Searched refs:decrypted (Results 1 – 9 of 9) sorted by relevance
/openbsd/usr.bin/ssh/ |
H A D | ssh-rsa.c | 632 u_char *decrypted = NULL; in openssh_RSA_verify() local 648 if ((decrypted = malloc(rsasize)) == NULL) { in openssh_RSA_verify() 652 if ((len = RSA_public_decrypt(siglen, sigbuf, decrypted, rsa, in openssh_RSA_verify() 661 oidmatch = timingsafe_bcmp(decrypted, oid, oidlen) == 0; in openssh_RSA_verify() 662 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0; in openssh_RSA_verify() 669 freezero(decrypted, rsasize); in openssh_RSA_verify()
|
H A D | PROTOCOL.chacha20poly1305 | 65 When receiving a packet, the length must be decrypted first. When 4 66 bytes of ciphertext length have been received, they may be decrypted 76 packet and the packet decrypted using ChaCha20 as described above (with
|
H A D | sshkey-xmss.c | 978 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local 1007 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state() 1044 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state() 1060 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state() 1067 *retp = decrypted; in sshkey_xmss_decrypt_state() 1068 decrypted = NULL; in sshkey_xmss_decrypt_state() 1073 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
|
H A D | sshkey.c | 1616 private2_check_padding(struct sshbuf *decrypted) in private2_check_padding() argument 1623 while (sshbuf_len(decrypted)) { in private2_check_padding() 1624 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in private2_check_padding() 2923 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() local 2935 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt() 3039 *decryptedp = decrypted; in private2_decrypt() 3040 decrypted = NULL; in private2_decrypt() 3058 sshbuf_free(decrypted); in private2_decrypt() 3068 struct sshbuf *decoded = NULL, *decrypted = NULL; in sshkey_parse_private2() local 3079 &decrypted, &pubkey)) != 0) in sshkey_parse_private2() [all …]
|
/openbsd/lib/libssl/test/ |
H A D | times | 17 the data is being encrypted, decrypted, encrypted and then decrypted again. 21 of bytes encrypted/decrypted/MACed. The first time value is how many seconds
|
/openbsd/sys/net/ |
H A D | pipex.c | 938 pipex_ppp_input(struct mbuf *m0, struct pipex_session *session, int decrypted) in pipex_ppp_input() argument 951 if (decrypted) in pipex_ppp_input() 961 decrypted = 1; in pipex_ppp_input() 966 if (decrypted) in pipex_ppp_input() 996 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input() 1006 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input() 1016 if (decrypted) in pipex_ppp_input()
|
/openbsd/regress/lib/libcrypto/wycheproof/ |
H A D | wycheproof.go | 2226 decrypted := make([]byte, rsaSize) 2230 …(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA… 2246 …ar)(unsafe.Pointer(&to[0])), C.int(rsaSize), (*C.uchar)(unsafe.Pointer(&decrypted[0])), C.int(rsaS… 2329 decrypted := make([]byte, rsaSize) 2333 …(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA… 2349 } else if !bytes.Equal(msg[:msgLen], decrypted[:msgLen]) {
|
/openbsd/share/snmp/ |
H A D | SNMP-USER-BASED-SM-MIB.txt | 332 decrypted.
|
/openbsd/sys/dev/ic/ |
H A D | qwx.c | 16371 enum hal_encrypt_type enctype, int decrypted) in qwx_dp_rx_h_undecap_raw() argument 16385 if (!decrypted) in qwx_dp_rx_h_undecap_raw() 16451 int decrypted) in qwx_dp_rx_h_undecap() argument 16464 qwx_dp_rx_h_undecap_raw(sc, msdu, enctype, decrypted); in qwx_dp_rx_h_undecap() 16481 if (ATH11K_SKB_RXCB(msdu)->is_mcbc && decrypted) in qwx_dp_rx_h_undecap()
|