HomeSort by relevance Sort by last modified time
    Searched defs:decrypted (Results 1 - 25 of 26) sorted by null

1 2

  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherWrapThread.java 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local
44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes());
45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
CipherPBEThread.java 37 byte[] decrypted = new byte[128];
56 cip.doFinal(output, 0, outputSize, decrypted);
58 checkEncodedData(getData().getBytes(), decrypted); local
CipherSymmetricKeyThread.java 36 byte[] decrypted = new byte[128];
62 cip.doFinal(output, 0, outputSize, decrypted);
68 cip.doFinal(output, 0, outputSize, decrypted);
71 checkEncodedData(getData().getBytes(), decrypted); local
  /external/libvpx/libvpx/vp8/decoder/
dboolhuff.c 48 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local
51 size_t n = MIN(sizeof(decrypted), bytes_left);
52 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n);
53 bufptr = decrypted;
  /hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/decoder/
dboolhuff.c 47 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local
50 size_t n = bytes_left > sizeof(decrypted) ? sizeof(decrypted) : bytes_left;
51 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n);
52 bufptr = decrypted;
  /external/wpa_supplicant_8/src/tls/
pkcs1.c 202 u8 *decrypted; local
208 decrypted = os_malloc(s_len);
209 if (decrypted == NULL)
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
216 os_free(decrypted);
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
240 os_free(decrypted);
261 os_free(decrypted);
    [all...]
tlsv1_common.c 404 const u8 *decrypted; local
444 decrypted = buf;
446 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
447 decrypted, buflen);
470 decrypted = buf + 19;
482 os_memcmp_const(decrypted, data, data_len) != 0) {
  /frameworks/av/drm/mediadrm/plugins/clearkey/tests/
AesCtrDecryptorUnittest.cpp 47 const uint8_t* decrypted,
56 EXPECT_EQ(0, memcmp(outputBuffer, decrypted, totalSize));
86 uint8_t decrypted[kTotalSize] = { local
101 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
131 uint8_t decrypted[kTotalSize] = { local
147 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
177 uint8_t decrypted[kTotalSize] = { local
193 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
226 uint8_t decrypted[kTotalSize] = { local
242 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
278 uint8_t decrypted[kTotalSize] = { local
333 uint8_t decrypted[kTotalSize] = { local
396 uint8_t decrypted[kTotalSize] = { local
    [all...]
  /libcore/support/src/test/java/tests/security/
AlgorithmParameterAsymmetricHelper.java 90 byte[] decrypted = null;
92 decrypted = cipher.doFinal(bs);
99 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
AlgorithmParameterSymmetricHelper.java 103 byte[] decrypted = null;
105 decrypted = cipher.doFinal(bs);
112 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
  /external/openssh/
ssh-rsa.c 219 u_char *decrypted = NULL; local
241 if ((decrypted = malloc(rsasize)) == NULL) {
245 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
254 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
255 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
262 if (decrypted) {
263 explicit_bzero(decrypted, rsasize);
264 free(decrypted);
sshkey.c 3206 struct sshbuf *kdf = NULL, *decrypted = NULL; local
3674 struct sshbuf *decrypted = NULL, *copy = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 939 u8 *decrypted; local
946 decrypted = os_malloc(encr_data_len);
947 if (decrypted == NULL)
949 os_memcpy(decrypted, encr_data, encr_data_len);
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
952 os_free(decrypted);
955 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
956 decrypted, encr_data_len);
958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr
    [all...]
ikev2_common.c 437 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
496 decrypted = os_malloc(decrypted_len);
497 if (decrypted == NULL)
501 decrypted, decrypted_len) < 0) {
502 os_free(decrypted);
506 pad_len = decrypted[decrypted_len - 1];
510 os_free(decrypted);
517 return decrypted;
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
276 decrypted = os_malloc(left);
277 if (decrypted == NULL) {
282 os_memcpy(decrypted, msg, left);
287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
290 os_free(decrypted);
293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
294 decrypted, left);
297 switch (decrypted[0] >> 6) {
314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1
    [all...]
ikev2.c 628 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
632 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
650 u8 *decrypted; local
654 decrypted = ikev2_decrypt_payload(data->proposal.encr,
658 if (decrypted == NULL)
662 decrypted, decrypted_len);
663 os_free(decrypted);
eap_sim.c 790 u8 *decrypted; local
791 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
794 if (decrypted == NULL) {
799 os_free(decrypted);
824 u8 *decrypted; local
832 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
835 if (decrypted == NULL) {
845 os_free(decrypted);
849 os_free(decrypted);
922 u8 *decrypted; local
    [all...]
eap_aka.c 1028 u8 *decrypted; local
1029 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1032 if (decrypted == NULL) {
1037 os_free(decrypted);
1062 u8 *decrypted; local
1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1073 if (decrypted == NULL) {
1083 os_free(decrypted);
1087 os_free(decrypted);
1159 u8 *decrypted; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 334 u8 *decrypted, nonce[16]; local
374 decrypted = os_malloc(left);
375 if (decrypted == NULL)
377 os_memcpy(decrypted, pos, left);
380 wpabuf_head(respData), 22, decrypted, left,
383 os_free(decrypted);
387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
388 decrypted, left);
391 switch (decrypted[0] >> 6) {
405 os_free(decrypted);
    [all...]
eap_server_sim.c 609 u8 *decrypted = NULL; local
625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
628 if (decrypted == NULL) {
640 os_free(decrypted);
641 decrypted = NULL;
679 os_free(decrypted);
ikev2.c 451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
716 u8 *decrypted; local
    [all...]
eap_server_aka.c 1053 u8 *decrypted = NULL; local
1071 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1074 if (decrypted == NULL) {
1086 os_free(decrypted);
1087 decrypted = NULL;
1137 os_free(decrypted);
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 990 struct wpabuf *decrypted; local
993 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
995 if (decrypted == NULL) {
1002 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
1004 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1005 wps_process_key_wrap_auth(wps, decrypted,
1009 wpabuf_free(decrypted);
1013 wpabuf_free(decrypted);
1084 struct wpabuf *decrypted; local
1104 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings
1139 struct wpabuf *decrypted; local
1196 struct wpabuf *decrypted; local
    [all...]
wps_common.c 155 struct wpabuf *decrypted; local
168 decrypted = wpabuf_alloc(encr_len - block_size);
169 if (decrypted == NULL)
173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
175 wpabuf_len(decrypted))) {
176 wpabuf_free(decrypted);
180 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
181 decrypted);
183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_registrar.c 2720 struct wpabuf *decrypted; local
2871 struct wpabuf *decrypted; local
    [all...]

Completed in 1146 milliseconds

1 2