/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
CFBBlockCipher.java | 195 * @param in the array containing the data to be decrypted.
|
/external/chromium/chrome/browser/password_manager/ |
ie7_password.cc | 129 // Now that we have the decrypted information, we need to understand it.
|
/external/chromium/chrome/browser/sync/syncable/ |
nigori_util.cc | 116 VLOG(1) << "Decrypted change for newly unencrypted type " <<
|
/external/openssl/crypto/pkcs12/ |
p12_decr.c | 63 /* Define this to dump decrypted output to files called DERnnn */
|
/hardware/ti/omap4xxx/security/tf_crypto_sst/ |
pkcs11_object.c | [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 363 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - Decrypted " 422 "Decrypted data with IV and padding "
|
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 110 * Verifies that the digests stored in the manifest match the decrypted 117 * agree with the decrypted digest as recovered from the
|
/libcore/luni/src/main/java/javax/crypto/ |
EncryptedPrivateKeyInfo.java | 250 throw new InvalidKeySpecException("Decrypted data does not represent valid PKCS#8 PrivateKeyInfo"); 424 throw new InvalidKeyException("Decrypted data does not represent valid PKCS#8 PrivateKeyInfo");
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/encodings/ |
ISO9796d1Encoding.java | 201 * @exception InvalidCipherTextException if the decrypted block is not a valid ISO 9796 bit string
|
/external/ipsec-tools/src/racoon/ |
TODO | 13 o save decrypted IKE packet in tcpdump format
|
/external/openssl/crypto/pkcs7/ |
pkcs7err.c | 124 {ERR_REASON(PKCS7_R_DECRYPTED_KEY_IS_WRONG_LENGTH),"decrypted key is wrong length"},
|
/external/openssl/include/openssl/ |
ssl2.h | 190 int wact_data_length; /* Set when things are decrypted. */
|
/external/openssl/ssl/ |
ssl2.h | 190 int wact_data_length; /* Set when things are decrypted. */
|
/frameworks/av/drm/libdrmframework/plugins/passthru/src/ |
DrmPassthruPlugIn.cpp | 278 * encrypted buffer as it is to decrypted buffer. Note, decBuffer
|
/external/chromium/chrome/browser/sync/engine/ |
apply_updates_command_unittest.cc | 249 << "The updates that can be decrypted should be applied"; 265 << "The updates that can't be decrypted should be in conflict"; 267 << "No update that can't be decrypted should be applied";
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls.h | 59 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no 303 * handshake message includes application data, this is decrypted and 366 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 184 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque", 205 "decrypted PAC-Opaque", [all...] |
eap_peap.c | 951 "pending wait state - save decrypted response"); 1058 * to handle the possibility of the decrypted data being longer than 1083 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-PEAP: Decrypted Phase 2 EAP", [all...] |
eap_ttls.c | 1019 "pending wait state - save decrypted response"); 1157 * to handle the possibility of the decrypted data being longer than 1197 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Decrypted Phase 2 EAP", [all...] |
/system/vold/ |
cryptfs.c | 690 /* If that succeeded, then mount the decrypted filesystem */ 795 SLOGE("Error creating decrypted block device\n"); 804 * a directory in it to test mount the decrypted filesystem. 809 SLOGE("Error temp mounting decrypted block device\n"); [all...] |
/external/dropbear/ |
common-session.c | 189 /* Process the decrypted packet. After this, the read buffer
|
/external/openssh/ |
auth-rsa.c | 104 /* The response is MD5 of decrypted challenge plus session id. */
|
/external/openssl/crypto/cmac/ |
cmac.c | 304 * So reinitliasing using the last decrypted block will allow
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_cred.c | 228 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no
|
tlsv1_record.c | 356 "TLSv1: Record Layer - Decrypted data",
|