HomeSort by relevance Sort by last modified time
    Searched defs:decrypted (Results 1 - 21 of 21) sorted by null

  /external/libvpx/libvpx/vp8/decoder/
dboolhuff.c 43 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local
46 size_t n = VPXMIN(sizeof(decrypted), bytes_left);
47 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n);
48 bufptr = decrypted;
  /external/wpa_supplicant_8/src/tls/
pkcs1.c 202 u8 *decrypted; local
208 decrypted = os_malloc(s_len);
209 if (decrypted == NULL)
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
216 os_free(decrypted);
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
240 os_free(decrypted);
261 os_free(decrypted);
    [all...]
tlsv1_common.c 420 const u8 *decrypted; local
460 decrypted = buf;
462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
463 decrypted, buflen);
486 decrypted = buf + 19;
493 decrypted = buf + 19;
500 decrypted = buf + 19;
513 os_memcmp_const(decrypted, data, data_len) != 0) {
  /frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/
AesCtrDecryptorUnittest.cpp 47 const uint8_t* decrypted,
56 EXPECT_EQ(0, memcmp(outputBuffer, decrypted, totalSize));
147 uint8_t decrypted[kTotalSize] = { local
162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
192 uint8_t decrypted[kTotalSize] = { local
208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
238 uint8_t decrypted[kTotalSize] = { local
254 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
287 uint8_t decrypted[kTotalSize] = { local
303 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
339 uint8_t decrypted[kTotalSize] = { local
394 uint8_t decrypted[kTotalSize] = { local
457 uint8_t decrypted[kTotalSize] = { local
    [all...]
  /external/openssh/
ssh-rsa.c 313 u_char *decrypted = NULL; local
329 if ((decrypted = malloc(rsasize)) == NULL) {
333 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
342 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
343 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
350 if (decrypted) {
351 explicit_bzero(decrypted, rsasize);
352 free(decrypted);
sshkey.c 3199 struct sshbuf *kdf = NULL, *decrypted = NULL; local
3665 struct sshbuf *decrypted = NULL, *copy = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 937 u8 *decrypted; local
944 decrypted = os_memdup(encr_data, encr_data_len);
945 if (decrypted == NULL)
948 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
949 os_free(decrypted);
952 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
953 decrypted, encr_data_len);
955 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
958 "decrypted AT_ENCR_DATA")
    [all...]
ikev2_common.c 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
495 decrypted = os_malloc(decrypted_len);
496 if (decrypted == NULL)
500 decrypted, decrypted_len) < 0) {
501 os_free(decrypted);
505 pad_len = decrypted[decrypted_len - 1];
509 os_free(decrypted);
516 return decrypted;
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local
275 decrypted = os_memdup(msg, left);
276 if (decrypted == NULL) {
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
291 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
    [all...]
ikev2.c 627 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
631 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
649 u8 *decrypted; local
653 decrypted = ikev2_decrypt_payload(data->proposal.encr,
657 if (decrypted == NULL)
661 decrypted, decrypted_len);
662 os_free(decrypted);
eap_sim.c 819 u8 *decrypted; local
820 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
823 if (decrypted == NULL) {
828 os_free(decrypted);
853 u8 *decrypted; local
861 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
864 if (decrypted == NULL) {
874 os_free(decrypted);
878 os_free(decrypted);
952 u8 *decrypted; local
    [all...]
eap_aka.c 1080 u8 *decrypted; local
1081 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1084 if (decrypted == NULL) {
1089 os_free(decrypted);
1114 u8 *decrypted; local
1122 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1125 if (decrypted == NULL) {
1135 os_free(decrypted);
1139 os_free(decrypted);
1212 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 333 u8 *decrypted, nonce[16]; local
373 decrypted = os_memdup(pos, left);
374 if (decrypted == NULL)
378 wpabuf_head(respData), 22, decrypted, left,
381 os_free(decrypted);
385 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
386 decrypted, left);
389 switch (decrypted[0] >> 6) {
403 os_free(decrypted);
eap_server_sim.c 612 u8 *decrypted = NULL; local
628 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
631 if (decrypted == NULL) {
643 os_free(decrypted);
644 decrypted = NULL;
682 os_free(decrypted);
ikev2.c 451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
715 u8 *decrypted; local
    [all...]
eap_server_aka.c 1057 u8 *decrypted = NULL; local
1075 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1078 if (decrypted == NULL) {
1090 os_free(decrypted);
1091 decrypted = NULL;
1141 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 996 struct wpabuf *decrypted; local
999 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
1001 if (decrypted == NULL) {
1008 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
1010 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1011 wps_process_key_wrap_auth(wps, decrypted,
1015 wpabuf_clear_free(decrypted);
1019 wpabuf_clear_free(decrypted);
1090 struct wpabuf *decrypted; local
1110 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings
1145 struct wpabuf *decrypted; local
1202 struct wpabuf *decrypted; local
    [all...]
wps_common.c 158 struct wpabuf *decrypted; local
171 decrypted = wpabuf_alloc(encr_len - block_size);
172 if (decrypted == NULL)
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
178 wpabuf_len(decrypted))) {
179 wpabuf_clear_free(decrypted);
183 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
184 decrypted);
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_registrar.c 2827 struct wpabuf *decrypted; local
2978 struct wpabuf *decrypted; local
    [all...]
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
AesGcmTest.java 238 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); local
240 cipher.doFinal(ctBuffer, decrypted);
241 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted));
262 ByteBuffer decrypted = ByteBuffer.wrap(backingArray); local
266 cipher.doFinal(ctBuffer, decrypted);
267 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted));
288 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); local
290 cipher.doFinal(ctBuffer, decrypted);
291 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted));
347 ByteBuffer decrypted = ByteBuffer.allocate(test.pt.length - 1) local
    [all...]
  /external/grpc-grpc/test/core/tsi/alts/crypt/
aes_gcm_test.cc 350 uint8_t* decrypted = static_cast<uint8_t*>(malloc(decrypted_length)); local
351 struct iovec decrypted_vec = {decrypted, decrypted_length};
362 free(decrypted);
    [all...]

Completed in 3072 milliseconds