HomeSort by relevance Sort by last modified time
    Searched full:decrypted (Results 1 - 25 of 185) sorted by null

1 2 3 4 5 6 7 8

  /external/chromium/chrome/browser/sync/util/
nigori_unittest.cc 90 std::string decrypted; local
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
93 EXPECT_EQ(plaintext, decrypted);
108 std::string decrypted; local
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
111 EXPECT_NE(plaintext, decrypted);
127 std::string decrypted; local
128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted));
130 EXPECT_NE(plaintext, decrypted);
cryptographer_unittest.cc 57 sync_pb::PasswordSpecificsData decrypted; local
58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
133 sync_pb::PasswordSpecificsData decrypted; local
134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
cryptographer.h 42 // delayed until after it can be decrypted.
63 // Returns whether |encrypted| can be decrypted using the default encryption
74 // or |message| fails to parse the decrypted data.
78 // Decrypts |encrypted| and returns plaintext decrypted data. If decryption
96 // Makes a local copy of |encrypted| to later be decrypted by
103 // successfully decrypted and installed.
109 // Returns whether there is a pending set of keys that needs to be decrypted.
nigori.h 55 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64
57 bool Decrypt(const std::string& value, std::string* decrypted) const;
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_common.c 154 struct wpabuf *decrypted; local
167 decrypted = wpabuf_alloc(encr_len - block_size);
168 if (decrypted == NULL)
172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
174 wpabuf_len(decrypted))) {
175 wpabuf_free(decrypted);
179 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
180 decrypted);
182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_enrollee.c 833 struct wpabuf *decrypted; local
853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
855 if (decrypted == NULL) {
856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
864 if (wps_parse_msg(decrypted, &eattr) < 0 ||
865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
867 wpabuf_free(decrypted);
871 wpabuf_free(decrypted);
882 struct wpabuf *decrypted; local
929 struct wpabuf *decrypted; local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherWrapThread.java 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local
44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes());
45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
CipherPBEThread.java 37 byte[] decrypted = new byte[128];
56 cip.doFinal(output, 0, outputSize, decrypted);
58 checkEncodedData(getData().getBytes(), decrypted); local
CipherRSAThread.java 33 byte[] decrypted = new byte[256];
46 cip.doFinal(output, 0, outputSize, decrypted);
48 checkEncodedData(input, decrypted);
CipherSymmetricKeyThread.java 36 byte[] decrypted = new byte[128];
62 cip.doFinal(output, 0, outputSize, decrypted);
68 cip.doFinal(output, 0, outputSize, decrypted);
71 checkEncodedData(getData().getBytes(), decrypted); local
  /external/srtp/crypto/include/
xfm.h 67 void *opaque, /* data to be decrypted and authenticated */
69 * decrypted and authd (before and after)
108 void *opaque, /* data to be decrypted and authenticated */
110 * decrypted and authd (before and after)
  /frameworks/base/media/java/android/drm/mobile1/
DrmRawContent.java 192 * Get one InputStream object to read decrypted content.
194 * @param rights the rights object contain decrypted key.
196 * @return the InputStream object of decrypted media content.
206 * Get the type of the decrypted media content.
208 * @return the decrypted media content type of this DRM content.
215 * Get the length of the decrypted media content.
217 * @param rights the rights object contain decrypted key.
219 * @return the length of the decrypted media content.
283 /* call native method to get this DRM decrypted media content length */
433 * @return the decrypted media content type
    [all...]
  /libcore/support/src/test/java/tests/security/
AlgorithmParameterAsymmetricHelper.java 90 byte[] decrypted = null;
92 decrypted = cipher.doFinal(bs);
99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
AlgorithmParameterSymmetricHelper.java 103 byte[] decrypted = null;
105 decrypted = cipher.doFinal(bs);
112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
CipherHelper.java 65 byte[] decrypted = crypt(cipher, encrypted);
67 String decryptedString = new String(decrypted);
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 962 struct wpabuf *decrypted; local
982 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
984 if (decrypted == NULL) {
985 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
991 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) {
992 wpabuf_free(decrypted);
997 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
999 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1000 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
1002 wpabuf_free(decrypted);
1017 struct wpabuf *decrypted; local
1074 struct wpabuf *decrypted; local
    [all...]
wps_common.c 152 struct wpabuf *decrypted; local
165 decrypted = wpabuf_alloc(encr_len - block_size);
166 if (decrypted == NULL)
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
172 wpabuf_len(decrypted))) {
173 wpabuf_free(decrypted);
177 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
178 decrypted);
180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
  /external/chromium/chrome/browser/importer/
firefox_importer_unittest_messages_internal.h 23 // Child->Server: Decrypted String.
  /external/openssh/
ssh-rsa.c 216 u_char *decrypted = NULL; local
242 decrypted = xmalloc(rsasize);
243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen);
253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
265 if (decrypted)
266 xfree(decrypted);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local
279 decrypted = os_malloc(left);
280 if (decrypted == NULL) {
285 os_memcpy(decrypted, msg, left);
290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
293 os_free(decrypted);
296 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
297 decrypted, left);
300 switch (decrypted[0] >> 6) {
317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local
274 decrypted = os_malloc(left);
275 if (decrypted == NULL) {
280 os_memcpy(decrypted, msg, left);
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
291 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
  /frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/
FwdLockGlue.h 71 * @param[out] pDecryptedKey A reference to the buffer containing the decrypted key.
72 * @param[in] decryptedKeyLength The length in bytes of the decrypted key.
  /external/chromium/chrome/browser/webdata/
token_service_table.h 23 // Returns true if there were tokens and we decrypted them,
  /external/chromium/net/socket/
ssl_client_socket_win.h 169 // data in place, sometimes recv_buffer_ may contain decrypted plaintext and
170 // any undecrypted ciphertext. (Ciphertext is decrypted one full SSL record
176 char* decrypted_ptr_; // Points to the decrypted plaintext in recv_buffer_
177 int bytes_decrypted_; // The number of bytes of decrypted plaintext.
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 339 u8 *decrypted, nonce[16]; local
379 decrypted = os_malloc(left);
380 if (decrypted == NULL)
382 os_memcpy(decrypted, pos, left);
385 wpabuf_head(respData), 22, decrypted, left,
388 os_free(decrypted);
392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
393 decrypted, left);
396 switch (decrypted[0] >> 6) {
410 os_free(decrypted);
    [all...]

Completed in 396 milliseconds

1 2 3 4 5 6 7 8