/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_common.c | 154 struct wpabuf *decrypted; local 167 decrypted = wpabuf_alloc(encr_len - block_size); 168 if (decrypted == NULL) 172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 174 wpabuf_len(decrypted))) { 175 wpabuf_free(decrypted); 179 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 180 decrypted); 182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
wps_enrollee.c | 833 struct wpabuf *decrypted; local 853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 855 if (decrypted == NULL) { 856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 864 if (wps_parse_msg(decrypted, &eattr) < 0 || 865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 867 wpabuf_free(decrypted); 871 wpabuf_free(decrypted); 882 struct wpabuf *decrypted; local 929 struct wpabuf *decrypted; local [all...] |
/dalvik/libcore/crypto/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherWrapThread.java | 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local 44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes()); 45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
|
CipherPBEThread.java | 37 byte[] decrypted = new byte[128]; 56 cip.doFinal(output, 0, outputSize, decrypted); 58 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherRSAThread.java | 33 byte[] decrypted = new byte[256]; 46 cip.doFinal(output, 0, outputSize, decrypted); 48 checkEncodedData(input, decrypted);
|
CipherSymmetricKeyThread.java | 36 byte[] decrypted = new byte[128]; 62 cip.doFinal(output, 0, outputSize, decrypted); 68 cip.doFinal(output, 0, outputSize, decrypted); 71 checkEncodedData(getData().getBytes(), decrypted); local
|
/frameworks/base/media/libdrm/mobile2/include/util/crypto/ |
DrmCrypto.h | 42 * \param decData the buffer to store decrypted data
43 * \param decLen the actual length of decrypted data
185 * \param decData the buffer to store decrypted data
187 * -1 decrypted failed
188 * >0 the actual length of decrypted data
195 * get the length of decrypted data
198 * the length of decrypted data
|
/frameworks/base/media/java/android/drm/mobile1/ |
DrmRawContent.java | 192 * Get one InputStream object to read decrypted content. 194 * @param rights the rights object contain decrypted key. 196 * @return the InputStream object of decrypted media content. 206 * Get the type of the decrypted media content. 208 * @return the decrypted media content type of this DRM content. 215 * Get the length of the decrypted media content. 217 * @param rights the rights object contain decrypted key. 219 * @return the length of the decrypted media content. 283 /* call native method to get this DRM decrypted media content length */ 433 * @return the decrypted media content type [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local 279 decrypted = os_malloc(left); 280 if (decrypted == NULL) { 285 os_memcpy(decrypted, msg, left); 290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 293 os_free(decrypted); 296 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 297 decrypted, left); 300 switch (decrypted[0] >> 6) { 317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
eap_sim.c | 660 u8 *decrypted; local 661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 664 if (decrypted == NULL) { 669 os_free(decrypted); 694 u8 *decrypted; local 702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 705 if (decrypted == NULL) { 715 os_free(decrypted); 719 os_free(decrypted); 792 u8 *decrypted; local [all...] |
eap_aka.c | 892 u8 *decrypted; local 893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 896 if (decrypted == NULL) { 901 os_free(decrypted); 926 u8 *decrypted; local 934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 937 if (decrypted == NULL) { 947 os_free(decrypted); 951 os_free(decrypted); 1023 u8 *decrypted; local [all...] |
/external/wpa_supplicant/ |
eap_psk.c | 183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; local 265 decrypted = os_malloc(left); 266 if (decrypted == NULL) { 271 os_memcpy(decrypted, msg, left); 274 reqData, 22, decrypted, left, tag)) { 276 os_free(decrypted); 279 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 280 decrypted, left); 283 switch (decrypted[0] >> 6) { 302 os_free(decrypted); [all...] |
eap_aka.c | 490 u8 *decrypted; local 491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 494 if (decrypted == NULL) { 500 os_free(decrypted); 520 u8 *decrypted; local 528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 531 if (decrypted == NULL) { 541 os_free(decrypted); 545 os_free(decrypted); 624 u8 *decrypted; local [all...] |
eap_sim.c | 569 u8 *decrypted; local 570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 573 if (decrypted == NULL) { 579 os_free(decrypted); 599 u8 *decrypted; local 607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 610 if (decrypted == NULL) { 620 os_free(decrypted); 624 os_free(decrypted); 703 u8 *decrypted; local [all...] |
eap_sim_common.c | 571 u8 *decrypted; local 578 decrypted = os_malloc(encr_data_len); 579 if (decrypted == NULL) 581 os_memcpy(decrypted, encr_data, encr_data_len); 583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len); 584 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 585 decrypted, encr_data_len); 587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, 590 "decrypted AT_ENCR_DATA") [all...] |
/packages/apps/Mms/src/com/android/mms/drm/ |
DrmWrapper.java | 52 * The decrypted data. 90 * Get permission type for the decrypted content-type. 105 * Get decrypted data. 107 * @return the decrypted content if decryption was successful. 217 * Get the decrypted object's content-type.
|
/dalvik/libcore/security/src/test/java/tests/targets/security/ |
CipherHelper.java | 94 byte[] decrypted = crypt(cipher, encrypted); 96 String decryptedString = new String(decrypted); 309 byte[] decrypted = null; 311 decrypted = cipher.doFinal(bs); 318 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local 393 byte[] decrypted = null; 395 decrypted = cipher.doFinal(bs); 402 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
/frameworks/base/media/libdrm/mobile2/include/drmmanager/ |
DrmManager.h | 79 * Open one Dcf container to read the decrypted data according to specified 83 * @param decrypted data returned.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 339 u8 *decrypted, nonce[16]; local 379 decrypted = os_malloc(left); 380 if (decrypted == NULL) 382 os_memcpy(decrypted, pos, left); 385 wpabuf_head(respData), 22, decrypted, left, 388 os_free(decrypted); 392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 393 decrypted, left); 396 switch (decrypted[0] >> 6) { 410 os_free(decrypted); [all...] |
ikev2.c | 456 u8 *decrypted; local 461 decrypted = ikev2_decrypt_payload(data->proposal.encr, 465 if (decrypted == NULL) 468 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 470 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 471 decrypted + decrypted_len) < 0) { 472 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 480 os_free(decrypted); 699 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 703 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 721 u8 *decrypted; local [all...] |
/frameworks/base/media/libdrm/mobile2/src/dcf/ |
DrmIStream.cpp | 45 // come to the end of decrypted data
|
/frameworks/base/media/libdrm/mobile1/include/objmng/ |
drm_rights_manager.h | 129 * Discard the padding bytes in DCF decrypted data. 131 * \param decryptedBuf The aes decrypted data buffer to be scanned. 142 * \param Buffer The buffer to decrypted and also used to save the output data.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 944 u8 *decrypted; local 951 decrypted = os_malloc(encr_data_len); 952 if (decrypted == NULL) 954 os_memcpy(decrypted, encr_data, encr_data_len); 956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 957 os_free(decrypted); 960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 961 decrypted, encr_data_len); 963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
/frameworks/base/media/libdrm/mobile1/include/parser/ |
parser_dcf.h | 63 int32_t DecryptedDataLen; /**< Length of the decrypted data field */
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/encodings/ |
OAEPEncoding.java | 193 * @exception InvalidCipherTextException if the decrypted block turns out to 207 // on encryption, we need to make sure our decrypted block comes back
|