/external/chromium/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 56 SaslMechanism::Base64Encode(const std::string & plain) { argument 57 return Base64::Encode(plain); 66 SaslMechanism::Base64EncodeFromArray(const char * plain, size_t length) { argument 68 Base64::EncodeFromArray(plain, length, &result);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 28 * @plain: Plaintext key, n * 64 bits 31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 39 r = plain; 54 r = plain + (n - 1) * 8; 70 * These are already in @plain due to the location of temporary
|
H A D | aes-wrap.c | 27 * @plain: Plaintext key to be wrapped, n * 64 bits 31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 42 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-dec.c | 141 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 143 rijndaelDecrypt(ctx, crypt, plain);
|
H A D | aes-internal-enc.c | 111 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 113 rijndaelEncrypt(ctx, plain, crypt);
|
H A D | crypto_internal-rsa.c | 111 u8 *plain, size_t *plain_len) 114 crypt, crypt_len, plain, plain_len); 109 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | crypto_internal-cipher.c | 115 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 122 if (plain != crypt) 123 os_memcpy(crypt, plain, len); 134 ctx->u.aes.cbc[j] ^= plain[j]; 139 plain += ctx->u.aes.block_size; 149 ctx->u.des3.cbc[j] ^= plain[j]; 153 plain += 8; 163 ctx->u.des3.cbc[j] ^= plain[j]; 167 plain += 8; 180 u8 *plain, size_ 179 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 28 * @plain: Plaintext key, n * 64 bits 31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 39 r = plain; 54 r = plain + (n - 1) * 8; 70 * These are already in @plain due to the location of temporary
|
H A D | aes-wrap.c | 27 * @plain: Plaintext key to be wrapped, n * 64 bits 31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 42 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-dec.c | 141 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 143 rijndaelDecrypt(ctx, crypt, plain);
|
H A D | aes-internal-enc.c | 111 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 113 rijndaelEncrypt(ctx, plain, crypt);
|
H A D | crypto_internal-rsa.c | 111 u8 *plain, size_t *plain_len) 114 crypt, crypt_len, plain, plain_len); 109 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-unwrap.c | 28 * @plain: Plaintext key, n * 64 bits 31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 39 r = plain; 54 r = plain + (n - 1) * 8; 70 * These are already in @plain due to the location of temporary
|
H A D | aes-wrap.c | 27 * @plain: Plaintext key to be wrapped, n * 64 bits 31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 42 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-dec.c | 141 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 143 rijndaelDecrypt(ctx, crypt, plain);
|
H A D | aes-internal-enc.c | 111 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 113 rijndaelEncrypt(ctx, plain, crypt);
|
H A D | crypto_internal-rsa.c | 111 u8 *plain, size_t *plain_len) 114 crypt, crypt_len, plain, plain_len); 109 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 135 u8 *plain, size_t *plain_len) 141 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 154 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 160 pos = plain + 3; 161 if (plain[1] == 0x00) { 163 if (plain[2] != 0x00) { 168 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 172 if (plain[ 133 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 135 u8 *plain, size_t *plain_len) 141 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 154 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 160 pos = plain + 3; 161 if (plain[1] == 0x00) { 163 if (plain[2] != 0x00) { 168 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 172 if (plain[ 133 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 135 u8 *plain, size_t *plain_len) 141 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 154 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 160 pos = plain + 3; 161 if (plain[1] == 0x00) { 163 if (plain[2] != 0x00) { 168 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 172 if (plain[ 133 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |
/external/openssl/crypto/rc2/ |
H A D | rc2test.c | 120 static unsigned char plain[CFB_TEST_SIZE]= variable 225 idea_cfb64_encrypt(plain,cfb_buf1,(long)12,&eks, 227 idea_cfb64_encrypt(&(plain[12]),&(cfb_buf1[12]), 244 if (memcmp(plain,cfb_buf2,CFB_TEST_SIZE) != 0)
|
/external/wpa_supplicant/ |
H A D | crypto_gnutls.c | 121 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 124 gcry_cipher_encrypt(hd, crypt, 16, plain, 16); 151 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 154 gcry_cipher_decrypt(hd, plain, 16, crypt, 16);
|
/external/wpa_supplicant/tests/ |
H A D | test_aes.c | 95 printf("AES-128 EAX mode decryption returned invalid plain " 109 u8 plain[32]; member in struct:cbc_test_vector 150 memcpy(buf, tv->plain, tv->len); 158 if (memcmp(buf, tv->plain, tv->len) != 0) { 235 u8 plain[] = { local 249 if (aes_wrap(kek, 2, plain, result)) { 261 if (memcmp(result, plain, 16) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_attr_build.c | 229 struct wpabuf *plain) 238 pad_len = block_size - wpabuf_len(plain) % block_size; 239 os_memset(wpabuf_put(plain, pad_len), pad_len, pad_len); 242 wpabuf_put_be16(msg, block_size + wpabuf_len(plain)); 249 wpabuf_put_buf(msg, plain); 250 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain))) 228 wps_build_encr_settings(struct wps_data *wps, struct wpabuf *msg, struct wpabuf *plain) argument
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_aes.c | 95 printf("AES-128 EAX mode decryption returned invalid plain " 109 u8 plain[32]; member in struct:cbc_test_vector 150 memcpy(buf, tv->plain, tv->len); 158 if (memcmp(buf, tv->plain, tv->len) != 0) { 237 u8 plain[] = { local 251 if (aes_wrap(kek, 2, plain, result)) { 263 if (memcmp(result, plain, 16) != 0) {
|