/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherWrapThread.java | 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local 44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes()); 45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
|
CipherPBEThread.java | 37 byte[] decrypted = new byte[128]; 56 cip.doFinal(output, 0, outputSize, decrypted); 58 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherSymmetricKeyThread.java | 36 byte[] decrypted = new byte[128]; 62 cip.doFinal(output, 0, outputSize, decrypted); 68 cip.doFinal(output, 0, outputSize, decrypted); 71 checkEncodedData(getData().getBytes(), decrypted); local
|
/external/chromium/crypto/ |
encryptor_unittest.cc | 230 std::string decrypted; local 231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted)); 232 EXPECT_EQ("", decrypted);
|
/external/libvpx/libvpx/vp8/decoder/ |
dboolhuff.c | 47 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local 50 size_t n = bytes_left > sizeof(decrypted) ? sizeof(decrypted) : bytes_left; 51 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); 52 bufptr = decrypted;
|
/external/chromium/chrome/browser/sync/util/ |
nigori_unittest.cc | 90 std::string decrypted; local 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 93 EXPECT_EQ(plaintext, decrypted); 108 std::string decrypted; local 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 111 EXPECT_NE(plaintext, decrypted); 127 std::string decrypted; local 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 130 EXPECT_NE(plaintext, decrypted);
|
cryptographer_unittest.cc | 57 sync_pb::PasswordSpecificsData decrypted; local 58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 133 sync_pb::PasswordSpecificsData decrypted; local 134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
|
/external/chromium_org/sync/util/ |
cryptographer_unittest.cc | 75 sync_pb::PasswordSpecificsData decrypted; local 76 EXPECT_TRUE(cryptographer_.Decrypt(encrypted, &decrypted)); 78 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 104 sync_pb::PasswordSpecificsData decrypted; local 105 EXPECT_TRUE(cryptographer_.Decrypt(encrypted2, &decrypted)); 109 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 180 sync_pb::PasswordSpecificsData decrypted; local 181 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 182 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
|
nigori_unittest.cc | 90 std::string decrypted; local 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 93 EXPECT_EQ(plaintext, decrypted); 108 std::string decrypted; local 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 111 EXPECT_NE(plaintext, decrypted); 127 std::string decrypted; local 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 130 EXPECT_NE(plaintext, decrypted);
|
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterAsymmetricHelper.java | 90 byte[] decrypted = null; 92 decrypted = cipher.doFinal(bs); 99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
AlgorithmParameterSymmetricHelper.java | 103 byte[] decrypted = null; 105 decrypted = cipher.doFinal(bs); 112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_crypto.cc | 225 SECStatus decrypted = local 233 if (decrypted != SECSuccess) {
|
networking_private_crypto_unittest.cc | 20 std::string decrypted; local 21 if (crypto.DecryptByteString(private_key_pem, encrypted, &decrypted)) 22 return decrypted == plain;
|
/external/chromium_org/sync/syncable/ |
entry_kernel.cc | 91 sync_pb::EntitySpecifics decrypted; local 96 cryptographer->Decrypt(encrypted, &decrypted)) { 97 value = EntitySpecificsToValue(decrypted);
|
/external/chromium_org/components/autofill/content/browser/wallet/ |
full_wallet.cc | 286 // There is no uint8* to int64 so convert the decrypted data to hex and then 290 int64 decrypted; local 291 if (!base::HexStringToInt64(hex_decrypted, &decrypted)) { 292 DLOG(ERROR) << "Failed to parse decrypted data in hex to int64"; 295 std::string card_info = base::Int64ToString(decrypted); 299 // PANPANPANPCVN. If what was decrypted is not of that size the front needs
|
/external/chromium_org/crypto/ |
encryptor_unittest.cc | 32 std::string decrypted; local 33 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decrypted)); 35 EXPECT_EQ(plaintext, decrypted); 87 std::string decrypted; local 98 EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decrypted)); 106 EXPECT_TRUE(decryptor2.Decrypt(ciphertext, &decrypted)); 112 EXPECT_FALSE(decryptor3.Decrypt(ciphertext, &decrypted)); 208 std::string decrypted; local 210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decrypted)); 212 EXPECT_EQ(plaintext_str, decrypted); 239 std::string decrypted; local 299 std::string decrypted; local 425 std::string decrypted; local 454 std::string decrypted; local 480 std::string decrypted; local [all...] |
/external/chromium_org/media/filters/ |
decrypting_demuxer_stream.cc | 250 scoped_refptr<DecoderBuffer> decrypted = DecoderBuffer::CopyFrom( local 252 decrypted->set_timestamp(buffer->timestamp()); 253 decrypted->set_duration(buffer->duration()); 255 base::ResetAndReturn(&read_cb_).Run(kOk, decrypted);
|
video_frame_stream_unittest.cc | 112 scoped_refptr<DecoderBuffer> decrypted = DecoderBuffer::CopyFrom( local 114 decrypted->set_timestamp(encrypted->timestamp()); 115 decrypted->set_duration(encrypted->duration()); 116 decrypt_cb.Run(Decryptor::kSuccess, decrypted);
|
/external/openssh/ |
ssh-rsa.c | 216 u_char *decrypted = NULL; local 242 decrypted = xmalloc(rsasize); 243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen); 253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 265 if (decrypted) 266 xfree(decrypted);
|
authfile.c | 421 Buffer decrypted; local 469 /* Initialize space for decrypted data. */ 470 buffer_init(&decrypted); 471 cp = buffer_append_space(&decrypted, buffer_len(©)); 482 check1 = buffer_get_char(&decrypted); 483 check2 = buffer_get_char(&decrypted); 484 if (check1 != buffer_get_char(&decrypted) || 485 check2 != buffer_get_char(&decrypted)) { 489 buffer_free(&decrypted); 493 buffer_get_bignum(&decrypted, prv->rsa->d) [all...] |
/external/chromium_org/media/cdm/ |
aes_decryptor.cc | 123 // Decrypts |input| using |key|. Returns a DecoderBuffer with the decrypted 150 DCHECK_GT(sample_size, 0U) << "No sample data to be decrypted."; 197 // copy the decrypted bytes over the encrypted bytes in the output. 333 scoped_refptr<DecoderBuffer> decrypted; local 337 decrypted = DecoderBuffer::CopyFrom(encrypted->data() + data_offset, 349 decrypted = DecryptData(*encrypted.get(), decryption_key); 350 if (!decrypted.get()) { 357 decrypted->set_timestamp(encrypted->timestamp()); 358 decrypted->set_duration(encrypted->duration()); 359 decrypt_cb.Run(kSuccess, decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 939 u8 *decrypted; local 946 decrypted = os_malloc(encr_data_len); 947 if (decrypted == NULL) 949 os_memcpy(decrypted, encr_data, encr_data_len); 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 952 os_free(decrypted); 955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 956 decrypted, encr_data_len); 958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 498 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 557 decrypted = os_malloc(decrypted_len); 558 if (decrypted == NULL) 562 decrypted, decrypted_len) < 0) { 563 os_free(decrypted); 567 pad_len = decrypted[decrypted_len - 1]; 571 os_free(decrypted); 578 return decrypted;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 334 u8 *decrypted, nonce[16]; local 374 decrypted = os_malloc(left); 375 if (decrypted == NULL) 377 os_memcpy(decrypted, pos, left); 380 wpabuf_head(respData), 22, decrypted, left, 383 os_free(decrypted); 387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 388 decrypted, left); 391 switch (decrypted[0] >> 6) { 405 os_free(decrypted); [all...] |