/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 90 std::string decrypted; local 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 93 EXPECT_EQ(plaintext, decrypted); 108 std::string decrypted; local 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 111 EXPECT_NE(plaintext, decrypted); 127 std::string decrypted; local 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 130 EXPECT_NE(plaintext, decrypted);
|
cryptographer_unittest.cc | 57 sync_pb::PasswordSpecificsData decrypted; local 58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 133 sync_pb::PasswordSpecificsData decrypted; local 134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
|
cryptographer.h | 42 // delayed until after it can be decrypted. 63 // Returns whether |encrypted| can be decrypted using the default encryption 74 // or |message| fails to parse the decrypted data. 78 // Decrypts |encrypted| and returns plaintext decrypted data. If decryption 96 // Makes a local copy of |encrypted| to later be decrypted by 103 // successfully decrypted and installed. 109 // Returns whether there is a pending set of keys that needs to be decrypted.
|
nigori.h | 55 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64 57 bool Decrypt(const std::string& value, std::string* decrypted) const;
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_common.c | 154 struct wpabuf *decrypted; local 167 decrypted = wpabuf_alloc(encr_len - block_size); 168 if (decrypted == NULL) 172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 174 wpabuf_len(decrypted))) { 175 wpabuf_free(decrypted); 179 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 180 decrypted); 182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
wps_enrollee.c | 833 struct wpabuf *decrypted; local 853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 855 if (decrypted == NULL) { 856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 864 if (wps_parse_msg(decrypted, &eattr) < 0 || 865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 867 wpabuf_free(decrypted); 871 wpabuf_free(decrypted); 882 struct wpabuf *decrypted; local 929 struct wpabuf *decrypted; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherWrapThread.java | 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local 44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes()); 45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
|
CipherPBEThread.java | 37 byte[] decrypted = new byte[128]; 56 cip.doFinal(output, 0, outputSize, decrypted); 58 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherRSAThread.java | 33 byte[] decrypted = new byte[256]; 46 cip.doFinal(output, 0, outputSize, decrypted); 48 checkEncodedData(input, decrypted);
|
CipherSymmetricKeyThread.java | 36 byte[] decrypted = new byte[128]; 62 cip.doFinal(output, 0, outputSize, decrypted); 68 cip.doFinal(output, 0, outputSize, decrypted); 71 checkEncodedData(getData().getBytes(), decrypted); local
|
/external/srtp/crypto/include/ |
xfm.h | 67 void *opaque, /* data to be decrypted and authenticated */ 69 * decrypted and authd (before and after) 108 void *opaque, /* data to be decrypted and authenticated */ 110 * decrypted and authd (before and after)
|
/frameworks/base/media/java/android/drm/mobile1/ |
DrmRawContent.java | 192 * Get one InputStream object to read decrypted content. 194 * @param rights the rights object contain decrypted key. 196 * @return the InputStream object of decrypted media content. 206 * Get the type of the decrypted media content. 208 * @return the decrypted media content type of this DRM content. 215 * Get the length of the decrypted media content. 217 * @param rights the rights object contain decrypted key. 219 * @return the length of the decrypted media content. 283 /* call native method to get this DRM decrypted media content length */ 433 * @return the decrypted media content type [all...] |
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterAsymmetricHelper.java | 90 byte[] decrypted = null; 92 decrypted = cipher.doFinal(bs); 99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
AlgorithmParameterSymmetricHelper.java | 103 byte[] decrypted = null; 105 decrypted = cipher.doFinal(bs); 112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
CipherHelper.java | 65 byte[] decrypted = crypt(cipher, encrypted); 67 String decryptedString = new String(decrypted);
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 962 struct wpabuf *decrypted; local 982 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 984 if (decrypted == NULL) { 985 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 991 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) { 992 wpabuf_free(decrypted); 997 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 999 if (wps_parse_msg(decrypted, &eattr) < 0 || 1000 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 1002 wpabuf_free(decrypted); 1017 struct wpabuf *decrypted; local 1074 struct wpabuf *decrypted; local [all...] |
wps_common.c | 152 struct wpabuf *decrypted; local 165 decrypted = wpabuf_alloc(encr_len - block_size); 166 if (decrypted == NULL) 170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 172 wpabuf_len(decrypted))) { 173 wpabuf_free(decrypted); 177 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 178 decrypted); 180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
/external/chromium/chrome/browser/importer/ |
firefox_importer_unittest_messages_internal.h | 23 // Child->Server: Decrypted String.
|
/external/openssh/ |
ssh-rsa.c | 216 u_char *decrypted = NULL; local 242 decrypted = xmalloc(rsasize); 243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen); 253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 265 if (decrypted) 266 xfree(decrypted);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local 279 decrypted = os_malloc(left); 280 if (decrypted == NULL) { 285 os_memcpy(decrypted, msg, left); 290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 293 os_free(decrypted); 296 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 297 decrypted, left); 300 switch (decrypted[0] >> 6) { 317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local 274 decrypted = os_malloc(left); 275 if (decrypted == NULL) { 280 os_memcpy(decrypted, msg, left); 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 291 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/ |
FwdLockGlue.h | 71 * @param[out] pDecryptedKey A reference to the buffer containing the decrypted key. 72 * @param[in] decryptedKeyLength The length in bytes of the decrypted key.
|
/external/chromium/chrome/browser/webdata/ |
token_service_table.h | 23 // Returns true if there were tokens and we decrypted them,
|
/external/chromium/net/socket/ |
ssl_client_socket_win.h | 169 // data in place, sometimes recv_buffer_ may contain decrypted plaintext and 170 // any undecrypted ciphertext. (Ciphertext is decrypted one full SSL record 176 char* decrypted_ptr_; // Points to the decrypted plaintext in recv_buffer_ 177 int bytes_decrypted_; // The number of bytes of decrypted plaintext.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 339 u8 *decrypted, nonce[16]; local 379 decrypted = os_malloc(left); 380 if (decrypted == NULL) 382 os_memcpy(decrypted, pos, left); 385 wpabuf_head(respData), 22, decrypted, left, 388 os_free(decrypted); 392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 393 decrypted, left); 396 switch (decrypted[0] >> 6) { 410 os_free(decrypted); [all...] |