Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 - 25 of 44) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dpkcs1.c206 u8 *decrypted; in pkcs1_v15_sig_ver() local
212 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
213 if (decrypted == NULL) in pkcs1_v15_sig_ver()
216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver()
220 os_free(decrypted); in pkcs1_v15_sig_ver()
223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver()
242 os_free(decrypted); in pkcs1_v15_sig_ver()
263 os_free(decrypted); in pkcs1_v15_sig_ver()
273 os_free(decrypted); in pkcs1_v15_sig_ver()
[all...]
H A Dtlsv1_common.c420 const u8 *decrypted; in tls_verify_signature() local
460 decrypted = buf; in tls_verify_signature()
463 decrypted, buflen); in tls_verify_signature()
486 decrypted = buf + 19; in tls_verify_signature()
493 decrypted = buf + 19; in tls_verify_signature()
500 decrypted = buf + 19; in tls_verify_signature()
513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs1.c202 u8 *decrypted; in pkcs1_v15_sig_ver() local
208 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
209 if (decrypted == NULL) in pkcs1_v15_sig_ver()
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver()
216 os_free(decrypted); in pkcs1_v15_sig_ver()
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver()
240 os_free(decrypted); in pkcs1_v15_sig_ver()
263 os_free(decrypted); in pkcs1_v15_sig_ver()
273 os_free(decrypted); in pkcs1_v15_sig_ver()
[all...]
H A Dtlsv1_common.c420 const u8 *decrypted; in tls_verify_signature() local
460 decrypted = buf; in tls_verify_signature()
463 decrypted, buflen); in tls_verify_signature()
486 decrypted = buf + 19; in tls_verify_signature()
493 decrypted = buf + 19; in tls_verify_signature()
500 decrypted = buf + 19; in tls_verify_signature()
513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
H A Dwps_enrollee.c996 struct wpabuf *decrypted; in wps_process_m2() local
999 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2()
1001 if (decrypted == NULL) { in wps_process_m2()
1008 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " in wps_process_m2()
1010 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2()
1011 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2()
1015 wpabuf_clear_free(decrypted); in wps_process_m2()
1019 wpabuf_clear_free(decrypted); in wps_process_m2()
1090 struct wpabuf *decrypted; in wps_process_m4() local
1110 decrypted in wps_process_m4()
1145 struct wpabuf *decrypted; wps_process_m6() local
1202 struct wpabuf *decrypted; wps_process_m8() local
[all...]
H A Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings()
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) in wps_decrypt_encr_settings()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
H A Dwps_enrollee.c1007 struct wpabuf *decrypted; in wps_process_m2() local
1010 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2()
1012 if (decrypted == NULL) { in wps_process_m2()
1019 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " in wps_process_m2()
1021 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2()
1022 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2()
1026 wpabuf_clear_free(decrypted); in wps_process_m2()
1030 wpabuf_clear_free(decrypted); in wps_process_m2()
1101 struct wpabuf *decrypted; in wps_process_m4() local
1121 decrypted in wps_process_m4()
1156 struct wpabuf *decrypted; wps_process_m6() local
1213 struct wpabuf *decrypted; wps_process_m8() local
[all...]
H A Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings()
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) in wps_decrypt_encr_settings()
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-padding-aes256.js51 let decrypted = decrypt(encrypted, false);
52 assert.strictEqual(decrypted, plaintext);
59 decrypted = decrypt(encrypted, true);
60 assert.strictEqual(decrypted, plaintext);
H A Dtest-crypto-private-decrypt-gh32240.js32 const decrypted = privateDecrypt(key, encrypted);
33 assert.deepStrictEqual(decrypted, expected);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[ in eap_psk_process_3()
[all...]
