Searched refs:decrypted (Results 1 - 25 of 33) sorted by relevance

12

/freebsd-current/contrib/wpa/src/tls/
H A Dpkcs1.c206 u8 *decrypted; local
212 decrypted = os_malloc(s_len);
213 if (decrypted == NULL)
216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
220 os_free(decrypted);
223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
242 os_free(decrypted);
263 os_free(decrypted);
273 os_free(decrypted);
[all...]
H A Dtlsv1_common.c420 const u8 *decrypted; local
460 decrypted = buf;
463 decrypted, buflen);
486 decrypted = buf + 19;
493 decrypted = buf + 19;
500 decrypted = buf + 19;
513 os_memcmp_const(decrypted, data, data_len) != 0) {
/freebsd-current/sys/contrib/libsodium/test/default/
H A Daead_aes256gcm.c3084 unsigned char *decrypted; local
3169 decrypted = (unsigned char *) sodium_malloc(message_len);
3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len,
3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len,
3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len,
3199 if (memcmp(decrypted, message, message_len) != 0) {
3202 memset(decrypted, 0xd0, message_len);
3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted,
3209 if (memcmp(decrypted, message, message_len) != 0) {
3217 sodium_free(decrypted);
[all...]
/freebsd-current/contrib/wpa/src/wps/
H A Dwps_enrollee.c1007 struct wpabuf *decrypted; local
1010 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
1012 if (decrypted == NULL) {
1019 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
1021 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1022 wps_process_key_wrap_auth(wps, decrypted,
1026 wpabuf_clear_free(decrypted);
1030 wpabuf_clear_free(decrypted);
1101 struct wpabuf *decrypted; local
1121 decrypted
1156 struct wpabuf *decrypted; local
1213 struct wpabuf *decrypted; local
[all...]
H A Dwps_common.c158 struct wpabuf *decrypted; local
171 decrypted = wpabuf_alloc(encr_len - block_size);
172 if (decrypted == NULL)
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
178 wpabuf_len(decrypted))) {
179 wpabuf_clear_free(decrypted);
184 decrypted);
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted)
[all...]
H A Dwps_registrar.c2818 struct wpabuf *decrypted; local
2845 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
2847 if (decrypted == NULL) {
2848 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
2854 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) {
2855 wpabuf_clear_free(decrypted);
2860 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
2862 if (wps_parse_msg(decrypted, &eattr) < 0 ||
2863 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
2865 wpabuf_clear_free(decrypted);
2969 struct wpabuf *decrypted; local
[all...]
/freebsd-current/crypto/openssl/test/recipes/
H A D15-test_mp_rsa.t108 my $decrypted = shift;
116 open($fh, "<", $decrypted ) or return 0;
122 print STDERR "cleartext and decrypted are not the same";
/freebsd-current/contrib/wpa/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; local
275 decrypted = os_memdup(msg, left);
276 if (decrypted == NULL) {
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
330 if (decrypted[
[all...]
H A Deap_sim.c835 u8 *decrypted; local
836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
839 if (decrypted == NULL) {
844 os_free(decrypted);
869 u8 *decrypted; local
877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
880 if (decrypted == NULL) {
890 os_free(decrypted);
894 os_free(decrypted);
968 u8 *decrypted; local
[all...]
H A Deap_aka.c1103 u8 *decrypted; local
1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1107 if (decrypted == NULL) {
1112 os_free(decrypted);
1137 u8 *decrypted; local
1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1148 if (decrypted == NULL) {
1158 os_free(decrypted);
1162 os_free(decrypted);
1235 u8 *decrypted; local
[all...]
H A Dikev2.c629 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
633 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
651 u8 *decrypted; local
655 decrypted = ikev2_decrypt_payload(data->proposal.encr,
659 if (decrypted == NULL)
663 decrypted, decrypted_len);
664 os_free(decrypted);
H A Deap_fast.c26 * - password change (pending mschapv2 packet; replay decrypted packet)
1106 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, argument
