/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 339 u8 *decrypted, nonce[16]; local 379 decrypted = os_malloc(left); 380 if (decrypted == NULL) 382 os_memcpy(decrypted, pos, left); 385 wpabuf_head(respData), 22, decrypted, left, 388 os_free(decrypted); 392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 393 decrypted, left); 396 switch (decrypted[0] >> 6) { 410 os_free(decrypted); [all...] |
ikev2.c | 456 u8 *decrypted; local 461 decrypted = ikev2_decrypt_payload(data->proposal.encr, 465 if (decrypted == NULL) 468 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 470 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 471 decrypted + decrypted_len) < 0) { 472 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 480 os_free(decrypted); 699 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 703 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 721 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 340 u8 *decrypted, nonce[16]; local 380 decrypted = os_malloc(left); 381 if (decrypted == NULL) 383 os_memcpy(decrypted, pos, left); 386 wpabuf_head(respData), 22, decrypted, left, 389 os_free(decrypted); 393 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 394 decrypted, left); 397 switch (decrypted[0] >> 6) { 411 os_free(decrypted); [all...] |
ikev2.c | 457 u8 *decrypted; local 462 decrypted = ikev2_decrypt_payload(data->proposal.encr, 466 if (decrypted == NULL) 469 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 471 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 472 decrypted + decrypted_len) < 0) { 473 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 481 os_free(decrypted); 700 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 704 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 722 u8 *decrypted; local [all...] |
/external/wpa_supplicant/ |
eap_aka.c | 490 u8 *decrypted; local 491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 494 if (decrypted == NULL) { 500 os_free(decrypted); 520 u8 *decrypted; local 528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 531 if (decrypted == NULL) { 541 os_free(decrypted); 545 os_free(decrypted); 624 u8 *decrypted; local [all...] |
eap_sim.c | 569 u8 *decrypted; local 570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 573 if (decrypted == NULL) { 579 os_free(decrypted); 599 u8 *decrypted; local 607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 610 if (decrypted == NULL) { 620 os_free(decrypted); 624 os_free(decrypted); 703 u8 *decrypted; local [all...] |
eap_sim_common.c | 571 u8 *decrypted; local 578 decrypted = os_malloc(encr_data_len); 579 if (decrypted == NULL) 581 os_memcpy(decrypted, encr_data, encr_data_len); 583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len); 584 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 585 decrypted, encr_data_len); 587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, 590 "decrypted AT_ENCR_DATA") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sim.c | 660 u8 *decrypted; local 661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 664 if (decrypted == NULL) { 669 os_free(decrypted); 694 u8 *decrypted; local 702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 705 if (decrypted == NULL) { 715 os_free(decrypted); 719 os_free(decrypted); 792 u8 *decrypted; local [all...] |
eap_aka.c | 892 u8 *decrypted; local 893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 896 if (decrypted == NULL) { 901 os_free(decrypted); 926 u8 *decrypted; local 934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 937 if (decrypted == NULL) { 947 os_free(decrypted); 951 os_free(decrypted); 1023 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 659 u8 *decrypted; local 660 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 663 if (decrypted == NULL) { 668 os_free(decrypted); 693 u8 *decrypted; local 701 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 704 if (decrypted == NULL) { 714 os_free(decrypted); 718 os_free(decrypted); 791 u8 *decrypted; local [all...] |
eap_aka.c | 890 u8 *decrypted; local 891 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 894 if (decrypted == NULL) { 899 os_free(decrypted); 924 u8 *decrypted; local 932 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 935 if (decrypted == NULL) { 945 os_free(decrypted); 949 os_free(decrypted); 1021 u8 *decrypted; local [all...] |
/external/srtp/crypto/include/ |
cryptoalg.h | 97 void *opaque, /* data to be decrypted and authenticated */ 99 * decrypted and authd (before and after)
|
/frameworks/base/drm/libdrmframework/plugins/forward-lock/internal-format/common/ |
FwdLockGlue.c | 106 * Validates the padding of a decrypted key. 108 * @param[in] pData A reference to the buffer containing the decrypted key and padding. 109 * @param[in] decryptedKeyLength The length in bytes of the decrypted key.
|
/frameworks/base/media/libdrm/mobile1/include/objmng/ |
drm_rights_manager.h | 129 * Discard the padding bytes in DCF decrypted data. 131 * \param decryptedBuf The aes decrypted data buffer to be scanned. 142 * \param Buffer The buffer to decrypted and also used to save the output data.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 944 u8 *decrypted; local 951 decrypted = os_malloc(encr_data_len); 952 if (decrypted == NULL) 954 os_memcpy(decrypted, encr_data, encr_data_len); 956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 957 os_free(decrypted); 960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 961 decrypted, encr_data_len); 963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 503 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 562 decrypted = os_malloc(decrypted_len); 563 if (decrypted == NULL) 567 decrypted, decrypted_len) < 0) { 568 os_free(decrypted); 572 pad_len = decrypted[decrypted_len - 1]; 576 os_free(decrypted); 583 return decrypted;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 945 u8 *decrypted; local 952 decrypted = os_malloc(encr_data_len); 953 if (decrypted == NULL) 955 os_memcpy(decrypted, encr_data, encr_data_len); 957 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 958 os_free(decrypted); 961 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 962 decrypted, encr_data_len); 964 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 504 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 563 decrypted = os_malloc(decrypted_len); 564 if (decrypted == NULL) 568 decrypted, decrypted_len) < 0) { 569 os_free(decrypted); 573 pad_len = decrypted[decrypted_len - 1]; 577 os_free(decrypted); 584 return decrypted;
|
/frameworks/base/media/libdrm/mobile1/include/parser/ |
parser_dcf.h | 63 int32_t DecryptedDataLen; /**< Length of the decrypted data field */
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/ |
OAEPEncoding.java | 199 * @exception InvalidCipherTextException if the decrypted block turns out to 213 // on encryption, we need to make sure our decrypted block comes back
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
CBCBlockCipher.java | 191 * @param in the array containing the data to be decrypted. 193 * @param out the array the decrypted data will be copied into.
|
/frameworks/base/include/drm/ |
drm_framework_common.h | 248 * size of memory to be allocated to get the decrypted content. 295 * e.g. size of memory to be allocated to get the decrypted content.
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionState.java | 127 * @param type - the ContentType of the data to be decrypted. 138 * @param type - the ContentType of the data to be decrypted.
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_registrar.c | 2003 struct wpabuf *decrypted; local 2110 struct wpabuf *decrypted; local [all...] |
/external/chromium/crypto/ |
encryptor_unittest.cc | 230 std::string decrypted; local 231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted)); 232 EXPECT_EQ("", decrypted);
|