HomeSort by relevance Sort by last modified time
    Searched full:decrypted (Results 26 - 50 of 186) sorted by null

12 3 4 5 6 7 8

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 339 u8 *decrypted, nonce[16]; local
379 decrypted = os_malloc(left);
380 if (decrypted == NULL)
382 os_memcpy(decrypted, pos, left);
385 wpabuf_head(respData), 22, decrypted, left,
388 os_free(decrypted);
392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
393 decrypted, left);
396 switch (decrypted[0] >> 6) {
410 os_free(decrypted);
    [all...]
ikev2.c 456 u8 *decrypted; local
461 decrypted = ikev2_decrypt_payload(data->proposal.encr,
465 if (decrypted == NULL)
468 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
470 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
471 decrypted + decrypted_len) < 0) {
472 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
480 os_free(decrypted);
699 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
703 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
721 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 340 u8 *decrypted, nonce[16]; local
380 decrypted = os_malloc(left);
381 if (decrypted == NULL)
383 os_memcpy(decrypted, pos, left);
386 wpabuf_head(respData), 22, decrypted, left,
389 os_free(decrypted);
393 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
394 decrypted, left);
397 switch (decrypted[0] >> 6) {
411 os_free(decrypted);
    [all...]
ikev2.c 457 u8 *decrypted; local
462 decrypted = ikev2_decrypt_payload(data->proposal.encr,
466 if (decrypted == NULL)
469 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
471 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
472 decrypted + decrypted_len) < 0) {
473 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
481 os_free(decrypted);
700 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
704 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
722 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant/
eap_aka.c 490 u8 *decrypted; local
491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
494 if (decrypted == NULL) {
500 os_free(decrypted);
520 u8 *decrypted; local
528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
531 if (decrypted == NULL) {
541 os_free(decrypted);
545 os_free(decrypted);
624 u8 *decrypted; local
    [all...]
eap_sim.c 569 u8 *decrypted; local
570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
573 if (decrypted == NULL) {
579 os_free(decrypted);
599 u8 *decrypted; local
607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
610 if (decrypted == NULL) {
620 os_free(decrypted);
624 os_free(decrypted);
703 u8 *decrypted; local
    [all...]
eap_sim_common.c 571 u8 *decrypted; local
578 decrypted = os_malloc(encr_data_len);
579 if (decrypted == NULL)
581 os_memcpy(decrypted, encr_data, encr_data_len);
583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len);
584 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
585 decrypted, encr_data_len);
587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
590 "decrypted AT_ENCR_DATA")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 660 u8 *decrypted; local
661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
664 if (decrypted == NULL) {
669 os_free(decrypted);
694 u8 *decrypted; local
702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
705 if (decrypted == NULL) {
715 os_free(decrypted);
719 os_free(decrypted);
792 u8 *decrypted; local
    [all...]
eap_aka.c 892 u8 *decrypted; local
893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
896 if (decrypted == NULL) {
901 os_free(decrypted);
926 u8 *decrypted; local
934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
937 if (decrypted == NULL) {
947 os_free(decrypted);
951 os_free(decrypted);
1023 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 659 u8 *decrypted; local
660 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
663 if (decrypted == NULL) {
668 os_free(decrypted);
693 u8 *decrypted; local
701 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
704 if (decrypted == NULL) {
714 os_free(decrypted);
718 os_free(decrypted);
791 u8 *decrypted; local
    [all...]
eap_aka.c 890 u8 *decrypted; local
891 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
894 if (decrypted == NULL) {
899 os_free(decrypted);
924 u8 *decrypted; local
932 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
935 if (decrypted == NULL) {
945 os_free(decrypted);
949 os_free(decrypted);
1021 u8 *decrypted; local
    [all...]
  /external/srtp/crypto/include/
cryptoalg.h 97 void *opaque, /* data to be decrypted and authenticated */
99 * decrypted and authd (before and after)
  /frameworks/base/drm/libdrmframework/plugins/forward-lock/internal-format/common/
FwdLockGlue.c 106 * Validates the padding of a decrypted key.
108 * @param[in] pData A reference to the buffer containing the decrypted key and padding.
109 * @param[in] decryptedKeyLength The length in bytes of the decrypted key.
  /frameworks/base/media/libdrm/mobile1/include/objmng/
drm_rights_manager.h 129 * Discard the padding bytes in DCF decrypted data.
131 * \param decryptedBuf The aes decrypted data buffer to be scanned.
142 * \param Buffer The buffer to decrypted and also used to save the output data.
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 944 u8 *decrypted; local
951 decrypted = os_malloc(encr_data_len);
952 if (decrypted == NULL)
954 os_memcpy(decrypted, encr_data, encr_data_len);
956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
957 os_free(decrypted);
960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
961 decrypted, encr_data_len);
963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 503 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
562 decrypted = os_malloc(decrypted_len);
563 if (decrypted == NULL)
567 decrypted, decrypted_len) < 0) {
568 os_free(decrypted);
572 pad_len = decrypted[decrypted_len - 1];
576 os_free(decrypted);
583 return decrypted;
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 945 u8 *decrypted; local
952 decrypted = os_malloc(encr_data_len);
953 if (decrypted == NULL)
955 os_memcpy(decrypted, encr_data, encr_data_len);
957 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
958 os_free(decrypted);
961 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
962 decrypted, encr_data_len);
964 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 504 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
563 decrypted = os_malloc(decrypted_len);
564 if (decrypted == NULL)
568 decrypted, decrypted_len) < 0) {
569 os_free(decrypted);
573 pad_len = decrypted[decrypted_len - 1];
577 os_free(decrypted);
584 return decrypted;
  /frameworks/base/media/libdrm/mobile1/include/parser/
parser_dcf.h 63 int32_t DecryptedDataLen; /**< Length of the decrypted data field */
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/
OAEPEncoding.java 199 * @exception InvalidCipherTextException if the decrypted block turns out to
213 // on encryption, we need to make sure our decrypted block comes back
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
CBCBlockCipher.java 191 * @param in the array containing the data to be decrypted.
193 * @param out the array the decrypted data will be copied into.
  /frameworks/base/include/drm/
drm_framework_common.h 248 * size of memory to be allocated to get the decrypted content.
295 * e.g. size of memory to be allocated to get the decrypted content.
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionState.java 127 * @param type - the ContentType of the data to be decrypted.
138 * @param type - the ContentType of the data to be decrypted.
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_registrar.c 2003 struct wpabuf *decrypted; local
2110 struct wpabuf *decrypted; local
    [all...]
  /external/chromium/crypto/
encryptor_unittest.cc 230 std::string decrypted; local
231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted));
232 EXPECT_EQ("", decrypted);

Completed in 1344 milliseconds

12 3 4 5 6 7 8