H A Deap_sim.c823 u8 *decrypted; in eap_sim_process_challenge() local
824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
827 if (decrypted == NULL) { in eap_sim_process_challenge()
832 os_free(decrypted); in eap_sim_process_challenge()
857 u8 *decrypted; in eap_sim_process_notification_reauth() local
865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
868 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
878 os_free(decrypted); in eap_sim_process_notification_reauth()
882 os_free(decrypted); in eap_sim_process_notification_reauth()
956 u8 *decrypted; in eap_sim_process_reauthentication() local
[all...]
H A Deap_aka.c1089 u8 *decrypted; in eap_aka_process_challenge() local
1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1093 if (decrypted == NULL) { in eap_aka_process_challenge()
1098 os_free(decrypted); in eap_aka_process_challenge()
1123 u8 *decrypted; in eap_aka_process_notification_reauth() local
1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1134 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1144 os_free(decrypted); in eap_aka_process_notification_reauth()
1148 os_free(decrypted); in eap_aka_process_notification_reauth()
1221 u8 *decrypted; in eap_aka_process_reauthentication() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[ in eap_psk_process_3()
[all...]
H A Deap_sim.c835 u8 *decrypted; in eap_sim_process_challenge() local
836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
839 if (decrypted == NULL) { in eap_sim_process_challenge()
844 os_free(decrypted); in eap_sim_process_challenge()
869 u8 *decrypted; in eap_sim_process_notification_reauth() local
877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
880 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
890 os_free(decrypted); in eap_sim_process_notification_reauth()
894 os_free(decrypted); in eap_sim_process_notification_reauth()
968 u8 *decrypted; in eap_sim_process_reauthentication() local
[all...]
H A Deap_aka.c1103 u8 *decrypted; in eap_aka_process_challenge() local
1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1107 if (decrypted == NULL) { in eap_aka_process_challenge()
1112 os_free(decrypted); in eap_aka_process_challenge()
1137 u8 *decrypted; in eap_aka_process_notification_reauth() local
1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1148 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1158 os_free(decrypted); in eap_aka_process_notification_reauth()
1162 os_free(decrypted); in eap_aka_process_notification_reauth()
1235 u8 *decrypted; in eap_aka_process_reauthentication() local
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/
H A Denvelope.rs124 /// Feeds data from `input` through the cipher, writing decrypted bytes into `output`.
175 let mut decrypted = vec![0; enc_len + cipher.block_size()]; in public_encrypt_private_decrypt() variables
176 let mut dec_len = open.update(&encrypted[..enc_len], &mut decrypted).unwrap(); in public_encrypt_private_decrypt()
177 dec_len += open.finalize(&mut decrypted[dec_len..]).unwrap(); in public_encrypt_private_decrypt()
179 assert_eq!(&secret[..], &decrypted[..dec_len]); in public_encrypt_private_decrypt()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
H A Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_auth_decrypted()
697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_auth_decrypted()
715 u8 *decrypted; ikev2_process_sa_auth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
H A Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_auth_decrypted()
697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_auth_decrypted()
715 u8 *decrypted; ikev2_process_sa_auth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()
H A Deap_sim_common.c937 u8 *decrypted; in eap_sim_parse_encr() local
944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr()
945 if (decrypted == NULL) in eap_sim_parse_encr()
952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
953 os_free(decrypted); in eap_sim_parse_encr()
958 decrypted, encr_data_len); in eap_sim_parse_encr()
960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr()
963 "decrypted AT_ENCR_DATA"); in eap_sim_parse_encr()
964 os_free(decrypted); in eap_sim_parse_encr()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()
H A Deap_sim_common.c947 u8 *decrypted; in eap_sim_parse_encr() local
954 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr()
955 if (decrypted == NULL) in eap_sim_parse_encr()
962 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr()
963 os_free(decrypted); in eap_sim_parse_encr()
968 decrypted, encr_data_len); in eap_sim_parse_encr()
970 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr()
973 "decrypted AT_ENCR_DATA"); in eap_sim_parse_encr()
974 os_free(decrypted); in eap_sim_parse_encr()
[all...]

Completed in 22 milliseconds

12