HomeSort by relevance Sort by last modified time
    Searched full:decrypted (Results 26 - 50 of 185) sorted by null

12 3 4 5 6 7 8

  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 336 u8 *decrypted, nonce[16]; local
376 decrypted = os_malloc(left);
377 if (decrypted == NULL)
379 os_memcpy(decrypted, pos, left);
382 wpabuf_head(respData), 22, decrypted, left,
385 os_free(decrypted);
389 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
390 decrypted, left);
393 switch (decrypted[0] >> 6) {
407 os_free(decrypted);
    [all...]
ikev2.c 451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
716 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 660 u8 *decrypted; local
661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
664 if (decrypted == NULL) {
669 os_free(decrypted);
694 u8 *decrypted; local
702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
705 if (decrypted == NULL) {
715 os_free(decrypted);
719 os_free(decrypted);
792 u8 *decrypted; local
    [all...]
eap_aka.c 892 u8 *decrypted; local
893 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
896 if (decrypted == NULL) {
901 os_free(decrypted);
926 u8 *decrypted; local
934 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
937 if (decrypted == NULL) {
947 os_free(decrypted);
951 os_free(decrypted);
1023 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 673 u8 *decrypted; local
674 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
677 if (decrypted == NULL) {
682 os_free(decrypted);
707 u8 *decrypted; local
715 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
718 if (decrypted == NULL) {
728 os_free(decrypted);
732 os_free(decrypted);
805 u8 *decrypted; local
    [all...]
eap_aka.c 904 u8 *decrypted; local
905 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
908 if (decrypted == NULL) {
913 os_free(decrypted);
938 u8 *decrypted; local
946 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
949 if (decrypted == NULL) {
959 os_free(decrypted);
963 os_free(decrypted);
1035 u8 *decrypted; local
    [all...]
  /external/openssh/
authfile.c 421 Buffer decrypted; local
469 /* Initialize space for decrypted data. */
470 buffer_init(&decrypted);
471 cp = buffer_append_space(&decrypted, buffer_len(&copy));
482 check1 = buffer_get_char(&decrypted);
483 check2 = buffer_get_char(&decrypted);
484 if (check1 != buffer_get_char(&decrypted) ||
485 check2 != buffer_get_char(&decrypted)) {
489 buffer_free(&decrypted);
493 buffer_get_bignum(&decrypted, prv->rsa->d)
    [all...]
  /external/srtp/crypto/include/
cryptoalg.h 97 void *opaque, /* data to be decrypted and authenticated */
99 * decrypted and authd (before and after)
  /frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/
FwdLockGlue.c 106 * Validates the padding of a decrypted key.
108 * @param[in] pData A reference to the buffer containing the decrypted key and padding.
109 * @param[in] decryptedKeyLength The length in bytes of the decrypted key.
  /frameworks/base/media/libdrm/mobile1/include/objmng/
drm_rights_manager.h 129 * Discard the padding bytes in DCF decrypted data.
131 * \param decryptedBuf The aes decrypted data buffer to be scanned.
142 * \param Buffer The buffer to decrypted and also used to save the output data.
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 456 u8 *decrypted; local
461 decrypted = ikev2_decrypt_payload(data->proposal.encr,
465 if (decrypted == NULL)
468 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
470 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
471 decrypted + decrypted_len) < 0) {
472 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
480 os_free(decrypted);
699 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
703 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
721 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 944 u8 *decrypted; local
951 decrypted = os_malloc(encr_data_len);
952 if (decrypted == NULL)
954 os_memcpy(decrypted, encr_data, encr_data_len);
956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
957 os_free(decrypted);
960 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
961 decrypted, encr_data_len);
963 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 503 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
562 decrypted = os_malloc(decrypted_len);
563 if (decrypted == NULL)
567 decrypted, decrypted_len) < 0) {
568 os_free(decrypted);
572 pad_len = decrypted[decrypted_len - 1];
576 os_free(decrypted);
583 return decrypted;
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 939 u8 *decrypted; local
946 decrypted = os_malloc(encr_data_len);
947 if (decrypted == NULL)
949 os_memcpy(decrypted, encr_data, encr_data_len);
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
952 os_free(decrypted);
955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
956 decrypted, encr_data_len);
958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 498 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
557 decrypted = os_malloc(decrypted_len);
558 if (decrypted == NULL)
562 decrypted, decrypted_len) < 0) {
563 os_free(decrypted);
567 pad_len = decrypted[decrypted_len - 1];
571 os_free(decrypted);
578 return decrypted;
  /frameworks/base/media/libdrm/mobile1/include/parser/
parser_dcf.h 63 int32_t DecryptedDataLen; /**< Length of the decrypted data field */
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/
OAEPEncoding.java 199 * @exception InvalidCipherTextException if the decrypted block turns out to
213 // on encryption, we need to make sure our decrypted block comes back
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
CBCBlockCipher.java 191 * @param in the array containing the data to be decrypted.
193 * @param out the array the decrypted data will be copied into.
  /frameworks/av/include/drm/
drm_framework_common.h 249 * size of memory to be allocated to get the decrypted content.
296 * e.g. size of memory to be allocated to get the decrypted content.
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ConnectionState.java 127 * @param type - the ContentType of the data to be decrypted.
138 * @param type - the ContentType of the data to be decrypted.
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_registrar.c 2003 struct wpabuf *decrypted; local
2110 struct wpabuf *decrypted; local
    [all...]
  /external/chromium/crypto/
encryptor_unittest.cc 230 std::string decrypted; local
231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted));
232 EXPECT_EQ("", decrypted);
  /external/chromium/chrome/browser/password_manager/
login_database.h 82 // Returns a decrypted version of cipher_text.
  /external/dropbear/
process-packet.c 42 /* process a decrypted packet, call the appropriate handler */
  /external/openssl/crypto/des/
INSTALL 57 decrypted the files on a SparcStation.

Completed in 892 milliseconds

12 3 4 5 6 7 8