/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | pkcs1.c | 206 u8 *decrypted; in pkcs1_v15_sig_ver() local 212 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver() 213 if (decrypted == NULL) in pkcs1_v15_sig_ver() 216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver() 220 os_free(decrypted); in pkcs1_v15_sig_ver() 223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver() 238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver() 242 os_free(decrypted); in pkcs1_v15_sig_ver() 263 os_free(decrypted); in pkcs1_v15_sig_ver() 273 os_free(decrypted); in pkcs1_v15_sig_ver() [all...] |
H A D | tlsv1_common.c | 420 const u8 *decrypted; in tls_verify_signature() local 460 decrypted = buf; in tls_verify_signature() 463 decrypted, buflen); in tls_verify_signature() 486 decrypted = buf + 19; in tls_verify_signature() 493 decrypted = buf + 19; in tls_verify_signature() 500 decrypted = buf + 19; in tls_verify_signature() 513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs1.c | 202 u8 *decrypted; in pkcs1_v15_sig_ver() local 208 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver() 209 if (decrypted == NULL) in pkcs1_v15_sig_ver() 212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver() 216 os_free(decrypted); in pkcs1_v15_sig_ver() 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver() 234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver() 240 os_free(decrypted); in pkcs1_v15_sig_ver() 263 os_free(decrypted); in pkcs1_v15_sig_ver() 273 os_free(decrypted); in pkcs1_v15_sig_ver() [all...] |
H A D | tlsv1_common.c | 420 const u8 *decrypted; in tls_verify_signature() local 460 decrypted = buf; in tls_verify_signature() 463 decrypted, buflen); in tls_verify_signature() 486 decrypted = buf + 19; in tls_verify_signature() 493 decrypted = buf + 19; in tls_verify_signature() 500 decrypted = buf + 19; in tls_verify_signature() 513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_enrollee.c | 996 struct wpabuf *decrypted; in wps_process_m2() local 999 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2() 1001 if (decrypted == NULL) { in wps_process_m2() 1008 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " in wps_process_m2() 1010 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2() 1011 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2() 1015 wpabuf_clear_free(decrypted); in wps_process_m2() 1019 wpabuf_clear_free(decrypted); in wps_process_m2() 1090 struct wpabuf *decrypted; in wps_process_m4() local 1110 decrypted in wps_process_m4() 1145 struct wpabuf *decrypted; wps_process_m6() local 1202 struct wpabuf *decrypted; wps_process_m8() local [all...] |
H A D | wps_common.c | 158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local 171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings() 172 if (decrypted == NULL) in wps_decrypt_encr_settings() 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings() 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings() 178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings() 179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings() 184 decrypted); in wps_decrypt_encr_settings() 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) in wps_decrypt_encr_settings() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_enrollee.c | 1007 struct wpabuf *decrypted; in wps_process_m2() local 1010 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2() 1012 if (decrypted == NULL) { in wps_process_m2() 1019 wpa_printf(MSG_DEBUG, "WPS: Processing decrypted Encrypted " in wps_process_m2() 1021 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2() 1022 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2() 1026 wpabuf_clear_free(decrypted); in wps_process_m2() 1030 wpabuf_clear_free(decrypted); in wps_process_m2() 1101 struct wpabuf *decrypted; in wps_process_m4() local 1121 decrypted in wps_process_m4() 1156 struct wpabuf *decrypted; wps_process_m6() local 1213 struct wpabuf *decrypted; wps_process_m8() local [all...] |
H A D | wps_common.c | 158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local 171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings() 172 if (decrypted == NULL) in wps_decrypt_encr_settings() 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings() 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings() 178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings() 179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings() 184 decrypted); in wps_decrypt_encr_settings() 186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) in wps_decrypt_encr_settings() [all...] |
