/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; local 208 decrypted = os_malloc(s_len); 209 if (decrypted == NULL) 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 216 os_free(decrypted); 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 240 os_free(decrypted); 261 os_free(decrypted); 269 os_free(decrypted); [all...] |
H A D | tlsv1_common.c | 420 const u8 *decrypted; local 460 decrypted = buf; 463 decrypted, buflen); 486 decrypted = buf + 19; 493 decrypted = buf + 19; 500 decrypted = buf + 19; 513 os_memcmp_const(decrypted, data, data_len) != 0) {
|
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_enrollee.c | 996 struct wpabuf *decrypted; local 999 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 1001 if (decrypted == NULL) { 1008 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1010 if (wps_parse_msg(decrypted, &eattr) < 0 || 1011 wps_process_key_wrap_auth(wps, decrypted, 1015 wpabuf_clear_free(decrypted); 1019 wpabuf_clear_free(decrypted); 1090 struct wpabuf *decrypted; local 1110 decrypted 1145 struct wpabuf *decrypted; local 1202 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 158 struct wpabuf *decrypted; local 171 decrypted = wpabuf_alloc(encr_len - block_size); 172 if (decrypted == NULL) 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 178 wpabuf_len(decrypted))) { 179 wpabuf_clear_free(decrypted); 184 decrypted); 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
H A D | wps_registrar.c | 2827 struct wpabuf *decrypted; local 2854 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 2856 if (decrypted == NULL) { 2857 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 2863 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { 2864 wpabuf_clear_free(decrypted); 2869 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 2871 if (wps_parse_msg(decrypted, &eattr) < 0 || 2872 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 2874 wpabuf_clear_free(decrypted); 2978 struct wpabuf *decrypted; local [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | ssh-rsa.c | 313 u_char *decrypted = NULL; local 329 if ((decrypted = malloc(rsasize)) == NULL) { 333 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 342 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 343 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 350 if (decrypted) { 351 explicit_bzero(decrypted, rsasize); 352 free(decrypted);
|
H A D | sshkey.c | 3199 struct sshbuf *kdf = NULL, *decrypted = NULL; local 3212 (decrypted = sshbuf_new()) == NULL) { 3329 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || 3349 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || 3350 (r = sshbuf_get_u32(decrypted, &check2)) != 0) 3358 if ((r = sshkey_private_deserialize(decrypted, &k)) != 0 || 3359 (r = sshbuf_get_cstring(decrypted, &comment, NULL)) != 0) 3364 while (sshbuf_len(decrypted)) { 3365 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) 3402 sshbuf_free(decrypted); 3665 struct sshbuf *decrypted = NULL, *copy = NULL; local [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local 275 decrypted = os_memdup(msg, left); 276 if (decrypted == NULL) { 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 318 os_free(decrypted); 330 if (decrypted[ [all...] |
H A D | eap_sim.c | 823 u8 *decrypted; local 824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 827 if (decrypted == NULL) { 832 os_free(decrypted); 857 u8 *decrypted; local 865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 868 if (decrypted == NULL) { 878 os_free(decrypted); 882 os_free(decrypted); 956 u8 *decrypted; local [all...] |
H A D | eap_aka.c | 1089 u8 *decrypted; local 1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1093 if (decrypted == NULL) { 1098 os_free(decrypted); 1123 u8 *decrypted; local 1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1134 if (decrypted == NULL) { 1144 os_free(decrypted); 1148 os_free(decrypted); 1221 u8 *decrypted; local [all...] |
H A D | ikev2.c | 627 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 631 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 649 u8 *decrypted; local 653 decrypted = ikev2_decrypt_payload(data->proposal.encr, 657 if (decrypted == NULL) 661 decrypted, decrypted_len); 662 os_free(decrypted);
|
H A D | eap_teap.c | 1095 static int eap_teap_parse_decrypted(struct wpabuf *decrypted, argument 1106 /* Parse TLVs from the decrypted Phase 2 data */ 1107 pos = wpabuf_mhead(decrypted); 1108 end = pos + wpabuf_len(decrypted); 1185 struct wpabuf *decrypted, 1193 if (eap_teap_parse_decrypted(decrypted, &tlv, &resp) < 0) { 1181 eap_teap_process_decrypted(struct eap_sm *sm, struct eap_teap_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
|
H A D | eap_fast.c | 26 * - password change (pending mschapv2 packet; replay decrypted packet) 1086 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, argument 1096 /* Parse TLVs from the decrypted Phase 2 data */ 1097 pos = wpabuf_mhead(decrypted); 1098 end = pos + wpabuf_len(decrypted); 1181 struct wpabuf *decrypted, 1188 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) 1177 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 495 decrypted = os_malloc(decrypted_len); 496 if (decrypted == NULL) 500 decrypted, decrypted_len) < 0) { 501 os_free(decrypted); 505 pad_len = decrypted[decrypted_len - 1]; 509 os_free(decrypted); 516 return decrypted;
|
H A D | eap_sim_common.c | 937 u8 *decrypted; local 944 decrypted = os_memdup(encr_data, encr_data_len); 945 if (decrypted == NULL) 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 953 os_free(decrypted); 958 decrypted, encr_data_len); 960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, 963 "decrypted AT_ENCR_DATA"); 964 os_free(decrypted); [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; local 373 decrypted = os_memdup(pos, left); 374 if (decrypted == NULL) 378 wpabuf_head(respData), 22, decrypted, left, 381 os_free(decrypted); 386 decrypted, left); 389 switch (decrypted[0] >> 6) { 403 os_free(decrypted);
|
H A D | ikev2.c | 451 u8 *decrypted; local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, 460 if (decrypted == NULL) 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 466 decrypted + decrypted_len) < 0) { 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 475 os_free(decrypted); 693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 715 u8 *decrypted; local [all...] |
H A D | eap_server_sim.c | 629 u8 *decrypted = NULL; local 645 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 648 if (decrypted == NULL) { 660 os_free(decrypted); 661 decrypted = NULL; 699 os_free(decrypted);
|
H A D | eap_server_aka.c | 1074 u8 *decrypted = NULL; local 1092 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1095 if (decrypted == NULL) { 1107 os_free(decrypted); 1108 decrypted = NULL; 1158 os_free(decrypted);
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 180 int decrypted = 0; local 269 decrypted = 1; 274 if (!decrypted) {
|