/external/openssl/crypto/aes/ |
aes_cfb.c | 178 else /* decrypt the input */
|
/external/openssl/crypto/camellia/ |
cmll_cfb.c | 188 else /* decrypt the input */
|
/external/openssl/crypto/rc2/ |
rc2test.c | 247 printf("idea_cfb_encrypt decrypt error\n");
|
/external/wpa_supplicant/ |
rsa.c | 272 * Decrypt (or sign) using Chinese remainer theorem to speed
|
eap_testing.txt | 266 (Failed to decrypt Phase 2 data) 321 wpa_supplicant tries to decrypt this.. Replying with TLS ACK and and
|
aes_wrap.c | 486 * @data: Data to decrypt in-place
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
rsa.c | 274 * Decrypt (or sign) using Chinese remainer theorem to speed
|
tlsv1_server_read.c | 517 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt " 888 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature");
|
/hardware/ti/wlan/wl1271/TWD/FirmwareApi/ |
public_descriptors.h | 244 uint8 status; /* 0 = Success, 1 = RX Decrypt Fail, 2 = RX MIC Fail */
|
/external/dropbear/libtomcrypt/ |
changes | 118 -- lrw_process now checks the return of the cipher ecb encrypt/decrypt calls 180 analyzed. It does carry some advantages over RSA (slightly smaller public key, faster decrypt) but also 185 -- Made the cipher ecb encrypt/decrypt return an int as well, changed ALL dependent code to check for this. 196 -- Added encrypt/decrypt to the DSA side (basically DH with DSA parameters) 393 -- Removed tim_exptmod() completely, updated several RSA functions (notably v15 and the decrypt/verify) so they [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
blowfish.c | 546 /* encrypt and decrypt */ 555 /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-alg-fst.c | 305 * Decrypt a single block. 403 * Decrypt only a certain number of rounds.
|
/external/openssl/ssl/ |
ssl_err.c | 293 {ERR_REASON(SSL_R_BAD_RSA_DECRYPT) ,"bad rsa decrypt"}, 465 {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR),"tlsv1 alert decrypt error"}, [all...] |
t1_lib.c | 955 /* Attempt to decrypt session data */ 988 /* If session decrypt failure indicate a cache miss and set state to
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 618 "decrypt GTK"); 709 "decrypt IGTK");
|
wpa.c | 1148 "failed - could not decrypt GTK"); [all...] |
/external/openssl/apps/ |
speed.c | 759 int decrypt=0; local 864 else if (argc > 0 && !strcmp(*argv,"-decrypt")) 866 decrypt=1; [all...] |
/build/tools/signapk/ |
SignApk.java | 112 * Decrypt an encrypted PKCS 8 format private key.
|
/dalvik/libcore/x-net/src/main/java/javax/net/ssl/ |
SSLEngine.java | 24 * protocols. It includes the setup, handshake, and encrypt/decrypt
|
/dalvik/libcore/x-net/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionStateTLS.java | 300 protected byte[] decrypt(byte type, byte[] fragment, method in class:ConnectionStateTLS
|
SSLRecordProtocol.java | 387 fragment = activeReadState.decrypt((byte) type, fragment);
|
/external/ipsec-tools/src/racoon/ |
isakmp_quick.c | 333 /* decrypt packet */ 710 /* decrypt packet */ 864 /* decrypt packet */ [all...] |
/external/openssl/crypto/des/ |
des_old.h | 415 # define DECRYPT DES_DECRYPT
|
/external/openssl/include/openssl/ |
des_old.h | 415 # define DECRYPT DES_DECRYPT
|
/external/proguard/docs/ |
FAQ.html | 210 is ever incorporated, I'll provide a tool to decrypt the strings as well.
|