/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 336 u8 *decrypted, nonce[16]; local 376 decrypted = os_malloc(left); 377 if (decrypted == NULL) 379 os_memcpy(decrypted, pos, left); 382 wpabuf_head(respData), 22, decrypted, left, 385 os_free(decrypted); 389 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 390 decrypted, left); 393 switch (decrypted[0] >> 6) { 407 os_free(decrypted); [all...] |
ikev2.c | 451 u8 *decrypted; local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, 460 if (decrypted == NULL) 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 466 decrypted + decrypted_len) < 0) { 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 475 os_free(decrypted); 694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 716 u8 *decrypted; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sim.c | 660 u8 *decrypted; local 661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 664 if (decrypted == NULL) { 669 os_free(decrypted); 694 u8 *decrypted; local 702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 705 if (decrypted == NULL) { 715 os_free(decrypted); 719 os_free(decrypted); 792 u8 *decrypted; local [all...] |
eap_aka.c | 892 u8 *decrypted; local 893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 896 if (decrypted == NULL) { 901 os_free(decrypted); 926 u8 *decrypted; local 934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 937 if (decrypted == NULL) { 947 os_free(decrypted); 951 os_free(decrypted); 1023 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 673 u8 *decrypted; local 674 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 677 if (decrypted == NULL) { 682 os_free(decrypted); 707 u8 *decrypted; local 715 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 718 if (decrypted == NULL) { 728 os_free(decrypted); 732 os_free(decrypted); 805 u8 *decrypted; local [all...] |
eap_aka.c | 904 u8 *decrypted; local 905 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 908 if (decrypted == NULL) { 913 os_free(decrypted); 938 u8 *decrypted; local 946 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 949 if (decrypted == NULL) { 959 os_free(decrypted); 963 os_free(decrypted); 1035 u8 *decrypted; local [all...] |
/external/openssh/ |
authfile.c | 421 Buffer decrypted; local 469 /* Initialize space for decrypted data. */ 470 buffer_init(&decrypted); 471 cp = buffer_append_space(&decrypted, buffer_len(©)); 482 check1 = buffer_get_char(&decrypted); 483 check2 = buffer_get_char(&decrypted); 484 if (check1 != buffer_get_char(&decrypted) || 485 check2 != buffer_get_char(&decrypted)) { 489 buffer_free(&decrypted); 493 buffer_get_bignum(&decrypted, prv->rsa->d) [all...] |
/external/srtp/crypto/include/ |
cryptoalg.h | 97 void *opaque, /* data to be decrypted and authenticated */ 99 * decrypted and authd (before and after)
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/ |
FwdLockGlue.c | 106 * Validates the padding of a decrypted key. 108 * @param[in] pData A reference to the buffer containing the decrypted key and padding. 109 * @param[in] decryptedKeyLength The length in bytes of the decrypted key.
|
/frameworks/base/media/libdrm/mobile1/include/objmng/ |
drm_rights_manager.h | 129 * Discard the padding bytes in DCF decrypted data. 131 * \param decryptedBuf The aes decrypted data buffer to be scanned. 142 * \param Buffer The buffer to decrypted and also used to save the output data.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.c | 456 u8 *decrypted; local 461 decrypted = ikev2_decrypt_payload(data->proposal.encr, 465 if (decrypted == NULL) 468 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 470 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 471 decrypted + decrypted_len) < 0) { 472 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 480 os_free(decrypted); 699 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 703 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 721 u8 *decrypted; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 944 u8 *decrypted; local 951 decrypted = os_malloc(encr_data_len); 952 if (decrypted == NULL) 954 os_memcpy(decrypted, encr_data, encr_data_len); 956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 957 os_free(decrypted); 960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 961 decrypted, encr_data_len); 963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 503 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 562 decrypted = os_malloc(decrypted_len); 563 if (decrypted == NULL) 567 decrypted, decrypted_len) < 0) { 568 os_free(decrypted); 572 pad_len = decrypted[decrypted_len - 1]; 576 os_free(decrypted); 583 return decrypted;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 939 u8 *decrypted; local 946 decrypted = os_malloc(encr_data_len); 947 if (decrypted == NULL) 949 os_memcpy(decrypted, encr_data, encr_data_len); 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 952 os_free(decrypted); 955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 956 decrypted, encr_data_len); 958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 498 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 557 decrypted = os_malloc(decrypted_len); 558 if (decrypted == NULL) 562 decrypted, decrypted_len) < 0) { 563 os_free(decrypted); 567 pad_len = decrypted[decrypted_len - 1]; 571 os_free(decrypted); 578 return decrypted;
|
/frameworks/base/media/libdrm/mobile1/include/parser/ |
parser_dcf.h | 63 int32_t DecryptedDataLen; /**< Length of the decrypted data field */
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/ |
OAEPEncoding.java | 199 * @exception InvalidCipherTextException if the decrypted block turns out to 213 // on encryption, we need to make sure our decrypted block comes back
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
CBCBlockCipher.java | 191 * @param in the array containing the data to be decrypted. 193 * @param out the array the decrypted data will be copied into.
|
/frameworks/av/include/drm/ |
drm_framework_common.h | 249 * size of memory to be allocated to get the decrypted content. 296 * e.g. size of memory to be allocated to get the decrypted content.
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ConnectionState.java | 127 * @param type - the ContentType of the data to be decrypted. 138 * @param type - the ContentType of the data to be decrypted.
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_registrar.c | 2003 struct wpabuf *decrypted; local 2110 struct wpabuf *decrypted; local [all...] |
/external/chromium/crypto/ |
encryptor_unittest.cc | 230 std::string decrypted; local 231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted)); 232 EXPECT_EQ("", decrypted);
|
/external/chromium/chrome/browser/password_manager/ |
login_database.h | 82 // Returns a decrypted version of cipher_text.
|
/external/dropbear/ |
process-packet.c | 42 /* process a decrypted packet, call the appropriate handler */
|
/external/openssl/crypto/des/ |
INSTALL | 57 decrypted the files on a SparcStation.
|