Searched refs:decrypted (Results 1 - 17 of 17) sorted by relevance

/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_psk.c183 u8 *buf, *rpchannel, nonce[16], *decrypted; local
274 decrypted = os_malloc(left);
275 if (decrypted == NULL) {
280 os_memcpy(decrypted, msg, left);
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
[all...]
H A Deap_sim.c688 u8 *decrypted; local
689 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
692 if (decrypted == NULL) {
697 os_free(decrypted);
722 u8 *decrypted; local
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
733 if (decrypted == NULL) {
743 os_free(decrypted);
747 os_free(decrypted);
820 u8 *decrypted; local
[all...]
H A Deap_aka.c919 u8 *decrypted; local
920 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
923 if (decrypted == NULL) {
928 os_free(decrypted);
953 u8 *decrypted; local
961 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
964 if (decrypted == NULL) {
974 os_free(decrypted);
978 os_free(decrypted);
1050 u8 *decrypted; local
[all...]
H A Dikev2.c662 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
666 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
684 u8 *decrypted; local
688 decrypted = ikev2_decrypt_payload(data->proposal.encr,
692 if (decrypted == NULL)
696 decrypted, decrypted_len);
697 os_free(decrypted);
H A Deap_fast.c26 * - password change (pending mschapv2 packet; replay decrypted packet)
1050 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, argument
1059 /* Parse TLVs from the decrypted Phase 2 data */
1060 pos = wpabuf_mhead(decrypted);
1061 end = pos + wpabuf_len(decrypted);
1143 struct wpabuf *decrypted,
1150 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
1139 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument
/freebsd-10.0-release/crypto/openssh/
H A Dssh-rsa.c216 u_char *decrypted = NULL; local
242 decrypted = xmalloc(rsasize);
243 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen);
253 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
265 free(decrypted);
H A Dauthfile.c421 Buffer decrypted; local
469 /* Initialize space for decrypted data. */
470 buffer_init(&decrypted);
471 cp = buffer_append_space(&decrypted, buffer_len(&copy));
482 check1 = buffer_get_char(&decrypted);
483 check2 = buffer_get_char(&decrypted);
484 if (check1 != buffer_get_char(&decrypted) ||
485 check2 != buffer_get_char(&decrypted)) {
489 buffer_free(&decrypted);
493 buffer_get_bignum(&decrypted, pr
[all...]
/freebsd-10.0-release/contrib/wpa/src/wps/
H A Dwps_common.c152 struct wpabuf *decrypted; local
165 decrypted = wpabuf_alloc(encr_len - block_size);
166 if (decrypted == NULL)
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
172 wpabuf_len(decrypted))) {
173 wpabuf_free(decrypted);
178 decrypted);
180 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
H A Dwps_enrollee.c947 struct wpabuf *decrypted; local
967 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
969 if (decrypted == NULL) {
970 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
976 if (wps_validate_m4_encr(decrypted, attr->version2 != NULL) < 0) {
977 wpabuf_free(decrypted);
982 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
984 if (wps_parse_msg(decrypted, &eattr) < 0 ||
985 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
987 wpabuf_free(decrypted);
1002 struct wpabuf *decrypted; local
1059 struct wpabuf *decrypted; local
[all...]
H A Dwps_registrar.c2637 struct wpabuf *decrypted; local
2664 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
2666 if (decrypted == NULL) {
2667 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
2673 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) {
2674 wpabuf_free(decrypted);
2679 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
2681 if (wps_parse_msg(decrypted, &eattr) < 0 ||
2682 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
2684 wpabuf_free(decrypted);
2788 struct wpabuf *decrypted; local
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_psk.c336 u8 *decrypted, nonce[16]; local
376 decrypted = os_malloc(left);
377 if (decrypted == NULL)
379 os_memcpy(decrypted, pos, left);
382 wpabuf_head(respData), 22, decrypted, left,
385 os_free(decrypted);
390 decrypted, left);
393 switch (decrypted[0] >> 6) {
407 os_free(decrypted);
H A Dikev2.c451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
694 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
698 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
716 u8 *decrypted; local
[all...]
H A Deap_server_sim.c609 u8 *decrypted = NULL; local
625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
628 if (decrypted == NULL) {
640 os_free(decrypted);
641 decrypted = NULL;
679 os_free(decrypted);
H A Deap_server_aka.c1052 u8 *decrypted = NULL; local
1070 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1073 if (decrypted == NULL) {
1085 os_free(decrypted);
1086 decrypted = NULL;
1136 os_free(decrypted);
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_sim_common.c939 u8 *decrypted; local
946 decrypted = os_malloc(encr_data_len);
947 if (decrypted == NULL)
949 os_memcpy(decrypted, encr_data, encr_data_len);
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
952 os_free(decrypted);
956 decrypted, encr_data_len);
958 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
961 "decrypted AT_ENCR_DAT
[all...]
H A Dikev2_common.c498 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
557 decrypted = os_malloc(decrypted_len);
558 if (decrypted == NULL)
562 decrypted, decrypted_len) < 0) {
563 os_free(decrypted);
567 pad_len = decrypted[decrypted_len - 1];
571 os_free(decrypted);
578 return decrypted;
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dks_file.c180 int decrypted = 0; local
269 decrypted = 1;
274 if (!decrypted) {

Completed in 296 milliseconds