/freebsd-current/contrib/wpa/src/tls/ |
H A D | pkcs1.c | 206 u8 *decrypted; local 212 decrypted = os_malloc(s_len); 213 if (decrypted == NULL) 216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 220 os_free(decrypted); 223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 242 os_free(decrypted); 263 os_free(decrypted); 273 os_free(decrypted); [all...] |
H A D | tlsv1_common.c | 420 const u8 *decrypted; local 460 decrypted = buf; 463 decrypted, buflen); 486 decrypted = buf + 19; 493 decrypted = buf + 19; 500 decrypted = buf + 19; 513 os_memcmp_const(decrypted, data, data_len) != 0) {
|
/freebsd-current/sys/contrib/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3084 unsigned char *decrypted; local 3169 decrypted = (unsigned char *) sodium_malloc(message_len); 3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, 3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, 3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, 3199 if (memcmp(decrypted, message, message_len) != 0) { 3202 memset(decrypted, 0xd0, message_len); 3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted, 3209 if (memcmp(decrypted, message, message_len) != 0) { 3217 sodium_free(decrypted); [all...] |
/freebsd-current/contrib/wpa/src/wps/ |
H A D | wps_enrollee.c | 1007 struct wpabuf *decrypted; local 1010 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 1012 if (decrypted == NULL) { 1019 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1021 if (wps_parse_msg(decrypted, &eattr) < 0 || 1022 wps_process_key_wrap_auth(wps, decrypted, 1026 wpabuf_clear_free(decrypted); 1030 wpabuf_clear_free(decrypted); 1101 struct wpabuf *decrypted; local 1121 decrypted 1156 struct wpabuf *decrypted; local 1213 struct wpabuf *decrypted; local [all...] |
H A D | wps_common.c | 158 struct wpabuf *decrypted; local 171 decrypted = wpabuf_alloc(encr_len - block_size); 172 if (decrypted == NULL) 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 178 wpabuf_len(decrypted))) { 179 wpabuf_clear_free(decrypted); 184 decrypted); 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) [all...] |
H A D | wps_registrar.c | 2818 struct wpabuf *decrypted; local 2845 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 2847 if (decrypted == NULL) { 2848 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 2854 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { 2855 wpabuf_clear_free(decrypted); 2860 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 2862 if (wps_parse_msg(decrypted, &eattr) < 0 || 2863 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 2865 wpabuf_clear_free(decrypted); 2969 struct wpabuf *decrypted; local [all...] |
/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 15-test_mp_rsa.t | 108 my $decrypted = shift; 116 open($fh, "<", $decrypted ) or return 0; 122 print STDERR "cleartext and decrypted are not the same";
|
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local 275 decrypted = os_memdup(msg, left); 276 if (decrypted == NULL) { 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 318 os_free(decrypted); 330 if (decrypted[ [all...] |
H A D | eap_sim.c | 835 u8 *decrypted; local 836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 839 if (decrypted == NULL) { 844 os_free(decrypted); 869 u8 *decrypted; local 877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 880 if (decrypted == NULL) { 890 os_free(decrypted); 894 os_free(decrypted); 968 u8 *decrypted; local [all...] |
H A D | eap_aka.c | 1103 u8 *decrypted; local 1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1107 if (decrypted == NULL) { 1112 os_free(decrypted); 1137 u8 *decrypted; local 1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1148 if (decrypted == NULL) { 1158 os_free(decrypted); 1162 os_free(decrypted); 1235 u8 *decrypted; local [all...] |
H A D | ikev2.c | 629 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 633 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 651 u8 *decrypted; local 655 decrypted = ikev2_decrypt_payload(data->proposal.encr, 659 if (decrypted == NULL) 663 decrypted, decrypted_len); 664 os_free(decrypted);
|
H A D | eap_fast.c | 26 * - password change (pending mschapv2 packet; replay decrypted packet) 1106 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, argument 1116 /* Parse TLVs from the decrypted Phase 2 data */ 1117 pos = wpabuf_mhead(decrypted); 1118 end = pos + wpabuf_len(decrypted); 1201 struct wpabuf *decrypted, 1208 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) 1197 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
