HomeSort by relevance Sort by last modified time
    Searched defs:decrypted (Results 1 - 25 of 35) sorted by null

1 2

  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherWrapThread.java 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local
44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes());
45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
CipherPBEThread.java 37 byte[] decrypted = new byte[128];
56 cip.doFinal(output, 0, outputSize, decrypted);
58 checkEncodedData(getData().getBytes(), decrypted); local
CipherSymmetricKeyThread.java 36 byte[] decrypted = new byte[128];
62 cip.doFinal(output, 0, outputSize, decrypted);
68 cip.doFinal(output, 0, outputSize, decrypted);
71 checkEncodedData(getData().getBytes(), decrypted); local
  /external/chromium/crypto/
encryptor_unittest.cc 230 std::string decrypted; local
231 EXPECT_FALSE(encryptor.Decrypt("", &decrypted));
232 EXPECT_EQ("", decrypted);
  /external/libvpx/libvpx/vp8/decoder/
dboolhuff.c 47 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local
50 size_t n = bytes_left > sizeof(decrypted) ? sizeof(decrypted) : bytes_left;
51 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n);
52 bufptr = decrypted;
  /external/chromium/chrome/browser/sync/util/
nigori_unittest.cc 90 std::string decrypted; local
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
93 EXPECT_EQ(plaintext, decrypted);
108 std::string decrypted; local
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
111 EXPECT_NE(plaintext, decrypted);
127 std::string decrypted; local
128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted));
130 EXPECT_NE(plaintext, decrypted);
cryptographer_unittest.cc 57 sync_pb::PasswordSpecificsData decrypted; local
58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
133 sync_pb::PasswordSpecificsData decrypted; local
134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
  /external/chromium_org/sync/util/
cryptographer_unittest.cc 75 sync_pb::PasswordSpecificsData decrypted; local
76 EXPECT_TRUE(cryptographer_.Decrypt(encrypted, &decrypted));
78 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
104 sync_pb::PasswordSpecificsData decrypted; local
105 EXPECT_TRUE(cryptographer_.Decrypt(encrypted2, &decrypted));
109 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
180 sync_pb::PasswordSpecificsData decrypted; local
181 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
182 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
nigori_unittest.cc 90 std::string decrypted; local
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
93 EXPECT_EQ(plaintext, decrypted);
108 std::string decrypted; local
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
111 EXPECT_NE(plaintext, decrypted);
127 std::string decrypted; local
128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted));
130 EXPECT_NE(plaintext, decrypted);
  /libcore/support/src/test/java/tests/security/
AlgorithmParameterAsymmetricHelper.java 90 byte[] decrypted = null;
92 decrypted = cipher.doFinal(bs);
99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
AlgorithmParameterSymmetricHelper.java 103 byte[] decrypted = null;
105 decrypted = cipher.doFinal(bs);
112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
  /external/chromium_org/chrome/browser/extensions/api/networking_private/
networking_private_crypto.cc 225 SECStatus decrypted = local
233 if (decrypted != SECSuccess) {
networking_private_crypto_unittest.cc 20 std::string decrypted; local
21 if (crypto.DecryptByteString(private_key_pem, encrypted, &decrypted))
22 return decrypted == plain;
  /external/chromium_org/sync/syncable/
entry_kernel.cc 91 sync_pb::EntitySpecifics decrypted; local
96 cryptographer->Decrypt(encrypted, &decrypted)) {
97 value = EntitySpecificsToValue(decrypted);
  /external/chromium_org/components/autofill/content/browser/wallet/
full_wallet.cc 286 // There is no uint8* to int64 so convert the decrypted data to hex and then
290 int64 decrypted; local
291 if (!base::HexStringToInt64(hex_decrypted, &decrypted)) {
292 DLOG(ERROR) << "Failed to parse decrypted data in hex to int64";
295 std::string card_info = base::Int64ToString(decrypted);
