HomeSort by: relevance | last modified time | path
    Searched defs:decrypted (Results 1 - 24 of 24) sorted by relevancy

  /src/external/bsd/wpa/dist/src/tls/
pkcs1.c 206 u8 *decrypted; local
212 decrypted = os_malloc(s_len);
213 if (decrypted == NULL)
216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted,
220 os_free(decrypted);
223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 ||
242 os_free(decrypted);
263 os_free(decrypted);
    [all...]
tlsv1_common.c 422 const u8 *decrypted; local
462 decrypted = buf;
464 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
465 decrypted, buflen);
488 decrypted = buf + 19;
495 decrypted = buf + 19;
502 decrypted = buf + 19;
515 os_memcmp_const(decrypted, data, data_len) != 0) {
  /src/sys/external/isc/libsodium/dist/test/default/
aead_aes256gcm.c 3084 unsigned char *decrypted; local
3169 decrypted = (unsigned char *) sodium_malloc(message_len);
3171 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len,
3181 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len,
3193 if (crypto_aead_aes256gcm_decrypt(decrypted, &found_message_len,
3199 if (memcmp(decrypted, message, message_len) != 0) {
3202 memset(decrypted, 0xd0, message_len);
3203 if (crypto_aead_aes256gcm_decrypt_detached(decrypted,
3209 if (memcmp(decrypted, message, message_len) != 0) {
3217 sodium_free(decrypted);
    [all...]
  /src/crypto/external/apache2/openssl/dist/demos/encrypt/
rsa_encrypt.c 183 /* Calculate the size required to hold the decrypted data */
199 fprintf(stdout, "Decrypted:\n");
217 unsigned char *encrypted = NULL, *decrypted = NULL; local
225 &decrypted, &decrypted_len)) {
229 if (CRYPTO_memcmp(msg, decrypted, decrypted_len) != 0) {
230 fprintf(stderr, "Decrypted data does not match expected value\n");
236 OPENSSL_free(decrypted);
  /src/external/bsd/wpa/dist/src/eap_common/
ikev2_common.c 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local
495 decrypted = os_malloc(decrypted_len);
496 if (decrypted == NULL)
500 decrypted, decrypted_len) < 0) {
501 os_free(decrypted);
505 pad_len = decrypted[decrypted_len - 1];
509 os_free(decrypted);
516 return decrypted;
eap_sim_common.c 937 u8 *decrypted; local
944 decrypted = os_memdup(encr_data, encr_data_len);
945 if (decrypted == NULL)
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
953 os_free(decrypted);
957 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Decrypted AT_ENCR_DATA",
958 decrypted, encr_data_len);
960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
963 "decrypted AT_ENCR_DATA")
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_psk.c 184 u8 *buf, *rpchannel, nonce[16], *decrypted; local
275 decrypted = os_memdup(msg, left);
276 if (decrypted == NULL) {
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted,
288 os_free(decrypted);
291 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
292 decrypted, left);
295 switch (decrypted[0] >> 6) {
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1)
318 os_free(decrypted);
    [all...]
ikev2.c 629 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
633 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
651 u8 *decrypted; local
655 decrypted = ikev2_decrypt_payload(data->proposal.encr,
659 if (decrypted == NULL)
663 decrypted, decrypted_len);
664 os_free(decrypted);
eap_sim.c 944 u8 *decrypted; local
945 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
948 if (decrypted == NULL) {
953 os_free(decrypted);
978 u8 *decrypted; local
986 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
989 if (decrypted == NULL) {
999 os_free(decrypted);
1003 os_free(decrypted);
1077 u8 *decrypted; local
    [all...]
eap_aka.c 1208 u8 *decrypted; local
1209 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1212 if (decrypted == NULL) {
1217 os_free(decrypted);
1242 u8 *decrypted; local
1250 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1253 if (decrypted == NULL) {
1263 os_free(decrypted);
1267 os_free(decrypted);
1340 u8 *decrypted; local
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_psk.c 333 u8 *decrypted, nonce[16]; local
373 decrypted = os_memdup(pos, left);
374 if (decrypted == NULL)
378 wpabuf_head(respData), 22, decrypted, left,
381 os_free(decrypted);
385 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
386 decrypted, left);
389 switch (decrypted[0] >> 6) {
403 os_free(decrypted);
eap_server_sim.c 617 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Decrypted permanent identity",
751 u8 *decrypted = NULL; local
767 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
770 if (decrypted == NULL) {
782 os_free(decrypted);
783 decrypted = NULL;
822 os_free(decrypted);
ikev2.c 451 u8 *decrypted; local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr,
460 if (decrypted == NULL)
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted,
466 decrypted + decrypted_len) < 0) {
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
475 os_free(decrypted);
693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
715 u8 *decrypted; local
    [all...]
