HomeSort by relevance Sort by last modified time
    Searched refs:decrypted (Results 1 - 25 of 32) sorted by null

1 2

  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherRSAThread.java 33 byte[] decrypted = new byte[256];
46 cip.doFinal(output, 0, outputSize, decrypted);
49 checkPaddedEncodedData(input, decrypted, outputSize - input.length);
51 checkEncodedData(input, decrypted);
CipherSymmetricKeyThread.java 36 byte[] decrypted = new byte[128];
62 cip.doFinal(output, 0, outputSize, decrypted);
68 cip.doFinal(output, 0, outputSize, decrypted);
71 checkEncodedData(getData().getBytes(), decrypted); local
CipherPBEThread.java 37 byte[] decrypted = new byte[128];
56 cip.doFinal(output, 0, outputSize, decrypted);
58 checkEncodedData(getData().getBytes(), decrypted); local
CipherWrapThread.java 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local
44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes());
45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
  /external/chromium/chrome/browser/sync/util/
nigori_unittest.cc 90 std::string decrypted; local
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
93 EXPECT_EQ(plaintext, decrypted);
108 std::string decrypted; local
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
111 EXPECT_NE(plaintext, decrypted);
127 std::string decrypted; local
128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted));
130 EXPECT_NE(plaintext, decrypted);
cryptographer_unittest.cc 57 sync_pb::PasswordSpecificsData decrypted; local
58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
133 sync_pb::PasswordSpecificsData decrypted; local
134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
nigori.h 55 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64
57 bool Decrypt(const std::string& value, std::string* decrypted) const;
  /external/openssh/
ssh-rsa.c 216 u_char *decrypted = NULL; local
242 decrypted = xmalloc(rsasize);
243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen);
253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
265 if (decrypted)
266 xfree(decrypted);
authfile.c 421 Buffer decrypted; local
469 /* Initialize space for decrypted data. */
470 buffer_init(&decrypted);
471 cp = buffer_append_space(&decrypted, buffer_len(&copy));
482 check1 = buffer_get_char(&decrypted);
483 check2 = buffer_get_char(&decrypted);
484 if (check1 != buffer_get_char(&decrypted) ||
485 check2 != buffer_get_char(&decrypted)) {
489 buffer_free(&decrypted);
493 buffer_get_bignum(&decrypted, prv->rsa->d)
    [all...]
  /libcore/support/src/test/java/tests/security/
AlgorithmParameterAsymmetricHelper.java 90 byte[] decrypted = null;
92 decrypted = cipher.doFinal(bs);
99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
AlgorithmParameterSymmetricHelper.java 103 byte[] decrypted = null;
105 decrypted = cipher.doFinal(bs);
112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
CipherHelper.java 65 byte[] decrypted = crypt(cipher, encrypted);
67 String decryptedString = new String(decrypted);
  /external/wpa_supplicant_8/src/wps/
wps_common.c 152 struct wpabuf *decrypted; local
165 decrypted = wpabuf_alloc(encr_len - block_size);
166 if (decrypted == NULL)
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
172 wpabuf_len(decrypted))) {
173 wpabuf_free(decrypted);
177 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
178 decrypted);
180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_enrollee.c 981 struct wpabuf *decrypted; local
1001 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
1003 if (decrypted == NULL) {
1004 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
1010 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) {
1011 wpabuf_free(decrypted);
1016 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
1018 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1019 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
1021 wpabuf_free(decrypted);
1036 struct wpabuf *decrypted; local
1093 struct wpabuf *decrypted; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
276 decrypted = os_malloc(left);
277 if (decrypted == NULL) {
282 os_memcpy(decrypted, msg, left);
287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
290 os_free(decrypted);
293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
294 decrypted, left);
297 switch (decrypted[0] >> 6) {
314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
eap_sim.c 688 u8 *decrypted; local
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
692 if (decrypted == NULL) {
697 os_free(decrypted);
722 u8 *decrypted; local
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
733 if (decrypted == NULL) {
743 os_free(decrypted);
747 os_free(decrypted);
820 u8 *decrypted; local
    [all...]
eap_aka.c 919 u8 *decrypted; local
920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
923 if (decrypted == NULL) {
928 os_free(decrypted);
953 u8 *decrypted; local
961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
964 if (decrypted == NULL) {
974 os_free(decrypted);
978 os_free(decrypted);
1050 u8 *decrypted; local
    [all...]
ikev2.c 662 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
666 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
684 u8 *decrypted; local
688 decrypted = ikev2_decrypt_payload(data->proposal.encr,
692 if (decrypted == NULL)
696 decrypted, decrypted_len);
697 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 336 u8 *decrypted, nonce[16]; local
376 decrypted = os_malloc(left);
377 if (decrypted == NULL)
379 os_memcpy(decrypted, pos, left);
382 wpabuf_head(respData), 22, decrypted, left,
385 os_free(decrypted);
389 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
390 decrypted, left);
393 switch (decrypted[0] >> 6) {
407 os_free(decrypted);
    [all...]
ikev2.c 451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
716 u8 *decrypted; local
    [all...]
eap_server_sim.c 609 u8 *decrypted = NULL; local
625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
628 if (decrypted == NULL) {
640 os_free(decrypted);
641 decrypted = NULL;
679 os_free(decrypted);
eap_server_aka.c 1052 u8 *decrypted = NULL; local
1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1073 if (decrypted == NULL) {
1085 os_free(decrypted);
1086 decrypted = NULL;
1136 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 939 u8 *decrypted; local
946 decrypted = os_malloc(encr_data_len);
947 if (decrypted == NULL)
949 os_memcpy(decrypted, encr_data, encr_data_len);
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
952 os_free(decrypted);
955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
956 decrypted, encr_data_len);
958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 498 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
557 decrypted = os_malloc(decrypted_len);
558 if (decrypted == NULL)
562 decrypted, decrypted_len) < 0) {
563 os_free(decrypted);
567 pad_len = decrypted[decrypted_len - 1];
571 os_free(decrypted);
578 return decrypted;
  /external/chromium/crypto/
encryptor_unittest.cc 230 std::string decrypted; local
231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted));
232 EXPECT_EQ("", decrypted);

Completed in 2394 milliseconds

1 2