| /src/external/bsd/wpa/dist/src/tls/ |
| pkcs1.c | 206 u8 *decrypted; local 212 decrypted = os_malloc(s_len); 213 if (decrypted == NULL) 216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, 220 os_free(decrypted); 223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || 242 os_free(decrypted); 263 os_free(decrypted); [all...] |
| tlsv1_common.c | 422 const u8 *decrypted; local 462 decrypted = buf; 464 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature", 465 decrypted, buflen); 488 decrypted = buf + 19; 495 decrypted = buf + 19; 502 decrypted = buf + 19; 515 os_memcmp_const(decrypted, data, data_len) != 0) {
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| aead_aes256gcm.c | 3084 unsigned char *decrypted; local 3169 decrypted = (unsigned char *) sodium_malloc(message_len); 3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, 3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, 3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len, 3199 if (memcmp(decrypted, message, message_len) != 0) { 3202 memset(decrypted, 0xd0, message_len); 3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted, 3209 if (memcmp(decrypted, message, message_len) != 0) { 3217 sodium_free(decrypted); [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/encrypt/ |
| rsa_encrypt.c | 183 /* Calculate the size required to hold the decrypted data */ 199 fprintf(stdout, "Decrypted:\n"); 217 unsigned char *encrypted = NULL, *decrypted = NULL; local 225 &decrypted, &decrypted_len)) { 229 if (CRYPTO_memcmp(msg, decrypted, decrypted_len) != 0) { 230 fprintf(stderr, "Decrypted data does not match expected value\n"); 236 OPENSSL_free(decrypted);
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local 495 decrypted = os_malloc(decrypted_len); 496 if (decrypted == NULL) 500 decrypted, decrypted_len) < 0) { 501 os_free(decrypted); 505 pad_len = decrypted[decrypted_len - 1]; 509 os_free(decrypted); 516 return decrypted;
|
| eap_sim_common.c | 937 u8 *decrypted; local 944 decrypted = os_memdup(encr_data, encr_data_len); 945 if (decrypted == NULL) 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 953 os_free(decrypted); 957 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA", 958 decrypted, encr_data_len); 960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, 963 "decrypted AT_ENCR_DATA") [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local 275 decrypted = os_memdup(msg, left); 276 if (decrypted == NULL) { 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, 288 os_free(decrypted); 291 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 292 decrypted, left); 295 switch (decrypted[0] >> 6) { 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) 318 os_free(decrypted); [all...] |
| ikev2.c | 629 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 633 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 651 u8 *decrypted; local 655 decrypted = ikev2_decrypt_payload(data->proposal.encr, 659 if (decrypted == NULL) 663 decrypted, decrypted_len); 664 os_free(decrypted);
|
| eap_sim.c | 944 u8 *decrypted; local 945 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 948 if (decrypted == NULL) { 953 os_free(decrypted); 978 u8 *decrypted; local 986 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 989 if (decrypted == NULL) { 999 os_free(decrypted); 1003 os_free(decrypted); 1077 u8 *decrypted; local [all...] |
| eap_aka.c | 1208 u8 *decrypted; local 1209 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1212 if (decrypted == NULL) { 1217 os_free(decrypted); 1242 u8 *decrypted; local 1250 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1253 if (decrypted == NULL) { 1263 os_free(decrypted); 1267 os_free(decrypted); 1340 u8 *decrypted; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_psk.c | 333 u8 *decrypted, nonce[16]; local 373 decrypted = os_memdup(pos, left); 374 if (decrypted == NULL) 378 wpabuf_head(respData), 22, decrypted, left, 381 os_free(decrypted); 385 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 386 decrypted, left); 389 switch (decrypted[0] >> 6) { 403 os_free(decrypted);
|
| eap_server_sim.c | 617 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Decrypted permanent identity", 751 u8 *decrypted = NULL; local 767 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 770 if (decrypted == NULL) { 782 os_free(decrypted); 783 decrypted = NULL; 822 os_free(decrypted);
|
| ikev2.c | 451 u8 *decrypted; local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, 460 if (decrypted == NULL) 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, 466 decrypted + decrypted_len) < 0) { 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 475 os_free(decrypted); 693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 715 u8 *decrypted; local [all...] |
