Searched refs:decrypted (Results 1 - 25 of 74) sorted by relevance

123

/external/chromium_org/net/quic/crypto/
H A Dnull_decrypter_test.cc29 scoped_ptr<QuicData> decrypted(
31 ASSERT_TRUE(decrypted.get());
32 EXPECT_EQ("goodbye!", decrypted->AsStringPiece());
48 scoped_ptr<QuicData> decrypted(
50 ASSERT_FALSE(decrypted.get());
63 scoped_ptr<QuicData> decrypted(
65 ASSERT_FALSE(decrypted.get());
H A Dchacha20_poly1305_decrypter_test.cc114 scoped_ptr<QuicData> decrypted(DecryptWithNonce(
119 if (!decrypted.get()) {
125 ASSERT_EQ(pt.length(), decrypted->length());
126 test::CompareCharArraysWithHexError("plaintext", decrypted->data(),
H A Daes_128_gcm_12_decrypter_test.cc316 scoped_ptr<QuicData> decrypted(DecryptWithNonce(
321 if (!decrypted.get()) {
327 ASSERT_EQ(pt.length(), decrypted->length());
328 test::CompareCharArraysWithHexError("plaintext", decrypted->data(),
/external/libvpx/libvpx/vp8/decoder/
H A Ddboolhuff.c47 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local
50 size_t n = bytes_left > sizeof(decrypted) ? sizeof(decrypted) : bytes_left;
51 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n);
52 bufptr = decrypted;
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/decoder/
H A Ddboolhuff.c48 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local
51 size_t n = MIN(sizeof(decrypted), bytes_left);
52 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n);
53 bufptr = decrypted;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs1.c202 u8 *decrypted; local
208 decrypted = os_malloc(s_len);
209 if (decrypted == NULL)
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
216 os_free(decrypted);
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
240 os_free(decrypted);
261 os_free(decrypted);
269 os_free(decrypted);
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dpkcs1.c202 u8 *decrypted; local
208 decrypted = os_malloc(s_len);
209 if (decrypted == NULL)
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
216 os_free(decrypted);
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
240 os_free(decrypted);
261 os_free(decrypted);
269 os_free(decrypted);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dpkcs1.c202 u8 *decrypted; local
208 decrypted = os_malloc(s_len);
209 if (decrypted == NULL)
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
216 os_free(decrypted);
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
240 os_free(decrypted);
261 os_free(decrypted);
269 os_free(decrypted);
[all...]
/external/chromium_org/sync/util/
H A Dnigori_unittest.cc90 std::string decrypted; local
91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
93 EXPECT_EQ(plaintext, decrypted);
108 std::string decrypted; local
109 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted));
111 EXPECT_NE(plaintext, decrypted);
127 std::string decrypted; local
128 EXPECT_FALSE(nigori.Decrypt(encrypted, &decrypted));
130 EXPECT_NE(plaintext, decrypted);
H A Dcryptographer_unittest.cc75 sync_pb::PasswordSpecificsData decrypted; local
76 EXPECT_TRUE(cryptographer_.Decrypt(encrypted, &decrypted));
78 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
104 sync_pb::PasswordSpecificsData decrypted; local
105 EXPECT_TRUE(cryptographer_.Decrypt(encrypted2, &decrypted));
109 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
180 sync_pb::PasswordSpecificsData decrypted; local
181 EXPECT_TRUE(cryptographer.Decrypt(encrypted, &decrypted));
182 EXPECT_EQ(original.SerializeAsString(), decrypted.SerializeAsString());
H A Dnigori.h58 // Decrypts |value| into |decrypted|. It is assumed that |value| is Base64
60 bool Decrypt(const std::string& value, std::string* decrypted) const;
/external/chromium_org/chrome/common/extensions/api/networking_private/
H A Dnetworking_private_crypto_unittest.cc19 std::string decrypted; local
21 private_key_pem, encrypted, &decrypted))
22 return decrypted == plain;
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_enrollee.c964 struct wpabuf *decrypted; local
967 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
969 if (decrypted == NULL) {
976 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
978 if (wps_parse_msg(decrypted, &eattr) < 0 ||
979 wps_process_key_wrap_auth(wps, decrypted,
983 wpabuf_free(decrypted);
987 wpabuf_free(decrypted);
1058 struct wpabuf *decrypted; local
1078 decrypted
1113 struct wpabuf *decrypted; local
1170 struct wpabuf *decrypted; local
[all...]
H A Dwps_common.c155 struct wpabuf *decrypted; local
168 decrypted = wpabuf_alloc(encr_len - block_size);
169 if (decrypted == NULL)
173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
175 wpabuf_len(decrypted))) {
