Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 108) sorted by relevance

12345

/external/chromium/chrome/browser/sync/util/
Dnigori_unittest.cc70 std::string encrypted = in TEST() local
75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); in TEST()
87 std::string encrypted; in TEST() local
88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); in TEST()
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); in TEST()
102 std::string encrypted; in TEST() local
103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); in TEST()
106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); in TEST()
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); in TEST()
120 std::string encrypted; in TEST() local
[all …]
Dcryptographer.cc45 sync_pb::EncryptedData* encrypted) const { in Encrypt()
46 DCHECK(encrypted); in Encrypt()
55 encrypted->set_key_name(default_nigori_->first); in Encrypt()
57 encrypted->mutable_blob())) { in Encrypt()
64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, in Decrypt() argument
67 std::string plaintext = DecryptToString(encrypted); in Decrypt()
72 const sync_pb::EncryptedData& encrypted) const { in DecryptToString()
73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name()); in DecryptToString()
80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { in DecryptToString()
87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) const { in GetKeys()
[all …]
Dcryptographer_unittest.cc21 sync_pb::EncryptedData encrypted; in TEST() local
22 encrypted.set_key_name("foo"); in TEST()
23 encrypted.set_blob("bar"); in TEST()
25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); in TEST()
35 sync_pb::EncryptedData encrypted; in TEST() local
36 encrypted.set_key_name("foo"); in TEST()
37 encrypted.set_blob("bar"); in TEST()
39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); in TEST()
54 sync_pb::EncryptedData encrypted; in TEST() local
55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); in TEST()
[all …]
Dcryptographer.h61 bool CanDecrypt(const sync_pb::EncryptedData& encrypted) const;
65 bool CanDecryptUsingDefaultKey(const sync_pb::EncryptedData& encrypted) const;
71 sync_pb::EncryptedData* encrypted) const;
75 bool Decrypt(const sync_pb::EncryptedData& encrypted,
80 std::string DecryptToString(const sync_pb::EncryptedData& encrypted) const;
84 bool GetKeys(sync_pb::EncryptedData* encrypted) const;
94 bool SetKeys(const sync_pb::EncryptedData& encrypted);
99 void SetPendingKeys(const sync_pb::EncryptedData& encrypted);
Dnigori.cc170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { in Encrypt()
200 return Base64Encode(output, encrypted); in Encrypt()
203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { in Decrypt() argument
205 if (!Base64Decode(encrypted, &input)) in Decrypt()
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
DAbstractSampleEncryptionBox.java165 IsoTypeWriter.writeUInt32(byteBuffer, pair.encrypted); in getContent()
216 public Pair createPair(int clear, long encrypted) { in createPair() argument
217 return new Pair(clear, encrypted); in createPair()
223 public long encrypted; field in AbstractSampleEncryptionBox.Entry.Pair
225 public Pair(int clear, long encrypted) { in Pair() argument
227 this.encrypted = encrypted; in Pair()
244 if (encrypted != pair.encrypted) { in equals()
254 result = 31 * result + (int) (encrypted ^ (encrypted >>> 32)); in hashCode()
260 return "clr:" + clear + " enc:" + encrypted; in toString()
/external/chromium/chrome/browser/sync/protocol/
Dnigori_specifics.proto33 optional EncryptedData encrypted = 1; field
34 // True if |encrypted| is encrypted using a passphrase
38 // Booleans corresponding to whether a datatype should be encrypted.
39 // Passwords are always encrypted, so we don't need a field here.
Dpassword_specifics.proto20 // These are the properties that get serialized into the |encrypted| field of
38 // PasswordSpecificsData that is encrypted into |encrypted|.
40 optional EncryptedData encrypted = 1; field
Dencryption.proto5 // Common sync protocol for encrypted data.
18 // the name of the key that was used to encrypt blob and blob is encrypted data
/external/openssl/crypto/pkcs12/
Dp12_add.c196 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata()
197 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata()
198 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata()
199 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata()
212 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
215 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
/external/openssh/
Dauthfile.c88 Buffer buffer, encrypted; in key_private_rsa1_to_blob() local
