/external/wpa_supplicant_8/src/tls/ |
D | pkcs1.c | 202 u8 *decrypted; in pkcs1_v15_sig_ver() local 208 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver() 209 if (decrypted == NULL) in pkcs1_v15_sig_ver() 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver() 216 os_free(decrypted); in pkcs1_v15_sig_ver() 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver() 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver() 240 os_free(decrypted); in pkcs1_v15_sig_ver() 261 os_free(decrypted); in pkcs1_v15_sig_ver() 269 os_free(decrypted); in pkcs1_v15_sig_ver() [all …]
|
D | tlsv1_common.c | 420 const u8 *decrypted; in tls_verify_signature() local 460 decrypted = buf; in tls_verify_signature() 463 decrypted, buflen); in tls_verify_signature() 486 decrypted = buf + 19; in tls_verify_signature() 493 decrypted = buf + 19; in tls_verify_signature() 500 decrypted = buf + 19; in tls_verify_signature() 513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_enrollee.c | 991 struct wpabuf *decrypted; in wps_process_m2() local 994 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2() 996 if (decrypted == NULL) { in wps_process_m2() 1005 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2() 1006 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2() 1010 wpabuf_free(decrypted); in wps_process_m2() 1014 wpabuf_free(decrypted); in wps_process_m2() 1085 struct wpabuf *decrypted; in wps_process_m4() local 1105 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4() 1107 if (decrypted == NULL) { in wps_process_m4() [all …]
|
D | wps_common.c | 155 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local 168 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings() 169 if (decrypted == NULL) in wps_decrypt_encr_settings() 173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings() 174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings() 175 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings() 176 wpabuf_free(decrypted); in wps_decrypt_encr_settings() 181 decrypted); in wps_decrypt_encr_settings() 183 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings() 185 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings() [all …]
|
D | wps_registrar.c | 2751 struct wpabuf *decrypted; in wps_process_m5() local 2778 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m5() 2780 if (decrypted == NULL) { in wps_process_m5() 2787 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { in wps_process_m5() 2788 wpabuf_free(decrypted); in wps_process_m5() 2795 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m5() 2796 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || in wps_process_m5() 2798 wpabuf_free(decrypted); in wps_process_m5() 2802 wpabuf_free(decrypted); in wps_process_m5() 2902 struct wpabuf *decrypted; in wps_process_m7() local [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 276 decrypted = os_malloc(left); in eap_psk_process_3() 277 if (decrypted == NULL) { in eap_psk_process_3() 282 os_memcpy(decrypted, msg, left); in eap_psk_process_3() 287 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3() 290 os_free(decrypted); in eap_psk_process_3() 294 decrypted, left); in eap_psk_process_3() 297 switch (decrypted[0] >> 6) { in eap_psk_process_3() 314 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3() 320 os_free(decrypted); in eap_psk_process_3() [all …]
|
D | eap_sim.c | 792 u8 *decrypted; in eap_sim_process_challenge() local 793 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 796 if (decrypted == NULL) { in eap_sim_process_challenge() 801 os_free(decrypted); in eap_sim_process_challenge() 826 u8 *decrypted; in eap_sim_process_notification_reauth() local 834 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 837 if (decrypted == NULL) { in eap_sim_process_notification_reauth() 847 os_free(decrypted); in eap_sim_process_notification_reauth() 851 os_free(decrypted); in eap_sim_process_notification_reauth() 924 u8 *decrypted; in eap_sim_process_reauthentication() local [all …]
|
D | eap_aka.c | 1028 u8 *decrypted; in eap_aka_process_challenge() local 1029 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1032 if (decrypted == NULL) { in eap_aka_process_challenge() 1037 os_free(decrypted); in eap_aka_process_challenge() 1062 u8 *decrypted; in eap_aka_process_notification_reauth() local 1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1073 if (decrypted == NULL) { in eap_aka_process_notification_reauth() 1083 os_free(decrypted); in eap_aka_process_notification_reauth() 1087 os_free(decrypted); in eap_aka_process_notification_reauth() 1159 u8 *decrypted; in eap_aka_process_reauthentication() local [all …]
|
D | ikev2.c | 650 u8 *decrypted; in ikev2_process_sa_auth() local 654 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 658 if (decrypted == NULL) in ikev2_process_sa_auth() 662 decrypted, decrypted_len); in ikev2_process_sa_auth() 663 os_free(decrypted); in ikev2_process_sa_auth()
|
/external/libvpx/libvpx/vp8/decoder/ |
D | dboolhuff.c | 49 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; in vp8dx_bool_decoder_fill() local 52 size_t n = VPXMIN(sizeof(decrypted), bytes_left); in vp8dx_bool_decoder_fill() 53 br->decrypt_cb(br->decrypt_state, bufptr, decrypted, (int)n); in vp8dx_bool_decoder_fill() 54 bufptr = decrypted; in vp8dx_bool_decoder_fill()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
D | test_strings.py | 24 decrypted = rsa.decrypt(encrypted, self.priv) 25 print("\tDecrypted: %s" % decrypted) 27 self.assertEqual(message, decrypted)
