Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 25 of 87) sorted by relevance

1234

/src/contrib/wpa/src/tls/
H A Dpkcs1.c206 u8 *decrypted; in pkcs1_v15_sig_ver() local
212 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
213 if (decrypted == NULL) in pkcs1_v15_sig_ver()
216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver()
220 os_free(decrypted); in pkcs1_v15_sig_ver()
223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver()
242 os_free(decrypted); in pkcs1_v15_sig_ver()
263 os_free(decrypted); in pkcs1_v15_sig_ver()
273 os_free(decrypted); in pkcs1_v15_sig_ver()
[all …]
H A Dtlsv1_common.c422 const u8 *decrypted; in tls_verify_signature() local
462 decrypted = buf; in tls_verify_signature()
465 decrypted, buflen); in tls_verify_signature()
488 decrypted = buf + 19; in tls_verify_signature()
495 decrypted = buf + 19; in tls_verify_signature()
502 decrypted = buf + 19; in tls_verify_signature()
515 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/src/crypto/krb5/src/lib/crypto/crypto_tests/
H A Dt_fork.c62 krb5_data state_rc4, plain = string2data("plain"), decrypted; in main() local
88 t(alloc_data(&decrypted, plain.length)); in main()
89 t(krb5_k_decrypt(ctx, key_aes, 0, NULL, &out_aes, &decrypted)); in main()
90 assert(data_eq(plain, decrypted)); in main()
91 t(krb5_c_decrypt(ctx, &kb_aes, 0, NULL, &out_aes, &decrypted)); in main()
92 assert(data_eq(plain, decrypted)); in main()
104 krb5_free_data_contents(ctx, &decrypted); in main()
/src/sys/contrib/libsodium/test/default/
H A Daead_aes256gcm.c3084 unsigned char *decrypted; in tv() local
3169 decrypted = (unsigned char *) sodium_malloc(message_len); in tv()
3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv()
3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv()
3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, in tv()
3199 if (memcmp(decrypted, message, message_len) != 0) { in tv()
3202 memset(decrypted, 0xd0, message_len); in tv()
3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted, in tv()
3209 if (memcmp(decrypted, message, message_len) != 0) { in tv()
3217 sodium_free(decrypted); in tv()
/src/contrib/wpa/src/wps/
H A Dwps_enrollee.c1005 struct wpabuf *decrypted; in wps_process_m2() local
1008 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2()
1010 if (decrypted == NULL) { in wps_process_m2()
1019 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2()
1020 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2()
1024 wpabuf_clear_free(decrypted); in wps_process_m2()
1028 wpabuf_clear_free(decrypted); in wps_process_m2()
1099 struct wpabuf *decrypted; in wps_process_m4() local
1119 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4()
1121 if (decrypted == NULL) { in wps_process_m4()
[all …]
H A Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings()
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings()
188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
[all …]
H A Dwps_registrar.c2817 struct wpabuf *decrypted; in wps_process_m5() local
2844 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m5()
2846 if (decrypted == NULL) { in wps_process_m5()
2853 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { in wps_process_m5()
2854 wpabuf_clear_free(decrypted); in wps_process_m5()
2861 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m5()
2862 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || in wps_process_m5()
2864 wpabuf_clear_free(decrypted); in wps_process_m5()
2868 wpabuf_clear_free(decrypted); in wps_process_m5()
2968 struct wpabuf *decrypted; in wps_process_m7() local
[all …]
/src/contrib/wpa/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3()
[all …]
H A Deap_sim.c944 u8 *decrypted; in eap_sim_process_challenge() local
945 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
948 if (decrypted == NULL) { in eap_sim_process_challenge()
953 os_free(decrypted); in eap_sim_process_challenge()
978 u8 *decrypted; in eap_sim_process_notification_reauth() local
986 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
989 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
999 os_free(decrypted); in eap_sim_process_notification_reauth()
1003 os_free(decrypted); in eap_sim_process_notification_reauth()
1077 u8 *decrypted; in eap_sim_process_reauthentication() local
[all …]
H A Deap_aka.c1208 u8 *decrypted; in eap_aka_process_challenge() local
1209 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1212 if (decrypted == NULL) { in eap_aka_process_challenge()
1217 os_free(decrypted); in eap_aka_process_challenge()
1242 u8 *decrypted; in eap_aka_process_notification_reauth() local
1250 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1253 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1263 os_free(decrypted); in eap_aka_process_notification_reauth()
