Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 25 of 69) sorted by relevance

123

/freebsd/contrib/wpa/src/tls/
H A Dpkcs1.c206 u8 *decrypted; in pkcs1_v15_sig_ver() local
212 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
213 if (decrypted == NULL) in pkcs1_v15_sig_ver()
216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver()
220 os_free(decrypted); in pkcs1_v15_sig_ver()
223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver()
242 os_free(decrypted); in pkcs1_v15_sig_ver()
263 os_free(decrypted); in pkcs1_v15_sig_ver()
273 os_free(decrypted); in pkcs1_v15_sig_ver()
[all …]
H A Dtlsv1_common.c422 const u8 *decrypted; in tls_verify_signature() local
462 decrypted = buf; in tls_verify_signature()
465 decrypted, buflen); in tls_verify_signature()
488 decrypted = buf + 19; in tls_verify_signature()
495 decrypted = buf + 19; in tls_verify_signature()
502 decrypted = buf + 19; in tls_verify_signature()
515 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/freebsd/sys/contrib/libsodium/test/default/
H A Daead_aes256gcm.c3084 unsigned char *decrypted; in tv() local
3169 decrypted = (unsigned char *) sodium_malloc(message_len); in tv()
3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv()
3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv()
3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv()
3199 if (memcmp(decrypted, message, message_len) != 0) { in tv()
3202 memset(decrypted, 0xd0, message_len); in tv()
3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted, in tv()
3209 if (memcmp(decrypted, message, message_len) != 0) { in tv()
3217 sodium_free(decrypted); in tv()
/freebsd/contrib/wpa/src/wps/
H A Dwps_enrollee.c1005 struct wpabuf *decrypted; in wps_process_m2() local
1008 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2()
1010 if (decrypted == NULL) { in wps_process_m2()
1019 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2()
1020 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2()
1024 wpabuf_clear_free(decrypted); in wps_process_m2()
1028 wpabuf_clear_free(decrypted); in wps_process_m2()
1099 struct wpabuf *decrypted; in wps_process_m4() local
1119 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4()
1121 if (decrypted == NULL) { in wps_process_m4()
[all …]
H A Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings()
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings()
188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
[all …]
H A Dwps_registrar.c2817 struct wpabuf *decrypted; in wps_process_m5() local
2844 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m5()
2846 if (decrypted == NULL) { in wps_process_m5()
2853 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { in wps_process_m5()
2854 wpabuf_clear_free(decrypted); in wps_process_m5()
2861 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m5()
2862 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || in wps_process_m5()
2864 wpabuf_clear_free(decrypted); in wps_process_m5()
2868 wpabuf_clear_free(decrypted); in wps_process_m5()
2968 struct wpabuf *decrypted; in wps_process_m7() local
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3()
[all …]
H A Deap_sim.c944 u8 *decrypted; in eap_sim_process_challenge() local
945 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
948 if (decrypted == NULL) { in eap_sim_process_challenge()
953 os_free(decrypted); in eap_sim_process_challenge()
978 u8 *decrypted; in eap_sim_process_notification_reauth() local
986 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
989 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
999 os_free(decrypted); in eap_sim_process_notification_reauth()
1003 os_free(decrypted); in eap_sim_process_notification_reauth()
1077 u8 *decrypted; in eap_sim_process_reauthentication() local
[all …]
H A Deap_aka.c1208 u8 *decrypted; in eap_aka_process_challenge() local
1209 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1212 if (decrypted == NULL) { in eap_aka_process_challenge()
1217 os_free(decrypted); in eap_aka_process_challenge()
1242 u8 *decrypted; in eap_aka_process_notification_reauth() local
1250 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1253 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1263 os_free(decrypted); in eap_aka_process_notification_reauth()
1267 os_free(decrypted); in eap_aka_process_notification_reauth()
1340 u8 *decrypted; in eap_aka_process_reauthentication() local
[all …]
H A Dikev2.c651 u8 *decrypted; in ikev2_process_sa_auth() local
655 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