176 wpabuf_free(decrypted);
181 decrypted);
183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_enrollee.c964 struct wpabuf *decrypted; local
967 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
969 if (decrypted == NULL) {
976 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
978 if (wps_parse_msg(decrypted, &eattr) < 0 ||
979 wps_process_key_wrap_auth(wps, decrypted,
983 wpabuf_free(decrypted);
987 wpabuf_free(decrypted);
1058 struct wpabuf *decrypted; local
1078 decrypted
1113 struct wpabuf *decrypted; local
1170 struct wpabuf *decrypted; local
[all...]
H A Dwps_common.c155 struct wpabuf *decrypted; local
168 decrypted = wpabuf_alloc(encr_len - block_size);
169 if (decrypted == NULL)
173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
175 wpabuf_len(decrypted))) {
176 wpabuf_free(decrypted);
181 decrypted);
183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_enrollee.c964 struct wpabuf *decrypted; local
967 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
969 if (decrypted == NULL) {
976 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
978 if (wps_parse_msg(decrypted, &eattr) < 0 ||
979 wps_process_key_wrap_auth(wps, decrypted,
983 wpabuf_free(decrypted);
987 wpabuf_free(decrypted);
1058 struct wpabuf *decrypted; local
1078 decrypted
1113 struct wpabuf *decrypted; local
1170 struct wpabuf *decrypted; local
[all...]
H A Dwps_common.c155 struct wpabuf *decrypted; local
168 decrypted = wpabuf_alloc(encr_len - block_size);
169 if (decrypted == NULL)
173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
175 wpabuf_len(decrypted))) {
176 wpabuf_free(decrypted);
181 decrypted);
183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
/external/chromium_org/crypto/
H A Dencryptor_unittest.cc32 std::string decrypted; local
33 EXPECT_TRUE(encryptor.Decrypt(ciphertext, &decrypted));
35 EXPECT_EQ(plaintext, decrypted);
87 std::string decrypted; local
98 EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decrypted));
106 EXPECT_TRUE(decryptor2.Decrypt(ciphertext, &decrypted));
112 EXPECT_FALSE(decryptor3.Decrypt(ciphertext, &decrypted));
208 std::string decrypted; local
210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decrypted));
212 EXPECT_EQ(plaintext_str, decrypted);
239 std::string decrypted; local
299 std::string decrypted; local
425 std::string decrypted; local
454 std::string decrypted; local
[all...]
/external/chromium_org/content/child/webcrypto/nss/
H A Daes_kw_nss.cc175 // be temporarily viewed as a symmetric key to be unwrapped (decrypted).
176 crypto::ScopedPK11SymKey decrypted;
181 &decrypted);
187 if (PK11_ExtractKeyValue(decrypted.get()) != SECSuccess)
189 const SECItem* const key_data = PK11_GetKeyData(decrypted.get());
/external/fonttools/Lib/fontTools/
H A Dt1Lib.py298 decrypted, R = eexec.decrypt(chunk, 55665)
299 decrypted = decrypted[4:]
300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \
301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND:
303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r'
304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
/external/fonttools/Tools/fontTools/
H A Dt1Lib.py298 decrypted, R = eexec.decrypt(chunk, 55665)
299 decrypted = decrypted[4:]
300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \
301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND:
303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r'
304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
276 decrypted = os_malloc(left);
277 if (decrypted == NULL) {
282 os_memcpy(decrypted, msg, left);
287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
290 os_free(decrypted);
294 decrypted, left);
297 switch (decrypted[0] >> 6) {
314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
320 os_free(decrypted);
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
276 decrypted = os_malloc(left);
277 if (decrypted == NULL) {
282 os_memcpy(decrypted, msg, left);
287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
290 os_free(decrypted);
294 decrypted, left);
297 switch (decrypted[0] >> 6) {
314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
320 os_free(decrypted);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_psk.c185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
276 decrypted = os_malloc(left);
277 if (decrypted == NULL) {
282 os_memcpy(decrypted, msg, left);
287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
290 os_free(decrypted);
294 decrypted, left);
297 switch (decrypted[0] >> 6) {
314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
320 os_free(decrypted);
[all...]

Completed in 2197 milliseconds

123