/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | AesGcmTest.java | 238 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); in testByteBuffer() local 262 ByteBuffer decrypted = ByteBuffer.wrap(backingArray); in testByteBufferAlias() local 288 ByteBuffer decrypted = ByteBuffer.allocate(outputSize); in testReadOnlyByteBuffer() local 347 ByteBuffer decrypted = ByteBuffer.allocate(test.pt.length - 1); in testByteBufferTooShort() local
|
/external/libvpx/libvpx/vp8/decoder/ |
D | dboolhuff.c | 43 unsigned char decrypted[sizeof(VP8_BD_VALUE) + 1]; in vp8dx_bool_decoder_fill() local
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_enrollee.c | 996 struct wpabuf *decrypted; in wps_process_m2() local 1090 struct wpabuf *decrypted; in wps_process_m4() local 1145 struct wpabuf *decrypted; in wps_process_m6() local 1202 struct wpabuf *decrypted; in wps_process_m8() local
|
D | wps_common.c | 158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
|
D | wps_registrar.c | 2827 struct wpabuf *decrypted; in wps_process_m5() local 2978 struct wpabuf *decrypted; in wps_process_m7() local
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs1.c | 202 u8 *decrypted; in pkcs1_v15_sig_ver() local
|
D | tlsv1_common.c | 420 const u8 *decrypted; in tls_verify_signature() local
|
/external/openssh/ |
D | ssh-rsa.c | 313 u_char *decrypted = NULL; in openssh_RSA_verify() local
|
D | sshkey.c | 3199 struct sshbuf *kdf = NULL, *decrypted = NULL; in sshkey_parse_private2() local 3665 struct sshbuf *decrypted = NULL, *copy = NULL; in sshkey_parse_private_rsa1() local
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 451 u8 *decrypted; in ikev2_process_sa_init_encr() local 715 u8 *decrypted; in ikev2_process_sa_auth() local
|
D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
|
D | eap_server_sim.c | 612 u8 *decrypted = NULL; in eap_sim_process_reauth() local
|
D | eap_server_aka.c | 1057 u8 *decrypted = NULL; in eap_aka_process_reauth() local
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sim.c | 819 u8 *decrypted; in eap_sim_process_challenge() local 853 u8 *decrypted; in eap_sim_process_notification_reauth() local 952 u8 *decrypted; in eap_sim_process_reauthentication() local
|
D | eap_aka.c | 1080 u8 *decrypted; in eap_aka_process_challenge() local 1114 u8 *decrypted; in eap_aka_process_notification_reauth() local 1212 u8 *decrypted; in eap_aka_process_reauthentication() local
|
D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
|
D | eap_fast.c | 1086 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, in eap_fast_parse_decrypted() 1181 struct wpabuf *decrypted, in eap_fast_process_decrypted()
|
D | ikev2.c | 649 u8 *decrypted; in ikev2_process_sa_auth() local
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
|
D | eap_sim_common.c | 937 u8 *decrypted; in eap_sim_parse_encr() local
|
/external/grpc-grpc/test/core/tsi/alts/crypt/ |
D | aes_gcm_test.cc | 350 uint8_t* decrypted = static_cast<uint8_t*>(malloc(decrypted_length)); in gsec_test_multiple_random_encrypt_decrypt() local
|