eap_server_aka.c 873 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Decrypted permanent identity",
1183 u8 *decrypted = NULL; local
1201 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
1204 if (decrypted == NULL) {
1216 os_free(decrypted);
1217 decrypted = NULL;
1268 os_free(decrypted);
  /src/external/bsd/wpa/dist/src/wps/
wps_enrollee.c 1005 struct wpabuf *decrypted; local
1008 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
1010 if (decrypted == NULL) {
1017 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted "
1019 if (wps_parse_msg(decrypted, &eattr) < 0 ||
1020 wps_process_key_wrap_auth(wps, decrypted,
1024 wpabuf_clear_free(decrypted);
1028 wpabuf_clear_free(decrypted);
1099 struct wpabuf *decrypted; local
1119 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings
1154 struct wpabuf *decrypted; local
1211 struct wpabuf *decrypted; local
    [all...]
wps_common.c 158 struct wpabuf *decrypted; local
171 decrypted = wpabuf_alloc(encr_len - block_size);
172 if (decrypted == NULL)
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
178 wpabuf_len(decrypted))) {
179 wpabuf_clear_free(decrypted);
183 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
184 decrypted);
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1
    [all...]
wps_registrar.c 2817 struct wpabuf *decrypted; local
2844 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings,
2846 if (decrypted == NULL) {
2847 wpa_printf(MSG_DEBUG, "WPS: Failed to decrypted Encrypted "
2853 if (wps_validate_m5_encr(decrypted, attr->version2 != NULL) < 0) {
2854 wpabuf_clear_free(decrypted);
2859 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted Settings "
2861 if (wps_parse_msg(decrypted, &eattr) < 0 ||
2862 wps_process_key_wrap_auth(wps, decrypted, eattr.key_wrap_auth) ||
2864 wpabuf_clear_free(decrypted);
2968 struct wpabuf *decrypted; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
ks_file.c 202 int decrypted = 0; local
291 decrypted = 1;
296 if (!decrypted) {
  /src/sys/dev/usb/
if_run.c 2296 int decrypted = 0; local
2337 decrypted = 1;
2405 if (decrypted) {
  /src/crypto/external/apache2/openssl/dist/crypto/ml_kem/
ml_kem.c 1797 uint8_t decrypted[ML_KEM_SHARED_SECRET_BYTES + ML_KEM_PKHASH_BYTES]; local
1827 decrypt_cpa(decrypted, ctext, tmp, key);
1828 memcpy(decrypted + ML_KEM_SHARED_SECRET_BYTES, pkhash, ML_KEM_PKHASH_BYTES);
1829 if (!hash_g(Kr, decrypted, sizeof(decrypted), mdctx, key)
1830 || !encrypt_cpa(tmp_ctext, decrypted, r, tmp, mdctx, key)) {
1832 OPENSSL_cleanse(decrypted, ML_KEM_SHARED_SECRET_BYTES);
1839 OPENSSL_cleanse(decrypted, ML_KEM_SHARED_SECRET_BYTES);
  /src/crypto/external/bsd/netpgp/dist/src/lib/
reader.c 1401 uint8_t decrypted[1024 * 15]; member in struct:__anon1049
1454 encrypted->decrypted + encrypted->off, n);
1497 encrypted->decrypted, buffer, n);
1501 hexdump(stderr, "decrypted", encrypted->decrypted, 16);
1505 &encrypted->decrypted[encrypted->off], buffer, n);
1511 "encrypted_data_reader: 0 decrypted count\n");
  /src/crypto/external/bsd/netpgp/dist/src/libverify/
libverify.c 1556 uint8_t decrypted[8192]; local
1563 decryptc = pgpv_rsa_public_decrypt(decrypted, sigbn, BITS_TO_BYTES(bn[RSA_SIG].bits), pubkey);
1564 if (decryptc != keysize || (decrypted[0] != 0 || decrypted[1] != 1)) {
1572 if (decrypted[i] != 0xff) {
1576 if (decrypted[i++] != 0x0) {
1579 if (memcmp(&decrypted[i], prefix, prefixlen) != 0) {
1583 return memcmp(&decrypted[i + prefixlen], calculated, calclen) == 0;
  /src/crypto/external/bsd/openssh/dist/
sshkey.c 1694 private2_check_padding(struct sshbuf *decrypted)
1701 while (sshbuf_len(decrypted)) {
1702 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0)
2987 struct sshbuf *kdf = NULL, *decrypted = NULL; local
2999 if ((decrypted = sshbuf_new()) == NULL) {
3075 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 ||
3095 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 ||
3096 (r = sshbuf_get_u32(decrypted, &check2)) != 0)
3103 *decryptedp = decrypted;
3104 decrypted = NULL
3132 struct sshbuf *decoded = NULL, *decrypted = NULL; local
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/
libverify.c 2016 uint8_t decrypted[8192]; local
2023 decryptc = pgpv_rsa_public_decrypt(decrypted, sigbn, BITS_TO_BYTES(bn[RSA_SIG].bits), pubkey);
2024 if (decryptc != keysize || (decrypted[0] != 0 || decrypted[1] != 1)) {
2032 if (decrypted[i] != 0xff) {
2036 if (decrypted[i++] != 0x0) {
2039 if (memcmp(&decrypted[i], prefix, prefixlen) != 0) {
2043 return memcmp(&decrypted[i + prefixlen], calculated, calclen) == 0;

Completed in 62 milliseconds