/external/chromium/chrome/browser/webdata/ |
token_service_table.cc | 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 56 if (!encrypted) {
|
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption_unittest.cc | 58 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage1), 63 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 69 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage2), 74 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 80 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage3), 85 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 91 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage4), 96 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 103 std::string encrypted = local 108 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out) [all...] |
ec_private_key_nss.cc | 225 SECKEYEncryptedPrivateKeyInfo* encrypted = PK11_ExportEncryptedPrivKeyInfo( local 233 if (!encrypted) { 243 encrypted, 245 SECKEY_DestroyEncryptedPrivateKeyInfo(encrypted, PR_TRUE);
|
encryptor_unittest.cc | 202 std::string encrypted; local 203 EXPECT_TRUE(encryptor.Encrypt(plaintext_str, &encrypted)); 205 EXPECT_EQ(ciphertext_size, encrypted.size()); 206 EXPECT_EQ(0, memcmp(encrypted.data(), ciphertext, encrypted.size())); 210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decrypted)); 401 // PKCS #5 padding, encrypted.
|
/external/chromium_org/chrome/browser/webdata/ |
token_service_table.cc | 75 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 76 if (!encrypted) {
|
/external/chromium_org/sync/internal_api/ |
syncapi_internal.cc | 21 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 24 if (!crypto->Decrypt(encrypted, data.get())) 58 // Note that we can't compare encrypted strings directly as they are seeded 62 if (!cryptographer->CanDecrypt(left.encrypted())) { 66 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 71 if (!cryptographer->CanDecrypt(right.encrypted())) { 75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
base_node.cc | 83 // We assume any node with the encrypted field set has encrypted data and if 105 const sync_pb::EncryptedData& encrypted = specifics.encrypted(); local 107 DecryptToString(encrypted); 109 LOG(ERROR) << "Failed to decrypt encrypted node of type "
|
sync_encryption_handler_impl_unittest.cc | 343 // Verify that the encrypted types are being written to and read from the 384 // Set all encrypted types 400 // Receiving an empty nigori should not reset any encrypted types or trigger 520 // Receive an old nigori with old encryption keys and encrypted types. We should 521 // not revert our default key or encrypted types, and should post a task to 564 // Has an old set of keys, and no encrypted types. 585 // be encrypting with the newest, and the encrypted types should be the 593 our_encrypted_specifics.encrypted())); 595 other_encrypted_specifics.encrypted())); 656 // Ensure the bootstrap is encoded properly (a base64 encoded encrypted blo 697 sync_pb::EncryptedData encrypted; local 1091 sync_pb::EncryptedData encrypted; local 1171 sync_pb::EncryptedData encrypted; local 1250 sync_pb::EncryptedData encrypted; local 1329 sync_pb::EncryptedData encrypted; local 1891 sync_pb::EncryptedData encrypted; local [all...] |
sync_encryption_handler_impl.cc | 132 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key 147 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key 300 // Always trigger an encrypted types and cryptographer state change event at 315 // If we had encrypted types, the DataTypeManager will block, preventing 381 // 4. The user has pending keys encrypted with their current GAIA passphrase 383 // 5. The user has pending keys encrypted with an older GAIA passphrase 388 // an implicit passphrase (even if the data is encrypted with an old GAIA 508 // re-encrypted on another client while a SetDecryptionPassphrase() call is 523 // passphrase, where the data is already encrypted with the newest GAIA 527 // their password since they last encrypted their data, and therefor 548 sync_pb::EncryptedData encrypted; local [all...] |
