HomeSort by relevance Sort by last modified time
    Searched defs:encrypted (Results 1 - 25 of 44) sorted by null

1 2

  /external/chromium/chrome/browser/webdata/
token_service_table.cc 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local
56 if (!encrypted) {
  /external/chromium_org/crypto/
openpgp_symmetric_encryption_unittest.cc 58 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage1),
63 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out);
69 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage2),
74 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out);
80 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage3),
85 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out);
91 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage4),
96 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out);
103 std::string encrypted = local
108 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out)
    [all...]
ec_private_key_nss.cc 225 SECKEYEncryptedPrivateKeyInfo* encrypted = PK11_ExportEncryptedPrivKeyInfo( local
233 if (!encrypted) {
243 encrypted,
245 SECKEY_DestroyEncryptedPrivateKeyInfo(encrypted, PR_TRUE);
encryptor_unittest.cc 202 std::string encrypted; local
203 EXPECT_TRUE(encryptor.Encrypt(plaintext_str, &encrypted));
205 EXPECT_EQ(ciphertext_size, encrypted.size());
206 EXPECT_EQ(0, memcmp(encrypted.data(), ciphertext, encrypted.size()));
210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decypted));
401 // PKCS #5 padding, encrypted.
  /external/chromium_org/chrome/browser/webdata/
token_service_table.cc 75 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local
76 if (!encrypted) {
  /external/chromium_org/sync/internal_api/
syncapi_internal.cc 21 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local
24 if (!crypto->Decrypt(encrypted, data.get()))
58 // Note that we can't compare encrypted strings directly as they are seeded
62 if (!cryptographer->CanDecrypt(left.encrypted())) {
66 left_plaintext = cryptographer->DecryptToString(left.encrypted());
71 if (!cryptographer->CanDecrypt(right.encrypted())) {
75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
base_node.cc 83 // We assume any node with the encrypted field set has encrypted data and if
105 const sync_pb::EncryptedData& encrypted = specifics.encrypted(); local
107 DecryptToString(encrypted);
109 LOG(ERROR) << "Failed to decrypt encrypted node of type "
sync_encryption_handler_impl_unittest.cc 343 // Verify that the encrypted types are being written to and read from the
384 // Set all encrypted types
400 // Receiving an empty nigori should not reset any encrypted types or trigger
520 // Receive an old nigori with old encryption keys and encrypted types. We should
521 // not revert our default key or encrypted types, and should post a task to
564 // Has an old set of keys, and no encrypted types.
585 // be encrypting with the newest, and the encrypted types should be the
593 our_encrypted_specifics.encrypted()));
595 other_encrypted_specifics.encrypted()));
656 // Ensure the bootstrap is encoded properly (a base64 encoded encrypted blo
697 sync_pb::EncryptedData encrypted; local
1091 sync_pb::EncryptedData encrypted; local
1171 sync_pb::EncryptedData encrypted; local
1250 sync_pb::EncryptedData encrypted; local
1329 sync_pb::EncryptedData encrypted; local
1891 sync_pb::EncryptedData encrypted; local
    [all...]
sync_encryption_handler_impl.cc 132 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key
147 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key
300 // Always trigger an encrypted types and cryptographer state change event at
315 // If we had encrypted types, the DataTypeManager will block, preventing
381 // 4. The user has pending keys encrypted with their current GAIA passphrase
383 // 5. The user has pending keys encrypted with an older GAIA passphrase
388 // an implicit passphrase (even if the data is encrypted with an old GAIA
508 // re-encrypted on another client while a SetDecryptionPassphrase() call is
523 // passphrase, where the data is already encrypted with the newest GAIA
527 // their password since they last encrypted their data, and therefor
548 sync_pb::EncryptedData encrypted; local
    [all...]
  /external/chromium/chrome/browser/sync/util/
nigori_unittest.cc 70 std::string encrypted = local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext));
87 std::string encrypted; local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
102 std::string encrypted; local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a');
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted))
120 std::string encrypted; local
    [all...]
cryptographer_unittest.cc 21 sync_pb::EncryptedData encrypted; local
22 encrypted.set_key_name("foo");
23 encrypted.set_blob("bar");
25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
35 sync_pb::EncryptedData encrypted; local
36 encrypted.set_key_name("foo");
37 encrypted.set_blob("bar");
39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted));
54 sync_pb::EncryptedData encrypted; local
55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted));
102 sync_pb::EncryptedData encrypted; local
    [all...]
  /external/chromium_org/sync/util/
