/external/chromium/chrome/browser/sync/util/ |
D | nigori_unittest.cc | 70 std::string encrypted = in TEST() local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); in TEST() 87 std::string encrypted; in TEST() local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); in TEST() 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); in TEST() 102 std::string encrypted; in TEST() local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); in TEST() 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); in TEST() 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); in TEST() 120 std::string encrypted; in TEST() local [all …]
|
D | cryptographer.cc | 45 sync_pb::EncryptedData* encrypted) const { in Encrypt() 46 DCHECK(encrypted); in Encrypt() 55 encrypted->set_key_name(default_nigori_->first); in Encrypt() 57 encrypted->mutable_blob())) { in Encrypt() 64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, in Decrypt() argument 67 std::string plaintext = DecryptToString(encrypted); in Decrypt() 72 const sync_pb::EncryptedData& encrypted) const { in DecryptToString() 73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name()); in DecryptToString() 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { in DecryptToString() 87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) const { in GetKeys() [all …]
|
D | cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; in TEST() local 22 encrypted.set_key_name("foo"); in TEST() 23 encrypted.set_blob("bar"); in TEST() 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); in TEST() 35 sync_pb::EncryptedData encrypted; in TEST() local 36 encrypted.set_key_name("foo"); in TEST() 37 encrypted.set_blob("bar"); in TEST() 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); in TEST() 54 sync_pb::EncryptedData encrypted; in TEST() local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); in TEST() [all …]
|
D | cryptographer.h | 61 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const; 65 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const; 71 sync_pb::EncryptedData* encrypted) const; 75 bool Decrypt(const sync_pb::EncryptedData& encrypted, 80 std::string DecryptToString(const sync_pb::EncryptedData& encrypted) const; 84 bool GetKeys(sync_pb::EncryptedData* encrypted) const; 94 bool SetKeys(const sync_pb::EncryptedData& encrypted); 99 void SetPendingKeys(const sync_pb::EncryptedData& encrypted);
|
D | nigori.cc | 170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { in Encrypt() 200 return Base64Encode(output, encrypted); in Encrypt() 203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { in Decrypt() argument 205 if (!Base64Decode(encrypted, &input)) in Decrypt()
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
D | AbstractSampleEncryptionBox.java | 165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent() 216 public Pair createPair(int clear, long encrypted) { in createPair() argument 217 return new Pair(clear, encrypted); in createPair() 223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair 225 public Pair(int clear, long encrypted) { in Pair() argument 227 this.encrypted = encrypted; in Pair() 244 if (encrypted != pair.encrypted) { in equals() 254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode() 260 return "clr:" + clear + " enc:" + encrypted; in toString()
|
/external/chromium/chrome/browser/sync/protocol/ |
D | nigori_specifics.proto | 33 optional EncryptedData encrypted = 1; field 34 // True if |encrypted| is encrypted using a passphrase 38 // Booleans corresponding to whether a datatype should be encrypted. 39 // Passwords are always encrypted, so we don't need a field here.
|
D | password_specifics.proto | 20 // These are the properties that get serialized into the |encrypted| field of 38 // PasswordSpecificsData that is encrypted into |encrypted|. 40 optional EncryptedData encrypted = 1; field
|
D | encryption.proto | 5 // Common sync protocol for encrypted data. 18 // the name of the key that was used to encrypt blob and blob is encrypted data
|
/external/openssl/crypto/pkcs12/ |
D | p12_add.c | 196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata() 197 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata() 198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata() 199 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata() 212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 215 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
|
/external/openssh/ |
