/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
H A D | test_strings.py | 24 decrypted = rsa.decrypt(encrypted, self.priv) 25 print("\tDecrypted: %s" % decrypted) 27 self.assertEqual(message, decrypted)
|
H A D | test_integers.py | 20 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n) 21 print("\tDecrypted: %d" % decrypted) 23 self.assertEqual(message, decrypted)
|
H A D | test_pkcs1.py | 23 decrypted = pkcs1.decrypt(encrypted, self.priv) 24 print("\tDecrypted: %r" % decrypted) 26 self.assertEqual(message, decrypted)
|
/external/libvpx/libvpx/vp8/decoder/ |
H A D | dboolhuff.c | 49 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; local 52 size_t n = VPXMIN(sizeof(decrypted), bytes_left); 53 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); 54 bufptr = decrypted;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); 269 os_free(decrypted); [all...] |
H A D | tlsv1_common.c | 420 const u8 *decrypted; local 460 decrypted = buf; 463 decrypted, buflen); 486 decrypted = buf + 19; 493 decrypted = buf + 19; 500 decrypted = buf + 19; 513 os_memcmp_const(decrypted, data, data_len) != 0) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); 269 os_free(decrypted); [all...] |
H A D | tlsv1_common.c | 420 const u8 *decrypted; local 460 decrypted = buf; 463 decrypted, buflen); 486 decrypted = buf + 19; 493 decrypted = buf + 19; 500 decrypted = buf + 19; 513 os_memcmp_const(decrypted, data, data_len) != 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); 269 os_free(decrypted); [all...] |
H A D | tlsv1_common.c | 420 const u8 *decrypted; local 460 decrypted = buf; 463 decrypted, buflen); 486 decrypted = buf + 19; 493 decrypted = buf + 19; 500 decrypted = buf + 19; 513 os_memcmp_const(decrypted, data, data_len) != 0) {
|
/external/openssh/ |
H A D | ssh-rsa.c | 219 u_char *decrypted = NULL; local 241 if ((decrypted = malloc(rsasize)) == NULL) { 245 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 254 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 255 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 262 if (decrypted) { 263 explicit_bzero(decrypted, rsasize); 264 free(decrypted);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_enrollee.c | 991 struct wpabuf *decrypted; local 994 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 996 if (decrypted == NULL) { 1003 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1005 if (wps_parse_msg(decrypted, &eattr) < 0 || 1006 wps_process_key_wrap_auth(wps, decrypted, 1010 wpabuf_free(decrypted); 1014 wpabuf_free(decrypted); 1085 struct wpabuf *decrypted; local 1105 decrypted 1140 struct wpabuf *decrypted; local 1197 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 155 struct wpabuf *decrypted; local 168 decrypted = wpabuf_alloc(encr_len - block_size); 169 if (decrypted == NULL) 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 175 wpabuf_len(decrypted))) { 176 wpabuf_free(decrypted); 181 decrypted); 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_enrollee.c | 991 struct wpabuf *decrypted; local 994 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 996 if (decrypted == NULL) { 1003 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1005 if (wps_parse_msg(decrypted, &eattr) < 0 || 1006 wps_process_key_wrap_auth(wps, decrypted, 1010 wpabuf_free(decrypted); 1014 wpabuf_free(decrypted); 1085 struct wpabuf *decrypted; local 1105 decrypted 1140 struct wpabuf *decrypted; local 1197 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 155 struct wpabuf *decrypted; local 168 decrypted = wpabuf_alloc(encr_len - block_size); 169 if (decrypted == NULL) 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 175 wpabuf_len(decrypted))) { 176 wpabuf_free(decrypted); 181 decrypted); 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_enrollee.c | 991 struct wpabuf *decrypted; local 994 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 996 if (decrypted == NULL) { 1003 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1005 if (wps_parse_msg(decrypted, &eattr) < 0 || 1006 wps_process_key_wrap_auth(wps, decrypted, 1010 wpabuf_free(decrypted); 1014 wpabuf_free(decrypted); 1085 struct wpabuf *decrypted; local 1105 decrypted 1140 struct wpabuf *decrypted; local 1197 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 155 struct wpabuf *decrypted; local 168 decrypted = wpabuf_alloc(encr_len - block_size); 169 if (decrypted == NULL) 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 175 wpabuf_len(decrypted))) { 176 wpabuf_free(decrypted); 181 decrypted); 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
H A D | pkcs1.py | 227 decrypted = core.decrypt_int(encrypted, priv_key.d, priv_key.n) 228 cleartext = transform.int2bytes(decrypted, blocksize) 303 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n) 304 clearsig = transform.int2bytes(decrypted, blocksize)
|
/external/fonttools/Lib/fontTools/ |
H A D | t1Lib.py | 298 decrypted, R = eexec.decrypt(chunk, 55665) 299 decrypted = decrypted[4:] 300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \ 301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND: 303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r' 304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
|
/external/fonttools/Tools/fontTools/ |
H A D | t1Lib.py | 298 decrypted, R = eexec.decrypt(chunk, 55665) 299 decrypted = decrypted[4:] 300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \ 301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND: 303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r' 304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 320 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 320 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 276 decrypted = os_malloc(left); 277 if (decrypted == NULL) { 282 os_memcpy(decrypted, msg, left); 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 290 os_free(decrypted); 294 decrypted, left); 297 switch (decrypted[0] >> 6) { 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 320 os_free(decrypted); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 334 u8 *decrypted, nonce[16]; local 374 decrypted = os_malloc(left); 375 if (decrypted == NULL) 377 os_memcpy(decrypted, pos, left); 380 wpabuf_head(respData), 22, decrypted, left, 383 os_free(decrypted); 388 decrypted, left); 391 switch (decrypted[0] >> 6) { 405 os_free(decrypted);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 334 u8 *decrypted, nonce[16]; local 374 decrypted = os_malloc(left); 375 if (decrypted == NULL) 377 os_memcpy(decrypted, pos, left); 380 wpabuf_head(respData), 22, decrypted, left, 383 os_free(decrypted); 388 decrypted, left); 391 switch (decrypted[0] >> 6) { 405 os_free(decrypted);
|