659 if (decrypted == NULL) in ikev2_process_sa_auth()
663 decrypted, decrypted_len); in ikev2_process_sa_auth()
664 os_free(decrypted); in ikev2_process_sa_auth()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
H A Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
715 u8 *decrypted; in ikev2_process_sa_auth() local
719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
723 if (decrypted == NULL) in ikev2_process_sa_auth()
727 decrypted, decrypted_len); in ikev2_process_sa_auth()
[all …]
H A Deap_server_sim.c751 u8 *decrypted = NULL; in eap_sim_process_reauth() local
767 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
770 if (decrypted == NULL) { in eap_sim_process_reauth()
782 os_free(decrypted); in eap_sim_process_reauth()
783 decrypted = NULL; in eap_sim_process_reauth()
822 os_free(decrypted); in eap_sim_process_reauth()
H A Deap_server_aka.c1183 u8 *decrypted = NULL; in eap_aka_process_reauth() local
1201 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth()
1204 if (decrypted == NULL) { in eap_aka_process_reauth()
1216 os_free(decrypted); in eap_aka_process_reauth()
1217 decrypted = NULL; in eap_aka_process_reauth()
1268 os_free(decrypted); in eap_aka_process_reauth()
/freebsd/contrib/wpa/src/eap_common/
H A Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()
H A Deap_sim_common.c937 u8 *decrypted; in eap_sim_parse_encr() local
944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr()
945 if (decrypted == NULL) in eap_sim_parse_encr()
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
953 os_free(decrypted); in eap_sim_parse_encr()
958 decrypted, encr_data_len); in eap_sim_parse_encr()
960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr()
964 os_free(decrypted); in eap_sim_parse_encr()
968 return decrypted; in eap_sim_parse_encr()
/freebsd/crypto/openssl/test/recipes/
H A D15-test_mp_rsa.t108 my $decrypted = shift;
116 open($fh, "<", $decrypted ) or return 0;
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_decrypt.pod28 using I<ctx>. The data to be decrypted is specified using the I<in> and
34 decrypted data is written to I<out> and the amount of the decrypted data
H A DSSL_CTX_set_session_ticket_cb.pod64 application that a session ticket has just been decrypted.
88 The ticket couldn't be decrypted. No ticket data will be used and a new ticket
93 A ticket was successfully decrypted, any session ticket application data should
H A DPKCS12_decrypt_skey.pod29 Both functions will return the decrypted key or NULL if an error occurred.
/freebsd/crypto/openssh/
H A DPROTOCOL.chacha20poly130565 When receiving a packet, the length must be decrypted first. When 4
66 bytes of ciphertext length have been received, they may be decrypted
76 packet and the packet decrypted using ChaCha20 as described above (with
H A Dsshkey-xmss.c984 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local
1013 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state()
1050 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state()
1066 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state()
1073 *retp = decrypted; in sshkey_xmss_decrypt_state()
1074 decrypted = NULL; in sshkey_xmss_decrypt_state()
1079 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
H A Dsshkey.c1757 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument
1764 while (sshbuf_len(decrypted)) { in private2_check_padding()
1765 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding()
3064 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local
3076 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt()
3152 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || in private2_decrypt()
3172 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || in private2_decrypt()
3173 (r = sshbuf_get_u32(decrypted, &check2)) != 0) in private2_decrypt()
3180 *decryptedp = decrypted; in private2_decrypt()
3181 decrypted = NULL; in private2_decrypt()
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-asym_cipher.pod157 The data to be decrypted is pointed to by the I<in> parameter which is I<inlen>
159 Unless I<out> is NULL, the decrypted data should be written to the location
162 The length of the decrypted data should be written to I<*outlen>.
163 If I<out> is NULL then the maximum length of the decrypted data should be
/freebsd/crypto/heimdal/lib/hx509/
H A Dks_file.c187 int decrypted = 0; in parse_pem_private_key() local
276 decrypted = 1; in parse_pem_private_key()
281 if (!decrypted) { in parse_pem_private_key()

123