/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_common.c | 154 struct wpabuf *decrypted; local 167 decrypted = wpabuf_alloc(encr_len - block_size); 168 if (decrypted == NULL) 172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 174 wpabuf_len(decrypted))) { 175 wpabuf_free(decrypted); 180 decrypted); 182 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
H A D | wps_enrollee.c | 833 struct wpabuf *decrypted; local 853 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 855 if (decrypted == NULL) { 856 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 862 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 864 if (wps_parse_msg(decrypted, &eattr) < 0 || 865 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 867 wpabuf_free(decrypted); 871 wpabuf_free(decrypted); 882 struct wpabuf *decrypted; local 929 struct wpabuf *decrypted; local [all...] |
/external/chromium/chrome/browser/sync/util/ |
H A D | nigori_unittest.cc | 90 std::string decrypted; local 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 93 EXPECT_EQ(plaintext, decrypted); 108 std::string decrypted; local 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 111 EXPECT_NE(plaintext, decrypted); 127 std::string decrypted; local 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 130 EXPECT_NE(plaintext, decrypted);
|
H A D | cryptographer_unittest.cc | 57 sync_pb::PasswordSpecificsData decrypted; local 58 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 60 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 133 sync_pb::PasswordSpecificsData decrypted; local 134 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 135 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
|
H A D | nigori.h | 55 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64 57 bool Decrypt(const std::string& value, std::string* decrypted) const;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local 279 decrypted = os_malloc(left); 280 if (decrypted == NULL) { 285 os_memcpy(decrypted, msg, left); 290 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 293 os_free(decrypted); 297 decrypted, left); 300 switch (decrypted[0] >> 6) { 317 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 323 os_free(decrypted); [all...] |
H A D | eap_sim.c | 660 u8 *decrypted; local 661 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 664 if (decrypted == NULL) { 669 os_free(decrypted); 694 u8 *decrypted; local 702 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 705 if (decrypted == NULL) { 715 os_free(decrypted); 719 os_free(decrypted); 792 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local 274 decrypted = os_malloc(left); 275 if (decrypted == NULL) { 280 os_memcpy(decrypted, msg, left); 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 318 os_free(decrypted); [all...] |
H A D | eap_sim.c | 688 u8 *decrypted; local 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 692 if (decrypted == NULL) { 697 os_free(decrypted); 722 u8 *decrypted; local 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 733 if (decrypted == NULL) { 743 os_free(decrypted); 747 os_free(decrypted); 820 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local 274 decrypted = os_malloc(left); 275 if (decrypted == NULL) { 280 os_memcpy(decrypted, msg, left); 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 318 os_free(decrypted); [all...] |
H A D | eap_sim.c | 688 u8 *decrypted; local 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 692 if (decrypted == NULL) { 697 os_free(decrypted); 722 u8 *decrypted; local 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 733 if (decrypted == NULL) { 743 os_free(decrypted); 747 os_free(decrypted); 820 u8 *decrypted; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local 274 decrypted = os_malloc(left); 275 if (decrypted == NULL) { 280 os_memcpy(decrypted, msg, left); 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 318 os_free(decrypted); [all...] |
H A D | eap_sim.c | 688 u8 *decrypted; local 689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 692 if (decrypted == NULL) { 697 os_free(decrypted); 722 u8 *decrypted; local 730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 733 if (decrypted == NULL) { 743 os_free(decrypted); 747 os_free(decrypted); 820 u8 *decrypted; local [all...] |
/external/openssh/ |
H A D | ssh-rsa.c | 216 u_char *decrypted = NULL; local 242 decrypted = xmalloc(rsasize); 243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen); 253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 265 if (decrypted) 266 xfree(decrypted);
|
