HomeSort by relevance Sort by last modified time
    Searched refs:decrypted (Results 1 - 25 of 63) sorted by null

1 2 3

  /device/google/wahoo/
init.ramoops.sh 14 setprop sys.ramoops.decrypted true
  /external/libvpx/libvpx/vp8/decoder/
dboolhuff.c 43 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local
46 size_t n = VPXMIN(sizeof(decrypted), bytes_left);
47 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n);
48 bufptr = decrypted;
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherRSAThread.java 33 byte[] decrypted = new byte[256];
46 cip.doFinal(output, 0, outputSize, decrypted);
49 checkPaddedEncodedData(input, decrypted, outputSize - input.length);
51 checkEncodedData(input, decrypted);
CipherSymmetricKeyThread.java 36 byte[] decrypted = new byte[128];
62 cip.doFinal(output, 0, outputSize, decrypted);
68 cip.doFinal(output, 0, outputSize, decrypted);
71 checkEncodedData(getData().getBytes(), decrypted); local
CipherPBEThread.java 37 byte[] decrypted = new byte[128];
56 cip.doFinal(output, 0, outputSize, decrypted);
58 checkEncodedData(getData().getBytes(), decrypted); local
CipherWrapThread.java 42 Key decrypted = cip.unwrap(output, getAlgName(), Cipher.SECRET_KEY); local
44 checkEncodedData(key.getFormat().getBytes(), decrypted.getFormat().getBytes());
45 checkEncodedData(key.getEncoded(), decrypted.getEncoded());
  /external/wpa_supplicant_8/src/tls/
pkcs1.c 202 u8 *decrypted; local
208 decrypted = os_malloc(s_len);
209 if (decrypted == NULL)
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
216 os_free(decrypted);
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
240 os_free(decrypted);
261 os_free(decrypted);
    [all...]
tlsv1_common.c 420 const u8 *decrypted; local
460 decrypted = buf;
462 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
463 decrypted, buflen);
486 decrypted = buf + 19;
493 decrypted = buf + 19;
500 decrypted = buf + 19;
513 os_memcmp_const(decrypted, data, data_len) != 0) {
  /libcore/support/src/test/java/tests/security/
AlgorithmParameterAsymmetricHelper.java 52 byte[] decrypted = cipher.doFinal(bs);
53 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
AlgorithmParameterSymmetricHelper.java 66 byte[] decrypted = cipher.doFinal(bs);
68 Assert.assertTrue(Arrays.equals(plainData.getBytes(), decrypted)); local
CipherHelper.java 48 byte[] decrypted = cipher.doFinal(encrypted);
49 String decryptedString = new String(decrypted);
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 992 struct wpabuf *decrypted; local
995 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
997 if (decrypted == NULL) {
1004 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
1006 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1007 wps_process_key_wrap_auth(wps, decrypted,
1011 wpabuf_clear_free(decrypted);
1015 wpabuf_clear_free(decrypted);
1086 struct wpabuf *decrypted; local
1106 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings
1141 struct wpabuf *decrypted; local
1198 struct wpabuf *decrypted; local
    [all...]
wps_common.c 158 struct wpabuf *decrypted; local
171 decrypted = wpabuf_alloc(encr_len - block_size);
172 if (decrypted == NULL)
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
178 wpabuf_len(decrypted))) {
179 wpabuf_clear_free(decrypted);
183 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
184 decrypted);
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
AesGcmTest.java 238 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); local
240 cipher.doFinal(ctBuffer, decrypted);
241 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted));
262 ByteBuffer decrypted = ByteBuffer.wrap(backingArray); local
266 cipher.doFinal(ctBuffer, decrypted);
267 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted));
288 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); local
290 cipher.doFinal(ctBuffer, decrypted);
291 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted));
347 ByteBuffer decrypted = ByteBuffer.allocate(test.pt.length - 1) local
    [all...]
CipherOutputStreamTest.java 144 byte[] decrypted = os.toByteArray();
148 if (decrypted.length > 0) {
150 "this should fail; decrypted:"
151 + TestUtil.bytesToHex(decrypted)
175 byte[] decrypted = os.toByteArray();
177 "this should fail; decrypted:"
178 + TestUtil.bytesToHex(decrypted)
EciesTest.java 86 byte[] decrypted = ecies.doFinal(ciphertext);
87 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted));
185 fail("Decrypted:" + TestUtil.bytesToHex(corrupt));
289 byte[] decrypted = eciesB.doFinal(ciphertext);
290 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted));
331 byte[] decrypted = ecies.doFinal(backingArray, 0, ctBuffer.remaining());
332 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted));
DhiesTest.java 98 byte[] decrypted = dhies.doFinal(ciphertext);
99 assertEquals(TestUtil.bytesToHex(message), TestUtil.bytesToHex(decrypted));
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local
275 decrypted = os_memdup(msg, left);
276 if (decrypted == NULL) {
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
291 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
    [all...]
  /external/fonttools/Lib/fontTools/
t1Lib.py 298 decrypted, R = eexec.decrypt(chunk, 55665)
299 decrypted = decrypted[4:]
300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \
301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND:
303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r'
304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
  /frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/
AesCtrDecryptorUnittest.cpp 47 const uint8_t* decrypted,
56 EXPECT_EQ(0, memcmp(outputBuffer, decrypted, totalSize));
147 uint8_t decrypted[kTotalSize] = { local
162 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
192 uint8_t decrypted[kTotalSize] = { local
208 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
238 uint8_t decrypted[kTotalSize] = { local
254 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
287 uint8_t decrypted[kTotalSize] = { local
303 attemptDecryptExpectingSuccess<kTotalSize>(key, iv, encrypted, decrypted,
339 uint8_t decrypted[kTotalSize] = { local
394 uint8_t decrypted[kTotalSize] = { local
457 uint8_t decrypted[kTotalSize] = { local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
495 decrypted = os_malloc(decrypted_len);
496 if (decrypted == NULL)
500 decrypted, decrypted_len) < 0) {
501 os_free(decrypted);
505 pad_len = decrypted[decrypted_len - 1];
509 os_free(decrypted);
516 return decrypted;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 333 u8 *decrypted, nonce[16]; local
373 decrypted = os_memdup(pos, left);
374 if (decrypted == NULL)
378 wpabuf_head(respData), 22, decrypted, left,
381 os_free(decrypted);
385 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
386 decrypted, left);
389 switch (decrypted[0] >> 6) {
403 os_free(decrypted);
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
SecureBoxTest.java 207 byte[] decrypted =
210 assertThat(decrypted).isEqualTo(TEST_PAYLOAD);
218 byte[] decrypted =
220 assertThat(decrypted).isEqualTo(TEST_PAYLOAD);
228 byte[] decrypted =
230 assertThat(decrypted).isEqualTo(TEST_PAYLOAD);
238 byte[] decrypted =
244 assertThat(decrypted.length).isEqualTo(0);
  /libcore/luni/src/test/java/libcore/javax/crypto/spec/
AlgorithmParametersTestPBES2.java 218 byte[] decrypted = c.doFinal(encrypted);
221 Arrays.toString(decrypted));
  /build/make/tools/releasetools/
check_ota_package_signature.py 123 # Verify the digest by outputing the decrypted result in ASN.1 structure.
124 decrypted_file = common.MakeTempFile(prefix='decrypted-')

Completed in 469 milliseconds

1 2 3