|
D | test_integers.py | 20 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n) 21 print("\tDecrypted: %d" % decrypted) 23 self.assertEqual(message, decrypted)
|
D | test_pkcs1.py | 23 decrypted = pkcs1.decrypt(encrypted, self.priv) 24 print("\tDecrypted: %r" % decrypted) 26 self.assertEqual(message, decrypted)
|
/external/fonttools/Lib/fontTools/ |
D | t1Lib.py | 298 decrypted, R = eexec.decrypt(chunk, 55665) 299 decrypted = decrypted[4:] 300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \ 301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND: 303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r' 304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_psk.c | 334 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 374 decrypted = os_malloc(left); in eap_psk_process_4() 375 if (decrypted == NULL) in eap_psk_process_4() 377 os_memcpy(decrypted, pos, left); in eap_psk_process_4() 380 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4() 383 os_free(decrypted); in eap_psk_process_4() 388 decrypted, left); in eap_psk_process_4() 391 switch (decrypted[0] >> 6) { in eap_psk_process_4() 405 os_free(decrypted); in eap_psk_process_4()
|
D | ikev2.c | 451 u8 *decrypted; in ikev2_process_sa_init_encr() local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() 460 if (decrypted == NULL) in ikev2_process_sa_init_encr() 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr() 466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr() 475 os_free(decrypted); in ikev2_process_sa_init_encr() 716 u8 *decrypted; in ikev2_process_sa_auth() local 720 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 724 if (decrypted == NULL) in ikev2_process_sa_auth() 728 decrypted, decrypted_len); in ikev2_process_sa_auth() [all …]
|
D | eap_server_sim.c | 609 u8 *decrypted = NULL; in eap_sim_process_reauth() local 625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth() 628 if (decrypted == NULL) { in eap_sim_process_reauth() 640 os_free(decrypted); in eap_sim_process_reauth() 641 decrypted = NULL; in eap_sim_process_reauth() 679 os_free(decrypted); in eap_sim_process_reauth()
|
D | eap_server_aka.c | 1053 u8 *decrypted = NULL; in eap_aka_process_reauth() local 1071 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth() 1074 if (decrypted == NULL) { in eap_aka_process_reauth() 1086 os_free(decrypted); in eap_aka_process_reauth() 1087 decrypted = NULL; in eap_aka_process_reauth() 1137 os_free(decrypted); in eap_aka_process_reauth()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
D | pkcs1.py | 227 decrypted = core.decrypt_int(encrypted, priv_key.d, priv_key.n) 228 cleartext = transform.int2bytes(decrypted, blocksize) 303 decrypted = core.decrypt_int(encrypted, pub_key.e, pub_key.n) 304 clearsig = transform.int2bytes(decrypted, blocksize)
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local 495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload() 496 if (decrypted == NULL) in ikev2_decrypt_payload() 500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload() 501 os_free(decrypted); in ikev2_decrypt_payload() 505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload() 509 os_free(decrypted); in ikev2_decrypt_payload() 516 return decrypted; in ikev2_decrypt_payload()
|
D | eap_sim_common.c | 939 u8 *decrypted; in eap_sim_parse_encr() local 946 decrypted = os_malloc(encr_data_len); in eap_sim_parse_encr() 947 if (decrypted == NULL) in eap_sim_parse_encr() 949 os_memcpy(decrypted, encr_data, encr_data_len); in eap_sim_parse_encr() 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 952 os_free(decrypted); in eap_sim_parse_encr() 956 decrypted, encr_data_len); in eap_sim_parse_encr() 958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr() 962 os_free(decrypted); in eap_sim_parse_encr() 966 return decrypted; in eap_sim_parse_encr()
|
/external/boringssl/src/crypto/rsa/ |
D | rsa_test.cc | 643 uint8_t encrypted[kBits / 8], decrypted[kBits / 8]; in TestMultiPrimeKeygen() local 655 !RSA_decrypt(rsa.get(), &decrypted_len, decrypted, sizeof(decrypted), in TestMultiPrimeKeygen() 658 memcmp(decrypted, kMessage, sizeof(kMessage)) != 0) { in TestMultiPrimeKeygen()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
D | upgrading.rst | 23 decrypted = rsa200.decrypt(old_crypto, version_200_private_key) 24 new_crypto = rsa.encrypt(decrypted, version_3_public_key)
|
/external/tpm2/ |
D | CryptUtil.c | 2259 BYTE *decrypted, in CryptSymmetricDecrypt() argument 2307 _cpri__AESDecryptCTR(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() 2311 _cpri__AESDecryptOFB(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() 2315 _cpri__AESDecryptCBC(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() 2319 _cpri__AESDecryptCFB(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() 2323 _cpri__AESDecryptECB(decrypted, keySizeInBits, key, in CryptSymmetricDecrypt() 2337 _cpri__SM4DecryptCTR(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() 2341 _cpri__SM4DecryptOFB(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() 2345 _cpri__SM4DecryptCBC(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() 2349 _cpri__SM4DecryptCFB(decrypted, keySizeInBits, key, iv, in CryptSymmetricDecrypt() [all …]
|
/external/ipsec-tools/src/racoon/doc/ |
D | README.plainrsa | 6 encrypted by a public key can be decrypted only by the corresponding 10 decrypted by the public key so that the public knows that this
|