| /src/contrib/wpa/src/tls/ |
| H A D | pkcs1.c | 206 u8 *decrypted; in pkcs1_v15_sig_ver() local 212 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver() 213 if (decrypted == NULL) in pkcs1_v15_sig_ver() 216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver() 220 os_free(decrypted); in pkcs1_v15_sig_ver() 223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver() 238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver() 242 os_free(decrypted); in pkcs1_v15_sig_ver() 263 os_free(decrypted); in pkcs1_v15_sig_ver() 273 os_free(decrypted); in pkcs1_v15_sig_ver() [all …]
|
| H A D | tlsv1_common.c | 422 const u8 *decrypted; in tls_verify_signature() local 462 decrypted = buf; in tls_verify_signature() 465 decrypted, buflen); in tls_verify_signature() 488 decrypted = buf + 19; in tls_verify_signature() 495 decrypted = buf + 19; in tls_verify_signature() 502 decrypted = buf + 19; in tls_verify_signature() 515 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
|
| /src/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_fork.c | 62 krb5_data state_rc4, plain = string2data("plain"), decrypted; in main() local 88 t(alloc_data(&decrypted, plain.length)); in main() 89 t(krb5_k_decrypt(ctx, key_aes, 0, NULL, &out_aes, &decrypted)); in main() 90 assert(data_eq(plain, decrypted)); in main() 91 t(krb5_c_decrypt(ctx, &kb_aes, 0, NULL, &out_aes, &decrypted)); in main() 92 assert(data_eq(plain, decrypted)); in main() 104 krb5_free_data_contents(ctx, &decrypted); in main()
|
| /src/sys/contrib/libsodium/test/default/ |
| H A D | aead_aes256gcm.c | 3084 unsigned char *decrypted; in tv() local 3169 decrypted = (unsigned char *) sodium_malloc(message_len); in tv() 3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv() 3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv() 3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv() 3199 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3202 memset(decrypted, 0xd0, message_len); in tv() 3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted, in tv() 3209 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3217 sodium_free(decrypted); in tv()
|
| /src/contrib/wpa/src/wps/ |
| H A D | wps_enrollee.c | 1005 struct wpabuf *decrypted; in wps_process_m2() local 1008 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2() 1010 if (decrypted == NULL) { in wps_process_m2() 1019 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2() 1020 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2() 1024 wpabuf_clear_free(decrypted); in wps_process_m2() 1028 wpabuf_clear_free(decrypted); in wps_process_m2() 1099 struct wpabuf *decrypted; in wps_process_m4() local 1119 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4() 1121 if (decrypted == NULL) { in wps_process_m4() [all …]
|
| H A D | wps_common.c | 158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local 171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings() 172 if (decrypted == NULL) in wps_decrypt_encr_settings() 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings() 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings() 178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings() 179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings() 184 decrypted); in wps_decrypt_encr_settings() 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings() 188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings() [all …]
|
| H A D | wps_registrar.c | 2817 struct wpabuf *decrypted; in wps_process_m5() local 2844 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m5() 2846 if (decrypted == NULL) { in wps_process_m5() 2853 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { in wps_process_m5() 2854 wpabuf_clear_free(decrypted); in wps_process_m5() 2861 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m5() 2862 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || in wps_process_m5() 2864 wpabuf_clear_free(decrypted); in wps_process_m5() 2868 wpabuf_clear_free(decrypted); in wps_process_m5() 2968 struct wpabuf *decrypted; in wps_process_m7() local [all …]
|
| /src/contrib/wpa/src/eap_peer/ |
| H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 275 decrypted = os_memdup(msg, left); in eap_psk_process_3() 276 if (decrypted == NULL) { in eap_psk_process_3() 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3() 288 os_free(decrypted); in eap_psk_process_3() 292 decrypted, left); in eap_psk_process_3() 295 switch (decrypted[0] >> 6) { in eap_psk_process_3() 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3() 318 os_free(decrypted); in eap_psk_process_3() 330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3() [all …]
|
| H A D | eap_sim.c | 944 u8 *decrypted; in eap_sim_process_challenge() local 945 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 948 if (decrypted == NULL) { in eap_sim_process_challenge() 953 os_free(decrypted); in eap_sim_process_challenge() 978 u8 *decrypted; in eap_sim_process_notification_reauth() local 986 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 989 if (decrypted == NULL) { in eap_sim_process_notification_reauth() 999 os_free(decrypted); in eap_sim_process_notification_reauth() 1003 os_free(decrypted); in eap_sim_process_notification_reauth() 1077 u8 *decrypted; in eap_sim_process_reauthentication() local [all …]
|
| H A D | eap_aka.c | 1208 u8 *decrypted; in eap_aka_process_challenge() local 1209 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1212 if (decrypted == NULL) { in eap_aka_process_challenge() 1217 os_free(decrypted); in eap_aka_process_challenge() 1242 u8 *decrypted; in eap_aka_process_notification_reauth() local 1250 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1253 if (decrypted == NULL) { in eap_aka_process_notification_reauth() 1263 os_free(decrypted); in eap_aka_process_notification_reauth() 1267 os_free(decrypted); in eap_aka_process_notification_reauth() 1340 u8 *decrypted; in eap_aka_process_reauthentication() local [all …]
