Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 9 of 9) sorted by relevance

/openbsd/usr.bin/ssh/
H A Dssh-rsa.c632 u_char *decrypted = NULL; in openssh_RSA_verify() local
648 if ((decrypted = malloc(rsasize)) == NULL) { in openssh_RSA_verify()
652 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify()
661 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; in openssh_RSA_verify()
662 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; in openssh_RSA_verify()
669 freezero(decrypted, rsasize); in openssh_RSA_verify()
H A DPROTOCOL.chacha20poly130565 When receiving a packet, the length must be decrypted first. When 4
66 bytes of ciphertext length have been received, they may be decrypted
76 packet and the packet decrypted using ChaCha20 as described above (with
H A Dsshkey-xmss.c978 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local
1007 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state()
1044 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state()
1060 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state()
1067 *retp = decrypted; in sshkey_xmss_decrypt_state()
1068 decrypted = NULL; in sshkey_xmss_decrypt_state()
1073 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
H A Dsshkey.c1616 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument
1623 while (sshbuf_len(decrypted)) { in private2_check_padding()
1624 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding()
2923 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local
2935 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt()
3039 *decryptedp = decrypted; in private2_decrypt()
3040 decrypted = NULL; in private2_decrypt()
3058 sshbuf_free(decrypted); in private2_decrypt()
3068 struct sshbuf *decoded = NULL, *decrypted = NULL; in sshkey_parse_private2() local
3079 &decrypted, &pubkey)) != 0) in sshkey_parse_private2()
[all …]
/openbsd/lib/libssl/test/
H A Dtimes17 the data is being encrypted, decrypted, encrypted and then decrypted again.
21 of bytes encrypted/decrypted/MACed. The first time value is how many seconds
/openbsd/sys/net/
H A Dpipex.c938 pipex_ppp_input(struct mbuf *m0, struct pipex_session *session, int decrypted) in pipex_ppp_input() argument
951 if (decrypted) in pipex_ppp_input()
961 decrypted = 1; in pipex_ppp_input()
966 if (decrypted) in pipex_ppp_input()
996 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input()
1006 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input()
1016 if (decrypted) in pipex_ppp_input()
/openbsd/regress/lib/libcrypto/wycheproof/
H A Dwycheproof.go2226 decrypted := make([]byte, rsaSize)
2230 …(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA…
2246 …ar)(unsafe.Pointer(&to[0])), C.int(rsaSize), (*C.uchar)(unsafe.Pointer(&decrypted[0])), C.int(rsaS…
2329 decrypted := make([]byte, rsaSize)
2333 …(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA…
2349 } else if !bytes.Equal(msg[:msgLen], decrypted[:msgLen]) {
/openbsd/share/snmp/
H A DSNMP-USER-BASED-SM-MIB.txt332 decrypted.
/openbsd/sys/dev/ic/
H A Dqwx.c16371 enum hal_encrypt_type enctype, int decrypted) in qwx_dp_rx_h_undecap_raw() argument
16385 if (!decrypted) in qwx_dp_rx_h_undecap_raw()
16451 int decrypted) in qwx_dp_rx_h_undecap() argument
16464 qwx_dp_rx_h_undecap_raw(sc, msdu, enctype, decrypted); in qwx_dp_rx_h_undecap()
16481 if (ATH11K_SKB_RXCB(msdu)->is_mcbc && decrypted) in qwx_dp_rx_h_undecap()