Searched refs:decrypted (Results 1 - 25 of 67) sorted by relevance

123

/external/wpa_supplicant_6/wpa_supplicant/src/wps/
H A Dwps_common.c154 struct wpabuf *decrypted; local
167 decrypted = wpabuf_alloc(encr_len - block_size);
168 if (decrypted == NULL)
172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
174 wpabuf_len(decrypted))) {
175 wpabuf_free(decrypted);
180 decrypted);
182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
H A Dwps_enrollee.c833 struct wpabuf *decrypted; local
853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
855 if (decrypted == NULL) {
856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
864 if (wps_parse_msg(decrypted, &eattr) < 0 ||
865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
867 wpabuf_free(decrypted);
871 wpabuf_free(decrypted);
882 struct wpabuf *decrypted; local
929 struct wpabuf *decrypted; local
[all...]
/external/chromium/chrome/browser/sync/util/
H A Dnigori_unittest.cc90 std::string decrypted; local
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
93 EXPECT_EQ(plaintext, decrypted);
108 std::string decrypted; local
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
111 EXPECT_NE(plaintext, decrypted);
127 std::string decrypted; local
128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted));
130 EXPECT_NE(plaintext, decrypted);
H A Dcryptographer_unittest.cc57 sync_pb::PasswordSpecificsData decrypted; local
58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
133 sync_pb::PasswordSpecificsData decrypted; local
134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
H A Dnigori.h55 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64
57 bool Decrypt(const std::string& value, std::string* decrypted) const;
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_psk.c188 u8 *buf, *rpchannel, nonce[16], *decrypted; local
279 decrypted = os_malloc(left);
280 if (decrypted == NULL) {
285 os_memcpy(decrypted, msg, left);
290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
293 os_free(decrypted);
297 decrypted, left);
300 switch (decrypted[0] >> 6) {
317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
323 os_free(decrypted);
[all...]
H A Deap_sim.c660 u8 *decrypted; local
661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
664 if (decrypted == NULL) {
669 os_free(decrypted);
694 u8 *decrypted; local
702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
705 if (decrypted == NULL) {
715 os_free(decrypted);
719 os_free(decrypted);
792 u8 *decrypted; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c183 u8 *buf, *rpchannel, nonce[16], *decrypted; local
274 decrypted = os_malloc(left);
275 if (decrypted == NULL) {
280 os_memcpy(decrypted, msg, left);
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
[all...]
H A Deap_sim.c688 u8 *decrypted; local
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
692 if (decrypted == NULL) {
697 os_free(decrypted);
722 u8 *decrypted; local
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
733 if (decrypted == NULL) {
743 os_free(decrypted);
747 os_free(decrypted);
820 u8 *decrypted; local
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c183 u8 *buf, *rpchannel, nonce[16], *decrypted; local
274 decrypted = os_malloc(left);
275 if (decrypted == NULL) {
280 os_memcpy(decrypted, msg, left);
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
[all...]
H A Deap_sim.c688 u8 *decrypted; local
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
692 if (decrypted == NULL) {
697 os_free(decrypted);
722 u8 *decrypted; local
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
733 if (decrypted == NULL) {
743 os_free(decrypted);
747 os_free(decrypted);
820 u8 *decrypted; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_psk.c183 u8 *buf, *rpchannel, nonce[16], *decrypted; local
274 decrypted = os_malloc(left);
275 if (decrypted == NULL) {
280 os_memcpy(decrypted, msg, left);
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
[all...]
H A Deap_sim.c688 u8 *decrypted; local
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
692 if (decrypted == NULL) {
697 os_free(decrypted);
722 u8 *decrypted; local
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
733 if (decrypted == NULL) {
743 os_free(decrypted);
747 os_free(decrypted);
820 u8 *decrypted; local
[all...]
/external/openssh/
H A Dssh-rsa.c216 u_char *decrypted = NULL; local
242 decrypted = xmalloc(rsasize);
243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen);
253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
265 if (decrypted)
266 xfree(decrypted);
H A Dauthfile.c421 Buffer decrypted; local
