Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 25 of 55) sorted by relevance

123

/external/wpa_supplicant_8/src/tls/
Dpkcs1.c202 u8 *decrypted; in pkcs1_v15_sig_ver() local
208 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
209 if (decrypted == NULL) in pkcs1_v15_sig_ver()
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver()
216 os_free(decrypted); in pkcs1_v15_sig_ver()
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver()
240 os_free(decrypted); in pkcs1_v15_sig_ver()
261 os_free(decrypted); in pkcs1_v15_sig_ver()
269 os_free(decrypted); in pkcs1_v15_sig_ver()
[all …]
Dtlsv1_common.c420 const u8 *decrypted; in tls_verify_signature() local
460 decrypted = buf; in tls_verify_signature()
463 decrypted, buflen); in tls_verify_signature()
486 decrypted = buf + 19; in tls_verify_signature()
493 decrypted = buf + 19; in tls_verify_signature()
500 decrypted = buf + 19; in tls_verify_signature()
513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/external/wpa_supplicant_8/src/wps/
Dwps_enrollee.c996 struct wpabuf *decrypted; in wps_process_m2() local
999 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2()
1001 if (decrypted == NULL) { in wps_process_m2()
1010 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2()
1011 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2()
1015 wpabuf_clear_free(decrypted); in wps_process_m2()
1019 wpabuf_clear_free(decrypted); in wps_process_m2()
1090 struct wpabuf *decrypted; in wps_process_m4() local
1110 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4()
1112 if (decrypted == NULL) { in wps_process_m4()
[all …]
Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings()
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings()
188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
[all …]
/external/wycheproof/java/com/google/security/wycheproof/testcases/
DAesGcmTest.java238 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); in testByteBuffer() local
240 cipher.doFinal(ctBuffer, decrypted); in testByteBuffer()
241 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted)); in testByteBuffer()
262 ByteBuffer decrypted = ByteBuffer.wrap(backingArray); in testByteBufferAlias() local
266 cipher.doFinal(ctBuffer, decrypted); in testByteBufferAlias()
267 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted)); in testByteBufferAlias()
288 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); in testReadOnlyByteBuffer() local
290 cipher.doFinal(ctBuffer, decrypted); in testReadOnlyByteBuffer()
291 assertEquals(test.ptHex, TestUtil.byteBufferToHex(decrypted)); in testReadOnlyByteBuffer()
347 ByteBuffer decrypted = ByteBuffer.allocate(test.pt.length - 1); in testByteBufferTooShort() local
[all …]
DCipherOutputStreamTest.java144 byte[] decrypted = os.toByteArray(); in testCorruptDecrypt()
148 if (decrypted.length > 0) { in testCorruptDecrypt()
151 + TestUtil.bytesToHex(decrypted) in testCorruptDecrypt()
175 byte[] decrypted = os.toByteArray(); in testCorruptDecryptEmpty()
178 + TestUtil.bytesToHex(decrypted) in testCorruptDecryptEmpty()
/external/wpa_supplicant_8/src/eap_peer/
Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3()
[all …]
Deap_sim.c819 u8 *decrypted; in eap_sim_process_challenge() local
820 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
823 if (decrypted == NULL) { in eap_sim_process_challenge()
828 os_free(decrypted); in eap_sim_process_challenge()
853 u8 *decrypted; in eap_sim_process_notification_reauth() local
861 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
864 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
874 os_free(decrypted); in eap_sim_process_notification_reauth()
878 os_free(decrypted); in eap_sim_process_notification_reauth()
952 u8 *decrypted; in eap_sim_process_reauthentication() local
[all …]
Deap_aka.c1080 u8 *decrypted; in eap_aka_process_challenge() local
1081 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1084 if (decrypted == NULL) { in eap_aka_process_challenge()
1089 os_free(decrypted); in eap_aka_process_challenge()
