/external/chromium_org/net/quic/crypto/ |
H A D | null_decrypter_test.cc | 29 scoped_ptr<QuicData> decrypted( 31 ASSERT_TRUE(decrypted.get()); 32 EXPECT_EQ("goodbye!", decrypted->AsStringPiece()); 48 scoped_ptr<QuicData> decrypted( 50 ASSERT_FALSE(decrypted.get()); 63 scoped_ptr<QuicData> decrypted( 65 ASSERT_FALSE(decrypted.get());
|
H A D | chacha20_poly1305_decrypter_test.cc | 114 scoped_ptr<QuicData> decrypted(DecryptWithNonce( 119 if (!decrypted.get()) { 125 ASSERT_EQ(pt.length(), decrypted->length()); 126 test::CompareCharArraysWithHexError("plaintext", decrypted->data(),
|
H A D | aes_128_gcm_12_decrypter_test.cc | 316 scoped_ptr<QuicData> decrypted(DecryptWithNonce( 321 if (!decrypted.get()) { 327 ASSERT_EQ(pt.length(), decrypted->length()); 328 test::CompareCharArraysWithHexError("plaintext", decrypted->data(),
|
/external/libvpx/libvpx/vp8/decoder/ |
H A D | dboolhuff.c | 47 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local 50 size_t n = bytes_left > sizeof(decrypted) ? sizeof(decrypted) : bytes_left; 51 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); 52 bufptr = decrypted;
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/decoder/ |
H A D | dboolhuff.c | 48 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local 51 size_t n = MIN(sizeof(decrypted), bytes_left); 52 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); 53 bufptr = decrypted;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); 269 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); 269 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); 269 os_free(decrypted); [all...] |
/external/chromium_org/sync/util/ |
H A D | nigori_unittest.cc | 90 std::string decrypted; local 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 93 EXPECT_EQ(plaintext, decrypted); 108 std::string decrypted; local 109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 111 EXPECT_NE(plaintext, decrypted); 127 std::string decrypted; local 128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted)); 130 EXPECT_NE(plaintext, decrypted);
|
H A D | cryptographer_unittest.cc | 75 sync_pb::PasswordSpecificsData decrypted; local 76 EXPECT_TRUE(cryptographer_.Decrypt(encrypted, &decrypted)); 78 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 104 sync_pb::PasswordSpecificsData decrypted; local 105 EXPECT_TRUE(cryptographer_.Decrypt(encrypted2, &decrypted)); 109 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString()); 180 sync_pb::PasswordSpecificsData decrypted; local 181 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted)); 182 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
|
H A D | nigori.h | 58 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64 60 bool Decrypt(const std::string& value, std::string* decrypted) const;
|
/external/chromium_org/crypto/ |
H A D | encryptor_unittest.cc | 32 std::string decrypted; local 33 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decrypted)); 35 EXPECT_EQ(plaintext, decrypted); 87 std::string decrypted; local 98 EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decrypted)); 106 EXPECT_TRUE(decryptor2.Decrypt(ciphertext, &decrypted)); 112 EXPECT_FALSE(decryptor3.Decrypt(ciphertext, &decrypted)); 208 std::string decrypted; local 210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decrypted)); 212 EXPECT_EQ(plaintext_str, decrypted); 239 std::string decrypted; local 299 std::string decrypted; local 425 std::string decrypted; local 454 std::string decrypted; local 480 std::string decrypted; local [all...] |
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto_unittest.cc | 20 std::string decrypted; local 21 if (crypto.DecryptByteString(private_key_pem, encrypted, &decrypted)) 22 return decrypted == plain;
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_enrollee.c | 954 struct wpabuf *decrypted; local 957 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 959 if (decrypted == NULL) { 966 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 968 if (wps_parse_msg(decrypted, &eattr) < 0 || 969 wps_process_key_wrap_auth(wps, decrypted, 973 wpabuf_free(decrypted); 977 wpabuf_free(decrypted); 1048 struct wpabuf *decrypted; local 1068 decrypted 1103 struct wpabuf *decrypted; local 1160 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 155 struct wpabuf *decrypted; local 168 decrypted = wpabuf_alloc(encr_len - block_size); 169 if (decrypted == NULL) 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 175 wpabuf_len(decrypted))) { 176 wpabuf_free(decrypted); 181 decrypted); 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_enrollee.c | 954 struct wpabuf *decrypted; local 957 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 959 if (decrypted == NULL) { 966 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 968 if (wps_parse_msg(decrypted, &eattr) < 0 || 969 wps_process_key_wrap_auth(wps, decrypted, 973 wpabuf_free(decrypted); 977 wpabuf_free(decrypted); 1048 struct wpabuf *decrypted; local 1068 decrypted 1103 struct wpabuf *decrypted; local 1160 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 155 struct wpabuf *decrypted; local 168 decrypted = wpabuf_alloc(encr_len - block_size); 169 if (decrypted == NULL) 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 175 wpabuf_len(decrypted))) { 176 wpabuf_free(decrypted); 181 decrypted); 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_enrollee.c | 954 struct wpabuf *decrypted; local 957 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 959 if (decrypted == NULL) { 966 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 968 if (wps_parse_msg(decrypted, &eattr) < 0 || 969 wps_process_key_wrap_auth(wps, decrypted, 973 wpabuf_free(decrypted); 977 wpabuf_free(decrypted); 1048 struct wpabuf *decrypted; local 1068 decrypted 1103 struct wpabuf *decrypted; local 1160 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 155 struct wpabuf *decrypted; local 168 decrypted = wpabuf_alloc(encr_len - block_size); 169 if (decrypted == NULL) 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 175 wpabuf_len(decrypted))) { 176 wpabuf_free(decrypted); 181 decrypted); 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
/external/fonttools/Lib/fontTools/ |
H A D | t1Lib.py | 298 decrypted, R = eexec.decrypt(chunk, 55665) 299 decrypted = decrypted[4:] 300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \ 301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND: 303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r' 304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
|
/external/fonttools/Tools/fontTools/ |
H A D | t1Lib.py | 298 decrypted, R = eexec.decrypt(chunk, 55665) 299 decrypted = decrypted[4:] 300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \ 301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND: 303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r' 304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 320 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 320 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 320 os_free(decrypted); [all...] |
/external/chromium_org/media/cdm/ |
H A D | aes_decryptor.cc | 127 // Decrypts |input| using |key|. Returns a DecoderBuffer with the decrypted 151 DCHECK_GT(sample_size, 0U) << "No sample data to be decrypted."; 198 // copy the decrypted bytes over the encrypted bytes in the output. 361 scoped_refptr<DecoderBuffer> decrypted; local 364 decrypted = DecoderBuffer::CopyFrom(encrypted->data(), 376 decrypted = DecryptData(*encrypted.get(), decryption_key); 377 if (!decrypted.get()) { 384 decrypted->set_timestamp(encrypted->timestamp()); 385 decrypted->set_duration(encrypted->duration()); 386 decrypt_cb.Run(kSuccess, decrypted); [all...] |