/external/chromium/chrome/browser/webdata/ |
token_service_table.cc | 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 56 if (!encrypted) {
|
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption_unittest.cc | 58 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage1), 63 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 69 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage2), 74 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 80 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage3), 85 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 91 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage4), 96 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 103 std::string encrypted = local 108 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out) [all...] |
ec_private_key_nss.cc | 225 SECKEYEncryptedPrivateKeyInfo* encrypted = PK11_ExportEncryptedPrivKeyInfo( local 233 if (!encrypted) { 243 encrypted, 245 SECKEY_DestroyEncryptedPrivateKeyInfo(encrypted, PR_TRUE);
|
encryptor_unittest.cc | 202 std::string encrypted; local 203 EXPECT_TRUE(encryptor.Encrypt(plaintext_str, &encrypted)); 205 EXPECT_EQ(ciphertext_size, encrypted.size()); 206 EXPECT_EQ(0, memcmp(encrypted.data(), ciphertext, encrypted.size())); 210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decypted)); 401 // PKCS #5 padding, encrypted.
|
/external/chromium_org/chrome/browser/webdata/ |
token_service_table.cc | 75 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 76 if (!encrypted) {
|
/external/chromium_org/sync/internal_api/ |
syncapi_internal.cc | 21 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 24 if (!crypto->Decrypt(encrypted, data.get())) 58 // Note that we can't compare encrypted strings directly as they are seeded 62 if (!cryptographer->CanDecrypt(left.encrypted())) { 66 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 71 if (!cryptographer->CanDecrypt(right.encrypted())) { 75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
base_node.cc | 83 // We assume any node with the encrypted field set has encrypted data and if 105 const sync_pb::EncryptedData& encrypted = specifics.encrypted(); local 107 DecryptToString(encrypted); 109 LOG(ERROR) << "Failed to decrypt encrypted node of type "
|
sync_encryption_handler_impl_unittest.cc | 343 // Verify that the encrypted types are being written to and read from the 384 // Set all encrypted types 400 // Receiving an empty nigori should not reset any encrypted types or trigger 520 // Receive an old nigori with old encryption keys and encrypted types. We should 521 // not revert our default key or encrypted types, and should post a task to 564 // Has an old set of keys, and no encrypted types. 585 // be encrypting with the newest, and the encrypted types should be the 593 our_encrypted_specifics.encrypted())); 595 other_encrypted_specifics.encrypted())); 656 // Ensure the bootstrap is encoded properly (a base64 encoded encrypted blo 697 sync_pb::EncryptedData encrypted; local 1091 sync_pb::EncryptedData encrypted; local 1171 sync_pb::EncryptedData encrypted; local 1250 sync_pb::EncryptedData encrypted; local 1329 sync_pb::EncryptedData encrypted; local 1891 sync_pb::EncryptedData encrypted; local [all...] |
sync_encryption_handler_impl.cc | 132 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key 147 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key 300 // Always trigger an encrypted types and cryptographer state change event at 315 // If we had encrypted types, the DataTypeManager will block, preventing 381 // 4. The user has pending keys encrypted with their current GAIA passphrase 383 // 5. The user has pending keys encrypted with an older GAIA passphrase 388 // an implicit passphrase (even if the data is encrypted with an old GAIA 508 // re-encrypted on another client while a SetDecryptionPassphrase() call is 523 // passphrase, where the data is already encrypted with the newest GAIA 527 // their password since they last encrypted their data, and therefor 548 sync_pb::EncryptedData encrypted; local [all...] |
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; local 22 encrypted.set_key_name("foo"); 23 encrypted.set_blob("bar"); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 54 sync_pb::EncryptedData encrypted; local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 102 sync_pb::EncryptedData encrypted; local [all...] |
/external/chromium_org/sync/util/ |
cryptographer_unittest.cc | 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 45 sync_pb::EncryptedData encrypted; local 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); 55 sync_pb::EncryptedData encrypted; local 56 encrypted.set_key_name("foo"); 57 encrypted.set_blob("bar"); 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 72 sync_pb::EncryptedData encrypted; local 91 sync_pb::EncryptedData encrypted; local 149 sync_pb::EncryptedData encrypted; local 199 sync_pb::EncryptedData encrypted; local [all...] |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_constants.h | 182 namespace encrypted { namespace in namespace:chromeos::onc 194 } // namespace encrypted
|
/external/chromium_org/sync/syncable/ |
entry_kernel.cc | 92 const sync_pb::EncryptedData& encrypted = kernel.ref(field).encrypted(); local 95 cryptographer->CanDecrypt(encrypted) && 96 cryptographer->Decrypt(encrypted, &decrypted)) { 98 value->SetBoolean("encrypted", true);
|
/external/chromium_org/net/quic/ |
quic_packet_creator.cc | 234 QuicEncryptedPacket* encrypted = local 236 DCHECK(encrypted); 237 DCHECK_GE(options_.max_packet_length, encrypted->length()); 238 return encrypted;
|
quic_connection.cc | 792 QuicEncryptedPacket* encrypted = local 796 helper_->WritePacketToWire(*encrypted, &error); 797 delete encrypted; [all...] |
quic_connection_test.cc | 501 scoped_ptr<QuicEncryptedPacket> encrypted( 504 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 533 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket( 535 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 536 return encrypted->length(); 542 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket( 544 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 598 scoped_ptr<QuicEncryptedPacket> encrypted( 601 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 602 return encrypted->length() 2169 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 2207 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 2219 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 2247 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local 2373 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local [all...] |
/external/chromium_org/net/tools/quic/ |
quic_dispatcher_test.cc | 220 scoped_ptr<QuicEncryptedPacket> encrypted( 231 dispatcher_.ProcessPacket(IPEndPoint(), addr, guid, *encrypted); local
|
/external/openssh/ |
authfile.c | 88 Buffer buffer, encrypted; local 117 * will be stored in plain text, and storing them also in encrypted 125 /* Pad the part to be encrypted until its size is a multiple of 8. */ 130 buffer_init(&encrypted); 134 buffer_put_char(&encrypted, authfile_id_string[i]); 135 buffer_put_char(&encrypted, 0); 138 buffer_put_char(&encrypted, cipher_num); 139 buffer_put_int(&encrypted, 0); /* For future extension */ 142 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); 143 buffer_put_bignum(&encrypted, key->rsa->n) [all...] |
/external/chromium_org/net/quic/test_tools/ |
quic_test_utils.cc | 249 QuicEncryptedPacket* encrypted = local 251 encrypted_packets_.push_back(encrypted);
|
/external/dropbear/ |
keyimport.c | 355 int encrypted; member in struct:openssh_key 373 ret->encrypted = 0; 422 if (!strcmp(p, "ENCRYPTED\n")) 423 ret->encrypted = 1; 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { 468 errmsg = "Encrypted key blob is not a multiple of cipher block size"; 501 ret = key->encrypted; 529 if (key->encrypted) { 530 errmsg = "encrypted keys not supported currently"; 930 fprintf(stderr, "Encrypted keys aren't supported currently\n") [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); 216 public Pair createPair(int clear, long encrypted) { 217 return new Pair(clear, encrypted); 223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { 227 this.encrypted = encrypted; 244 if (encrypted != pair.encrypted) { 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)) [all...] |
/system/core/fs_mgr/ |
fs_mgr.c | 576 int encrypted = 0; local 622 /* mount(2) returned an error, check if it's encrypted and deal with it */ 630 ERROR("Cannot mount tmpfs filesystem for encrypted fs at %s\n", 634 encrypted = 1; 642 if (encrypted) {
|