1114 u8 *decrypted; in eap_aka_process_notification_reauth() local
1122 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1125 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1135 os_free(decrypted); in eap_aka_process_notification_reauth()
1139 os_free(decrypted); in eap_aka_process_notification_reauth()
1212 u8 *decrypted; in eap_aka_process_reauthentication() local
[all …]
/external/openssh/
Dssh-rsa.c313 u_char *decrypted = NULL; in openssh_RSA_verify() local
329 if ((decrypted = malloc(rsasize)) == NULL) { in openssh_RSA_verify()
333 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
342 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; in openssh_RSA_verify()
343 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; in openssh_RSA_verify()
350 if (decrypted) { in openssh_RSA_verify()
351 explicit_bzero(decrypted, rsasize); in openssh_RSA_verify()
352 free(decrypted); in openssh_RSA_verify()
/external/libvpx/libvpx/vp8/decoder/
Ddboolhuff.c43 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; in vp8dx_bool_decoder_fill() local
46 size_t n = VPXMIN(sizeof(decrypted), bytes_left); in vp8dx_bool_decoder_fill()
47 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); in vp8dx_bool_decoder_fill()
48 bufptr = decrypted; in vp8dx_bool_decoder_fill()
/external/python/rsa/rsa/
Dpkcs1.py234 decrypted = priv_key.blinded_decrypt(encrypted)
235 cleartext = transform.int2bytes(decrypted, blocksize)
323 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n)
324 clearsig = transform.int2bytes(decrypted, keylength)
354 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n)
355 clearsig = transform.int2bytes(decrypted, keylength)
/external/python/rsa/tests/
Dtest_strings.py39 decrypted = rsa.decrypt(encrypted, self.priv)
40 print("\tDecrypted: %s" % decrypted)
42 self.assertEqual(message, decrypted)
Dtest_integers.py36 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n)
37 print("\tDecrypted: %d" % decrypted)
39 self.assertEqual(message, decrypted)
Dtest_pkcs1.py38 decrypted = pkcs1.decrypt(encrypted, self.priv)
39 print("\tDecrypted: %r" % decrypted)
41 self.assertEqual(message, decrypted)
/external/fonttools/Lib/fontTools/t1Lib/
D__init__.py294 decrypted, R = eexec.decrypt(chunk, 55665)
295 decrypted = decrypted[4:]
296 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \
297 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND:
299 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + b'\r'
300 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
/external/wpa_supplicant_8/src/eap_server/
Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
715 u8 *decrypted; in ikev2_process_sa_auth() local
719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
723 if (decrypted == NULL) in ikev2_process_sa_auth()
727 decrypted, decrypted_len); in ikev2_process_sa_auth()
[all …]
/external/conscrypt/testing/src/main/java/org/conscrypt/java/security/
DCipherHelper.java44 byte[] decrypted = cipher.doFinal(encrypted); in test()
45 String decryptedString = new String(decrypted, "UTF-8"); in test()
DAlgorithmParameterAsymmetricHelper.java53 byte[] decrypted = cipher.doFinal(bs); in test()
54 assertTrue(Arrays.equals(plainData.getBytes("UTF-8"), decrypted)); in test()
DAlgorithmParameterSymmetricHelper.java61 byte[] decrypted = cipher.doFinal(bs); in test()
63 assertTrue(Arrays.equals(plainData.getBytes("UTF-8"), decrypted)); in test()
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/java/security/
DCipherHelper.java48 byte[] decrypted = cipher.doFinal(encrypted); in test()
49 String decryptedString = new String(decrypted, "UTF-8"); in test()
DAlgorithmParameterAsymmetricHelper.java57 byte[] decrypted = cipher.doFinal(bs); in test()
58 assertTrue(Arrays.equals(plainData.getBytes("UTF-8"), decrypted)); in test()
DAlgorithmParameterSymmetricHelper.java65 byte[] decrypted = cipher.doFinal(bs); in test()
67 assertTrue(Arrays.equals(plainData.getBytes("UTF-8"), decrypted)); in test()
/external/wpa_supplicant_8/src/eap_common/
Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()

123