Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 23 of 23) sorted by relevance

/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dpkcs1.c202 u8 *decrypted; in pkcs1_v15_sig_ver() local
208 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
209 if (decrypted == NULL) in pkcs1_v15_sig_ver()
216 os_free(decrypted); in pkcs1_v15_sig_ver()
240 os_free(decrypted); in pkcs1_v15_sig_ver()
261 os_free(decrypted); in pkcs1_v15_sig_ver()
269 os_free(decrypted); in pkcs1_v15_sig_ver()
280 os_free(decrypted); in pkcs1_v15_sig_ver()
294 os_free(decrypted); in pkcs1_v15_sig_ver()
303 os_free(decrypted); in pkcs1_v15_sig_ver()
[all …]
H A Dtlsv1_common.c420 const u8 *decrypted; in tls_verify_signature() local
460 decrypted = buf; in tls_verify_signature()
463 decrypted, buflen); in tls_verify_signature()
486 decrypted = buf + 19; in tls_verify_signature()
493 decrypted = buf + 19; in tls_verify_signature()
500 decrypted = buf + 19; in tls_verify_signature()
513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/dragonfly/contrib/wpa_supplicant/src/wps/
H A Dwps_enrollee.c996 struct wpabuf *decrypted; in wps_process_m2() local
1001 if (decrypted == NULL) { in wps_process_m2()
1090 struct wpabuf *decrypted; in wps_process_m4() local
1112 if (decrypted == NULL) { in wps_process_m4()
1134 wpabuf_clear_free(decrypted); in wps_process_m4()
1145 struct wpabuf *decrypted; in wps_process_m6() local
1165 if (decrypted == NULL) { in wps_process_m6()
1187 wpabuf_clear_free(decrypted); in wps_process_m6()
1202 struct wpabuf *decrypted; in wps_process_m8() local
1235 if (decrypted == NULL) { in wps_process_m8()
[all …]
H A Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings()
188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
190 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
197 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
201 decrypted->used -= pad; in wps_decrypt_encr_settings()
[all …]
H A Dwps_registrar.c2827 struct wpabuf *decrypted; in wps_process_m5() local
2856 if (decrypted == NULL) { in wps_process_m5()
2864 wpabuf_clear_free(decrypted); in wps_process_m5()
2871 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m5()
2874 wpabuf_clear_free(decrypted); in wps_process_m5()
2878 wpabuf_clear_free(decrypted); in wps_process_m5()
2978 struct wpabuf *decrypted; in wps_process_m7() local
3007 if (decrypted == NULL) { in wps_process_m7()
3016 wpabuf_clear_free(decrypted); in wps_process_m7()
3027 wpabuf_clear_free(decrypted); in wps_process_m7()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3()
337 rpchannel[4 + 16 + 1] = decrypted[1]; in eap_psk_process_3()
350 os_free(decrypted); in eap_psk_process_3()
[all …]
H A Deap_sim.c823 u8 *decrypted; in eap_sim_process_challenge() local
832 os_free(decrypted); in eap_sim_process_challenge()
857 u8 *decrypted; in eap_sim_process_notification_reauth() local
868 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
878 os_free(decrypted); in eap_sim_process_notification_reauth()
882 os_free(decrypted); in eap_sim_process_notification_reauth()
956 u8 *decrypted; in eap_sim_process_reauthentication() local
1006 if (decrypted == NULL) { in eap_sim_process_reauthentication()
1017 os_free(decrypted); in eap_sim_process_reauthentication()
1040 os_free(decrypted); in eap_sim_process_reauthentication()
[all …]
H A Deap_aka.c1089 u8 *decrypted; in eap_aka_process_challenge() local
1098 os_free(decrypted); in eap_aka_process_challenge()
1123 u8 *decrypted; in eap_aka_process_notification_reauth() local
1134 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1144 os_free(decrypted); in eap_aka_process_notification_reauth()
1148 os_free(decrypted); in eap_aka_process_notification_reauth()
1221 u8 *decrypted; in eap_aka_process_reauthentication() local
1272 if (decrypted == NULL) { in eap_aka_process_reauthentication()
1283 os_free(decrypted); in eap_aka_process_reauthentication()
1306 os_free(decrypted); in eap_aka_process_reauthentication()
[all …]
H A Dikev2.c649 u8 *decrypted; in ikev2_process_sa_auth() local
653 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
657 if (decrypted == NULL) in ikev2_process_sa_auth()
