Searched refs:decrypted (Results 1 – 9 of 9) sorted by relevance
/external/wpa_supplicant/ |
D | eap_psk.c | 183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 265 decrypted = os_malloc(left); in eap_psk_process_3() 266 if (decrypted == NULL) { in eap_psk_process_3() 271 os_memcpy(decrypted, msg, left); in eap_psk_process_3() 274 reqData, 22, decrypted, left, tag)) { in eap_psk_process_3() 276 os_free(decrypted); in eap_psk_process_3() 280 decrypted, left); in eap_psk_process_3() 283 switch (decrypted[0] >> 6) { in eap_psk_process_3() 302 os_free(decrypted); in eap_psk_process_3() 319 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3() [all …]
|
D | eap_aka.c | 490 u8 *decrypted; in eap_aka_process_challenge() local 491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 494 if (decrypted == NULL) { in eap_aka_process_challenge() 500 os_free(decrypted); in eap_aka_process_challenge() 520 u8 *decrypted; in eap_aka_process_notification_reauth() local 528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 531 if (decrypted == NULL) { in eap_aka_process_notification_reauth() 541 os_free(decrypted); in eap_aka_process_notification_reauth() 545 os_free(decrypted); in eap_aka_process_notification_reauth() 624 u8 *decrypted; in eap_aka_process_reauthentication() local [all …]
|
D | eap_sim.c | 569 u8 *decrypted; in eap_sim_process_challenge() local 570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 573 if (decrypted == NULL) { in eap_sim_process_challenge() 579 os_free(decrypted); in eap_sim_process_challenge() 599 u8 *decrypted; in eap_sim_process_notification_reauth() local 607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 610 if (decrypted == NULL) { in eap_sim_process_notification_reauth() 620 os_free(decrypted); in eap_sim_process_notification_reauth() 624 os_free(decrypted); in eap_sim_process_notification_reauth() 703 u8 *decrypted; in eap_sim_process_reauthentication() local [all …]
|
D | eap_sim_common.c | 571 u8 *decrypted; in eap_sim_parse_encr() local 578 decrypted = os_malloc(encr_data_len); in eap_sim_parse_encr() 579 if (decrypted == NULL) in eap_sim_parse_encr() 581 os_memcpy(decrypted, encr_data, encr_data_len); in eap_sim_parse_encr() 583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len); in eap_sim_parse_encr() 585 decrypted, encr_data_len); in eap_sim_parse_encr() 587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr() 591 os_free(decrypted); in eap_sim_parse_encr() 595 return decrypted; in eap_sim_parse_encr()
|
/external/ipsec-tools/src/racoon/doc/ |
D | README.plainrsa | 6 encrypted by a public key can be decrypted only by the corresponding 10 decrypted by the public key so that the public knows that this
|
/external/openssl/crypto/des/ |
D | INSTALL | 57 decrypted the files on a SparcStation.
|
/external/ipsec-tools/src/racoon/ |
D | TODO | 13 o save decrypted IKE packet in tcpdump format
|
/external/tcpdump/ |
D | CHANGES | 173 changed syntax of -E argument so that multiple SAs can be decrypted
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 530 pt, /* store decrypted data here */ 533 /* now we have decrypted ct to the original plaintext in pt */ 1192 …es, the \textit{eax} state will be initialized such that you can now either have data decrypted or 3364 If the RSA decrypted data is not a valid OAEP packet then \textit{stat} is set to $0$. Otherwise, …
|