HomeSort by relevance Sort by last modified time
    Searched refs:Encrypt (Results 1 - 25 of 43) sorted by null

1 2

  /external/chromium_org/sync/util/
nigori_unittest.cc 58 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted1));
61 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted2));
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
121 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted));
155 EXPECT_TRUE(nigori1.Encrypt(original, &ciphertext));
159 EXPECT_TRUE(nigori2.Encrypt(original, &ciphertext));
cryptographer_unittest.cc 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted));
73 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted));
92 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted));
97 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted2));
99 // Now encrypt with a new default key. Should overwrite the old data.
102 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3));
123 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted1));
125 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted2));
132 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted3));
134 EXPECT_TRUE(cryptographer_.Encrypt(original, &encrypted4))
    [all...]
nigori.h 24 // for your secret (basically a map key), and |Encrypt| and |Decrypt| to store
56 bool Encrypt(const std::string& value, std::string* encrypted) const;
cryptographer.h 36 // This class manages the Nigori objects used to encrypt and decrypt sensitive
81 bool Encrypt(const ::google::protobuf::MessageLite& message,
108 // Encrypt.
160 // Returns whether this Cryptographer is ready to encrypt and decrypt data.
nigori.cc 134 if (!encryptor.Encrypt(plaintext.str(), &ciphertext))
158 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const {
170 if (!encryptor.Encrypt(value, &ciphertext))
cryptographer.cc 56 bool Cryptographer::Encrypt(
61 LOG(ERROR) << "Cryptographer not ready, failed to encrypt.";
93 if (!default_nigori->second->Encrypt(serialized,
95 LOG(ERROR) << "Failed to encrypt data.";
113 return std::string(); // Caller should have called CanDecrypt(encrypt).
140 // Encrypt the bag with the default Nigori.
141 return Encrypt(bag, encrypted);
  /external/chromium_org/media/cast/transport/utility/
transport_encryption_handler.h 32 bool Encrypt(uint32 frame_id,
transport_encryption_handler.cc 41 bool TransportEncryptionHandler::Encrypt(uint32 frame_id,
50 if (!encryptor_->Encrypt(data, encrypted_data)) {
51 NOTREACHED() << "Encrypt error";
  /external/chromium_org/net/quic/crypto/
null_encrypter.cc 24 bool NullEncrypter::Encrypt(
43 Encrypt(StringPiece(), associated_data, plaintext, buffer);
null_encrypter.h 15 // has occurred. It does not actually encrypt the payload, but does
25 virtual bool Encrypt(base::StringPiece nonce,
null_encrypter_test.cc 16 TEST_F(NullEncrypterTest, Encrypt) {
quic_encrypter.h 42 // Encrypt encrypts |plaintext| and writes the ciphertext, plus a MAC over
47 virtual bool Encrypt(base::StringPiece nonce,
chacha20_poly1305_encrypter_test.cc 42 // EncryptWithNonce wraps the |Encrypt| method of |encrypter| to allow passing
51 if (!encrypter->Encrypt(nonce, associated_data, plaintext,
59 TEST(ChaCha20Poly1305EncrypterTest, Encrypt) {
aead_base_encrypter_nss.cc 50 bool AeadBaseEncrypter::Encrypt(StringPiece nonce,
120 // TODO(ianswett): Introduce a check to ensure that we don't encrypt with the
127 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
aead_base_encrypter_openssl.cc 76 bool AeadBaseEncrypter::Encrypt(StringPiece nonce,
106 // TODO(ianswett): Introduce a check to ensure that we don't encrypt with the
113 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
aes_128_gcm_12_encrypter_test.cc 209 // EncryptWithNonce wraps the |Encrypt| method of |encrypter| to allow passing
218 if (!encrypter->Encrypt(nonce, associated_data, plaintext,
226 TEST(Aes128Gcm12EncrypterTest, Encrypt) {
aead_base_encrypter.h 45 virtual bool Encrypt(base::StringPiece nonce,
crypto_secret_boxer.cc 60 if (!encrypter->Encrypt(StringPiece(data, kBoxNonceSize), StringPiece(),
63 DLOG(DFATAL) << "CryptoSecretBoxer's Encrypt failed.";
  /external/chromium_org/crypto/
encryptor.h 68 bool Encrypt(const base::StringPiece& plaintext, std::string* ciphertext);
118 bool Crypt(bool do_encrypt, // Pass true to encrypt, false to decrypt.
encryptor_unittest.cc 28 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
72 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
118 // - F.5.1 CTR-AES128.Encrypt
119 // - F.5.6 CTR-AES256.Encrypt
203 EXPECT_TRUE(encryptor.Encrypt(plaintext_str, &encrypted));
296 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
306 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext));
361 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt.
363 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt.
420 EXPECT_TRUE(encryptor.Encrypt(plaintext, &ciphertext))
    [all...]
  /external/chromium_org/components/os_crypt/
os_crypt_posix.cc 93 if (!encryptor.Encrypt(plaintext, ciphertext))
  /external/chromium_org/chrome/browser/chromeos/settings/
token_encryptor.cc 44 LOG(WARNING) << "System salt key is not available for encrypt.";
86 if (!encryptor.Encrypt(token, &encoded_token)) {
87 LOG(WARNING) << "Failed to encrypt token.";
  /external/chromium_org/third_party/skia/experimental/PdfViewer/pdfparser/native/pdfapi/
SkPdfFileTrailerDictionary_autogen.cpp 47 SkPdfDictionary* SkPdfFileTrailerDictionary::Encrypt(SkPdfNativeDoc* doc) {
48 SkPdfNativeObject* ret = get("Encrypt", "");
56 return get("Encrypt", "") != NULL;
  /external/skia/experimental/PdfViewer/pdfparser/native/pdfapi/
SkPdfFileTrailerDictionary_autogen.cpp 47 SkPdfDictionary* SkPdfFileTrailerDictionary::Encrypt(SkPdfNativeDoc* doc) {
48 SkPdfNativeObject* ret = get("Encrypt", "");
56 return get("Encrypt", "") != NULL;
  /external/chromium_org/content/child/webcrypto/
shared_crypto.h 80 CONTENT_EXPORT Status Encrypt(const blink::WebCryptoAlgorithm& algorithm,

Completed in 1203 milliseconds

1 2