HomeSort by relevance Sort by last modified time
    Searched full:decrypted (Results 101 - 125 of 186) sorted by null

1 2 3 45 6 7 8

  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 356 "TLSv1: Record Layer - Decrypted data",
tlsv1_client.c 249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
tlsv1_cred.c 298 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no
tlsv1_server.c 223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
  /libcore/luni/src/main/java/javax/crypto/
SealedObject.java 40 * The wrapped object can later be decrypted (unsealed) using the corresponding
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionStateSSLv3.java 329 logger.println("Decrypted:");
ConnectionStateTLS.java 330 logger.println("Decrypted:");
  /system/vold/
Volume.cpp 338 * that partition, and update the volume object to point to it's new decrypted
362 /* We now have the new sysfs path for the decrypted block device, and the
  /external/chromium/net/socket/
ssl_server_socket_nss.cc 376 // decrypted data.
  /external/dropbear/
packet.c 240 /* we've already decrypted the first blocksize in read_packet_init */
  /external/openssl/crypto/evp/
evp_enc.c 415 /* if we have 'decrypted' a multiple of block size, make sure
  /external/openssl/crypto/rsa/
rsa_test.c 321 printf("Corrupt data decrypted!\n");
  /external/srtp/crypto/cipher/
aes_cbc.c 314 * determine the number of padding bytes in the decrypted plaintext
  /external/wpa_supplicant/
crypto.h 124 * @plain: Buffer for the decrypted data (16 bytes)
tlsv1_common.c 499 "TLSv1: Record Layer - Decrypted data",
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto.h 125 * @plain: Buffer for the decrypted data (16 bytes)
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.c 249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
tlsv1_server.c 223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
  /external/wpa_supplicant_8/src/crypto/
tls_nss.c 566 * to handle the possibility of the decrypted data being longer than
  /frameworks/base/docs/html/guide/appendix/
install-location.jd 72 generated key that can be decrypted only by the device that originally installed it. Thus, an
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_tls_common.c 851 * @in_decrypted: Buffer for returning a pointer to the decrypted message
875 * to handle the possibility of the decrypted data being longer than
eap_peap.c 806 wpa_hexdump_buf(MSG_DEBUG, "EAP-PEAP: Decrypted Phase 2 EAP",
903 "shorter length than full decrypted data "
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_peap.c 954 "pending wait state - save decrypted response");
1060 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-PEAP: Decrypted Phase 2 EAP",
    [all...]
eap_server_ttls.c 997 "pending wait state - save decrypted response");
1150 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS: Decrypted Phase 2 EAP",
    [all...]
  /external/openssl/ssl/
kssl.c 911 ** Decrypted authenticator looks like this:
    [all...]

Completed in 1482 milliseconds

1 2 3 45 6 7 8