Searched refs:decrypted (Results 1 - 20 of 20) sorted by relevance

/freebsd-11-stable/contrib/wpa/src/tls/
H A Dpkcs1.c202 u8 *decrypted; local
208 decrypted = os_malloc(s_len);
209 if (decrypted == NULL)
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
216 os_free(decrypted);
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
240 os_free(decrypted);
261 os_free(decrypted);
269 os_free(decrypted);
[all...]
H A Dtlsv1_common.c420 const u8 *decrypted; local
460 decrypted = buf;
463 decrypted, buflen);
486 decrypted = buf + 19;
493 decrypted = buf + 19;
500 decrypted = buf + 19;
513 os_memcmp_const(decrypted, data, data_len) != 0) {
/freebsd-11-stable/contrib/wpa/src/wps/
H A Dwps_enrollee.c996 struct wpabuf *decrypted; local
999 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
1001 if (decrypted == NULL) {
1008 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
1010 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1011 wps_process_key_wrap_auth(wps, decrypted,
1015 wpabuf_clear_free(decrypted);
1019 wpabuf_clear_free(decrypted);
1090 struct wpabuf *decrypted; local
1110 decrypted
1145 struct wpabuf *decrypted; local
1202 struct wpabuf *decrypted; local
[all...]
H A Dwps_common.c158 struct wpabuf *decrypted; local
171 decrypted = wpabuf_alloc(encr_len - block_size);
172 if (decrypted == NULL)
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
178 wpabuf_len(decrypted))) {
179 wpabuf_clear_free(decrypted);
184 decrypted);
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
H A Dwps_registrar.c2827 struct wpabuf *decrypted; local
2854 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
2856 if (decrypted == NULL) {
2857 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
2863 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) {
2864 wpabuf_clear_free(decrypted);
2869 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
2871 if (wps_parse_msg(decrypted, &eattr) < 0 ||
2872 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
2874 wpabuf_clear_free(decrypted);
2978 struct wpabuf *decrypted; local
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dssh-rsa.c313 u_char *decrypted = NULL; local
329 if ((decrypted = malloc(rsasize)) == NULL) {
333 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
342 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
343 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
350 if (decrypted) {
351 explicit_bzero(decrypted, rsasize);
352 free(decrypted);
H A Dsshkey.c3199 struct sshbuf *kdf = NULL, *decrypted = NULL; local
3212 (decrypted = sshbuf_new()) == NULL) {
3329 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 ||
3349 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 ||
3350 (r = sshbuf_get_u32(decrypted, &check2)) != 0)
3358 if ((r = sshkey_private_deserialize(decrypted, &k)) != 0 ||
3359 (r = sshbuf_get_cstring(decrypted, &comment, NULL)) != 0)
3364 while (sshbuf_len(decrypted)) {
3365 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0)
3402 sshbuf_free(decrypted);
3665 struct sshbuf *decrypted = NULL, *copy = NULL; local
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; local
275 decrypted = os_memdup(msg, left);
276 if (decrypted == NULL) {
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
330 if (decrypted[
[all...]
H A Deap_sim.c823 u8 *decrypted; local
824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
827 if (decrypted == NULL) {
832 os_free(decrypted);
857 u8 *decrypted; local
865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
868 if (decrypted == NULL) {
878 os_free(decrypted);
882 os_free(decrypted);
956 u8 *decrypted; local
[all...]
H A Deap_aka.c1089 u8 *decrypted; local
1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1093 if (decrypted == NULL) {
1098 os_free(decrypted);
1123 u8 *decrypted; local
1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1134 if (decrypted == NULL) {
1144 os_free(decrypted);
1148 os_free(decrypted);
1221 u8 *decrypted; local
[all...]
H A Dikev2.c627 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
631 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
649 u8 *decrypted; local
653 decrypted = ikev2_decrypt_payload(data->proposal.encr,
657 if (decrypted == NULL)
661 decrypted, decrypted_len);
662 os_free(decrypted);
H A Deap_teap.c1095 static int eap_teap_parse_decrypted(struct wpabuf *decrypted, argument
1106 /* Parse TLVs from the decrypted Phase 2 data */
1107 pos = wpabuf_mhead(decrypted);
1108 end = pos + wpabuf_len(decrypted);
1185 struct wpabuf *decrypted,
1193 if (eap_teap_parse_decrypted(decrypted, &tlv, &resp) < 0) {
1181 eap_teap_process_decrypted(struct eap_sm *sm, struct eap_teap_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
H A Deap_fast.c26 * - password change (pending mschapv2 packet; replay decrypted packet)
1086 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, argument
1096 /* Parse TLVs from the decrypted Phase 2 data */
1097 pos = wpabuf_mhead(decrypted);
1098 end = pos + wpabuf_len(decrypted);
1181 struct wpabuf *decrypted,
1188 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
1177 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
495 decrypted = os_malloc(decrypted_len);
496 if (decrypted == NULL)
500 decrypted, decrypted_len) < 0) {
501 os_free(decrypted);
505 pad_len = decrypted[decrypted_len - 1];
509 os_free(decrypted);
516 return decrypted;
H A Deap_sim_common.c937 u8 *decrypted; local
944 decrypted = os_memdup(encr_data, encr_data_len);
945 if (decrypted == NULL)
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
953 os_free(decrypted);
958 decrypted, encr_data_len);
960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
963 "decrypted AT_ENCR_DATA");
964 os_free(decrypted);
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_psk.c333 u8 *decrypted, nonce[16]; local
373 decrypted = os_memdup(pos, left);
374 if (decrypted == NULL)
378 wpabuf_head(respData), 22, decrypted, left,
381 os_free(decrypted);
386 decrypted, left);
389 switch (decrypted[0] >> 6) {
403 os_free(decrypted);
H A Dikev2.c451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
715 u8 *decrypted; local
[all...]
H A Deap_server_sim.c629 u8 *decrypted = NULL; local
645 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
648 if (decrypted == NULL) {
660 os_free(decrypted);
661 decrypted = NULL;
699 os_free(decrypted);
H A Deap_server_aka.c1074 u8 *decrypted = NULL; local
1092 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1095 if (decrypted == NULL) {
1107 os_free(decrypted);
1108 decrypted = NULL;
1158 os_free(decrypted);
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dks_file.c180 int decrypted = 0; local
269 decrypted = 1;
274 if (!decrypted) {

Completed in 207 milliseconds