H A D | authfile.c | 421 Buffer decrypted; local 469 /* Initialize space for decrypted data. */ 470 buffer_init(&decrypted); 471 cp = buffer_append_space(&decrypted, buffer_len(©)); 482 check1 = buffer_get_char(&decrypted); 483 check2 = buffer_get_char(&decrypted); 484 if (check1 != buffer_get_char(&decrypted) || 485 check2 != buffer_get_char(&decrypted)) { 489 buffer_free(&decrypted); 493 buffer_get_bignum(&decrypted, pr [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_common.c | 152 struct wpabuf *decrypted; local 165 decrypted = wpabuf_alloc(encr_len - block_size); 166 if (decrypted == NULL) 170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 172 wpabuf_len(decrypted))) { 173 wpabuf_free(decrypted); 178 decrypted); 180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
H A D | wps_enrollee.c | 963 struct wpabuf *decrypted; local 983 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 985 if (decrypted == NULL) { 986 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 992 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) { 993 wpabuf_free(decrypted); 998 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 1000 if (wps_parse_msg(decrypted, &eattr) < 0 || 1001 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 1003 wpabuf_free(decrypted); 1018 struct wpabuf *decrypted; local 1075 struct wpabuf *decrypted; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_common.c | 152 struct wpabuf *decrypted; local 165 decrypted = wpabuf_alloc(encr_len - block_size); 166 if (decrypted == NULL) 170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 172 wpabuf_len(decrypted))) { 173 wpabuf_free(decrypted); 178 decrypted); 180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
H A D | wps_enrollee.c | 963 struct wpabuf *decrypted; local 983 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 985 if (decrypted == NULL) { 986 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 992 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) { 993 wpabuf_free(decrypted); 998 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 1000 if (wps_parse_msg(decrypted, &eattr) < 0 || 1001 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 1003 wpabuf_free(decrypted); 1018 struct wpabuf *decrypted; local 1075 struct wpabuf *decrypted; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_common.c | 152 struct wpabuf *decrypted; local 165 decrypted = wpabuf_alloc(encr_len - block_size); 166 if (decrypted == NULL) 170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 172 wpabuf_len(decrypted))) { 173 wpabuf_free(decrypted); 178 decrypted); 180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
H A D | wps_enrollee.c | 963 struct wpabuf *decrypted; local 983 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 985 if (decrypted == NULL) { 986 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 992 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) { 993 wpabuf_free(decrypted); 998 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 1000 if (wps_parse_msg(decrypted, &eattr) < 0 || 1001 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 1003 wpabuf_free(decrypted); 1018 struct wpabuf *decrypted; local 1075 struct wpabuf *decrypted; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_psk.c | 339 u8 *decrypted, nonce[16]; local 379 decrypted = os_malloc(left); 380 if (decrypted == NULL) 382 os_memcpy(decrypted, pos, left); 385 wpabuf_head(respData), 22, decrypted, left, 388 os_free(decrypted); 393 decrypted, left); 396 switch (decrypted[0] >> 6) { 410 os_free(decrypted);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 336 u8 *decrypted, nonce[16]; local 376 decrypted = os_malloc(left); 377 if (decrypted == NULL) 379 os_memcpy(decrypted, pos, left); 382 wpabuf_head(respData), 22, decrypted, left, 385 os_free(decrypted); 390 decrypted, left); 393 switch (decrypted[0] >> 6) { 407 os_free(decrypted);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 336 u8 *decrypted, nonce[16]; local 376 decrypted = os_malloc(left); 377 if (decrypted == NULL) 379 os_memcpy(decrypted, pos, left); 382 wpabuf_head(respData), 22, decrypted, left, 385 os_free(decrypted); 390 decrypted, left); 393 switch (decrypted[0] >> 6) { 407 os_free(decrypted);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 336 u8 *decrypted, nonce[16]; local 376 decrypted = os_malloc(left); 377 if (decrypted == NULL) 379 os_memcpy(decrypted, pos, left); 382 wpabuf_head(respData), 22, decrypted, left, 385 os_free(decrypted); 390 decrypted, left); 393 switch (decrypted[0] >> 6) { 407 os_free(decrypted);
|