/third_party/node/test/parallel/ |
H A D | test-crypto-padding-aes256.js | 51 let decrypted = decrypt(encrypted, false); 52 assert.strictEqual(decrypted, plaintext); 59 decrypted = decrypt(encrypted, true); 60 assert.strictEqual(decrypted, plaintext);
|
H A D | test-crypto-private-decrypt-gh32240.js | 32 const decrypted = privateDecrypt(key, encrypted); 33 assert.deepStrictEqual(decrypted, expected);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 275 decrypted = os_memdup(msg, left); in eap_psk_process_3() 276 if (decrypted == NULL) { in eap_psk_process_3() 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3() 288 os_free(decrypted); in eap_psk_process_3() 292 decrypted, left); in eap_psk_process_3() 295 switch (decrypted[0] >> 6) { in eap_psk_process_3() 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3() 318 os_free(decrypted); in eap_psk_process_3() 330 if (decrypted[ in eap_psk_process_3() [all...] |
H A D | eap_sim.c | 823 u8 *decrypted; in eap_sim_process_challenge() local 824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 827 if (decrypted == NULL) { in eap_sim_process_challenge() 832 os_free(decrypted); in eap_sim_process_challenge() 857 u8 *decrypted; in eap_sim_process_notification_reauth() local 865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 868 if (decrypted == NULL) { in eap_sim_process_notification_reauth() 878 os_free(decrypted); in eap_sim_process_notification_reauth() 882 os_free(decrypted); in eap_sim_process_notification_reauth() 956 u8 *decrypted; in eap_sim_process_reauthentication() local [all...] |
H A D | eap_aka.c | 1089 u8 *decrypted; in eap_aka_process_challenge() local 1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1093 if (decrypted == NULL) { in eap_aka_process_challenge() 1098 os_free(decrypted); in eap_aka_process_challenge() 1123 u8 *decrypted; in eap_aka_process_notification_reauth() local 1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1134 if (decrypted == NULL) { in eap_aka_process_notification_reauth() 1144 os_free(decrypted); in eap_aka_process_notification_reauth() 1148 os_free(decrypted); in eap_aka_process_notification_reauth() 1221 u8 *decrypted; in eap_aka_process_reauthentication() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 275 decrypted = os_memdup(msg, left); in eap_psk_process_3() 276 if (decrypted == NULL) { in eap_psk_process_3() 285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3() 288 os_free(decrypted); in eap_psk_process_3() 292 decrypted, left); in eap_psk_process_3() 295 switch (decrypted[0] >> 6) { in eap_psk_process_3() 312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3() 318 os_free(decrypted); in eap_psk_process_3() 330 if (decrypted[ in eap_psk_process_3() [all...] |
H A D | eap_sim.c | 835 u8 *decrypted; in eap_sim_process_challenge() local 836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge() 839 if (decrypted == NULL) { in eap_sim_process_challenge() 844 os_free(decrypted); in eap_sim_process_challenge() 869 u8 *decrypted; in eap_sim_process_notification_reauth() local 877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth() 880 if (decrypted == NULL) { in eap_sim_process_notification_reauth() 890 os_free(decrypted); in eap_sim_process_notification_reauth() 894 os_free(decrypted); in eap_sim_process_notification_reauth() 968 u8 *decrypted; in eap_sim_process_reauthentication() local [all...] |
H A D | eap_aka.c | 1103 u8 *decrypted; in eap_aka_process_challenge() local 1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge() 1107 if (decrypted == NULL) { in eap_aka_process_challenge() 1112 os_free(decrypted); in eap_aka_process_challenge() 1137 u8 *decrypted; in eap_aka_process_notification_reauth() local 1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth() 1148 if (decrypted == NULL) { in eap_aka_process_notification_reauth() 1158 os_free(decrypted); in eap_aka_process_notification_reauth() 1162 os_free(decrypted); in eap_aka_process_notification_reauth() 1235 u8 *decrypted; in eap_aka_process_reauthentication() local [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | envelope.rs | 124 /// Feeds data from `input` through the cipher, writing decrypted bytes into `output`. 175 let mut decrypted = vec![0; enc_len + cipher.block_size()]; in public_encrypt_private_decrypt() variables 176 let mut dec_len = open.update(&encrypted[..enc_len], &mut decrypted).unwrap(); in public_encrypt_private_decrypt() 177 dec_len += open.finalize(&mut decrypted[dec_len..]).unwrap(); in public_encrypt_private_decrypt() 179 assert_eq!(&secret[..], &decrypted[..dec_len]); in public_encrypt_private_decrypt()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 373 decrypted = os_memdup(pos, left); in eap_psk_process_4() 374 if (decrypted == NULL) in eap_psk_process_4() 378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4() 381 os_free(decrypted); in eap_psk_process_4() 386 decrypted, left); in eap_psk_process_4() 389 switch (decrypted[0] >> 6) { in eap_psk_process_4() 403 os_free(decrypted); in eap_psk_process_4()
