/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 152 struct wpabuf *decrypted; local 165 decrypted = wpabuf_alloc(encr_len - block_size); 166 if (decrypted == NULL) 170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 172 wpabuf_len(decrypted))) { 173 wpabuf_free(decrypted); 177 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 178 decrypted); 180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
wps_enrollee.c | 990 struct wpabuf *decrypted; local 1010 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 1012 if (decrypted == NULL) { 1013 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 1019 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) { 1020 wpabuf_free(decrypted); 1025 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 1027 if (wps_parse_msg(decrypted, &eattr) < 0 || 1028 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 1030 wpabuf_free(decrypted); 1045 struct wpabuf *decrypted; local 1102 struct wpabuf *decrypted; local [all...] |
wps_registrar.c | 2647 struct wpabuf *decrypted; local 2798 struct wpabuf *decrypted; local [all...] |
/external/chromium_org/media/cdm/ |
aes_decryptor_unittest.cc | 284 scoped_refptr<DecoderBuffer> decrypted; local 291 .WillOnce(SaveArg<1>(&decrypted)); 295 .WillOnce(SaveArg<1>(&decrypted)); 299 .WillOnce(SaveArg<1>(&decrypted)); 306 if (decrypted && decrypted->data_size()) { 308 decrypted->data(), decrypted->data() + decrypted->data_size());
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 662 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 666 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 684 u8 *decrypted; local 688 decrypted = ikev2_decrypt_payload(data->proposal.encr, 692 if (decrypted == NULL) 696 decrypted, decrypted_len); 697 os_free(decrypted); [all...] |
eap_sim.c | 688 u8 *decrypted; local 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 692 if (decrypted == NULL) { 697 os_free(decrypted); 722 u8 *decrypted; local 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 733 if (decrypted == NULL) { 743 os_free(decrypted); 747 os_free(decrypted); 820 u8 *decrypted; local [all...] |
eap_aka.c | 919 u8 *decrypted; local 920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 923 if (decrypted == NULL) { 928 os_free(decrypted); 953 u8 *decrypted; local 961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 964 if (decrypted == NULL) { 974 os_free(decrypted); 978 os_free(decrypted); 1050 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 609 u8 *decrypted = NULL; local 625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 628 if (decrypted == NULL) { 640 os_free(decrypted); 641 decrypted = NULL; 679 os_free(decrypted);
|
ikev2.c | 451 u8 *decrypted; local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, 460 if (decrypted == NULL) 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 466 decrypted + decrypted_len) < 0) { 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 475 os_free(decrypted); 694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 716 u8 *decrypted; local [all...] |
eap_server_aka.c | 1052 u8 *decrypted = NULL; local 1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1073 if (decrypted == NULL) { 1085 os_free(decrypted); 1086 decrypted = NULL; 1136 os_free(decrypted); [all...] |