/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 356 "TLSv1: Record Layer - Decrypted data",
|
tlsv1_client.c | 249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
|
tlsv1_cred.c | 298 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no
|
tlsv1_server.c | 223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
|
/libcore/luni/src/main/java/javax/crypto/ |
SealedObject.java | 40 * The wrapped object can later be decrypted (unsealed) using the corresponding
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionStateSSLv3.java | 329 logger.println("Decrypted:");
|
ConnectionStateTLS.java | 330 logger.println("Decrypted:");
|
/system/vold/ |
Volume.cpp | 338 * that partition, and update the volume object to point to it's new decrypted 362 /* We now have the new sysfs path for the decrypted block device, and the
|
/external/chromium/net/socket/ |
ssl_server_socket_nss.cc | 376 // decrypted data.
|
/external/dropbear/ |
packet.c | 240 /* we've already decrypted the first blocksize in read_packet_init */
|
/external/openssl/crypto/evp/ |
evp_enc.c | 415 /* if we have 'decrypted' a multiple of block size, make sure
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 321 printf("Corrupt data decrypted!\n");
|
/external/srtp/crypto/cipher/ |
aes_cbc.c | 314 * determine the number of padding bytes in the decrypted plaintext
|
/external/wpa_supplicant/ |
crypto.h | 124 * @plain: Buffer for the decrypted data (16 bytes)
|
tlsv1_common.c | 499 "TLSv1: Record Layer - Decrypted data",
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto.h | 125 * @plain: Buffer for the decrypted data (16 bytes)
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.c | 249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
|
tlsv1_server.c | 223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
|
/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 566 * to handle the possibility of the decrypted data being longer than
|
/frameworks/base/docs/html/guide/appendix/ |
install-location.jd | 72 generated key that can be decrypted only by the device that originally installed it. Thus, an
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.c | 851 * @in_decrypted: Buffer for returning a pointer to the decrypted message 875 * to handle the possibility of the decrypted data being longer than
|
eap_peap.c | 806 wpa_hexdump_buf(MSG_DEBUG, "EAP-PEAP: Decrypted Phase 2 EAP", 903 "shorter length than full decrypted data " [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 954 "pending wait state - save decrypted response"); 1060 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-PEAP: Decrypted Phase 2 EAP", [all...] |
eap_server_ttls.c | 997 "pending wait state - save decrypted response"); 1150 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS: Decrypted Phase 2 EAP", [all...] |
/external/openssl/ssl/ |
kssl.c | 911 ** Decrypted authenticator looks like this: [all...] |