/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherWrapThread.java | 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local 44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes()); 45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
|
CipherPBEThread.java | 37 byte[] decrypted = new byte[128]; 56 cip.doFinal(output, 0, outputSize, decrypted); 58 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherSymmetricKeyThread.java | 36 byte[] decrypted = new byte[128]; 62 cip.doFinal(output, 0, outputSize, decrypted); 68 cip.doFinal(output, 0, outputSize, decrypted); 71 checkEncodedData(getData().getBytes(), decrypted); local
|
/external/libvpx/libvpx/vp8/decoder/ |
dboolhuff.c | 48 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local 51 size_t n = MIN(sizeof(decrypted), bytes_left); 52 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); 53 bufptr = decrypted;
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/decoder/ |
dboolhuff.c | 47 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local 50 size_t n = bytes_left > sizeof(decrypted) ? sizeof(decrypted) : bytes_left; 51 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); 52 bufptr = decrypted;
|
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); [all...] |
tlsv1_common.c | 404 const u8 *decrypted; local 444 decrypted = buf; 446 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature", 447 decrypted, buflen); 470 decrypted = buf + 19; 482 os_memcmp_const(decrypted, data, data_len) != 0) {
|
/frameworks/av/drm/mediadrm/plugins/clearkey/tests/ |
AesCtrDecryptorUnittest.cpp | 47 const uint8_t* decrypted, 56 EXPECT_EQ(0, memcmp(outputBuffer, decrypted, totalSize)); 86 uint8_t decrypted[kTotalSize] = { local 101 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 131 uint8_t decrypted[kTotalSize] = { local 147 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 177 uint8_t decrypted[kTotalSize] = { local 193 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 226 uint8_t decrypted[kTotalSize] = { local 242 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 278 uint8_t decrypted[kTotalSize] = { local 333 uint8_t decrypted[kTotalSize] = { local 396 uint8_t decrypted[kTotalSize] = { local [all...] |
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterAsymmetricHelper.java | 90 byte[] decrypted = null; 92 decrypted = cipher.doFinal(bs); 99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
AlgorithmParameterSymmetricHelper.java | 103 byte[] decrypted = null; 105 decrypted = cipher.doFinal(bs); 112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
/external/openssh/ |
ssh-rsa.c | 219 u_char *decrypted = NULL; local 241 if ((decrypted = malloc(rsasize)) == NULL) { 245 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 254 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 255 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 262 if (decrypted) { 263 explicit_bzero(decrypted, rsasize); 264 free(decrypted);
|
sshkey.c | 3206 struct sshbuf *kdf = NULL, *decrypted = NULL; local 3674 struct sshbuf *decrypted = NULL, *copy = NULL; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 939 u8 *decrypted; local 946 decrypted = os_malloc(encr_data_len); 947 if (decrypted == NULL) 949 os_memcpy(decrypted, encr_data, encr_data_len); 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 952 os_free(decrypted); 955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 956 decrypted, encr_data_len); 958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr [all...] |
ikev2_common.c | 437 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 496 decrypted = os_malloc(decrypted_len); 497 if (decrypted == NULL) 501 decrypted, decrypted_len) < 0) { 502 os_free(decrypted); 506 pad_len = decrypted[decrypted_len - 1]; 510 os_free(decrypted); 517 return decrypted;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1 [all...] |
ikev2.c | 628 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 632 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 650 u8 *decrypted; local 654 decrypted = ikev2_decrypt_payload(data->proposal.encr, 658 if (decrypted == NULL) 662 decrypted, decrypted_len); 663 os_free(decrypted);
|
eap_sim.c | 790 u8 *decrypted; local 791 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 794 if (decrypted == NULL) { 799 os_free(decrypted); 824 u8 *decrypted; local 832 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 835 if (decrypted == NULL) { 845 os_free(decrypted); 849 os_free(decrypted); 922 u8 *decrypted; local [all...] |
eap_aka.c | 1028 u8 *decrypted; local 1029 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1032 if (decrypted == NULL) { 1037 os_free(decrypted); 1062 u8 *decrypted; local 1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1073 if (decrypted == NULL) { 1083 os_free(decrypted); 1087 os_free(decrypted); 1159 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 334 u8 *decrypted, nonce[16]; local 374 decrypted = os_malloc(left); 375 if (decrypted == NULL) 377 os_memcpy(decrypted, pos, left); 380 wpabuf_head(respData), 22, decrypted, left, 383 os_free(decrypted); 387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 388 decrypted, left); 391 switch (decrypted[0] >> 6) { 405 os_free(decrypted); [all...] |
eap_server_sim.c | 609 u8 *decrypted = NULL; local 625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 628 if (decrypted == NULL) { 640 os_free(decrypted); 641 decrypted = NULL; 679 os_free(decrypted);
|
ikev2.c | 451 u8 *decrypted; local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, 460 if (decrypted == NULL) 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 466 decrypted + decrypted_len) < 0) { 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 475 os_free(decrypted); 694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 716 u8 *decrypted; local [all...] |
eap_server_aka.c | 1053 u8 *decrypted = NULL; local 1071 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1074 if (decrypted == NULL) { 1086 os_free(decrypted); 1087 decrypted = NULL; 1137 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 990 struct wpabuf *decrypted; local 993 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 995 if (decrypted == NULL) { 1002 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1004 if (wps_parse_msg(decrypted, &eattr) < 0 || 1005 wps_process_key_wrap_auth(wps, decrypted, 1009 wpabuf_free(decrypted); 1013 wpabuf_free(decrypted); 1084 struct wpabuf *decrypted; local 1104 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings 1139 struct wpabuf *decrypted; local 1196 struct wpabuf *decrypted; local [all...] |
wps_common.c | 155 struct wpabuf *decrypted; local 168 decrypted = wpabuf_alloc(encr_len - block_size); 169 if (decrypted == NULL) 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 175 wpabuf_len(decrypted))) { 176 wpabuf_free(decrypted); 180 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 181 decrypted); 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
wps_registrar.c | 2720 struct wpabuf *decrypted; local 2871 struct wpabuf *decrypted; local [all...] |