/external/chromium_org/sync/util/ |
nigori_unittest.cc | 58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1)); 61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2)); 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 121 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 155 EXPECT_TRUE(nigori1.Encrypt(original, &ciphertext)); 159 EXPECT_TRUE(nigori2.Encrypt(original, &ciphertext));
|
cryptographer_unittest.cc | 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); 73 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted)); 92 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted)); 97 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted2)); 99 // Now encrypt with a new default key. Should overwrite the old data. 102 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3)); 123 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted1)); 125 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted2)); 132 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3)); 134 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted4)) [all...] |
nigori.h | 24 // for your secret (basically a map key), and |Encrypt| and |Decrypt| to store 56 bool Encrypt(const std::string& value, std::string* encrypted) const;
|
cryptographer.h | 36 // This class manages the Nigori objects used to encrypt and decrypt sensitive 81 bool Encrypt(const ::google::protobuf::MessageLite& message, 108 // Encrypt. 160 // Returns whether this Cryptographer is ready to encrypt and decrypt data.
|
nigori.cc | 134 if (!encryptor.Encrypt(plaintext.str(), &ciphertext)) 158 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { 170 if (!encryptor.Encrypt(value, &ciphertext))
|
cryptographer.cc | 56 bool Cryptographer::Encrypt( 61 LOG(ERROR) << "Cryptographer not ready, failed to encrypt."; 93 if (!default_nigori->second->Encrypt(serialized, 95 LOG(ERROR) << "Failed to encrypt data."; 113 return std::string(); // Caller should have called CanDecrypt(encrypt). 140 // Encrypt the bag with the default Nigori. 141 return Encrypt(bag, encrypted);
|
/external/chromium_org/media/cast/transport/utility/ |
transport_encryption_handler.h | 32 bool Encrypt(uint32 frame_id,
|
transport_encryption_handler.cc | 41 bool TransportEncryptionHandler::Encrypt(uint32 frame_id, 50 if (!encryptor_->Encrypt(data, encrypted_data)) { 51 NOTREACHED() << "Encrypt error";
|
/external/chromium_org/net/quic/crypto/ |
null_encrypter.cc | 24 bool NullEncrypter::Encrypt( 43 Encrypt(StringPiece(), associated_data, plaintext, buffer);
|
null_encrypter.h | 15 // has occurred. It does not actually encrypt the payload, but does 25 virtual bool Encrypt(base::StringPiece nonce,
|
null_encrypter_test.cc | 16 TEST_F(NullEncrypterTest, Encrypt) {
|
quic_encrypter.h | 42 // Encrypt encrypts |plaintext| and writes the ciphertext, plus a MAC over 47 virtual bool Encrypt(base::StringPiece nonce,
|
chacha20_poly1305_encrypter_test.cc | 42 // EncryptWithNonce wraps the |Encrypt| method of |encrypter| to allow passing 51 if (!encrypter->Encrypt(nonce, associated_data, plaintext, 59 TEST(ChaCha20Poly1305EncrypterTest, Encrypt) {
|
aead_base_encrypter_nss.cc | 50 bool AeadBaseEncrypter::Encrypt(StringPiece nonce, 120 // TODO(ianswett): Introduce a check to ensure that we don't encrypt with the 127 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
aead_base_encrypter_openssl.cc | 76 bool AeadBaseEncrypter::Encrypt(StringPiece nonce, 106 // TODO(ianswett): Introduce a check to ensure that we don't encrypt with the 113 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
aes_128_gcm_12_encrypter_test.cc | 209 // EncryptWithNonce wraps the |Encrypt| method of |encrypter| to allow passing 218 if (!encrypter->Encrypt(nonce, associated_data, plaintext, 226 TEST(Aes128Gcm12EncrypterTest, Encrypt) {
|
aead_base_encrypter.h | 45 virtual bool Encrypt(base::StringPiece nonce,
|
crypto_secret_boxer.cc | 60 if (!encrypter->Encrypt(StringPiece(data, kBoxNonceSize), StringPiece(), 63 DLOG(DFATAL) << "CryptoSecretBoxer's Encrypt failed.";
|
/external/chromium_org/crypto/ |
encryptor.h | 68 bool Encrypt(const base::StringPiece& plaintext, std::string* ciphertext); 118 bool Crypt(bool do_encrypt, // Pass true to encrypt, false to decrypt.
|
encryptor_unittest.cc | 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 72 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 118 // - F.5.1 CTR-AES128.Encrypt 119 // - F.5.6 CTR-AES256.Encrypt 203 EXPECT_TRUE(encryptor.Encrypt(plaintext_str, &encrypted)); 296 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 306 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)); 361 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt. 363 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt. 420 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext)) [all...] |
/external/chromium_org/components/os_crypt/ |
os_crypt_posix.cc | 93 if (!encryptor.Encrypt(plaintext, ciphertext))
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
token_encryptor.cc | 44 LOG(WARNING) << "System salt key is not available for encrypt."; 86 if (!encryptor.Encrypt(token, &encoded_token)) { 87 LOG(WARNING) << "Failed to encrypt token.";
|
/external/chromium_org/third_party/skia/experimental/PdfViewer/pdfparser/native/pdfapi/ |
SkPdfFileTrailerDictionary_autogen.cpp | 47 SkPdfDictionary* SkPdfFileTrailerDictionary::Encrypt(SkPdfNativeDoc* doc) { 48 SkPdfNativeObject* ret = get("Encrypt", ""); 56 return get("Encrypt", "") != NULL;
|
/external/skia/experimental/PdfViewer/pdfparser/native/pdfapi/ |
SkPdfFileTrailerDictionary_autogen.cpp | 47 SkPdfDictionary* SkPdfFileTrailerDictionary::Encrypt(SkPdfNativeDoc* doc) { 48 SkPdfNativeObject* ret = get("Encrypt", ""); 56 return get("Encrypt", "") != NULL;
|
/external/chromium_org/content/child/webcrypto/ |
shared_crypto.h | 80 CONTENT_EXPORT Status Encrypt(const blink::WebCryptoAlgorithm& algorithm,
|