1116 /* Parse TLVs from the decrypted Phase 2 data */
1117 pos = wpabuf_mhead(decrypted);
1118 end = pos + wpabuf_len(decrypted);
1201 struct wpabuf *decrypted,
1208 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
1197 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
H A Deap_teap.c1150 static int eap_teap_parse_decrypted(struct wpabuf *decrypted, argument
1161 /* Parse TLVs from the decrypted Phase 2 data */
1162 pos = wpabuf_mhead(decrypted);
1163 end = pos + wpabuf_len(decrypted);
1240 struct wpabuf *decrypted,
1249 if (eap_teap_parse_decrypted(decrypted, &tlv, &resp) < 0) {
1236 eap_teap_process_decrypted(struct eap_sm *sm, struct eap_teap_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
/freebsd-current/contrib/wpa/src/eap_common/
H A Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
495 decrypted = os_malloc(decrypted_len);
496 if (decrypted == NULL)
500 decrypted, decrypted_len) < 0) {
501 os_free(decrypted);
505 pad_len = decrypted[decrypted_len - 1];
509 os_free(decrypted);
516 return decrypted;
H A Deap_sim_common.c937 u8 *decrypted; local
944 decrypted = os_memdup(encr_data, encr_data_len);
945 if (decrypted == NULL)
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
953 os_free(decrypted);
958 decrypted, encr_data_len);
960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
963 "decrypted AT_ENCR_DATA");
964 os_free(decrypted);
[all...]
/freebsd-current/contrib/wpa/src/eap_server/
H A Deap_server_psk.c333 u8 *decrypted, nonce[16]; local
373 decrypted = os_memdup(pos, left);
374 if (decrypted == NULL)
378 wpabuf_head(respData), 22, decrypted, left,
381 os_free(decrypted);
386 decrypted, left);
389 switch (decrypted[0] >> 6) {
403 os_free(decrypted);
H A Dikev2.c451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
715 u8 *decrypted; local
[all...]
H A Deap_server_sim.c630 u8 *decrypted = NULL; local
646 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
649 if (decrypted == NULL) {
661 os_free(decrypted);
662 decrypted = NULL;
701 os_free(decrypted);
H A Deap_server_aka.c1075 u8 *decrypted = NULL; local
1093 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1096 if (decrypted == NULL) {
1108 os_free(decrypted);
1109 decrypted = NULL;
1160 os_free(decrypted);
/freebsd-current/crypto/openssh/
H A Dssh-rsa.c639 u_char *decrypted = NULL; local
655 if ((decrypted = malloc(rsasize)) == NULL) {
659 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa,
668 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0;
669 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
676 freezero(decrypted, rsasize);
H A Dsshkey-xmss.c984 struct sshbuf *copy = NULL, *decrypted = NULL; local
1013 (decrypted = sshbuf_new()) == NULL ||
1050 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 ||
1066 if ((r = sshbuf_consume(decrypted, aadlen)) != 0)
1073 *retp = decrypted;
1074 decrypted = NULL;
1079 sshbuf_free(decrypted);
H A Dsshkey.c1649 private2_check_padding(struct sshbuf *decrypted) argument
1656 while (sshbuf_len(decrypted)) {
1657 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0)
2956 struct sshbuf *kdf = NULL, *decrypted = NULL; local
2968 if ((decrypted = sshbuf_new()) == NULL) {
3044 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 ||
3064 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 ||
3065 (r = sshbuf_get_u32(decrypted, &check2)) != 0)
3072 *decryptedp = decrypted;
3073 decrypted
3101 struct sshbuf *decoded = NULL, *decrypted = NULL; local
[all...]
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dks_file.c187 int decrypted = 0; local
276 decrypted = 1;
281 if (!decrypted) {
/freebsd-current/sys/contrib/dev/rtw88/
H A Drx.c166 if (pkt_stat->decrypted)
/freebsd-current/tests/sys/kern/
H A Dktls_test.c821 debug_hexdump(tc, buf, payload_len, "decrypted buffer");
931 debug_hexdump(tc, buf, payload_len, "decrypted buffer");
1179 char *plaintext, *decrypted, *outbuf; local
1187 decrypted = malloc(len);
1274 decrypted + decrypted_len,
1286 "read %zu decrypted bytes, but wrote %zu", decrypted_len, written);
1288 ATF_REQUIRE(memcmp(plaintext, decrypted, len) == 0);
1291 free(decrypted);
1329 char *plaintext, *decrypted, *outbuf; local
1338 decrypted
[all...]

Completed in 217 milliseconds

12