/freebsd/contrib/wpa/src/tls/ |
H A D | pkcs1.c | 206 u8 *decrypted; in pkcs1_v15_sig_ver() local 212 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver() 213 if (decrypted == NULL) in pkcs1_v15_sig_ver() 216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver() 220 os_free(decrypted); in pkcs1_v15_sig_ver() 223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver() 238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver() 242 os_free(decrypted); in pkcs1_v15_sig_ver() 263 os_free(decrypted); in pkcs1_v15_sig_ver() 273 os_free(decrypted); in pkcs1_v15_sig_ver() [all …]
|
H A D | tlsv1_common.c | 422 const u8 *decrypted; in tls_verify_signature() local 462 decrypted = buf; in tls_verify_signature() 465 decrypted, buflen); in tls_verify_signature() 488 decrypted = buf + 19; in tls_verify_signature() 495 decrypted = buf + 19; in tls_verify_signature() 502 decrypted = buf + 19; in tls_verify_signature() 515 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
|
/freebsd/sys/contrib/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3084 unsigned char *decrypted; in tv() local 3169 decrypted = (unsigned char *) sodium_malloc(message_len); in tv() 3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv() 3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv() 3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv() 3199 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3202 memset(decrypted, 0xd0, message_len); in tv() 3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted, in tv() 3209 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3217 sodium_free(decrypted); in tv()
|
/freebsd/contrib/wpa/src/wps/ |
H A D | wps_enrollee.c | 1005 struct wpabuf *decrypted; in wps_process_m2() local 1008 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2() 1010 if (decrypted == NULL) { in wps_process_m2() 1019 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2() 1020 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2() 1024 wpabuf_clear_free(decrypted); in wps_process_m2() 1028 wpabuf_clear_free(decrypted); in wps_process_m2() 1099 struct wpabuf *decrypted; in wps_process_m4() local 1119 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4() 1121 if (decrypted == NULL) { in wps_process_m4() [all …]
|
H A D | wps_common.c | 158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local 171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings() 172 if (decrypted == NULL) in wps_decrypt_encr_settings() 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings() 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings() 178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings() 179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings() 184 decrypted); in wps_decrypt_encr_settings() 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings() 188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings() [all …]
|
H A D | wps_registrar.c | 2817 struct wpabuf *decrypted; in wps_process_m5() local 2844 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m5() 2846 if (decrypted == NULL) { in wps_process_m5() 2853 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { in wps_process_m5() 2854 wpabuf_clear_free(decrypted); in wps_process_m5() 2861 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m5() 2862 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || in wps_process_m5() 2864 wpabuf_clear_free(decrypted); in wps_process_m5() 2868 wpabuf_clear_free(decrypted); in wps_process_m5() 2968 struct wpabuf *decrypted; in wps_process_m7() local [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 275 decrypted = os_memdup(msg, left); in eap_psk_process_3() 276 if (decrypted == NULL) { in eap_psk_process_3() 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3() 288 os_free(decrypted); in eap_psk_process_3() 292 decrypted, left); in eap_psk_process_3() 295 switch (decrypted[0] >> 6) { in eap_psk_process_3() 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3() 318 os_free(decrypted); in eap_psk_process_3() 330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3() [all …]
|
H A D | eap_sim.c | 944 u8 *decrypted; in eap_sim_process_challenge() local 945 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 948 if (decrypted == NULL) { in eap_sim_process_challenge() 953 os_free(decrypted); in eap_sim_process_challenge() 978 u8 *decrypted; in eap_sim_process_notification_reauth() local 986 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 989 if (decrypted == NULL) { in eap_sim_process_notification_reauth() 999 os_free(decrypted); in eap_sim_process_notification_reauth() 1003 os_free(decrypted); in eap_sim_process_notification_reauth() 1077 u8 *decrypted; in eap_sim_process_reauthentication() local [all …]
|
H A D | eap_aka.c | 1208 u8 *decrypted; in eap_aka_process_challenge() local 1209 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1212 if (decrypted == NULL) { in eap_aka_process_challenge() 1217 os_free(decrypted); in eap_aka_process_challenge() 1242 u8 *decrypted; in eap_aka_process_notification_reauth() local 1250 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1253 if (decrypted == NULL) { in eap_aka_process_notification_reauth() 1263 os_free(decrypted); in eap_aka_process_notification_reauth() 1267 os_free(decrypted); in eap_aka_process_notification_reauth() 1340 u8 *decrypted; in eap_aka_process_reauthentication() local [all …]
|
