/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherWrapThread.java | 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local 44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes()); 45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
|
CipherPBEThread.java | 37 byte[] decrypted = new byte[128]; 56 cip.doFinal(output, 0, outputSize, decrypted); 58 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherSymmetricKeyThread.java | 36 byte[] decrypted = new byte[128]; 62 cip.doFinal(output, 0, outputSize, decrypted); 68 cip.doFinal(output, 0, outputSize, decrypted); 71 checkEncodedData(getData().getBytes(), decrypted); local
|
/external/chromium/crypto/ |
encryptor_unittest.cc | 230 std::string decrypted; local 231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted)); 232 EXPECT_EQ("", decrypted);
|
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 90 std::string decrypted; local 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 93 EXPECT_EQ(plaintext, decrypted); 108 std::string decrypted; local 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 111 EXPECT_NE(plaintext, decrypted); 127 std::string decrypted; local 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 130 EXPECT_NE(plaintext, decrypted);
|
cryptographer_unittest.cc | 57 sync_pb::PasswordSpecificsData decrypted; local 58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 133 sync_pb::PasswordSpecificsData decrypted; local 134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
|
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterAsymmetricHelper.java | 90 byte[] decrypted = null; 92 decrypted = cipher.doFinal(bs); 99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
AlgorithmParameterSymmetricHelper.java | 103 byte[] decrypted = null; 105 decrypted = cipher.doFinal(bs); 112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_common.c | 154 struct wpabuf *decrypted; local 167 decrypted = wpabuf_alloc(encr_len - block_size); 168 if (decrypted == NULL) 172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 174 wpabuf_len(decrypted))) { 175 wpabuf_free(decrypted); 179 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 180 decrypted); 182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
wps_enrollee.c | 833 struct wpabuf *decrypted; local 853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 855 if (decrypted == NULL) { 856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 864 if (wps_parse_msg(decrypted, &eattr) < 0 || 865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 867 wpabuf_free(decrypted); 871 wpabuf_free(decrypted); 882 struct wpabuf *decrypted; local 929 struct wpabuf *decrypted; local [all...] |
/external/wpa_supplicant/ |
eap_psk.c | 183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; local 265 decrypted = os_malloc(left); 266 if (decrypted == NULL) { 271 os_memcpy(decrypted, msg, left); 274 reqData, 22, decrypted, left, tag)) { 276 os_free(decrypted); 279 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 280 decrypted, left); 283 switch (decrypted[0] >> 6) { 302 os_free(decrypted); [all...] |
eap_sim_common.c | 571 u8 *decrypted; local 578 decrypted = os_malloc(encr_data_len); 579 if (decrypted == NULL) 581 os_memcpy(decrypted, encr_data, encr_data_len); 583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len); 584 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 585 decrypted, encr_data_len); 587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, 590 "decrypted AT_ENCR_DATA") [all...] |
eap_aka.c | 490 u8 *decrypted; local 491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 494 if (decrypted == NULL) { 500 os_free(decrypted); 520 u8 *decrypted; local 528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 531 if (decrypted == NULL) { 541 os_free(decrypted); 545 os_free(decrypted); 624 u8 *decrypted; local [all...] |
eap_sim.c | 569 u8 *decrypted; local 570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 573 if (decrypted == NULL) { 579 os_free(decrypted); 599 u8 *decrypted; local 607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 610 if (decrypted == NULL) { 620 os_free(decrypted); 624 os_free(decrypted); 703 u8 *decrypted; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 944 u8 *decrypted; local 951 decrypted = os_malloc(encr_data_len); 952 if (decrypted == NULL) 954 os_memcpy(decrypted, encr_data, encr_data_len); 956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 957 os_free(decrypted); 960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 961 decrypted, encr_data_len); 963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 503 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 562 decrypted = os_malloc(decrypted_len); 563 if (decrypted == NULL) 567 decrypted, decrypted_len) < 0) { 568 os_free(decrypted); 572 pad_len = decrypted[decrypted_len - 1]; 576 os_free(decrypted); 583 return decrypted;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local 279 decrypted = os_malloc(left); 280 if (decrypted == NULL) { 285 os_memcpy(decrypted, msg, left); 290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 293 os_free(decrypted); 296 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 297 decrypted, left); 300 switch (decrypted[0] >> 6) { 317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
ikev2.c | 667 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 671 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 689 u8 *decrypted; local 693 decrypted = ikev2_decrypt_payload(data->proposal.encr, 697 if (decrypted == NULL) 701 decrypted, decrypted_len); 702 os_free(decrypted); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 339 u8 *decrypted, nonce[16]; local 379 decrypted = os_malloc(left); 380 if (decrypted == NULL) 382 os_memcpy(decrypted, pos, left); 385 wpabuf_head(respData), 22, decrypted, left, 388 os_free(decrypted); 392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 393 decrypted, left); 396 switch (decrypted[0] >> 6) { 410 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 945 u8 *decrypted; local 952 decrypted = os_malloc(encr_data_len); 953 if (decrypted == NULL) 955 os_memcpy(decrypted, encr_data, encr_data_len); 957 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 958 os_free(decrypted); 961 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 962 decrypted, encr_data_len); 964 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 504 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 563 decrypted = os_malloc(decrypted_len); 564 if (decrypted == NULL) 568 decrypted, decrypted_len) < 0) { 569 os_free(decrypted); 573 pad_len = decrypted[decrypted_len - 1]; 577 os_free(decrypted); 584 return decrypted;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 189 u8 *buf, *rpchannel, nonce[16], *decrypted; local 280 decrypted = os_malloc(left); 281 if (decrypted == NULL) { 286 os_memcpy(decrypted, msg, left); 291 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 294 os_free(decrypted); 297 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 298 decrypted, left); 301 switch (decrypted[0] >> 6) { 318 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 340 u8 *decrypted, nonce[16]; local 380 decrypted = os_malloc(left); 381 if (decrypted == NULL) 383 os_memcpy(decrypted, pos, left); 386 wpabuf_head(respData), 22, decrypted, left, 389 os_free(decrypted); 393 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 394 decrypted, left); 397 switch (decrypted[0] >> 6) { 411 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 159 struct wpabuf *decrypted; local 172 decrypted = wpabuf_alloc(encr_len - block_size); 173 if (decrypted == NULL) 177 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 178 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 179 wpabuf_len(decrypted))) { 180 wpabuf_free(decrypted); 184 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 185 decrypted); 187 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
wps_enrollee.c | 941 struct wpabuf *decrypted; local 961 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 963 if (decrypted == NULL) { 964 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 970 if (wps_validate_m4_encr(decrypted, attr->version2 != 0) < 0) { 971 wpabuf_free(decrypted); 976 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 978 if (wps_parse_msg(decrypted, &eattr) < 0 || 979 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 981 wpabuf_free(decrypted); 996 struct wpabuf *decrypted; local 1049 struct wpabuf *decrypted; local [all...] |