Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 12 of 12) sorted by relevance

/openbsd/lib/libcrypto/mlkem/
H A Dmlkem1024.c1020 uint8_t decrypted[64]; in MLKEM1024_decap() local
1029 decrypt_cpa(decrypted, priv, ciphertext); in MLKEM1024_decap()
1030 memcpy(decrypted + 32, priv->pub.public_key_hash, in MLKEM1024_decap()
1031 sizeof(decrypted) - 32); in MLKEM1024_decap()
1032 hash_g(key_and_randomness, decrypted, sizeof(decrypted)); in MLKEM1024_decap()
1033 encrypt_cpa(expected_ciphertext, &priv->pub, decrypted, in MLKEM1024_decap()
H A Dmlkem768.c1019 uint8_t decrypted[64]; in MLKEM768_decap() local
1028 decrypt_cpa(decrypted, priv, ciphertext); in MLKEM768_decap()
1029 memcpy(decrypted + 32, priv->pub.public_key_hash, in MLKEM768_decap()
1030 sizeof(decrypted) - 32); in MLKEM768_decap()
1031 hash_g(key_and_randomness, decrypted, sizeof(decrypted)); in MLKEM768_decap()
1032 encrypt_cpa(expected_ciphertext, &priv->pub, decrypted, in MLKEM768_decap()
/openbsd/usr.bin/ssh/
H A DPROTOCOL.chacha20poly130565 When receiving a packet, the length must be decrypted first. When 4
66 bytes of ciphertext length have been received, they may be decrypted
76 packet and the packet decrypted using ChaCha20 as described above (with
H A Dsshkey-xmss.c978 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local
1007 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state()
1044 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state()
1060 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state()
1067 *retp = decrypted; in sshkey_xmss_decrypt_state()
1068 decrypted = NULL; in sshkey_xmss_decrypt_state()
1073 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
H A Dsshkey.c1714 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument
1721 while (sshbuf_len(decrypted)) { in private2_check_padding()
1722 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding()
3008 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local
3020 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt()
3124 *decryptedp = decrypted; in private2_decrypt()
3125 decrypted = NULL; in private2_decrypt()
3143 sshbuf_free(decrypted); in private2_decrypt()
3153 struct sshbuf *decoded = NULL, *decrypted = NULL; in sshkey_parse_private2() local
3164 &decrypted, &pubkey)) != 0) in sshkey_parse_private2()
[all …]
H A Dlibcrux_mlkem768_sha3.h10933 uint8_t decrypted[32U]; in libcrux_ml_kem_ind_cca_decapsulate_70() local
10935 decrypted); in libcrux_ml_kem_ind_cca_decapsulate_70()
10938 Eurydice_array_to_slice((size_t)32U, decrypted, uint8_t), to_hash0); in libcrux_ml_kem_ind_cca_decapsulate_70()
10967 memcpy(copy_of_decrypted, decrypted, (size_t)32U * sizeof(uint8_t)); in libcrux_ml_kem_ind_cca_decapsulate_70()
11698 uint8_t decrypted[32U]; in libcrux_ml_kem_ind_cca_decapsulate_700() local
11700 decrypted); in libcrux_ml_kem_ind_cca_decapsulate_700()
11703 Eurydice_array_to_slice((size_t)32U, decrypted, uint8_t), to_hash0); in libcrux_ml_kem_ind_cca_decapsulate_700()
11732 memcpy(copy_of_decrypted, decrypted, (size_t)32U * sizeof(uint8_t)); in libcrux_ml_kem_ind_cca_decapsulate_700()
/openbsd/lib/libssl/test/
H A Dtimes17 the data is being encrypted, decrypted, encrypted and then decrypted again.
21 of bytes encrypted/decrypted/MACed. The first time value is how many seconds
/openbsd/sys/net/
H A Dpipex.c938 pipex_ppp_input(struct mbuf *m0, struct pipex_session *session, int decrypted) in pipex_ppp_input() argument
951 if (decrypted) in pipex_ppp_input()
961 decrypted = 1; in pipex_ppp_input()
966 if (decrypted) in pipex_ppp_input()
996 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input()
1006 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input()
1016 if (decrypted) in pipex_ppp_input()
/openbsd/regress/lib/libcrypto/wycheproof/
H A Dwycheproof.go2240 decrypted := make([]byte, rsaSize)
2244 …(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA…
2260 …ar)(unsafe.Pointer(&to[0])), C.int(rsaSize), (*C.uchar)(unsafe.Pointer(&decrypted[0])), C.int(rsaS…
2343 decrypted := make([]byte, rsaSize)
2347 …(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA…
2363 } else if !bytes.Equal(msg[:msgLen], decrypted[:msgLen]) {
/openbsd/share/snmp/
H A DSNMP-USER-BASED-SM-MIB.txt332 decrypted.
/openbsd/sys/dev/ic/
H A Dqwz.c14447 enum hal_encrypt_type enctype, int decrypted) in qwz_dp_rx_h_undecap_raw() argument
14461 if (!decrypted) in qwz_dp_rx_h_undecap_raw()
14527 int decrypted) in qwz_dp_rx_h_undecap() argument
14540 qwz_dp_rx_h_undecap_raw(sc, msdu, enctype, decrypted); in qwz_dp_rx_h_undecap()
14557 if (ATH12K_SKB_RXCB(msdu)->is_mcbc && decrypted) in qwz_dp_rx_h_undecap()
H A Dqwx.c16375 enum hal_encrypt_type enctype, int decrypted) in qwx_dp_rx_h_undecap_raw() argument
16389 if (!decrypted) in qwx_dp_rx_h_undecap_raw()
16455 int decrypted) in qwx_dp_rx_h_undecap() argument
16468 qwx_dp_rx_h_undecap_raw(sc, msdu, enctype, decrypted); in qwx_dp_rx_h_undecap()
16485 if (ATH11K_SKB_RXCB(msdu)->is_mcbc && decrypted) in qwx_dp_rx_h_undecap()