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; local 22 encrypted.set_key_name("foo"); 23 encrypted.set_blob("bar"); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 54 sync_pb::EncryptedData encrypted; local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 102 sync_pb::EncryptedData encrypted; local [all...] |
/external/chromium_org/sync/util/ |
cryptographer_unittest.cc | 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 45 sync_pb::EncryptedData encrypted; local 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); 55 sync_pb::EncryptedData encrypted; local 56 encrypted.set_key_name("foo"); 57 encrypted.set_blob("bar"); 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 72 sync_pb::EncryptedData encrypted; local 91 sync_pb::EncryptedData encrypted; local 149 sync_pb::EncryptedData encrypted; local 199 sync_pb::EncryptedData encrypted; local [all...] |
nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)) 120 std::string encrypted; local [all...] |
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_crypto.cc | 187 SECStatus encrypted = PK11_PubEncryptPKCS1( local 193 if (encrypted != SECSuccess) {
|
/external/chromium_org/components/onc/ |
onc_constants.h | 194 namespace encrypted { namespace in namespace:onc 206 } // namespace encrypted
|
/external/chromium_org/sync/syncable/ |
entry_kernel.cc | 92 const sync_pb::EncryptedData& encrypted = kernel.ref(field).encrypted(); local 95 cryptographer->CanDecrypt(encrypted) && 96 cryptographer->Decrypt(encrypted, &decrypted)) { 98 value->SetBoolean("encrypted", true);
|
/external/chromium_org/net/tools/quic/ |
quic_dispatcher_test.cc | 201 scoped_ptr<QuicEncryptedPacket> encrypted( 212 dispatcher_.ProcessPacket(IPEndPoint(), addr, guid, true, *encrypted); local
|
quic_time_wait_list_manager_test.cc | 132 QuicEncryptedPacket* encrypted = framer_.EncryptPacket(ENCRYPTION_NONE, local 135 EXPECT_TRUE(encrypted != NULL); 136 return encrypted; 164 QuicEncryptedPacket encrypted(std::tr1::get<0>(packet_buffer), 166 framer.ProcessPacket(encrypted);
|
/external/openssh/ |
authfile.c | 88 Buffer buffer, encrypted; local 117 * will be stored in plain text, and storing them also in encrypted 125 /* Pad the part to be encrypted until its size is a multiple of 8. */ 130 buffer_init(&encrypted); 134 buffer_put_char(&encrypted, authfile_id_string[i]); 135 buffer_put_char(&encrypted, 0); 138 buffer_put_char(&encrypted, cipher_num); 139 buffer_put_int(&encrypted, 0); /* For future extension */ 142 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); 143 buffer_put_bignum(&encrypted, key->rsa->n) [all...] |
/external/chromium_org/net/quic/ |
quic_packet_creator.cc | 385 QuicEncryptedPacket* encrypted = local 387 DCHECK(encrypted); 388 DCHECK_GE(options_.max_packet_length, encrypted->length()); 389 return encrypted;
|
/external/dropbear/ |
keyimport.c | 355 int encrypted; member in struct:openssh_key 373 ret->encrypted = 0; 422 if (!strcmp(p, "ENCRYPTED\n")) 423 ret->encrypted = 1; 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { 468 errmsg = "Encrypted key blob is not a multiple of cipher block size"; 501 ret = key->encrypted; 529 if (key->encrypted) { 530 errmsg = "encrypted keys not supported currently"; 930 fprintf(stderr, "Encrypted keys aren't supported currently\n") [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); 216 public Pair createPair(int clear, long encrypted) { 217 return new Pair(clear, encrypted); 223 public long encrypted; field in class:AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { 227 this.encrypted = encrypted; 244 if (encrypted != pair.encrypted) { 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)) [all...] |
/external/chromium_org/net/quic/test_tools/ |
quic_test_utils.cc | 286 QuicEncryptedPacket* encrypted = local 288 encrypted_packets_.push_back(encrypted);
|
/system/core/fs_mgr/ |
fs_mgr.c | 576 int encrypted = 0; local 622 /* mount(2) returned an error, check if it's encrypted and deal with it */ 630 ERROR("Cannot mount tmpfs filesystem for encrypted fs at %s\n", 634 encrypted = 1; 642 if (encrypted) {
|