cryptographer_unittest.cc 35 sync_pb::EncryptedData encrypted; local
36 encrypted.set_key_name("foo");
37 encrypted.set_blob("bar");
39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted));
45 sync_pb::EncryptedData encrypted; local
47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted));
55 sync_pb::EncryptedData encrypted; local
56 encrypted.set_key_name("foo");
57 encrypted.set_blob("bar");
59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted));
72 sync_pb::EncryptedData encrypted; local
91 sync_pb::EncryptedData encrypted; local
149 sync_pb::EncryptedData encrypted; local
199 sync_pb::EncryptedData encrypted; local
    [all...]
nigori_unittest.cc 70 std::string encrypted = local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext));
87 std::string encrypted; local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
102 std::string encrypted; local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a');
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted))
120 std::string encrypted; local
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_constants.h 182 namespace encrypted { namespace in namespace:chromeos::onc
194 } // namespace encrypted
  /external/chromium_org/sync/syncable/
entry_kernel.cc 92 const sync_pb::EncryptedData& encrypted = kernel.ref(field).encrypted(); local
95 cryptographer->CanDecrypt(encrypted) &&
96 cryptographer->Decrypt(encrypted, &decrypted)) {
98 value->SetBoolean("encrypted", true);
  /external/chromium_org/net/quic/
quic_packet_creator.cc 234 QuicEncryptedPacket* encrypted = local
236 DCHECK(encrypted);
237 DCHECK_GE(options_.max_packet_length, encrypted->length());
238 return encrypted;
quic_connection.cc 792 QuicEncryptedPacket* encrypted = local
796 helper_->WritePacketToWire(*encrypted, &error);
797 delete encrypted;
    [all...]
quic_connection_test.cc 501 scoped_ptr<QuicEncryptedPacket> encrypted(
504 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
533 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
535 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
536 return encrypted->length();
542 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
544 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
598 scoped_ptr<QuicEncryptedPacket> encrypted(
601 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
602 return encrypted->length()
2169 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
2207 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
2219 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
2247 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
2373 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); local
    [all...]
  /external/chromium_org/net/tools/quic/
quic_dispatcher_test.cc 220 scoped_ptr<QuicEncryptedPacket> encrypted(
231 dispatcher_.ProcessPacket(IPEndPoint(), addr, guid, *encrypted); local
  /external/openssh/
authfile.c 88 Buffer buffer, encrypted; local
117 * will be stored in plain text, and storing them also in encrypted
125 /* Pad the part to be encrypted until its size is a multiple of 8. */
130 buffer_init(&encrypted);
134 buffer_put_char(&encrypted, authfile_id_string[i]);
135 buffer_put_char(&encrypted, 0);
138 buffer_put_char(&encrypted, cipher_num);
139 buffer_put_int(&encrypted, 0); /* For future extension */
142 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n));
143 buffer_put_bignum(&encrypted, key->rsa->n)
    [all...]
  /external/chromium_org/net/quic/test_tools/
quic_test_utils.cc 249 QuicEncryptedPacket* encrypted = local
251 encrypted_packets_.push_back(encrypted);
  /external/dropbear/
keyimport.c 355 int encrypted; member in struct:openssh_key
373 ret->encrypted = 0;
422 if (!strcmp(p, "ENCRYPTED\n"))
423 ret->encrypted = 1;
467 if (ret->encrypted && ret->keyblob_len % 8 != 0) {
468 errmsg = "Encrypted key blob is not a multiple of cipher block size";
501 ret = key->encrypted;
529 if (key->encrypted) {
530 errmsg = "encrypted keys not supported currently";
930 fprintf(stderr, "Encrypted keys aren't supported currently\n")
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_inf.c 139 int encrypted;
143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
147 if (encrypted) {
180 if (encrypted) {
262 /* make sure the packet was encrypted after the beginning of phase 1. */
274 "%s message must be encrypted\n",
295 msgid, encrypted);
300 msgid, encrypted);
331 isakmp_info_recv_n(iph1, notify, msgid, encrypted)
335 int encrypted;
138 int encrypted; local
    [all...]
  /external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
AbstractSampleEncryptionBox.java 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted);
216 public Pair createPair(int clear, long encrypted) {
217 return new Pair(clear, encrypted);
223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair
225 public Pair(int clear, long encrypted) {
227 this.encrypted = encrypted;
244 if (encrypted != pair.encrypted) {
254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32))
    [all...]
  /system/core/fs_mgr/
fs_mgr.c 576 int encrypted = 0; local
622 /* mount(2) returned an error, check if it's encrypted and deal with it */
630 ERROR("Cannot mount tmpfs filesystem for encrypted fs at %s\n",
634 encrypted = 1;
642 if (encrypted) {

Completed in 1399 milliseconds

1 2