469 /* Initialize space for decrypted data. */
470 buffer_init(&decrypted);
471 cp = buffer_append_space(&decrypted, buffer_len(&copy));
482 check1 = buffer_get_char(&decrypted);
483 check2 = buffer_get_char(&decrypted);
484 if (check1 != buffer_get_char(&decrypted) ||
485 check2 != buffer_get_char(&decrypted)) {
489 buffer_free(&decrypted);
493 buffer_get_bignum(&decrypted, pr
[all...]
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_common.c152 struct wpabuf *decrypted; local
165 decrypted = wpabuf_alloc(encr_len - block_size);
166 if (decrypted == NULL)
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
172 wpabuf_len(decrypted))) {
173 wpabuf_free(decrypted);
178 decrypted);
180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
H A Dwps_enrollee.c963 struct wpabuf *decrypted; local
983 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
985 if (decrypted == NULL) {
986 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
992 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) {
993 wpabuf_free(decrypted);
998 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
1000 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1001 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
1003 wpabuf_free(decrypted);
1018 struct wpabuf *decrypted; local
1075 struct wpabuf *decrypted; local
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_common.c152 struct wpabuf *decrypted; local
165 decrypted = wpabuf_alloc(encr_len - block_size);
166 if (decrypted == NULL)
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
172 wpabuf_len(decrypted))) {
173 wpabuf_free(decrypted);
178 decrypted);
180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
H A Dwps_enrollee.c963 struct wpabuf *decrypted; local
983 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
985 if (decrypted == NULL) {
986 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
992 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) {
993 wpabuf_free(decrypted);
998 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
1000 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1001 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
1003 wpabuf_free(decrypted);
1018 struct wpabuf *decrypted; local
1075 struct wpabuf *decrypted; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_common.c152 struct wpabuf *decrypted; local
165 decrypted = wpabuf_alloc(encr_len - block_size);
166 if (decrypted == NULL)
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
172 wpabuf_len(decrypted))) {
173 wpabuf_free(decrypted);
178 decrypted);
180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
H A Dwps_enrollee.c963 struct wpabuf *decrypted; local
983 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
985 if (decrypted == NULL) {
986 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
992 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) {
993 wpabuf_free(decrypted);
998 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
1000 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1001 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
1003 wpabuf_free(decrypted);
1018 struct wpabuf *decrypted; local
1075 struct wpabuf *decrypted; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_psk.c339 u8 *decrypted, nonce[16]; local
379 decrypted = os_malloc(left);
380 if (decrypted == NULL)
382 os_memcpy(decrypted, pos, left);
385 wpabuf_head(respData), 22, decrypted, left,
388 os_free(decrypted);
393 decrypted, left);
396 switch (decrypted[0] >> 6) {
410 os_free(decrypted);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c336 u8 *decrypted, nonce[16]; local
376 decrypted = os_malloc(left);
377 if (decrypted == NULL)
379 os_memcpy(decrypted, pos, left);
382 wpabuf_head(respData), 22, decrypted, left,
385 os_free(decrypted);
390 decrypted, left);
393 switch (decrypted[0] >> 6) {
407 os_free(decrypted);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c336 u8 *decrypted, nonce[16]; local
376 decrypted = os_malloc(left);
377 if (decrypted == NULL)
379 os_memcpy(decrypted, pos, left);
382 wpabuf_head(respData), 22, decrypted, left,
385 os_free(decrypted);
390 decrypted, left);
393 switch (decrypted[0] >> 6) {
407 os_free(decrypted);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c336 u8 *decrypted, nonce[16]; local
376 decrypted = os_malloc(left);
377 if (decrypted == NULL)
379 os_memcpy(decrypted, pos, left);
382 wpabuf_head(respData), 22, decrypted, left,
385 os_free(decrypted);
390 decrypted, left);
393 switch (decrypted[0] >> 6) {
407 os_free(decrypted);

Completed in 271 milliseconds

123