/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; in pkcs1_v15_sig_ver() local 208 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver() 209 if (decrypted == NULL) in pkcs1_v15_sig_ver() 216 os_free(decrypted); in pkcs1_v15_sig_ver() 240 os_free(decrypted); in pkcs1_v15_sig_ver() 261 os_free(decrypted); in pkcs1_v15_sig_ver() 269 os_free(decrypted); in pkcs1_v15_sig_ver() 280 os_free(decrypted); in pkcs1_v15_sig_ver() 294 os_free(decrypted); in pkcs1_v15_sig_ver() 303 os_free(decrypted); in pkcs1_v15_sig_ver() [all …]
|
H A D | tlsv1_common.c | 420 const u8 *decrypted; in tls_verify_signature() local 460 decrypted = buf; in tls_verify_signature() 463 decrypted, buflen); in tls_verify_signature() 486 decrypted = buf + 19; in tls_verify_signature() 493 decrypted = buf + 19; in tls_verify_signature() 500 decrypted = buf + 19; in tls_verify_signature() 513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
|
/dragonfly/contrib/wpa_supplicant/src/wps/ |
H A D | wps_enrollee.c | 996 struct wpabuf *decrypted; in wps_process_m2() local 1001 if (decrypted == NULL) { in wps_process_m2() 1090 struct wpabuf *decrypted; in wps_process_m4() local 1112 if (decrypted == NULL) { in wps_process_m4() 1134 wpabuf_clear_free(decrypted); in wps_process_m4() 1145 struct wpabuf *decrypted; in wps_process_m6() local 1165 if (decrypted == NULL) { in wps_process_m6() 1187 wpabuf_clear_free(decrypted); in wps_process_m6() 1202 struct wpabuf *decrypted; in wps_process_m8() local 1235 if (decrypted == NULL) { in wps_process_m8() [all …]
|
H A D | wps_common.c | 158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local 172 if (decrypted == NULL) in wps_decrypt_encr_settings() 178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings() 179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings() 184 decrypted); in wps_decrypt_encr_settings() 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings() 188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings() 190 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings() 197 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings() 201 decrypted->used -= pad; in wps_decrypt_encr_settings() [all …]
|
H A D | wps_registrar.c | 2827 struct wpabuf *decrypted; in wps_process_m5() local 2856 if (decrypted == NULL) { in wps_process_m5() 2864 wpabuf_clear_free(decrypted); in wps_process_m5() 2871 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m5() 2874 wpabuf_clear_free(decrypted); in wps_process_m5() 2878 wpabuf_clear_free(decrypted); in wps_process_m5() 2978 struct wpabuf *decrypted; in wps_process_m7() local 3007 if (decrypted == NULL) { in wps_process_m7() 3016 wpabuf_clear_free(decrypted); in wps_process_m7() 3027 wpabuf_clear_free(decrypted); in wps_process_m7() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 275 decrypted = os_memdup(msg, left); in eap_psk_process_3() 276 if (decrypted == NULL) { in eap_psk_process_3() 288 os_free(decrypted); in eap_psk_process_3() 292 decrypted, left); in eap_psk_process_3() 295 switch (decrypted[0] >> 6) { in eap_psk_process_3() 318 os_free(decrypted); in eap_psk_process_3() 330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3() 337 rpchannel[4 + 16 + 1] = decrypted[1]; in eap_psk_process_3() 350 os_free(decrypted); in eap_psk_process_3() [all …]
|
H A D | eap_sim.c | 823 u8 *decrypted; in eap_sim_process_challenge() local 832 os_free(decrypted); in eap_sim_process_challenge() 857 u8 *decrypted; in eap_sim_process_notification_reauth() local 868 if (decrypted == NULL) { in eap_sim_process_notification_reauth() 878 os_free(decrypted); in eap_sim_process_notification_reauth() 882 os_free(decrypted); in eap_sim_process_notification_reauth() 956 u8 *decrypted; in eap_sim_process_reauthentication() local 1006 if (decrypted == NULL) { in eap_sim_process_reauthentication() 1017 os_free(decrypted); in eap_sim_process_reauthentication() 1040 os_free(decrypted); in eap_sim_process_reauthentication() [all …]
|
H A D | eap_aka.c | 1089 u8 *decrypted; in eap_aka_process_challenge() local 1098 os_free(decrypted); in eap_aka_process_challenge() 1123 u8 *decrypted; in eap_aka_process_notification_reauth() local 1134 if (decrypted == NULL) { in eap_aka_process_notification_reauth() 1144 os_free(decrypted); in eap_aka_process_notification_reauth() 1148 os_free(decrypted); in eap_aka_process_notification_reauth() 1221 u8 *decrypted; in eap_aka_process_reauthentication() local 1272 if (decrypted == NULL) { in eap_aka_process_reauthentication() 1283 os_free(decrypted); in eap_aka_process_reauthentication() 1306 os_free(decrypted); in eap_aka_process_reauthentication() [all …]
|
H A D | ikev2.c | 649 u8 *decrypted; in ikev2_process_sa_auth() local 653 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 657 if (decrypted == NULL) in ikev2_process_sa_auth() 661 decrypted, decrypted_len); in ikev2_process_sa_auth() 662 os_free(decrypted); in ikev2_process_sa_auth()
|
