/external/chromium/chrome/browser/password_manager/ |
login_database.h | 82 // Returns a decrypted version of cipher_text.
|
/external/dropbear/ |
process-packet.c | 42 /* process a decrypted packet, call the appropriate handler */
|
/external/openssl/crypto/des/ |
INSTALL | 57 decrypted the files on a SparcStation.
|
/frameworks/base/drm/libdrmframework/plugins/forward-lock/FwdLockEngine/include/ |
FwdLockEngine.h | 324 * @param fd File descriptor of the protected content to be decrypted 345 * @param uri Path of the protected content to be decrypted 388 * @param decBuffer Decrypted data block 410 * @param decBuffer Decrypted data block
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 6 encrypted by a public key can be decrypted only by the corresponding 10 decrypted by the public key so that the public knows that this
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_process.c | 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 75 "decrypted attribute");
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_process.c | 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 75 "decrypted attribute");
|
wps_registrar.c | 2458 struct wpabuf *decrypted; local 2595 struct wpabuf *decrypted; local [all...] |
/docs/source.android.com/src/tech/encryption/ |
android_crypto_implementation.md | 98 filesystem so the real decrypted /data filesystem could be mounted meant that 104 are not started until after /data has been decrypted and mounted. The magic 147 is correct (which is determined by successfully mounting the decrypted 149 decrypted block device in the property ro.crypto.fs_crypto_blkdev, and 157 unmounted. vold then mounts the decrypted real /data partition, and then 169 Now the framework boots all its services using the decrypted /data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim.c | 564 u8 *decrypted = NULL; local 582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 585 if (decrypted == NULL) { 597 os_free(decrypted); 598 decrypted = NULL; 645 os_free(decrypted);
|
eap_aka.c | 956 u8 *decrypted = NULL; local 976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 979 if (decrypted == NULL) { 991 os_free(decrypted); 992 decrypted = NULL; 1063 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 565 u8 *decrypted = NULL; local 583 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 586 if (decrypted == NULL) { 598 os_free(decrypted); 599 decrypted = NULL; 646 os_free(decrypted);
|
eap_server_aka.c | 956 u8 *decrypted = NULL; local 976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 979 if (decrypted == NULL) { 991 os_free(decrypted); 992 decrypted = NULL; 1063 os_free(decrypted); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.c | 667 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 671 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 689 u8 *decrypted; local 693 decrypted = ikev2_decrypt_payload(data->proposal.encr, 697 if (decrypted == NULL) 701 decrypted, decrypted_len); 702 os_free(decrypted); [all...] |
eap_fast.c | 32 * - password change (pending mschapv2 packet; replay decrypted packet) 1051 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, 1060 /* Parse TLVs from the decrypted Phase 2 data */ 1061 pos = wpabuf_mhead(decrypted); 1062 end = pos + wpabuf_len(decrypted); 1144 struct wpabuf *decrypted, 1151 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 668 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 672 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 690 u8 *decrypted; local 694 decrypted = ikev2_decrypt_payload(data->proposal.encr, 698 if (decrypted == NULL) 702 decrypted, decrypted_len); 703 os_free(decrypted); [all...] |
eap_fast.c | 32 * - password change (pending mschapv2 packet; replay decrypted packet) 1051 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, 1060 /* Parse TLVs from the decrypted Phase 2 data */ 1061 pos = wpabuf_mhead(decrypted); 1062 end = pos + wpabuf_len(decrypted); 1144 struct wpabuf *decrypted, 1151 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) [all...] |
/frameworks/base/drm/libdrmframework/include/ |
DrmManagerClientImpl.h | 300 * @param[in] fd File descriptor of the protected content to be decrypted 312 * @param[in] uri Path of the protected content to be decrypted 350 * @param[out] decBuffer Decrypted data block
|
/frameworks/base/drm/libdrmframework/plugins/common/include/ |
DrmEngineBase.h | 371 * @param[in] fd File descriptor of the protected content to be decrypted 385 * @param[in] uri Path of the protected content to be decrypted 424 * @param[out] decBuffer Decrypted data block
|
IDrmEngine.h | 320 * @param[in] fd File descriptor of the protected content to be decrypted 334 * @param[in] uri Path of the protected content to be decrypted 373 * @param[out] decBuffer Decrypted data block
|
/frameworks/base/include/drm/ |
DrmManagerClient.h | 66 * @param[in] fd File descriptor of the protected content to be decrypted 77 * @param[in] uri Path of the protected content to be decrypted 139 * @param[out] decBuffer Decrypted data block
|
/frameworks/base/media/libdrm/mobile1/src/objmng/ |
drm_rights_manager.c | 605 /* Output the decrypted bytes */ 649 /* Write decrypted plaintext blocks */ 654 /* Write the decrypted plaintext block */
|
/external/chromium/net/socket/ |
ssl_client_socket_win.cc | 376 // Ciphertext is decrypted one SSL record at a time, so recv_buffer_ needs to 747 // If we have surplus decrypted plaintext, satisfy the Read with it without [all...] |
/external/openssl/crypto/pem/ |
pem_info.c | 334 * we have to be able to handle a not-yet-decrypted key 335 * being written out correctly ... if it is decrypted or
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/ |
PKCS1Encoding.java | 188 * @exception InvalidCipherTextException if the decrypted block is not in PKCS1 format.
|