HomeSort by relevance Sort by last modified time
    Searched full:decrypted (Results 1 - 25 of 114) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_common.c 154 struct wpabuf *decrypted; local
167 decrypted = wpabuf_alloc(encr_len - block_size);
168 if (decrypted == NULL)
172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
174 wpabuf_len(decrypted))) {
175 wpabuf_free(decrypted);
179 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
180 decrypted);
182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_enrollee.c 833 struct wpabuf *decrypted; local
853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
855 if (decrypted == NULL) {
856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
864 if (wps_parse_msg(decrypted, &eattr) < 0 ||
865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
867 wpabuf_free(decrypted);
871 wpabuf_free(decrypted);
882 struct wpabuf *decrypted; local
929 struct wpabuf *decrypted; local
    [all...]
  /dalvik/libcore/crypto/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherWrapThread.java 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local
44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes());
45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
CipherPBEThread.java 37 byte[] decrypted = new byte[128];
56 cip.doFinal(output, 0, outputSize, decrypted);
58 checkEncodedData(getData().getBytes(), decrypted); local
CipherRSAThread.java 33 byte[] decrypted = new byte[256];
46 cip.doFinal(output, 0, outputSize, decrypted);
48 checkEncodedData(input, decrypted);
CipherSymmetricKeyThread.java 36 byte[] decrypted = new byte[128];
62 cip.doFinal(output, 0, outputSize, decrypted);
68 cip.doFinal(output, 0, outputSize, decrypted);
71 checkEncodedData(getData().getBytes(), decrypted); local
  /frameworks/base/media/libdrm/mobile2/include/util/crypto/
DrmCrypto.h 42 * \param decData the buffer to store decrypted data
43 * \param decLen the actual length of decrypted data
185 * \param decData the buffer to store decrypted data
187 * -1 decrypted failed
188 * >0 the actual length of decrypted data
195 * get the length of decrypted data
198 * the length of decrypted data
  /frameworks/base/media/java/android/drm/mobile1/
DrmRawContent.java 192 * Get one InputStream object to read decrypted content.
194 * @param rights the rights object contain decrypted key.
196 * @return the InputStream object of decrypted media content.
206 * Get the type of the decrypted media content.
208 * @return the decrypted media content type of this DRM content.
215 * Get the length of the decrypted media content.
217 * @param rights the rights object contain decrypted key.
219 * @return the length of the decrypted media content.
283 /* call native method to get this DRM decrypted media content length */
433 * @return the decrypted media content type
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local
279 decrypted = os_malloc(left);
280 if (decrypted == NULL) {
285 os_memcpy(decrypted, msg, left);
290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
293 os_free(decrypted);
296 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
297 decrypted, left);
300 switch (decrypted[0] >> 6) {
317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
eap_sim.c 660 u8 *decrypted; local
661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
664 if (decrypted == NULL) {
669 os_free(decrypted);
694 u8 *decrypted; local
702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
705 if (decrypted == NULL) {
715 os_free(decrypted);
719 os_free(decrypted);
792 u8 *decrypted; local
    [all...]
eap_aka.c 892 u8 *decrypted; local
893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
896 if (decrypted == NULL) {
901 os_free(decrypted);
926 u8 *decrypted; local
934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
937 if (decrypted == NULL) {
947 os_free(decrypted);
951 os_free(decrypted);
1023 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant/
eap_psk.c 183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; local
265 decrypted = os_malloc(left);
266 if (decrypted == NULL) {
271 os_memcpy(decrypted, msg, left);
274 reqData, 22, decrypted, left, tag)) {
276 os_free(decrypted);
279 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
280 decrypted, left);
283 switch (decrypted[0] >> 6) {
302 os_free(decrypted);
    [all...]
eap_aka.c 490 u8 *decrypted; local
491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
494 if (decrypted == NULL) {
500 os_free(decrypted);
520 u8 *decrypted; local
528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
531 if (decrypted == NULL) {
541 os_free(decrypted);
545 os_free(decrypted);
624 u8 *decrypted; local
    [all...]
eap_sim.c 569 u8 *decrypted; local
570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
573 if (decrypted == NULL) {
579 os_free(decrypted);
599 u8 *decrypted; local
607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
610 if (decrypted == NULL) {
620 os_free(decrypted);
624 os_free(decrypted);
703 u8 *decrypted; local
    [all...]
eap_sim_common.c 571 u8 *decrypted; local
578 decrypted = os_malloc(encr_data_len);
579 if (decrypted == NULL)
581 os_memcpy(decrypted, encr_data, encr_data_len);
583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len);
584 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
585 decrypted, encr_data_len);
587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
590 "decrypted AT_ENCR_DATA")
    [all...]
  /packages/apps/Mms/src/com/android/mms/drm/
DrmWrapper.java 52 * The decrypted data.
90 * Get permission type for the decrypted content-type.
105 * Get decrypted data.
107 * @return the decrypted content if decryption was successful.
217 * Get the decrypted object's content-type.
  /dalvik/libcore/security/src/test/java/tests/targets/security/
CipherHelper.java 94 byte[] decrypted = crypt(cipher, encrypted);
96 String decryptedString = new String(decrypted);
309 byte[] decrypted = null;
311 decrypted = cipher.doFinal(bs);
318 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
393 byte[] decrypted = null;
395 decrypted = cipher.doFinal(bs);
402 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
  /frameworks/base/media/libdrm/mobile2/include/drmmanager/
DrmManager.h 79 * Open one Dcf container to read the decrypted data according to specified
83 * @param decrypted data returned.
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 339 u8 *decrypted, nonce[16]; local
379 decrypted = os_malloc(left);
380 if (decrypted == NULL)
382 os_memcpy(decrypted, pos, left);
385 wpabuf_head(respData), 22, decrypted, left,
388 os_free(decrypted);
392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
393 decrypted, left);
396 switch (decrypted[0] >> 6) {
410 os_free(decrypted);
    [all...]
ikev2.c 456 u8 *decrypted; local
461 decrypted = ikev2_decrypt_payload(data->proposal.encr,
465 if (decrypted == NULL)
468 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
470 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
471 decrypted + decrypted_len) < 0) {
472 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
480 os_free(decrypted);
699 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
703 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
721 u8 *decrypted; local
    [all...]
  /frameworks/base/media/libdrm/mobile2/src/dcf/
DrmIStream.cpp 45 // come to the end of decrypted data
  /frameworks/base/media/libdrm/mobile1/include/objmng/
drm_rights_manager.h 129 * Discard the padding bytes in DCF decrypted data.
131 * \param decryptedBuf The aes decrypted data buffer to be scanned.
142 * \param Buffer The buffer to decrypted and also used to save the output data.
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 944 u8 *decrypted; local
951 decrypted = os_malloc(encr_data_len);
952 if (decrypted == NULL)
954 os_memcpy(decrypted, encr_data, encr_data_len);
956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
957 os_free(decrypted);
960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
961 decrypted, encr_data_len);
963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
  /frameworks/base/media/libdrm/mobile1/include/parser/
parser_dcf.h 63 int32_t DecryptedDataLen; /**< Length of the decrypted data field */
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/encodings/
OAEPEncoding.java 193 * @exception InvalidCipherTextException if the decrypted block turns out to
207 // on encryption, we need to make sure our decrypted block comes back

Completed in 419 milliseconds

1 2 3 4 5