HomeSort by relevance Sort by last modified time
    Searched full:decrypted (Results 51 - 75 of 186) sorted by null

1 23 4 5 6 7 8

  /external/chromium/chrome/browser/password_manager/
login_database.h 82 // Returns a decrypted version of cipher_text.
  /external/dropbear/
process-packet.c 42 /* process a decrypted packet, call the appropriate handler */
  /external/openssl/crypto/des/
INSTALL 57 decrypted the files on a SparcStation.
  /frameworks/base/drm/libdrmframework/plugins/forward-lock/FwdLockEngine/include/
FwdLockEngine.h 324 * @param fd File descriptor of the protected content to be decrypted
345 * @param uri Path of the protected content to be decrypted
388 * @param decBuffer Decrypted data block
410 * @param decBuffer Decrypted data block
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 6 encrypted by a public key can be decrypted only by the corresponding
10 decrypted by the public key so that the public knows that this
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_process.c 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
75 "decrypted attribute");
  /external/wpa_supplicant_8/src/wps/
wps_attr_process.c 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
75 "decrypted attribute");
wps_registrar.c 2458 struct wpabuf *decrypted; local
2595 struct wpabuf *decrypted; local
    [all...]
  /docs/source.android.com/src/tech/encryption/
android_crypto_implementation.md 98 filesystem so the real decrypted /data filesystem could be mounted meant that
104 are not started until after /data has been decrypted and mounted. The magic
147 is correct (which is determined by successfully mounting the decrypted
149 decrypted block device in the property ro.crypto.fs_crypto_blkdev, and
157 unmounted. vold then mounts the decrypted real /data partition, and then
169 Now the framework boots all its services using the decrypted /data
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim.c 564 u8 *decrypted = NULL; local
582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
585 if (decrypted == NULL) {
597 os_free(decrypted);
598 decrypted = NULL;
645 os_free(decrypted);
eap_aka.c 956 u8 *decrypted = NULL; local
976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
979 if (decrypted == NULL) {
991 os_free(decrypted);
992 decrypted = NULL;
1063 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 565 u8 *decrypted = NULL; local
583 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
586 if (decrypted == NULL) {
598 os_free(decrypted);
599 decrypted = NULL;
646 os_free(decrypted);
eap_server_aka.c 956 u8 *decrypted = NULL; local
976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
979 if (decrypted == NULL) {
991 os_free(decrypted);
992 decrypted = NULL;
1063 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 667 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
671 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
689 u8 *decrypted; local
693 decrypted = ikev2_decrypt_payload(data->proposal.encr,
697 if (decrypted == NULL)
701 decrypted, decrypted_len);
702 os_free(decrypted);
    [all...]
eap_fast.c 32 * - password change (pending mschapv2 packet; replay decrypted packet)
1051 static int eap_fast_parse_decrypted(struct wpabuf *decrypted,
1060 /* Parse TLVs from the decrypted Phase 2 data */
1061 pos = wpabuf_mhead(decrypted);
1062 end = pos + wpabuf_len(decrypted);
1144 struct wpabuf *decrypted,
1151 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 668 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
672 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
690 u8 *decrypted; local
694 decrypted = ikev2_decrypt_payload(data->proposal.encr,
698 if (decrypted == NULL)
702 decrypted, decrypted_len);
703 os_free(decrypted);
    [all...]
eap_fast.c 32 * - password change (pending mschapv2 packet; replay decrypted packet)
1051 static int eap_fast_parse_decrypted(struct wpabuf *decrypted,
1060 /* Parse TLVs from the decrypted Phase 2 data */
1061 pos = wpabuf_mhead(decrypted);
1062 end = pos + wpabuf_len(decrypted);
1144 struct wpabuf *decrypted,
1151 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
    [all...]
  /frameworks/base/drm/libdrmframework/include/
DrmManagerClientImpl.h 300 * @param[in] fd File descriptor of the protected content to be decrypted
312 * @param[in] uri Path of the protected content to be decrypted
350 * @param[out] decBuffer Decrypted data block
  /frameworks/base/drm/libdrmframework/plugins/common/include/
DrmEngineBase.h 371 * @param[in] fd File descriptor of the protected content to be decrypted
385 * @param[in] uri Path of the protected content to be decrypted
424 * @param[out] decBuffer Decrypted data block
IDrmEngine.h 320 * @param[in] fd File descriptor of the protected content to be decrypted
334 * @param[in] uri Path of the protected content to be decrypted
373 * @param[out] decBuffer Decrypted data block
  /frameworks/base/include/drm/
DrmManagerClient.h 66 * @param[in] fd File descriptor of the protected content to be decrypted
77 * @param[in] uri Path of the protected content to be decrypted
139 * @param[out] decBuffer Decrypted data block
  /frameworks/base/media/libdrm/mobile1/src/objmng/
drm_rights_manager.c 605 /* Output the decrypted bytes */
649 /* Write decrypted plaintext blocks */
654 /* Write the decrypted plaintext block */
  /external/chromium/net/socket/
ssl_client_socket_win.cc 376 // Ciphertext is decrypted one SSL record at a time, so recv_buffer_ needs to
747 // If we have surplus decrypted plaintext, satisfy the Read with it without
    [all...]
  /external/openssl/crypto/pem/
pem_info.c 334 * we have to be able to handle a not-yet-decrypted key
335 * being written out correctly ... if it is decrypted or
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/
PKCS1Encoding.java 188 * @exception InvalidCipherTextException if the decrypted block is not in PKCS1 format.

Completed in 1159 milliseconds

1 23 4 5 6 7 8