HomeSort by relevance Sort by last modified time
    Searched full:decrypted (Results 51 - 75 of 185) sorted by null

1 23 4 5 6 7 8

  /frameworks/av/drm/libdrmframework/plugins/forward-lock/FwdLockEngine/include/
FwdLockEngine.h 324 * @param fd File descriptor of the protected content to be decrypted
345 * @param uri Path of the protected content to be decrypted
388 * @param decBuffer Decrypted data block
410 * @param decBuffer Decrypted data block
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 6 encrypted by a public key can be decrypted only by the corresponding
10 decrypted by the public key so that the public knows that this
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_process.c 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
75 "decrypted attribute");
  /external/wpa_supplicant_8/src/wps/
wps_attr_process.c 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
69 "decrypted attribute");
wps_registrar.c 2520 struct wpabuf *decrypted; local
2671 struct wpabuf *decrypted; local
    [all...]
  /docs/source.android.com/src/tech/encryption/
android_crypto_implementation.md 98 filesystem so the real decrypted /data filesystem could be mounted meant that
104 are not started until after /data has been decrypted and mounted. The magic
147 is correct (which is determined by successfully mounting the decrypted
149 decrypted block device in the property ro.crypto.fs_crypto_blkdev, and
157 unmounted. vold then mounts the decrypted real /data partition, and then
169 Now the framework boots all its services using the decrypted /data
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim.c 564 u8 *decrypted = NULL; local
582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
585 if (decrypted == NULL) {
597 os_free(decrypted);
598 decrypted = NULL;
645 os_free(decrypted);
eap_aka.c 956 u8 *decrypted = NULL; local
976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
979 if (decrypted == NULL) {
991 os_free(decrypted);
992 decrypted = NULL;
1063 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 559 u8 *decrypted = NULL; local
577 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
580 if (decrypted == NULL) {
592 os_free(decrypted);
593 decrypted = NULL;
640 os_free(decrypted);
eap_server_aka.c 949 u8 *decrypted = NULL; local
969 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
972 if (decrypted == NULL) {
984 os_free(decrypted);
985 decrypted = NULL;
1056 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 667 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
671 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
689 u8 *decrypted; local
693 decrypted = ikev2_decrypt_payload(data->proposal.encr,
697 if (decrypted == NULL)
701 decrypted, decrypted_len);
702 os_free(decrypted);
    [all...]
eap_fast.c 32 * - password change (pending mschapv2 packet; replay decrypted packet)
1051 static int eap_fast_parse_decrypted(struct wpabuf *decrypted,
1060 /* Parse TLVs from the decrypted Phase 2 data */
1061 pos = wpabuf_mhead(decrypted);
1062 end = pos + wpabuf_len(decrypted);
1144 struct wpabuf *decrypted,
1151 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 662 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
666 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
684 u8 *decrypted; local
688 decrypted = ikev2_decrypt_payload(data->proposal.encr,
692 if (decrypted == NULL)
696 decrypted, decrypted_len);
697 os_free(decrypted);
    [all...]
eap_fast.c 26 * - password change (pending mschapv2 packet; replay decrypted packet)
1050 static int eap_fast_parse_decrypted(struct wpabuf *decrypted,
1059 /* Parse TLVs from the decrypted Phase 2 data */
1060 pos = wpabuf_mhead(decrypted);
1061 end = pos + wpabuf_len(decrypted);
1143 struct wpabuf *decrypted,
1150 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
    [all...]
  /frameworks/av/drm/libdrmframework/plugins/common/include/
DrmEngineBase.h 373 * @param[in] fd File descriptor of the protected content to be decrypted
388 * @param[in] fd File descriptor of the protected content to be decrypted
409 * @param[in] uri Path of the protected content to be decrypted
422 * @param[in] uri Path of the protected content to be decrypted
467 * @param[out] decBuffer Decrypted data block
IDrmEngine.h 320 * @param[in] fd File descriptor of the protected content to be decrypted
337 * @param[in] uri Path of the protected content to be decrypted
379 * @param[out] decBuffer Decrypted data block
  /external/wpa_supplicant_8/src/crypto/
tls.h 96 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no
321 * handshake message includes application data, this is decrypted and
385 * Returns: Decrypted TLS data or %NULL on failure
  /frameworks/av/drm/libdrmframework/include/
DrmManagerClientImpl.h 300 * @param[in] fd File descriptor of the protected content to be decrypted
314 * @param[in] uri Path of the protected content to be decrypted
354 * @param[out] decBuffer Decrypted data block
  /frameworks/av/include/drm/
DrmManagerClient.h 66 * @param[in] fd File descriptor of the protected content to be decrypted
78 * @param[in] uri Path of the protected content to be decrypted
141 * @param[out] decBuffer Decrypted data block
  /frameworks/base/media/libdrm/mobile1/src/objmng/
drm_rights_manager.c 605 /* Output the decrypted bytes */
649 /* Write decrypted plaintext blocks */
654 /* Write the decrypted plaintext block */
  /external/chromium/net/socket/
ssl_client_socket_win.cc 376 // Ciphertext is decrypted one SSL record at a time, so recv_buffer_ needs to
747 // If we have surplus decrypted plaintext, satisfy the Read with it without
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/
PEMDecoder.java 113 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?");
118 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?");
  /external/openssl/crypto/pem/
pem_info.c 334 * we have to be able to handle a not-yet-decrypted key
335 * being written out correctly ... if it is decrypted or
  /external/openssl/ssl/
t1_lib.c     [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/
PKCS1Encoding.java 188 * @exception InvalidCipherTextException if the decrypted block is not in PKCS1 format.

Completed in 1077 milliseconds

1 23 4 5 6 7 8