H A D | eap_fast.c | 1086 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, in eap_fast_parse_decrypted() argument 1097 pos = wpabuf_mhead(decrypted); in eap_fast_parse_decrypted() 1098 end = pos + wpabuf_len(decrypted); in eap_fast_parse_decrypted() 1181 struct wpabuf *decrypted, in eap_fast_process_decrypted() argument 1188 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) in eap_fast_process_decrypted()
|
H A D | eap_teap.c | 1095 static int eap_teap_parse_decrypted(struct wpabuf *decrypted, in eap_teap_parse_decrypted() argument 1107 pos = wpabuf_mhead(decrypted); in eap_teap_parse_decrypted() 1108 end = pos + wpabuf_len(decrypted); in eap_teap_parse_decrypted() 1185 struct wpabuf *decrypted, in eap_teap_process_decrypted() argument 1193 if (eap_teap_parse_decrypted(decrypted, &tlv, &resp) < 0) { in eap_teap_process_decrypted()
|
/dragonfly/crypto/openssh/ |
H A D | ssh-rsa.c | 409 u_char *decrypted = NULL; in openssh_RSA_verify() local 425 if ((decrypted = malloc(rsasize)) == NULL) { in openssh_RSA_verify() 429 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify() 438 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; in openssh_RSA_verify() 439 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; in openssh_RSA_verify() 446 freezero(decrypted, rsasize); in openssh_RSA_verify()
|
H A D | PROTOCOL.chacha20poly1305 | 65 When receiving a packet, the length must be decrypted first. When 4 66 bytes of ciphertext length have been received, they may be decrypted 76 packet and the packet decrypted using ChaCha20 as described above (with
|
H A D | sshkey.c | 2130 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument 2137 while (sshbuf_len(decrypted)) { in private2_check_padding() 2138 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding() 4144 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local 4156 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt() 4260 *decryptedp = decrypted; in private2_decrypt() 4261 decrypted = NULL; in private2_decrypt() 4279 sshbuf_free(decrypted); in private2_decrypt() 4289 struct sshbuf *decoded = NULL, *decrypted = NULL; in sshkey_parse_private2() local 4300 &decrypted, &pubkey)) != 0) in sshkey_parse_private2() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 373 decrypted = os_memdup(pos, left); in eap_psk_process_4() 374 if (decrypted == NULL) in eap_psk_process_4() 378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4() 381 os_free(decrypted); in eap_psk_process_4() 386 decrypted, left); in eap_psk_process_4() 389 switch (decrypted[0] >> 6) { in eap_psk_process_4() 403 os_free(decrypted); in eap_psk_process_4()
|
H A D | ikev2.c | 451 u8 *decrypted; in ikev2_process_sa_init_encr() local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() 460 if (decrypted == NULL) in ikev2_process_sa_init_encr() 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr() 466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr() 475 os_free(decrypted); in ikev2_process_sa_init_encr() 715 u8 *decrypted; in ikev2_process_sa_auth() local 719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 723 if (decrypted == NULL) in ikev2_process_sa_auth() 727 decrypted, decrypted_len); in ikev2_process_sa_auth() [all …]
|
H A D | eap_server_sim.c | 629 u8 *decrypted = NULL; in eap_sim_process_reauth() local 645 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth() 648 if (decrypted == NULL) { in eap_sim_process_reauth() 660 os_free(decrypted); in eap_sim_process_reauth() 661 decrypted = NULL; in eap_sim_process_reauth() 699 os_free(decrypted); in eap_sim_process_reauth()
|
H A D | eap_server_aka.c | 1074 u8 *decrypted = NULL; in eap_aka_process_reauth() local 1092 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth() 1095 if (decrypted == NULL) { in eap_aka_process_reauth() 1107 os_free(decrypted); in eap_aka_process_reauth() 1108 decrypted = NULL; in eap_aka_process_reauth() 1158 os_free(decrypted); in eap_aka_process_reauth()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local 495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload() 496 if (decrypted == NULL) in ikev2_decrypt_payload() 500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload() 501 os_free(decrypted); in ikev2_decrypt_payload() 505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload() 509 os_free(decrypted); in ikev2_decrypt_payload() 516 return decrypted; in ikev2_decrypt_payload()
|
H A D | eap_sim_common.c | 937 u8 *decrypted; in eap_sim_parse_encr() local 944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr() 945 if (decrypted == NULL) in eap_sim_parse_encr() 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 953 os_free(decrypted); in eap_sim_parse_encr() 958 decrypted, encr_data_len); in eap_sim_parse_encr() 960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr() 964 os_free(decrypted); in eap_sim_parse_encr() 968 return decrypted; in eap_sim_parse_encr()
|
/dragonfly/contrib/file/magic/Magdir/ |
H A D | console | 493 >>>0x4000 lequad 0xE7FFDEFFE7FFDEFF (decrypted)
|
/dragonfly/sys/vfs/hammer2/ |
H A D | DESIGN | 249 - Server has no visibility to decrypted data.
|
/dragonfly/contrib/tcpdump/ |
H A D | CHANGES | 874 changed syntax of -E argument so that multiple SAs can be decrypted
|