/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSAThread.java | 33 byte[] decrypted = new byte[256]; 46 cip.doFinal(output, 0, outputSize, decrypted); 49 checkPaddedEncodedData(input, decrypted, outputSize - input.length); 51 checkEncodedData(input, decrypted);
|
CipherSymmetricKeyThread.java | 36 byte[] decrypted = new byte[128]; 62 cip.doFinal(output, 0, outputSize, decrypted); 68 cip.doFinal(output, 0, outputSize, decrypted); 71 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherPBEThread.java | 37 byte[] decrypted = new byte[128]; 56 cip.doFinal(output, 0, outputSize, decrypted); 58 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherWrapThread.java | 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local 44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes()); 45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
|
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 90 std::string decrypted; local 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 93 EXPECT_EQ(plaintext, decrypted); 108 std::string decrypted; local 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 111 EXPECT_NE(plaintext, decrypted); 127 std::string decrypted; local 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 130 EXPECT_NE(plaintext, decrypted);
|
cryptographer_unittest.cc | 57 sync_pb::PasswordSpecificsData decrypted; local 58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 133 sync_pb::PasswordSpecificsData decrypted; local 134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
|
nigori.h | 55 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64 57 bool Decrypt(const std::string& value, std::string* decrypted) const;
|
/external/openssh/ |
ssh-rsa.c | 216 u_char *decrypted = NULL; local 242 decrypted = xmalloc(rsasize); 243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen); 253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 265 if (decrypted) 266 xfree(decrypted);
|
authfile.c | 421 Buffer decrypted; local 469 /* Initialize space for decrypted data. */ 470 buffer_init(&decrypted); 471 cp = buffer_append_space(&decrypted, buffer_len(©)); 482 check1 = buffer_get_char(&decrypted); 483 check2 = buffer_get_char(&decrypted); 484 if (check1 != buffer_get_char(&decrypted) || 485 check2 != buffer_get_char(&decrypted)) { 489 buffer_free(&decrypted); 493 buffer_get_bignum(&decrypted, prv->rsa->d) [all...] |
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterAsymmetricHelper.java | 90 byte[] decrypted = null; 92 decrypted = cipher.doFinal(bs); 99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
AlgorithmParameterSymmetricHelper.java | 103 byte[] decrypted = null; 105 decrypted = cipher.doFinal(bs); 112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
CipherHelper.java | 65 byte[] decrypted = crypt(cipher, encrypted); 67 String decryptedString = new String(decrypted);
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 152 struct wpabuf *decrypted; local 165 decrypted = wpabuf_alloc(encr_len - block_size); 166 if (decrypted == NULL) 170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 172 wpabuf_len(decrypted))) { 173 wpabuf_free(decrypted); 177 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 178 decrypted); 180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
wps_enrollee.c | 981 struct wpabuf *decrypted; local 1001 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 1003 if (decrypted == NULL) { 1004 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 1010 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) { 1011 wpabuf_free(decrypted); 1016 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 1018 if (wps_parse_msg(decrypted, &eattr) < 0 || 1019 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 1021 wpabuf_free(decrypted); 1036 struct wpabuf *decrypted; local 1093 struct wpabuf *decrypted; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
eap_sim.c | 688 u8 *decrypted; local 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 692 if (decrypted == NULL) { 697 os_free(decrypted); 722 u8 *decrypted; local 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 733 if (decrypted == NULL) { 743 os_free(decrypted); 747 os_free(decrypted); 820 u8 *decrypted; local [all...] |
eap_aka.c | 919 u8 *decrypted; local 920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 923 if (decrypted == NULL) { 928 os_free(decrypted); 953 u8 *decrypted; local 961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 964 if (decrypted == NULL) { 974 os_free(decrypted); 978 os_free(decrypted); 1050 u8 *decrypted; local [all...] |
ikev2.c | 662 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 666 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 684 u8 *decrypted; local 688 decrypted = ikev2_decrypt_payload(data->proposal.encr, 692 if (decrypted == NULL) 696 decrypted, decrypted_len); 697 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 336 u8 *decrypted, nonce[16]; local 376 decrypted = os_malloc(left); 377 if (decrypted == NULL) 379 os_memcpy(decrypted, pos, left); 382 wpabuf_head(respData), 22, decrypted, left, 385 os_free(decrypted); 389 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 390 decrypted, left); 393 switch (decrypted[0] >> 6) { 407 os_free(decrypted); [all...] |
ikev2.c | 451 u8 *decrypted; local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, 460 if (decrypted == NULL) 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 466 decrypted + decrypted_len) < 0) { 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 475 os_free(decrypted); 694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 716 u8 *decrypted; local [all...] |
eap_server_sim.c | 609 u8 *decrypted = NULL; local 625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 628 if (decrypted == NULL) { 640 os_free(decrypted); 641 decrypted = NULL; 679 os_free(decrypted);
|
eap_server_aka.c | 1052 u8 *decrypted = NULL; local 1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1073 if (decrypted == NULL) { 1085 os_free(decrypted); 1086 decrypted = NULL; 1136 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 939 u8 *decrypted; local 946 decrypted = os_malloc(encr_data_len); 947 if (decrypted == NULL) 949 os_memcpy(decrypted, encr_data, encr_data_len); 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 952 os_free(decrypted); 955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 956 decrypted, encr_data_len); 958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 498 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 557 decrypted = os_malloc(decrypted_len); 558 if (decrypted == NULL) 562 decrypted, decrypted_len) < 0) { 563 os_free(decrypted); 567 pad_len = decrypted[decrypted_len - 1]; 571 os_free(decrypted); 578 return decrypted;
|
/external/chromium/crypto/ |
encryptor_unittest.cc | 230 std::string decrypted; local 231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted)); 232 EXPECT_EQ("", decrypted);
|