130 buffer_init(&encrypted); in key_private_rsa1_to_blob()
134 buffer_put_char(&encrypted, authfile_id_string[i]); in key_private_rsa1_to_blob()
135 buffer_put_char(&encrypted, 0); in key_private_rsa1_to_blob()
138 buffer_put_char(&encrypted, cipher_num); in key_private_rsa1_to_blob()
139 buffer_put_int(&encrypted, 0); /* For future extension */ in key_private_rsa1_to_blob()
142 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); in key_private_rsa1_to_blob()
143 buffer_put_bignum(&encrypted, key->rsa->n); in key_private_rsa1_to_blob()
144 buffer_put_bignum(&encrypted, key->rsa->e); in key_private_rsa1_to_blob()
145 buffer_put_cstring(&encrypted, comment); in key_private_rsa1_to_blob()
[all …]
/external/chromium/third_party/libjingle/source/talk/xmpp/
Dplainsaslhandler.h46 … std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { in ChooseBestSaslMechanism() argument
48 if (!encrypted && !allow_plain_) { in ChooseBestSaslMechanism()
Dsaslhandler.h49 …d::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) = 0;
/external/chromium/chrome/browser/webdata/
Dtoken_service_table.cc55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); in SetTokenForService() local
56 if (!encrypted) { in SetTokenForService()
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/
DCencSampleEncryptionInformationGroupEntry.java64 public void setEncrypted(int encrypted) { in setEncrypted() argument
65 isEncrypted = encrypted; in setEncrypted()
/external/chromium/chrome/browser/sync/engine/
Dsyncapi.cc209 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); in DecryptPasswordSpecifics() local
212 if (!crypto->Decrypt(encrypted, data.get())) in DecryptPasswordSpecifics()
235 const sync_pb::EncryptedData& encrypted = in DecryptIfNecessary() local
236 specifics.encrypted(); in DecryptIfNecessary()
238 DecryptToString(encrypted); in DecryptIfNecessary()
454 sync_pb::EntitySpecifics encrypted; in EncryptIfNecessary() local
455 syncable::AddDefaultExtensionValue(type, &encrypted); in EncryptIfNecessary()
460 encrypted.mutable_encrypted())) { in EncryptIfNecessary()
465 unencrypted->CopyFrom(encrypted); in EncryptIfNecessary()
568 GetEntry()->Get(SPECIFICS).GetExtension(sync_pb::password).encrypted(); in SetPasswordSpecifics()
[all …]
Dsyncer_util.cc297 if (!nigori.encrypted().blob().empty()) { in AttemptToUpdateEntry()
298 if (cryptographer->CanDecrypt(nigori.encrypted())) { in AttemptToUpdateEntry()
299 cryptographer->SetKeys(nigori.encrypted()); in AttemptToUpdateEntry()
301 cryptographer->SetPendingKeys(nigori.encrypted()); in AttemptToUpdateEntry()
337 !cryptographer->CanDecrypt(specifics.encrypted())) { in AttemptToUpdateEntry()
344 if (!cryptographer->CanDecrypt(password.encrypted())) { in AttemptToUpdateEntry()
/external/ipsec-tools/src/racoon/
Disakmp_inf.c138 int encrypted; local
142 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
146 if (encrypted) {
179 if (encrypted) {
294 msgid, encrypted);
299 msgid, encrypted);
330 isakmp_info_recv_n(iph1, notify, msgid, encrypted) in isakmp_info_recv_n() argument
334 int encrypted;
354 if (encrypted)
360 if (encrypted)
[all …]
/external/dropbear/
Dkeyimport.c355 int encrypted; member
373 ret->encrypted = 0; in load_openssh_key()
423 ret->encrypted = 1; in load_openssh_key()
467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { in load_openssh_key()
501 ret = key->encrypted; in openssh_encrypted()
529 if (key->encrypted) { in openssh_read()
1263 int encrypted;
1312 encrypted = 0;
1314 encrypted = 1;
1339 if (encrypted) {
[all …]
DTODO23 encrypted keys.
/external/openssl/crypto/des/
Ddes.pod125 Decrypt data that was encrypted with the B<-e> option.
129 Decrypt data that was encrypted with the B<-E> option.
178 the input file is assumed to contain uuencoded, DES encrypted data.
208 multiple of 512 bytes. This causes problems when encrypted data is
/external/chromium/third_party/libjingle/source/talk/examples/login/
Dxmppauth.h60 bool encrypted);
Dxmppauth.cc55 bool encrypted) { in ChooseBestSaslMechanism() argument
/external/dropbear/libtomcrypt/notes/
Dtech0006.txt81 of the hash digest]. The format of the encrypted text is as follows
86 skey OCTET STRING -- The encrypted text (which the hash was XOR'ed against)
/external/wpa_supplicant_8/src/eap_common/
Dikev2_common.c384 payloads->encrypted = pdata; in ikev2_parse_payloads()
493 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument
505 if (encrypted == NULL) { in ikev2_decrypt_payload()
529 iv = encrypted; in ikev2_decrypt_payload()
531 end = encrypted + encrypted_len; in ikev2_decrypt_payload()

12345