299 // PANPANPANPCVN. If what was decrypted is not of that size the front needs
  /external/chromium_org/crypto/
encryptor_unittest.cc 32 std::string decrypted; local
33 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decrypted));
35 EXPECT_EQ(plaintext, decrypted);
87 std::string decrypted; local
98 EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decrypted));
106 EXPECT_TRUE(decryptor2.Decrypt(ciphertext, &decrypted));
112 EXPECT_FALSE(decryptor3.Decrypt(ciphertext, &decrypted));
208 std::string decrypted; local
210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decrypted));
212 EXPECT_EQ(plaintext_str, decrypted);
239 std::string decrypted; local
299 std::string decrypted; local
425 std::string decrypted; local
454 std::string decrypted; local
480 std::string decrypted; local
    [all...]
  /external/chromium_org/media/filters/
decrypting_demuxer_stream.cc 250 scoped_refptr<DecoderBuffer> decrypted = DecoderBuffer::CopyFrom( local
252 decrypted->set_timestamp(buffer->timestamp());
253 decrypted->set_duration(buffer->duration());
255 base::ResetAndReturn(&read_cb_).Run(kOk, decrypted);
video_frame_stream_unittest.cc 112 scoped_refptr<DecoderBuffer> decrypted = DecoderBuffer::CopyFrom( local
114 decrypted->set_timestamp(encrypted->timestamp());
115 decrypted->set_duration(encrypted->duration());
116 decrypt_cb.Run(Decryptor::kSuccess, decrypted);
  /external/openssh/
ssh-rsa.c 216 u_char *decrypted = NULL; local
242 decrypted = xmalloc(rsasize);
243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen);
253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
265 if (decrypted)
266 xfree(decrypted);
authfile.c 421 Buffer decrypted; local
469 /* Initialize space for decrypted data. */
470 buffer_init(&decrypted);
471 cp = buffer_append_space(&decrypted, buffer_len(&copy));
482 check1 = buffer_get_char(&decrypted);
483 check2 = buffer_get_char(&decrypted);
484 if (check1 != buffer_get_char(&decrypted) ||
485 check2 != buffer_get_char(&decrypted)) {
489 buffer_free(&decrypted);
493 buffer_get_bignum(&decrypted, prv->rsa->d)
    [all...]
  /external/chromium_org/media/cdm/
aes_decryptor.cc 123 // Decrypts |input| using |key|. Returns a DecoderBuffer with the decrypted
150 DCHECK_GT(sample_size, 0U) << "No sample data to be decrypted.";
197 // copy the decrypted bytes over the encrypted bytes in the output.
333 scoped_refptr<DecoderBuffer> decrypted; local
337 decrypted = DecoderBuffer::CopyFrom(encrypted->data() + data_offset,
349 decrypted = DecryptData(*encrypted.get(), decryption_key);
350 if (!decrypted.get()) {
357 decrypted->set_timestamp(encrypted->timestamp());
358 decrypted->set_duration(encrypted->duration());
359 decrypt_cb.Run(kSuccess, decrypted);
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 939 u8 *decrypted; local
946 decrypted = os_malloc(encr_data_len);
947 if (decrypted == NULL)
949 os_memcpy(decrypted, encr_data, encr_data_len);
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
952 os_free(decrypted);
955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
956 decrypted, encr_data_len);
958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 498 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
557 decrypted = os_malloc(decrypted_len);
558 if (decrypted == NULL)
562 decrypted, decrypted_len) < 0) {
563 os_free(decrypted);
567 pad_len = decrypted[decrypted_len - 1];
571 os_free(decrypted);
578 return decrypted;
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
276 decrypted = os_malloc(left);
277 if (decrypted == NULL) {
282 os_memcpy(decrypted, msg, left);
287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
290 os_free(decrypted);
293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
294 decrypted, left);
297 switch (decrypted[0] >> 6) {
314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 334 u8 *decrypted, nonce[16]; local
374 decrypted = os_malloc(left);
375 if (decrypted == NULL)
377 os_memcpy(decrypted, pos, left);
380 wpabuf_head(respData), 22, decrypted, left,
383 os_free(decrypted);
387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
388 decrypted, left);
391 switch (decrypted[0] >> 6) {
405 os_free(decrypted);
    [all...]

Completed in 2456 milliseconds

1 2