D | authfile.c | 88 Buffer buffer, encrypted; in key_private_rsa1_to_blob() local 130 buffer_init(&encrypted); in key_private_rsa1_to_blob() 134 buffer_put_char(&encrypted, authfile_id_string[i]); in key_private_rsa1_to_blob() 135 buffer_put_char(&encrypted, 0); in key_private_rsa1_to_blob() 138 buffer_put_char(&encrypted, cipher_num); in key_private_rsa1_to_blob() 139 buffer_put_int(&encrypted, 0); /* For future extension */ in key_private_rsa1_to_blob() 142 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); in key_private_rsa1_to_blob() 143 buffer_put_bignum(&encrypted, key->rsa->n); in key_private_rsa1_to_blob() 144 buffer_put_bignum(&encrypted, key->rsa->e); in key_private_rsa1_to_blob() 145 buffer_put_cstring(&encrypted, comment); in key_private_rsa1_to_blob() [all …]
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
D | plainsaslhandler.h | 46 … std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { in ChooseBestSaslMechanism() argument 48 if (!encrypted && !allow_plain_) { in ChooseBestSaslMechanism()
|
D | saslhandler.h | 49 …d::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) = 0;
|
/external/chromium/chrome/browser/webdata/ |
D | token_service_table.cc | 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); in SetTokenForService() local 56 if (!encrypted) { in SetTokenForService()
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/ |
D | CencSampleEncryptionInformationGroupEntry.java | 64 public void setEncrypted(int encrypted) { in setEncrypted() argument 65 isEncrypted = encrypted; in setEncrypted()
|
/external/chromium/chrome/browser/sync/engine/ |
D | syncapi.cc | 209 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); in DecryptPasswordSpecifics() local 212 if (!crypto->Decrypt(encrypted, data.get())) in DecryptPasswordSpecifics() 235 const sync_pb::EncryptedData& encrypted = in DecryptIfNecessary() local 236 specifics.encrypted(); in DecryptIfNecessary() 238 DecryptToString(encrypted); in DecryptIfNecessary() 454 sync_pb::EntitySpecifics encrypted; in EncryptIfNecessary() local 455 syncable::AddDefaultExtensionValue(type, &encrypted); in EncryptIfNecessary() 460 encrypted.mutable_encrypted())) { in EncryptIfNecessary() 465 unencrypted->CopyFrom(encrypted); in EncryptIfNecessary() 568 GetEntry()->Get(SPECIFICS).GetExtension(sync_pb::password).encrypted(); in SetPasswordSpecifics() [all …]
|
D | syncer_util.cc | 297 if (!nigori.encrypted().blob().empty()) { in AttemptToUpdateEntry() 298 if (cryptographer->CanDecrypt(nigori.encrypted())) { in AttemptToUpdateEntry() 299 cryptographer->SetKeys(nigori.encrypted()); in AttemptToUpdateEntry() 301 cryptographer->SetPendingKeys(nigori.encrypted()); in AttemptToUpdateEntry() 337 !cryptographer->CanDecrypt(specifics.encrypted())) { in AttemptToUpdateEntry() 344 if (!cryptographer->CanDecrypt(password.encrypted())) { in AttemptToUpdateEntry()
|
/external/ipsec-tools/src/racoon/ |
D | isakmp_inf.c | 138 int encrypted; local 142 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 146 if (encrypted) { 179 if (encrypted) { 294 msgid, encrypted); 299 msgid, encrypted); 330 isakmp_info_recv_n(iph1, notify, msgid, encrypted) in isakmp_info_recv_n() argument 334 int encrypted; 354 if (encrypted) 360 if (encrypted) [all …]
|
/external/dropbear/ |
D | keyimport.c | 355 int encrypted; member 373 ret->encrypted = 0; in load_openssh_key() 423 ret->encrypted = 1; in load_openssh_key() 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { in load_openssh_key() 501 ret = key->encrypted; in openssh_encrypted() 529 if (key->encrypted) { in openssh_read() 1263 int encrypted; 1312 encrypted = 0; 1314 encrypted = 1; 1339 if (encrypted) { [all …]
|
D | TODO | 23 encrypted keys.
|
/external/openssl/crypto/des/ |
D | des.pod | 125 Decrypt data that was encrypted with the B<-e> option. 129 Decrypt data that was encrypted with the B<-E> option. 178 the input file is assumed to contain uuencoded, DES encrypted data. 208 multiple of 512 bytes. This causes problems when encrypted data is
|
/external/chromium/third_party/libjingle/source/talk/examples/login/ |
D | xmppauth.h | 60 bool encrypted);
|
D | xmppauth.cc | 55 bool encrypted) { in ChooseBestSaslMechanism() argument
|
/external/dropbear/libtomcrypt/notes/ |
D | tech0006.txt | 81 of the hash digest]. The format of the encrypted text is as follows 86 skey OCTET STRING -- The encrypted text (which the hash was XOR'ed against)
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 384 payloads->encrypted = pdata; in ikev2_parse_payloads() 493 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument 505 if (encrypted == NULL) { in ikev2_decrypt_payload() 529 iv = encrypted; in ikev2_decrypt_payload() 531 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
|