Searched defs:plain (Results 1 - 25 of 107) sorted by relevance

12345

/external/chromium/third_party/libjingle/source/talk/xmpp/
H A Dsaslmechanism.cc56 SaslMechanism::Base64Encode(const std::string & plain) { argument
57 return Base64::Encode(plain);
66 SaslMechanism::Base64EncodeFromArray(const char * plain, size_t length) { argument
68 Base64::EncodeFromArray(plain, length, &result);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-unwrap.c28 * @plain: Plaintext key, n * 64 bits
31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
39 r = plain;
54 r = plain + (n - 1) * 8;
70 * These are already in @plain due to the location of temporary
H A Daes-wrap.c27 * @plain: Plaintext key to be wrapped, n * 64 bits
31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument
42 os_memcpy(r, plain, 8 * n);
H A Daes-internal-dec.c141 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
143 rijndaelDecrypt(ctx, crypt, plain);
H A Daes-internal-enc.c111 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
113 rijndaelEncrypt(ctx, plain, crypt);
H A Dcrypto_internal-rsa.c111 u8 *plain, size_t *plain_len)
114 crypt, crypt_len, plain, plain_len);
109 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
H A Dcrypto_internal-cipher.c115 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument
122 if (plain != crypt)
123 os_memcpy(crypt, plain, len);
134 ctx->u.aes.cbc[j] ^= plain[j];
139 plain += ctx->u.aes.block_size;
149 ctx->u.des3.cbc[j] ^= plain[j];
153 plain += 8;
163 ctx->u.des3.cbc[j] ^= plain[j];
167 plain += 8;
180 u8 *plain, size_
179 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Daes-unwrap.c28 * @plain: Plaintext key, n * 64 bits
31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
39 r = plain;
54 r = plain + (n - 1) * 8;
70 * These are already in @plain due to the location of temporary
H A Daes-wrap.c27 * @plain: Plaintext key to be wrapped, n * 64 bits
31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument
42 os_memcpy(r, plain, 8 * n);
H A Daes-internal-dec.c141 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
143 rijndaelDecrypt(ctx, crypt, plain);
H A Daes-internal-enc.c111 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
113 rijndaelEncrypt(ctx, plain, crypt);
H A Dcrypto_internal-rsa.c111 u8 *plain, size_t *plain_len)
114 crypt, crypt_len, plain, plain_len);
109 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-unwrap.c28 * @plain: Plaintext key, n * 64 bits
31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
39 r = plain;
54 r = plain + (n - 1) * 8;
70 * These are already in @plain due to the location of temporary
H A Daes-wrap.c27 * @plain: Plaintext key to be wrapped, n * 64 bits
31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument
42 os_memcpy(r, plain, 8 * n);
H A Daes-internal-dec.c141 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
143 rijndaelDecrypt(ctx, crypt, plain);
H A Daes-internal-enc.c111 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
113 rijndaelEncrypt(ctx, plain, crypt);
H A Dcrypto_internal-rsa.c111 u8 *plain, size_t *plain_len)
114 crypt, crypt_len, plain, plain_len);
109 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs1.c135 u8 *plain, size_t *plain_len)
141 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0)
154 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) {
160 pos = plain + 3;
161 if (plain[1] == 0x00) {
163 if (plain[2] != 0x00) {
168 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00)
172 if (plain[
133 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dpkcs1.c135 u8 *plain, size_t *plain_len)
141 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0)
154 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) {
160 pos = plain + 3;
161 if (plain[1] == 0x00) {
163 if (plain[2] != 0x00) {
168 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00)
172 if (plain[
133 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dpkcs1.c135 u8 *plain, size_t *plain_len)
141 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0)
154 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) {
160 pos = plain + 3;
161 if (plain[1] == 0x00) {
163 if (plain[2] != 0x00) {
168 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00)
172 if (plain[
133 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
[all...]
/external/openssl/crypto/rc2/
H A Drc2test.c120 static unsigned char plain[CFB_TEST_SIZE]= variable
225 idea_cfb64_encrypt(plain,cfb_buf1,(long)12,&eks,
227 idea_cfb64_encrypt(&(plain[12]),&(cfb_buf1[12]),
244 if (memcmp(plain,cfb_buf2,CFB_TEST_SIZE) != 0)
/external/wpa_supplicant/
H A Dcrypto_gnutls.c121 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
124 gcry_cipher_encrypt(hd, crypt, 16, plain, 16);
151 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
154 gcry_cipher_decrypt(hd, plain, 16, crypt, 16);
/external/wpa_supplicant/tests/
H A Dtest_aes.c95 printf("AES-128 EAX mode decryption returned invalid plain "
109 u8 plain[32]; member in struct:cbc_test_vector
150 memcpy(buf, tv->plain, tv->len);
158 if (memcmp(buf, tv->plain, tv->len) != 0) {
235 u8 plain[] = { local
249 if (aes_wrap(kek, 2, plain, result)) {
261 if (memcmp(result, plain, 16) != 0) {
/external/wpa_supplicant_6/wpa_supplicant/src/wps/
H A Dwps_attr_build.c229 struct wpabuf *plain)
238 pad_len = block_size - wpabuf_len(plain) % block_size;
239 os_memset(wpabuf_put(plain, pad_len), pad_len, pad_len);
242 wpabuf_put_be16(msg, block_size + wpabuf_len(plain));
249 wpabuf_put_buf(msg, plain);
250 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
228 wps_build_encr_settings(struct wps_data *wps, struct wpabuf *msg, struct wpabuf *plain) argument
/external/wpa_supplicant_6/wpa_supplicant/tests/
H A Dtest_aes.c95 printf("AES-128 EAX mode decryption returned invalid plain "
109 u8 plain[32]; member in struct:cbc_test_vector
150 memcpy(buf, tv->plain, tv->len);
158 if (memcmp(buf, tv->plain, tv->len) != 0) {
237 u8 plain[] = { local
251 if (aes_wrap(kek, 2, plain, result)) {
263 if (memcmp(result, plain, 16) != 0) {

Completed in 3544 milliseconds

12345