661 decrypted, decrypted_len); in ikev2_process_sa_auth()
662 os_free(decrypted); in ikev2_process_sa_auth()
H A Deap_fast.c1086 static int eap_fast_parse_decrypted(struct wpabuf *decrypted, in eap_fast_parse_decrypted() argument
1097 pos = wpabuf_mhead(decrypted); in eap_fast_parse_decrypted()
1098 end = pos + wpabuf_len(decrypted); in eap_fast_parse_decrypted()
1181 struct wpabuf *decrypted, in eap_fast_process_decrypted() argument
1188 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0) in eap_fast_process_decrypted()
H A Deap_teap.c1095 static int eap_teap_parse_decrypted(struct wpabuf *decrypted, in eap_teap_parse_decrypted() argument
1107 pos = wpabuf_mhead(decrypted); in eap_teap_parse_decrypted()
1108 end = pos + wpabuf_len(decrypted); in eap_teap_parse_decrypted()
1185 struct wpabuf *decrypted, in eap_teap_process_decrypted() argument
1193 if (eap_teap_parse_decrypted(decrypted, &tlv, &resp) < 0) { in eap_teap_process_decrypted()
/dragonfly/crypto/openssh/
H A Dssh-rsa.c409 u_char *decrypted = NULL; in openssh_RSA_verify() local
425 if ((decrypted = malloc(rsasize)) == NULL) { in openssh_RSA_verify()
429 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
438 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; in openssh_RSA_verify()
439 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; in openssh_RSA_verify()
446 freezero(decrypted, rsasize); in openssh_RSA_verify()
H A DPROTOCOL.chacha20poly130565 When receiving a packet, the length must be decrypted first. When 4
66 bytes of ciphertext length have been received, they may be decrypted
76 packet and the packet decrypted using ChaCha20 as described above (with
H A Dsshkey.c2130 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument
2137 while (sshbuf_len(decrypted)) { in private2_check_padding()
2138 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding()
4144 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local
4156 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt()
4260 *decryptedp = decrypted; in private2_decrypt()
4261 decrypted = NULL; in private2_decrypt()
4279 sshbuf_free(decrypted); in private2_decrypt()
4289 struct sshbuf *decoded = NULL, *decrypted = NULL; in sshkey_parse_private2() local
4300 &decrypted, &pubkey)) != 0) in sshkey_parse_private2()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
H A Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
715 u8 *decrypted; in ikev2_process_sa_auth() local
719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
723 if (decrypted == NULL) in ikev2_process_sa_auth()
727 decrypted, decrypted_len); in ikev2_process_sa_auth()
[all …]
H A Deap_server_sim.c629 u8 *decrypted = NULL; in eap_sim_process_reauth() local
645 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_reauth()
648 if (decrypted == NULL) { in eap_sim_process_reauth()
660 os_free(decrypted); in eap_sim_process_reauth()
661 decrypted = NULL; in eap_sim_process_reauth()
699 os_free(decrypted); in eap_sim_process_reauth()
H A Deap_server_aka.c1074 u8 *decrypted = NULL; in eap_aka_process_reauth() local
1092 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_reauth()
1095 if (decrypted == NULL) { in eap_aka_process_reauth()
1107 os_free(decrypted); in eap_aka_process_reauth()
1108 decrypted = NULL; in eap_aka_process_reauth()
1158 os_free(decrypted); in eap_aka_process_reauth()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()
H A Deap_sim_common.c937 u8 *decrypted; in eap_sim_parse_encr() local
944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr()
945 if (decrypted == NULL) in eap_sim_parse_encr()
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
953 os_free(decrypted); in eap_sim_parse_encr()
958 decrypted, encr_data_len); in eap_sim_parse_encr()
960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr()
964 os_free(decrypted); in eap_sim_parse_encr()
968 return decrypted; in eap_sim_parse_encr()
/dragonfly/contrib/file/magic/Magdir/
H A Dconsole493 >>>0x4000 lequad 0xE7FFDEFFE7FFDEFF (decrypted)
/dragonfly/sys/vfs/hammer2/
H A DDESIGN249 - Server has no visibility to decrypted data.
/dragonfly/contrib/tcpdump/
H A DCHANGES874 changed syntax of -E argument so that multiple SAs can be decrypted