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | rd_cred.c | 48 krb5_boolean decrypted = FALSE; in decrypt_encpart() local 61 decrypted = (ret == 0); in decrypt_encpart() 63 if (!decrypted && authcon->key != NULL) { in decrypt_encpart() 66 decrypted = (ret == 0); in decrypt_encpart() 68 if (decrypted) in decrypt_encpart()
|
| /src/crypto/openssl/demos/encrypt/ |
| H A D | rsa_encrypt.c | 217 unsigned char *encrypted = NULL, *decrypted = NULL; in main() local 225 &decrypted, &decrypted_len)) { in main() 229 if (CRYPTO_memcmp(msg, decrypted, decrypted_len) != 0) { in main() 236 OPENSSL_free(decrypted); in main()
|
| /src/contrib/wpa/src/eap_server/ |
| H A D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 373 decrypted = os_memdup(pos, left); in eap_psk_process_4() 374 if (decrypted == NULL) in eap_psk_process_4() 378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4() 381 os_free(decrypted); in eap_psk_process_4() 386 decrypted, left); in eap_psk_process_4() 389 switch (decrypted[0] >> 6) { in eap_psk_process_4() 403 os_free(decrypted); in eap_psk_process_4()
|
| H A D | ikev2.c | 451 u8 *decrypted; in ikev2_process_sa_init_encr() local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() 460 if (decrypted == NULL) in ikev2_process_sa_init_encr() 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr() 466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr() 475 os_free(decrypted); in ikev2_process_sa_init_encr() 715 u8 *decrypted; in ikev2_process_sa_auth() local 719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 723 if (decrypted == NULL) in ikev2_process_sa_auth() 727 decrypted, decrypted_len); in ikev2_process_sa_auth() [all …]
|
| H A D | eap_server_sim.c | 751 u8 *decrypted = NULL; in eap_sim_process_reauth() local 767 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth() 770 if (decrypted == NULL) { in eap_sim_process_reauth() 782 os_free(decrypted); in eap_sim_process_reauth() 783 decrypted = NULL; in eap_sim_process_reauth() 822 os_free(decrypted); in eap_sim_process_reauth()
|
| /src/contrib/wpa/src/eap_common/ |
| H A D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local 495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload() 496 if (decrypted == NULL) in ikev2_decrypt_payload() 500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload() 501 os_free(decrypted); in ikev2_decrypt_payload() 505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload() 509 os_free(decrypted); in ikev2_decrypt_payload() 516 return decrypted; in ikev2_decrypt_payload()
|
| H A D | eap_sim_common.c | 937 u8 *decrypted; in eap_sim_parse_encr() local 944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr() 945 if (decrypted == NULL) in eap_sim_parse_encr() 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 953 os_free(decrypted); in eap_sim_parse_encr() 958 decrypted, encr_data_len); in eap_sim_parse_encr() 960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr() 964 os_free(decrypted); in eap_sim_parse_encr() 968 return decrypted; in eap_sim_parse_encr()
|
| /src/crypto/openssl/doc/designs/quic-design/ |
| H A D | stream-receive-buffers.md | 35 the received data should not be copied out of the decrypted packets to 38 decrypted QUIC packet that stores the actual frame. 80 functions to keep and release decrypted packets with unprocessed data. 91 the decrypted quic packets and start copying the stream data due to 138 decrypted packet buffer once we reach a limit on unprocessed decrypted
|
| /src/crypto/openssl/test/recipes/ |
| H A D | 15-test_mp_rsa.t | 108 my $decrypted = shift; 116 open($fh, "<", $decrypted ) or return 0;
|
| /src/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | unwrap.c | 90 uint8_t *decrypted = NULL; in unwrap_v1() local 138 &decrypted); in unwrap_v1() 143 plain = decrypted; in unwrap_v1() 186 free(decrypted); in unwrap_v1()
|
| /src/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_decrypt.pod | 28 using I<ctx>. The data to be decrypted is specified using the I<in> and 34 decrypted data is written to I<out> and the amount of the decrypted data
|
| H A D | OSSL_CRMF_MSG_get0_tmpl.pod | 96 The function returns the decrypted certificate as a copy, leaving its ownership 108 On success, the function verifies the decrypted data as signed data, 123 The function returns the decrypted certificate as a copy, leaving its ownership
|
| /src/crypto/openssh/ |
| H A D | PROTOCOL.chacha20poly1305 | 65 When receiving a packet, the length must be decrypted first. When 4 66 bytes of ciphertext length have been received, they may be decrypted 76 packet and the packet decrypted using ChaCha20 as described above (with
|
| H A D | sshkey-xmss.c | 984 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local 1013 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state() 1050 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state() 1066 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state() 1073 *retp = decrypted; in sshkey_xmss_decrypt_state() 1074 decrypted = NULL; in sshkey_xmss_decrypt_state() 1079 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
|
| H A D | sshkey.c | 1754 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument 1761 while (sshbuf_len(decrypted)) { in private2_check_padding() 1762 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding() 3048 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local 3060 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt() 3136 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || in private2_decrypt() 3156 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || in private2_decrypt() 3157 (r = sshbuf_get_u32(decrypted, &check2)) != 0) in private2_decrypt() 3164 *decryptedp = decrypted; in private2_decrypt() 3165 decrypted = NULL; in private2_decrypt() [all …]
|