1267 os_free(decrypted); in eap_aka_process_notification_reauth()
1340 u8 *decrypted; in eap_aka_process_reauthentication() local
[all …]
/src/crypto/krb5/src/lib/krb5/krb/
H A Drd_cred.c48 krb5_boolean decrypted = FALSE; in decrypt_encpart() local
61 decrypted = (ret == 0); in decrypt_encpart()
63 if (!decrypted && authcon->key != NULL) { in decrypt_encpart()
66 decrypted = (ret == 0); in decrypt_encpart()
68 if (decrypted) in decrypt_encpart()
/src/crypto/openssl/demos/encrypt/
H A Drsa_encrypt.c217 unsigned char *encrypted = NULL, *decrypted = NULL; in main() local
225 &decrypted, &decrypted_len)) { in main()
229 if (CRYPTO_memcmp(msg, decrypted, decrypted_len) != 0) { in main()
236 OPENSSL_free(decrypted); in main()
/src/contrib/wpa/src/eap_server/
H A Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
H A Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
715 u8 *decrypted; in ikev2_process_sa_auth() local
719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
723 if (decrypted == NULL) in ikev2_process_sa_auth()
727 decrypted, decrypted_len); in ikev2_process_sa_auth()
[all …]
H A Deap_server_sim.c751 u8 *decrypted = NULL; in eap_sim_process_reauth() local
767 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
770 if (decrypted == NULL) { in eap_sim_process_reauth()
782 os_free(decrypted); in eap_sim_process_reauth()
783 decrypted = NULL; in eap_sim_process_reauth()
822 os_free(decrypted); in eap_sim_process_reauth()
/src/contrib/wpa/src/eap_common/
H A Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()
H A Deap_sim_common.c937 u8 *decrypted; in eap_sim_parse_encr() local
944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr()
945 if (decrypted == NULL) in eap_sim_parse_encr()
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
953 os_free(decrypted); in eap_sim_parse_encr()
958 decrypted, encr_data_len); in eap_sim_parse_encr()
960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr()
964 os_free(decrypted); in eap_sim_parse_encr()
968 return decrypted; in eap_sim_parse_encr()
/src/crypto/openssl/doc/designs/quic-design/
H A Dstream-receive-buffers.md35 the received data should not be copied out of the decrypted packets to
38 decrypted QUIC packet that stores the actual frame.
80 functions to keep and release decrypted packets with unprocessed data.
91 the decrypted quic packets and start copying the stream data due to
138 decrypted packet buffer once we reach a limit on unprocessed decrypted
/src/crypto/openssl/test/recipes/
H A D15-test_mp_rsa.t108 my $decrypted = shift;
116 open($fh, "<", $decrypted ) or return 0;
/src/crypto/krb5/src/lib/gssapi/krb5/
H A Dunwrap.c90 uint8_t *decrypted = NULL; in unwrap_v1() local
138 &decrypted); in unwrap_v1()
143 plain = decrypted; in unwrap_v1()
186 free(decrypted); in unwrap_v1()
/src/crypto/openssl/doc/man3/
H A DEVP_PKEY_decrypt.pod28 using I<ctx>. The data to be decrypted is specified using the I<in> and
34 decrypted data is written to I<out> and the amount of the decrypted data
H A DOSSL_CRMF_MSG_get0_tmpl.pod96 The function returns the decrypted certificate as a copy, leaving its ownership
108 On success, the function verifies the decrypted data as signed data,
123 The function returns the decrypted certificate as a copy, leaving its ownership
/src/crypto/openssh/
H A DPROTOCOL.chacha20poly130565 When receiving a packet, the length must be decrypted first. When 4
66 bytes of ciphertext length have been received, they may be decrypted
76 packet and the packet decrypted using ChaCha20 as described above (with
H A Dsshkey-xmss.c984 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local
1013 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state()
1050 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state()
1066 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state()
1073 *retp = decrypted; in sshkey_xmss_decrypt_state()
1074 decrypted = NULL; in sshkey_xmss_decrypt_state()
1079 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
H A Dsshkey.c1754 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument
1761 while (sshbuf_len(decrypted)) { in private2_check_padding()
1762 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding()
3048 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local
3060 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt()
3136 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || in private2_decrypt()
3156 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || in private2_decrypt()
3157 (r = sshbuf_get_u32(decrypted, &check2)) != 0) in private2_decrypt()
3164 *decryptedp = decrypted; in private2_decrypt()
3165 decrypted = NULL; in private2_decrypt()
[all …]

1234