|
H A D | ikev2.c | 451 u8 *decrypted; in ikev2_process_sa_init_encr() local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() 460 if (decrypted == NULL) in ikev2_process_sa_init_encr() 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_init_encr() 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr() 466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr() 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_init_encr() 475 os_free(decrypted); in ikev2_process_sa_init_encr() 693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_auth_decrypted() 697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_auth_decrypted() 715 u8 *decrypted; ikev2_process_sa_auth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_psk.c | 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 373 decrypted = os_memdup(pos, left); in eap_psk_process_4() 374 if (decrypted == NULL) in eap_psk_process_4() 378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4() 381 os_free(decrypted); in eap_psk_process_4() 386 decrypted, left); in eap_psk_process_4() 389 switch (decrypted[0] >> 6) { in eap_psk_process_4() 403 os_free(decrypted); in eap_psk_process_4()
|
H A D | ikev2.c | 451 u8 *decrypted; in ikev2_process_sa_init_encr() local 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() 460 if (decrypted == NULL) in ikev2_process_sa_init_encr() 463 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_init_encr() 465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr() 466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr() 467 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_init_encr() 475 os_free(decrypted); in ikev2_process_sa_init_encr() 693 wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); in ikev2_process_sa_auth_decrypted() 697 wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " in ikev2_process_sa_auth_decrypted() 715 u8 *decrypted; ikev2_process_sa_auth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local 495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload() 496 if (decrypted == NULL) in ikev2_decrypt_payload() 500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload() 501 os_free(decrypted); in ikev2_decrypt_payload() 505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload() 509 os_free(decrypted); in ikev2_decrypt_payload() 516 return decrypted; in ikev2_decrypt_payload()
|
H A D | eap_sim_common.c | 937 u8 *decrypted; in eap_sim_parse_encr() local 944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr() 945 if (decrypted == NULL) in eap_sim_parse_encr() 952 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 953 os_free(decrypted); in eap_sim_parse_encr() 958 decrypted, encr_data_len); in eap_sim_parse_encr() 960 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr() 963 "decrypted AT_ENCR_DATA"); in eap_sim_parse_encr() 964 os_free(decrypted); in eap_sim_parse_encr() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.c | 436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local 495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload() 496 if (decrypted == NULL) in ikev2_decrypt_payload() 500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload() 501 os_free(decrypted); in ikev2_decrypt_payload() 505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload() 509 os_free(decrypted); in ikev2_decrypt_payload() 516 return decrypted; in ikev2_decrypt_payload()
|
H A D | eap_sim_common.c | 947 u8 *decrypted; in eap_sim_parse_encr() local 954 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr() 955 if (decrypted == NULL) in eap_sim_parse_encr() 962 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { in eap_sim_parse_encr() 963 os_free(decrypted); in eap_sim_parse_encr() 968 decrypted, encr_data_len); in eap_sim_parse_encr() 970 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr, in eap_sim_parse_encr() 973 "decrypted AT_ENCR_DATA"); in eap_sim_parse_encr() 974 os_free(decrypted); in eap_sim_parse_encr() [all...] |