| eap_server_aka.c | 873 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Decrypted permanent identity", 1183 u8 *decrypted = NULL; local 1201 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, 1204 if (decrypted == NULL) { 1216 os_free(decrypted); 1217 decrypted = NULL; 1268 os_free(decrypted);
|
| /src/external/bsd/wpa/dist/src/wps/ |
| wps_enrollee.c | 1005 struct wpabuf *decrypted; local 1008 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 1010 if (decrypted == NULL) { 1017 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " 1019 if (wps_parse_msg(decrypted, &eattr) < 0 || 1020 wps_process_key_wrap_auth(wps, decrypted, 1024 wpabuf_clear_free(decrypted); 1028 wpabuf_clear_free(decrypted); 1099 struct wpabuf *decrypted; local 1119 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings 1154 struct wpabuf *decrypted; local 1211 struct wpabuf *decrypted; local [all...] |
| wps_common.c | 158 struct wpabuf *decrypted; local 171 decrypted = wpabuf_alloc(encr_len - block_size); 172 if (decrypted == NULL) 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), 178 wpabuf_len(decrypted))) { 179 wpabuf_clear_free(decrypted); 183 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings", 184 decrypted); 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1 [all...] |
| wps_registrar.c | 2817 struct wpabuf *decrypted; local 2844 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, 2846 if (decrypted == NULL) { 2847 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted " 2853 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) { 2854 wpabuf_clear_free(decrypted); 2859 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings " 2861 if (wps_parse_msg(decrypted, &eattr) < 0 || 2862 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) || 2864 wpabuf_clear_free(decrypted); 2968 struct wpabuf *decrypted; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| ks_file.c | 202 int decrypted = 0; local 291 decrypted = 1; 296 if (!decrypted) {
|
| /src/sys/dev/usb/ |
| if_run.c | 2296 int decrypted = 0; local 2337 decrypted = 1; 2405 if (decrypted) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/ml_kem/ |
| ml_kem.c | 1797 uint8_t decrypted[ML_KEM_SHARED_SECRET_BYTES + ML_KEM_PKHASH_BYTES]; local 1827 decrypt_cpa(decrypted, ctext, tmp, key); 1828 memcpy(decrypted + ML_KEM_SHARED_SECRET_BYTES, pkhash, ML_KEM_PKHASH_BYTES); 1829 if (!hash_g(Kr, decrypted, sizeof(decrypted), mdctx, key) 1830 || !encrypt_cpa(tmp_ctext, decrypted, r, tmp, mdctx, key)) { 1832 OPENSSL_cleanse(decrypted, ML_KEM_SHARED_SECRET_BYTES); 1839 OPENSSL_cleanse(decrypted, ML_KEM_SHARED_SECRET_BYTES);
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| reader.c | 1401 uint8_t decrypted[1024 * 15]; member in struct:__anon1049 1454 encrypted->decrypted + encrypted->off, n); 1497 encrypted->decrypted, buffer, n); 1501 hexdump(stderr, "decrypted", encrypted->decrypted, 16); 1505 &encrypted->decrypted[encrypted->off], buffer, n); 1511 "encrypted_data_reader: 0 decrypted count\n");
|
| /src/crypto/external/bsd/netpgp/dist/src/libverify/ |
| libverify.c | 1556 uint8_t decrypted[8192]; local 1563 decryptc = pgpv_rsa_public_decrypt(decrypted, sigbn, BITS_TO_BYTES(bn[RSA_SIG].bits), pubkey); 1564 if (decryptc != keysize || (decrypted[0] != 0 || decrypted[1] != 1)) { 1572 if (decrypted[i] != 0xff) { 1576 if (decrypted[i++] != 0x0) { 1579 if (memcmp(&decrypted[i], prefix, prefixlen) != 0) { 1583 return memcmp(&decrypted[i + prefixlen], calculated, calclen) == 0;
|
| /src/crypto/external/bsd/openssh/dist/ |
| sshkey.c | 1694 private2_check_padding(struct sshbuf *decrypted) 1701 while (sshbuf_len(decrypted)) { 1702 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) 2987 struct sshbuf *kdf = NULL, *decrypted = NULL; local 2999 if ((decrypted = sshbuf_new()) == NULL) { 3075 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || 3095 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || 3096 (r = sshbuf_get_u32(decrypted, &check2)) != 0) 3103 *decryptedp = decrypted; 3104 decrypted = NULL 3132 struct sshbuf *decoded = NULL, *decrypted = NULL; local [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| libverify.c | 2016 uint8_t decrypted[8192]; local 2023 decryptc = pgpv_rsa_public_decrypt(decrypted, sigbn, BITS_TO_BYTES(bn[RSA_SIG].bits), pubkey); 2024 if (decryptc != keysize || (decrypted[0] != 0 || decrypted[1] != 1)) { 2032 if (decrypted[i] != 0xff) { 2036 if (decrypted[i++] != 0x0) { 2039 if (memcmp(&decrypted[i], prefix, prefixlen) != 0) { 2043 return memcmp(&decrypted[i + prefixlen], calculated, calclen) == 0;
|