Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 9 of 9) sorted by relevance

/external/wpa_supplicant/
Deap_psk.c183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
265 decrypted = os_malloc(left); in eap_psk_process_3()
266 if (decrypted == NULL) { in eap_psk_process_3()
271 os_memcpy(decrypted, msg, left); in eap_psk_process_3()
274 reqData, 22, decrypted, left, tag)) { in eap_psk_process_3()
276 os_free(decrypted); in eap_psk_process_3()
280 decrypted, left); in eap_psk_process_3()
283 switch (decrypted[0] >> 6) { in eap_psk_process_3()
302 os_free(decrypted); in eap_psk_process_3()
319 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3()
[all …]
Deap_aka.c490 u8 *decrypted; in eap_aka_process_challenge() local
491 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
494 if (decrypted == NULL) { in eap_aka_process_challenge()
500 os_free(decrypted); in eap_aka_process_challenge()
520 u8 *decrypted; in eap_aka_process_notification_reauth() local
528 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
531 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
541 os_free(decrypted); in eap_aka_process_notification_reauth()
545 os_free(decrypted); in eap_aka_process_notification_reauth()
624 u8 *decrypted; in eap_aka_process_reauthentication() local
[all …]
Deap_sim.c569 u8 *decrypted; in eap_sim_process_challenge() local
570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
573 if (decrypted == NULL) { in eap_sim_process_challenge()
579 os_free(decrypted); in eap_sim_process_challenge()
599 u8 *decrypted; in eap_sim_process_notification_reauth() local
607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
610 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
620 os_free(decrypted); in eap_sim_process_notification_reauth()
624 os_free(decrypted); in eap_sim_process_notification_reauth()
703 u8 *decrypted; in eap_sim_process_reauthentication() local
[all …]
Deap_sim_common.c571 u8 *decrypted; in eap_sim_parse_encr() local
578 decrypted = os_malloc(encr_data_len); in eap_sim_parse_encr()
579 if (decrypted == NULL) in eap_sim_parse_encr()
581 os_memcpy(decrypted, encr_data, encr_data_len); in eap_sim_parse_encr()
583 aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len); in eap_sim_parse_encr()
585 decrypted, encr_data_len); in eap_sim_parse_encr()
587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr()
591 os_free(decrypted); in eap_sim_parse_encr()
595 return decrypted; in eap_sim_parse_encr()
/external/ipsec-tools/src/racoon/doc/
DREADME.plainrsa6 encrypted by a public key can be decrypted only by the corresponding
10 decrypted by the public key so that the public knows that this
/external/openssl/crypto/des/
DINSTALL57 decrypted the files on a SparcStation.
/external/ipsec-tools/src/racoon/
DTODO13 o save decrypted IKE packet in tcpdump format
/external/tcpdump/
DCHANGES173 changed syntax of -E argument so that multiple SAs can be decrypted
/external/dropbear/libtomcrypt/
Dcrypt.tex530 pt, /* store decrypted data here */
533 /* now we have decrypted ct to the original plaintext in pt */
1192 …es, the \textit{eax} state will be initialized such that you can now either have data decrypted or
3364 If the RSA decrypted data is not a valid OAEP packet then \textit{stat} is set to $0$. Otherwise, …