/frameworks/av/drm/libdrmframework/plugins/forward-lock/FwdLockEngine/include/ |
FwdLockEngine.h | 324 * @param fd File descriptor of the protected content to be decrypted 345 * @param uri Path of the protected content to be decrypted 388 * @param decBuffer Decrypted data block 410 * @param decBuffer Decrypted data block
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 6 encrypted by a public key can be decrypted only by the corresponding 10 decrypted by the public key so that the public knows that this
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_process.c | 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 75 "decrypted attribute");
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_process.c | 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 69 "decrypted attribute");
|
wps_registrar.c | 2520 struct wpabuf *decrypted; local 2671 struct wpabuf *decrypted; local [all...] |
/docs/source.android.com/src/tech/encryption/ |
android_crypto_implementation.md | 98 filesystem so the real decrypted /data filesystem could be mounted meant that 104 are not started until after /data has been decrypted and mounted. The magic 147 is correct (which is determined by successfully mounting the decrypted 149 decrypted block device in the property ro.crypto.fs_crypto_blkdev, and 157 unmounted. vold then mounts the decrypted real /data partition, and then 169 Now the framework boots all its services using the decrypted /data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim.c | 564 u8 *decrypted = NULL; local 582 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 585 if (decrypted == NULL) { 597 os_free(decrypted); 598 decrypted = NULL; 645 os_free(decrypted);
|
eap_aka.c | 956 u8 *decrypted = NULL; local 976 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 979 if (decrypted == NULL) { 991 os_free(decrypted); 992 decrypted = NULL; 1063 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 559 u8 *decrypted = NULL; local 577 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 580 if (decrypted == NULL) { 592 os_free(decrypted); 593 decrypted = NULL; 640 os_free(decrypted);
|
eap_server_aka.c | 949 u8 *decrypted = NULL; local 969 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 972 if (decrypted == NULL) { 984 os_free(decrypted); 985 decrypted = NULL; 1056 os_free(decrypted); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.c | 667 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 671 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 689 u8 *decrypted; local 693 decrypted = ikev2_decrypt_payload(data->proposal.encr, 697 if (decrypted == NULL) 701 decrypted, decrypted_len); 702 os_free(decrypted); [all...] |
eap_fast.c | 32 * - password change (pending mschapv2 packet; replay decrypted packet) 1051 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, 1060 /* Parse TLVs from the decrypted Phase 2 data */ 1061 pos = wpabuf_mhead(decrypted); 1062 end = pos + wpabuf_len(decrypted); 1144 struct wpabuf *decrypted, 1151 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 662 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 666 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 684 u8 *decrypted; local 688 decrypted = ikev2_decrypt_payload(data->proposal.encr, 692 if (decrypted == NULL) 696 decrypted, decrypted_len); 697 os_free(decrypted); [all...] |
eap_fast.c | 26 * - password change (pending mschapv2 packet; replay decrypted packet) 1050 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, 1059 /* Parse TLVs from the decrypted Phase 2 data */ 1060 pos = wpabuf_mhead(decrypted); 1061 end = pos + wpabuf_len(decrypted); 1143 struct wpabuf *decrypted, 1150 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) [all...] |
/frameworks/av/drm/libdrmframework/plugins/common/include/ |
DrmEngineBase.h | 373 * @param[in] fd File descriptor of the protected content to be decrypted 388 * @param[in] fd File descriptor of the protected content to be decrypted 409 * @param[in] uri Path of the protected content to be decrypted 422 * @param[in] uri Path of the protected content to be decrypted 467 * @param[out] decBuffer Decrypted data block
|
IDrmEngine.h | 320 * @param[in] fd File descriptor of the protected content to be decrypted 337 * @param[in] uri Path of the protected content to be decrypted 379 * @param[out] decBuffer Decrypted data block
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 96 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no 321 * handshake message includes application data, this is decrypted and 385 * Returns: Decrypted TLS data or %NULL on failure
|
/frameworks/av/drm/libdrmframework/include/ |
DrmManagerClientImpl.h | 300 * @param[in] fd File descriptor of the protected content to be decrypted 314 * @param[in] uri Path of the protected content to be decrypted 354 * @param[out] decBuffer Decrypted data block
|
/frameworks/av/include/drm/ |
DrmManagerClient.h | 66 * @param[in] fd File descriptor of the protected content to be decrypted 78 * @param[in] uri Path of the protected content to be decrypted 141 * @param[out] decBuffer Decrypted data block
|
/frameworks/base/media/libdrm/mobile1/src/objmng/ |
drm_rights_manager.c | 605 /* Output the decrypted bytes */ 649 /* Write decrypted plaintext blocks */ 654 /* Write the decrypted plaintext block */
|
/external/chromium/net/socket/ |
ssl_client_socket_win.cc | 376 // Ciphertext is decrypted one SSL record at a time, so recv_buffer_ needs to 747 // If we have surplus decrypted plaintext, satisfy the Read with it without [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
PEMDecoder.java | 113 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?"); 118 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?");
|
/external/openssl/crypto/pem/ |
pem_info.c | 334 * we have to be able to handle a not-yet-decrypted key 335 * being written out correctly ... if it is decrypted or
|
/external/openssl/ssl/ |
t1_lib.c | [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/ |
PKCS1Encoding.java | 188 * @exception InvalidCipherTextException if the decrypted block is not in PKCS1 format.
|