/device/google/wahoo/ |
init.ramoops.sh | 14 setprop sys.ramoops.decrypted true
|
/external/libvpx/libvpx/vp8/decoder/ |
dboolhuff.c | 43 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local 46 size_t n = VPXMIN(sizeof(decrypted), bytes_left); 47 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); 48 bufptr = decrypted;
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSAThread.java | 33 byte[] decrypted = new byte[256]; 46 cip.doFinal(output, 0, outputSize, decrypted); 49 checkPaddedEncodedData(input, decrypted, outputSize - input.length); 51 checkEncodedData(input, decrypted);
|
CipherSymmetricKeyThread.java | 36 byte[] decrypted = new byte[128]; 62 cip.doFinal(output, 0, outputSize, decrypted); 68 cip.doFinal(output, 0, outputSize, decrypted); 71 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherPBEThread.java | 37 byte[] decrypted = new byte[128]; 56 cip.doFinal(output, 0, outputSize, decrypted); 58 checkEncodedData(getData().getBytes(), decrypted); local
|
CipherWrapThread.java | 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local 44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes()); 45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
|
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); [all...] |
tlsv1_common.c | 420 const u8 *decrypted; local 460 decrypted = buf; 462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature", 463 decrypted, buflen); 486 decrypted = buf + 19; 493 decrypted = buf + 19; 500 decrypted = buf + 19; 513 os_memcmp_const(decrypted, data, data_len) != 0) {
|
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterAsymmetricHelper.java | 52 byte[] decrypted = cipher.doFinal(bs); 53 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
AlgorithmParameterSymmetricHelper.java | 66 byte[] decrypted = cipher.doFinal(bs); 68 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
|
CipherHelper.java | 48 byte[] decrypted = cipher.doFinal(encrypted); 49 String decryptedString = new String(decrypted);
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 992 struct wpabuf *decrypted; local 995 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 997 if (decrypted == NULL) { 1004 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1006 if (wps_parse_msg(decrypted, &eattr) < 0 || 1007 wps_process_key_wrap_auth(wps, decrypted, 1011 wpabuf_clear_free(decrypted); 1015 wpabuf_clear_free(decrypted); 1086 struct wpabuf *decrypted; local 1106 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings 1141 struct wpabuf *decrypted; local 1198 struct wpabuf *decrypted; local [all...] |
wps_common.c | 158 struct wpabuf *decrypted; local 171 decrypted = wpabuf_alloc(encr_len - block_size); 172 if (decrypted == NULL) 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 178 wpabuf_len(decrypted))) { 179 wpabuf_clear_free(decrypted); 183 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 184 decrypted); 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
AesGcmTest.java | 238 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); local 240 cipher.doFinal(ctBuffer, decrypted); 241 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted)); 262 ByteBuffer decrypted = ByteBuffer.wrap(backingArray); local 266 cipher.doFinal(ctBuffer, decrypted); 267 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted)); 288 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); local 290 cipher.doFinal(ctBuffer, decrypted); 291 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted)); 347 ByteBuffer decrypted = ByteBuffer.allocate(test.pt.length - 1) local [all...] |
CipherOutputStreamTest.java | 144 byte[] decrypted = os.toByteArray(); 148 if (decrypted.length > 0) { 150 "this should fail; decrypted:" 151 + TestUtil.bytesToHex(decrypted) 175 byte[] decrypted = os.toByteArray(); 177 "this should fail; decrypted:" 178 + TestUtil.bytesToHex(decrypted)
|
EciesTest.java | 86 byte[] decrypted = ecies.doFinal(ciphertext); 87 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted)); 185 fail("Decrypted:" + TestUtil.bytesToHex(corrupt)); 289 byte[] decrypted = eciesB.doFinal(ciphertext); 290 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted)); 331 byte[] decrypted = ecies.doFinal(backingArray, 0, ctBuffer.remaining()); 332 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted));
|
DhiesTest.java | 98 byte[] decrypted = dhies.doFinal(ciphertext); 99 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted));
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local 275 decrypted = os_memdup(msg, left); 276 if (decrypted == NULL) { 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 291 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 318 os_free(decrypted); [all...] |
/external/fonttools/Lib/fontTools/ |
t1Lib.py | 298 decrypted, R = eexec.decrypt(chunk, 55665) 299 decrypted = decrypted[4:] 300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \ 301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND: 303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r' 304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
AesCtrDecryptorUnittest.cpp | 47 const uint8_t* decrypted, 56 EXPECT_EQ(0, memcmp(outputBuffer, decrypted, totalSize)); 147 uint8_t decrypted[kTotalSize] = { local 162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 192 uint8_t decrypted[kTotalSize] = { local 208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 238 uint8_t decrypted[kTotalSize] = { local 254 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 287 uint8_t decrypted[kTotalSize] = { local 303 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted, 339 uint8_t decrypted[kTotalSize] = { local 394 uint8_t decrypted[kTotalSize] = { local 457 uint8_t decrypted[kTotalSize] = { local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 495 decrypted = os_malloc(decrypted_len); 496 if (decrypted == NULL) 500 decrypted, decrypted_len) < 0) { 501 os_free(decrypted); 505 pad_len = decrypted[decrypted_len - 1]; 509 os_free(decrypted); 516 return decrypted;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 333 u8 *decrypted, nonce[16]; local 373 decrypted = os_memdup(pos, left); 374 if (decrypted == NULL) 378 wpabuf_head(respData), 22, decrypted, left, 381 os_free(decrypted); 385 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 386 decrypted, left); 389 switch (decrypted[0] >> 6) { 403 os_free(decrypted);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
SecureBoxTest.java | 207 byte[] decrypted = 210 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); 218 byte[] decrypted = 220 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); 228 byte[] decrypted = 230 assertThat(decrypted).isEqualTo(TEST_PAYLOAD); 238 byte[] decrypted = 244 assertThat(decrypted.length).isEqualTo(0);
|
/libcore/luni/src/test/java/libcore/javax/crypto/spec/ |
AlgorithmParametersTestPBES2.java | 218 byte[] decrypted = c.doFinal(encrypted); 221 Arrays.toString(decrypted));
|
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 123 # Verify the digest by outputing the decrypted result in ASN.1 structure. 124 decrypted_file = common.MakeTempFile(prefix='decrypted-')
|