H A D | ikev2.c | 651 u8 *decrypted; in ikev2_process_sa_auth() local 655 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 659 if (decrypted == NULL) in ikev2_process_sa_auth() 663 decrypted, decrypted_len); in ikev2_process_sa_auth() 664 os_free(decrypted); in ikev2_process_sa_auth()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 373 decrypted = os_memdup(pos, left); in eap_psk_process_4() 374 if (decrypted == NULL) in eap_psk_process_4() 378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4() 381 os_free(decrypted); in eap_psk_process_4() 386 decrypted, left); in eap_psk_process_4() 389 switch (decrypted[0] >> 6) { in eap_psk_process_4() 403 os_free(decrypted); in eap_psk_process_4()
|
H A D | ikev2.c | 451 u8 *decrypted; in ikev2_process_sa_init_encr() local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() 460 if (decrypted == NULL) in ikev2_process_sa_init_encr() 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr() 466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr() 475 os_free(decrypted); in ikev2_process_sa_init_encr() 715 u8 *decrypted; in ikev2_process_sa_auth() local 719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 723 if (decrypted == NULL) in ikev2_process_sa_auth() 727 decrypted, decrypted_len); in ikev2_process_sa_auth() [all …]
|
H A D | eap_server_sim.c | 751 u8 *decrypted = NULL; in eap_sim_process_reauth() local 767 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth() 770 if (decrypted == NULL) { in eap_sim_process_reauth() 782 os_free(decrypted); in eap_sim_process_reauth() 783 decrypted = NULL; in eap_sim_process_reauth() 822 os_free(decrypted); in eap_sim_process_reauth()
|
H A D | eap_server_aka.c | 1183 u8 *decrypted = NULL; in eap_aka_process_reauth() local 1201 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth() 1204 if (decrypted == NULL) { in eap_aka_process_reauth() 1216 os_free(decrypted); in eap_aka_process_reauth() 1217 decrypted = NULL; in eap_aka_process_reauth() 1268 os_free(decrypted); in eap_aka_process_reauth()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local 495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload() 496 if (decrypted == NULL) in ikev2_decrypt_payload() 500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload() 501 os_free(decrypted); in ikev2_decrypt_payload() 505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload() 509 os_free(decrypted); in ikev2_decrypt_payload() 516 return decrypted; in ikev2_decrypt_payload()
|
H A D | eap_sim_common.c | 937 u8 *decrypted; in eap_sim_parse_encr() local 944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr() 945 if (decrypted == NULL) in eap_sim_parse_encr() 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 953 os_free(decrypted); in eap_sim_parse_encr() 958 decrypted, encr_data_len); in eap_sim_parse_encr() 960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr() 964 os_free(decrypted); in eap_sim_parse_encr() 968 return decrypted; in eap_sim_parse_encr()
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_mp_rsa.t | 108 my $decrypted = shift; 116 open($fh, "<", $decrypted ) or return 0;
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_decrypt.pod | 28 using I<ctx>. The data to be decrypted is specified using the I<in> and 34 decrypted data is written to I<out> and the amount of the decrypted data
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 64 application that a session ticket has just been decrypted. 88 The ticket couldn't be decrypted. No ticket data will be used and a new ticket 93 A ticket was successfully decrypted, any session ticket application data should
|
H A D | PKCS12_decrypt_skey.pod | 29 Both functions will return the decrypted key or NULL if an error occurred.
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 65 When receiving a packet, the length must be decrypted first. When 4 66 bytes of ciphertext length have been received, they may be decrypted 76 packet and the packet decrypted using ChaCha20 as described above (with
|
H A D | sshkey-xmss.c | 984 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local 1013 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state() 1050 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state() 1066 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state() 1073 *retp = decrypted; in sshkey_xmss_decrypt_state() 1074 decrypted = NULL; in sshkey_xmss_decrypt_state() 1079 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
|
H A D | sshkey.c | 1757 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument 1764 while (sshbuf_len(decrypted)) { in private2_check_padding() 1765 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding() 3064 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local 3076 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt() 3152 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || in private2_decrypt() 3172 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || in private2_decrypt() 3173 (r = sshbuf_get_u32(decrypted, &check2)) != 0) in private2_decrypt() 3180 *decryptedp = decrypted; in private2_decrypt() 3181 decrypted = NULL; in private2_decrypt() [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-asym_cipher.pod | 157 The data to be decrypted is pointed to by the I<in> parameter which is I<inlen> 159 Unless I<out> is NULL, the decrypted data should be written to the location 162 The length of the decrypted data should be written to I<*outlen>. 163 If I<out> is NULL then the maximum length of the decrypted data should be
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 187 int decrypted = 0; in parse_pem_private_key() local 276 decrypted = 1; in parse_pem_private_key() 281 if (!decrypted) { in parse_pem_private_key()
|