HomeSort by relevance Sort by last modified time
    Searched defs:decrypted (Results 1 - 25 of 38) sorted by null

1 2

  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherWrapThread.java 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local
44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes());
45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
CipherPBEThread.java 37 byte[] decrypted = new byte[128];
56 cip.doFinal(output, 0, outputSize, decrypted);
58 checkEncodedData(getData().getBytes(), decrypted); local
CipherSymmetricKeyThread.java 36 byte[] decrypted = new byte[128];
62 cip.doFinal(output, 0, outputSize, decrypted);
68 cip.doFinal(output, 0, outputSize, decrypted);
71 checkEncodedData(getData().getBytes(), decrypted); local
  /external/chromium/crypto/
encryptor_unittest.cc 230 std::string decrypted; local
231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted));
232 EXPECT_EQ("", decrypted);
  /external/chromium/chrome/browser/sync/util/
nigori_unittest.cc 90 std::string decrypted; local
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
93 EXPECT_EQ(plaintext, decrypted);
108 std::string decrypted; local
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
111 EXPECT_NE(plaintext, decrypted);
127 std::string decrypted; local
128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted));
130 EXPECT_NE(plaintext, decrypted);
cryptographer_unittest.cc 57 sync_pb::PasswordSpecificsData decrypted; local
58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
133 sync_pb::PasswordSpecificsData decrypted; local
134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
  /libcore/support/src/test/java/tests/security/
AlgorithmParameterAsymmetricHelper.java 90 byte[] decrypted = null;
92 decrypted = cipher.doFinal(bs);
99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
AlgorithmParameterSymmetricHelper.java 103 byte[] decrypted = null;
105 decrypted = cipher.doFinal(bs);
112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_common.c 154 struct wpabuf *decrypted; local
167 decrypted = wpabuf_alloc(encr_len - block_size);
168 if (decrypted == NULL)
172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
174 wpabuf_len(decrypted))) {
175 wpabuf_free(decrypted);
179 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
180 decrypted);
182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_enrollee.c 833 struct wpabuf *decrypted; local
853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
855 if (decrypted == NULL) {
856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
864 if (wps_parse_msg(decrypted, &eattr) < 0 ||
865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
867 wpabuf_free(decrypted);
871 wpabuf_free(decrypted);
882 struct wpabuf *decrypted; local
929 struct wpabuf *decrypted; local
    [all...]
  /external/wpa_supplicant/
eap_psk.c 183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; local
265 decrypted = os_malloc(left);
266 if (decrypted == NULL) {
271 os_memcpy(decrypted, msg, left);
274 reqData, 22, decrypted, left, tag)) {
276 os_free(decrypted);
279 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
280 decrypted, left);
283 switch (decrypted[0] >> 6) {
302 os_free(decrypted);
    [all...]
eap_sim_common.c 571 u8 *decrypted; local
578 decrypted = os_malloc(encr_data_len);
579 if (decrypted == NULL)
581 os_memcpy(decrypted, encr_data, encr_data_len);
583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len);
584 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
585 decrypted, encr_data_len);
587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
590 "decrypted AT_ENCR_DATA")
    [all...]
eap_aka.c 490 u8 *decrypted; local
491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
494 if (decrypted == NULL) {
500 os_free(decrypted);
520 u8 *decrypted; local
528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
531 if (decrypted == NULL) {
541 os_free(decrypted);
545 os_free(decrypted);
624 u8 *decrypted; local
    [all...]
eap_sim.c 569 u8 *decrypted; local
570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
573 if (decrypted == NULL) {
579 os_free(decrypted);
599 u8 *decrypted; local
607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
610 if (decrypted == NULL) {
620 os_free(decrypted);
624 os_free(decrypted);
703 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 944 u8 *decrypted; local
951 decrypted = os_malloc(encr_data_len);
952 if (decrypted == NULL)
954 os_memcpy(decrypted, encr_data, encr_data_len);
956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
957 os_free(decrypted);
960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
961 decrypted, encr_data_len);
963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 503 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
562 decrypted = os_malloc(decrypted_len);
563 if (decrypted == NULL)
567 decrypted, decrypted_len) < 0) {
568 os_free(decrypted);
572 pad_len = decrypted[decrypted_len - 1];
576 os_free(decrypted);
583 return decrypted;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local
279 decrypted = os_malloc(left);
280 if (decrypted == NULL) {
285 os_memcpy(decrypted, msg, left);
290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
293 os_free(decrypted);
296 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
297 decrypted, left);
300 switch (decrypted[0] >> 6) {
317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
ikev2.c 667 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
671 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
689 u8 *decrypted; local
693 decrypted = ikev2_decrypt_payload(data->proposal.encr,
697 if (decrypted == NULL)
701 decrypted, decrypted_len);
702 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 339 u8 *decrypted, nonce[16]; local
379 decrypted = os_malloc(left);
380 if (decrypted == NULL)
382 os_memcpy(decrypted, pos, left);
385 wpabuf_head(respData), 22, decrypted, left,
388 os_free(decrypted);
392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
393 decrypted, left);
396 switch (decrypted[0] >> 6) {
410 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 945 u8 *decrypted; local
952 decrypted = os_malloc(encr_data_len);
953 if (decrypted == NULL)
955 os_memcpy(decrypted, encr_data, encr_data_len);
957 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
958 os_free(decrypted);
961 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
962 decrypted, encr_data_len);
964 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 504 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
563 decrypted = os_malloc(decrypted_len);
564 if (decrypted == NULL)
568 decrypted, decrypted_len) < 0) {
569 os_free(decrypted);
573 pad_len = decrypted[decrypted_len - 1];
577 os_free(decrypted);
584 return decrypted;
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 189 u8 *buf, *rpchannel, nonce[16], *decrypted; local
280 decrypted = os_malloc(left);
281 if (decrypted == NULL) {
286 os_memcpy(decrypted, msg, left);
291 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
294 os_free(decrypted);
297 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
298 decrypted, left);
301 switch (decrypted[0] >> 6) {
318 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 340 u8 *decrypted, nonce[16]; local
380 decrypted = os_malloc(left);
381 if (decrypted == NULL)
383 os_memcpy(decrypted, pos, left);
386 wpabuf_head(respData), 22, decrypted, left,
389 os_free(decrypted);
393 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
394 decrypted, left);
397 switch (decrypted[0] >> 6) {
411 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_common.c 159 struct wpabuf *decrypted; local
172 decrypted = wpabuf_alloc(encr_len - block_size);
173 if (decrypted == NULL)
177 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
178 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
179 wpabuf_len(decrypted))) {
180 wpabuf_free(decrypted);
184 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
185 decrypted);
187 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_enrollee.c 941 struct wpabuf *decrypted; local
961 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
963 if (decrypted == NULL) {
964 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
970 if (wps_validate_m4_encr(decrypted, attr->version2 != 0) < 0) {
971 wpabuf_free(decrypted);
976 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
978 if (wps_parse_msg(decrypted, &eattr) < 0 ||
979 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
981 wpabuf_free(decrypted);
996 struct wpabuf *decrypted; local
1049 struct wpabuf *decrypted; local
    [all...]

Completed in 1915 milliseconds

1 2