HomeSort by relevance Sort by last modified time
    Searched defs:decrypted (Results 26 - 35 of 35) sorted by null

12

  /external/wpa_supplicant_8/src/wps/
wps_common.c 152 struct wpabuf *decrypted; local
165 decrypted = wpabuf_alloc(encr_len - block_size);
166 if (decrypted == NULL)
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
172 wpabuf_len(decrypted))) {
173 wpabuf_free(decrypted);
177 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
178 decrypted);
180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_enrollee.c 990 struct wpabuf *decrypted; local
1010 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
1012 if (decrypted == NULL) {
1013 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
1019 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) {
1020 wpabuf_free(decrypted);
1025 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
1027 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1028 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
1030 wpabuf_free(decrypted);
1045 struct wpabuf *decrypted; local
1102 struct wpabuf *decrypted; local
    [all...]
wps_registrar.c 2647 struct wpabuf *decrypted; local
2798 struct wpabuf *decrypted; local
    [all...]
  /external/chromium_org/media/cdm/
aes_decryptor_unittest.cc 284 scoped_refptr<DecoderBuffer> decrypted; local
291 .WillOnce(SaveArg<1>(&decrypted));
295 .WillOnce(SaveArg<1>(&decrypted));
299 .WillOnce(SaveArg<1>(&decrypted));
306 if (decrypted && decrypted->data_size()) {
308 decrypted->data(), decrypted->data() + decrypted->data_size());
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 662 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
666 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
684 u8 *decrypted; local
688 decrypted = ikev2_decrypt_payload(data->proposal.encr,
692 if (decrypted == NULL)
696 decrypted, decrypted_len);
697 os_free(decrypted);
    [all...]
eap_sim.c 688 u8 *decrypted; local
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
692 if (decrypted == NULL) {
697 os_free(decrypted);
722 u8 *decrypted; local
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
733 if (decrypted == NULL) {
743 os_free(decrypted);
747 os_free(decrypted);
820 u8 *decrypted; local
    [all...]
eap_aka.c 919 u8 *decrypted; local
920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
923 if (decrypted == NULL) {
928 os_free(decrypted);
953 u8 *decrypted; local
961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
964 if (decrypted == NULL) {
974 os_free(decrypted);
978 os_free(decrypted);
1050 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 609 u8 *decrypted = NULL; local
625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
628 if (decrypted == NULL) {
640 os_free(decrypted);
641 decrypted = NULL;
679 os_free(decrypted);
ikev2.c 451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
716 u8 *decrypted; local
    [all...]
eap_server_aka.c 1052 u8 *decrypted = NULL; local
1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1073 if (decrypted == NULL) {
1085 os_free(decrypted);
1086 decrypted = NULL;
1136 os_free(decrypted);
    [all...]

Completed in 604 milliseconds

12