpenResult(const wchar_t *name, HRESULT result, bool encrypted) = 0;
|
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
message | 2 Proc-Type: 4,ENCRYPTED
|
/external/openssl/crypto/pem/ |
message | 2 Proc-Type: 4,ENCRYPTED
|
/external/chromium_org/sync/protocol/ |
encryption.proto | 5 // Common sync protocol for encrypted data. 17 // Encrypted sync data consists of two parts: a key name and a blob. Key name is 18 // the name of the key that was used to encrypt blob and blob is encrypted data
|
password_specifics.proto | 19 // These are the properties that get serialized into the |encrypted| field of 38 // The actual password data. Contains an encrypted PasswordSpecificsData 40 optional EncryptedData encrypted = 1;
|