|
H A D | eap_teap.c | 1150 static int eap_teap_parse_decrypted(struct wpabuf *decrypted, argument 1161 /* Parse TLVs from the decrypted Phase 2 data */ 1162 pos = wpabuf_mhead(decrypted); 1163 end = pos + wpabuf_len(decrypted); 1240 struct wpabuf *decrypted, 1249 if (eap_teap_parse_decrypted(decrypted, &tlv, &resp) < 0) { 1236 eap_teap_process_decrypted(struct eap_sm *sm, struct eap_teap_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf *decrypted, struct wpabuf **out_data) argument
|
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 495 decrypted = os_malloc(decrypted_len); 496 if (decrypted == NULL) 500 decrypted, decrypted_len) < 0) { 501 os_free(decrypted); 505 pad_len = decrypted[decrypted_len - 1]; 509 os_free(decrypted); 516 return decrypted;
|
H A D | eap_sim_common.c | 937 u8 *decrypted; local 944 decrypted = os_memdup(encr_data, encr_data_len); 945 if (decrypted == NULL) 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 953 os_free(decrypted); 958 decrypted, encr_data_len); 960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, 963 "decrypted AT_ENCR_DATA"); 964 os_free(decrypted); [all...] |
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; local 373 decrypted = os_memdup(pos, left); 374 if (decrypted == NULL) 378 wpabuf_head(respData), 22, decrypted, left, 381 os_free(decrypted); 386 decrypted, left); 389 switch (decrypted[0] >> 6) { 403 os_free(decrypted);
|
H A D | ikev2.c | 451 u8 *decrypted; local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, 460 if (decrypted == NULL) 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 466 decrypted + decrypted_len) < 0) { 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 475 os_free(decrypted); 693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 715 u8 *decrypted; local [all...] |
H A D | eap_server_sim.c | 630 u8 *decrypted = NULL; local 646 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 649 if (decrypted == NULL) { 661 os_free(decrypted); 662 decrypted = NULL; 701 os_free(decrypted);
|
H A D | eap_server_aka.c | 1075 u8 *decrypted = NULL; local 1093 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1096 if (decrypted == NULL) { 1108 os_free(decrypted); 1109 decrypted = NULL; 1160 os_free(decrypted);
|
/freebsd-current/crypto/openssh/ |
H A D | ssh-rsa.c | 639 u_char *decrypted = NULL; local 655 if ((decrypted = malloc(rsasize)) == NULL) { 659 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, 668 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; 669 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; 676 freezero(decrypted, rsasize);
|
H A D | sshkey-xmss.c | 984 struct sshbuf *copy = NULL, *decrypted = NULL; local 1013 (decrypted = sshbuf_new()) == NULL || 1050 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || 1066 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) 1073 *retp = decrypted; 1074 decrypted = NULL; 1079 sshbuf_free(decrypted);
|
H A D | sshkey.c | 1649 private2_check_padding(struct sshbuf *decrypted) argument 1656 while (sshbuf_len(decrypted)) { 1657 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) 2956 struct sshbuf *kdf = NULL, *decrypted = NULL; local 2968 if ((decrypted = sshbuf_new()) == NULL) { 3044 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || 3064 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || 3065 (r = sshbuf_get_u32(decrypted, &check2)) != 0) 3072 *decryptedp = decrypted; 3073 decrypted 3101 struct sshbuf *decoded = NULL, *decrypted = NULL; local [all...] |
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 187 int decrypted = 0; local 276 decrypted = 1; 281 if (!decrypted) {
|
/freebsd-current/sys/contrib/dev/rtw88/ |
H A D | rx.c | 166 if (pkt_stat->decrypted)
|
/freebsd-current/tests/sys/kern/ |
H A D | ktls_test.c | 821 debug_hexdump(tc, buf, payload_len, "decrypted buffer"); 931 debug_hexdump(tc, buf, payload_len, "decrypted buffer"); 1179 char *plaintext, *decrypted, *outbuf; local 1187 decrypted = malloc(len); 1274 decrypted + decrypted_len, 1286 "read %zu decrypted bytes, but wrote %zu", decrypted_len, written); 1288 ATF_REQUIRE(memcmp(plaintext, decrypted, len) == 0); 1291 free(decrypted); 1329 char *plaintext, *decrypted, *outbuf; local 1338 decrypted [all...] |