Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 25 of 129) sorted by relevance

123456

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dpkcs1.c206 u8 *decrypted; in pkcs1_v15_sig_ver() local
212 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
213 if (decrypted == NULL) in pkcs1_v15_sig_ver()
216 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver()
220 os_free(decrypted); in pkcs1_v15_sig_ver()
223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
238 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver()
242 os_free(decrypted); in pkcs1_v15_sig_ver()
263 os_free(decrypted); in pkcs1_v15_sig_ver()
273 os_free(decrypted); in pkcs1_v15_sig_ver()
[all …]
Dtlsv1_common.c420 const u8 *decrypted; in tls_verify_signature() local
460 decrypted = buf; in tls_verify_signature()
463 decrypted, buflen); in tls_verify_signature()
486 decrypted = buf + 19; in tls_verify_signature()
493 decrypted = buf + 19; in tls_verify_signature()
500 decrypted = buf + 19; in tls_verify_signature()
513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dpkcs1.c202 u8 *decrypted; in pkcs1_v15_sig_ver() local
208 decrypted = os_malloc(s_len); in pkcs1_v15_sig_ver()
209 if (decrypted == NULL) in pkcs1_v15_sig_ver()
212 res = crypto_public_key_decrypt_pkcs1(pk, s, s_len, decrypted, in pkcs1_v15_sig_ver()
216 os_free(decrypted); in pkcs1_v15_sig_ver()
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
234 if (asn1_get_next(decrypted, decrypted_len, &hdr) < 0 || in pkcs1_v15_sig_ver()
240 os_free(decrypted); in pkcs1_v15_sig_ver()
263 os_free(decrypted); in pkcs1_v15_sig_ver()
273 os_free(decrypted); in pkcs1_v15_sig_ver()
[all …]
Dtlsv1_common.c420 const u8 *decrypted; in tls_verify_signature() local
460 decrypted = buf; in tls_verify_signature()
463 decrypted, buflen); in tls_verify_signature()
486 decrypted = buf + 19; in tls_verify_signature()
493 decrypted = buf + 19; in tls_verify_signature()
500 decrypted = buf + 19; in tls_verify_signature()
513 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
/third_party/gstreamer/gstplugins_bad/gst-libs/gst/codecparsers/
Ddboolhuff.c49 unsigned char decrypted[sizeof (VP8_BD_VALUE) + 1]; in vp8dx_bool_decoder_fill() local
53 bytes_left > sizeof (decrypted) ? sizeof (decrypted) : bytes_left; in vp8dx_bool_decoder_fill()
54 br->decrypt_cb (br->decrypt_state, bufptr, decrypted, (int) n); in vp8dx_bool_decoder_fill()
55 bufptr = decrypted; in vp8dx_bool_decoder_fill()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
Dwps_enrollee.c1007 struct wpabuf *decrypted; in wps_process_m2() local
1010 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2()
1012 if (decrypted == NULL) { in wps_process_m2()
1021 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2()
1022 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2()
1026 wpabuf_clear_free(decrypted); in wps_process_m2()
1030 wpabuf_clear_free(decrypted); in wps_process_m2()
1101 struct wpabuf *decrypted; in wps_process_m4() local
1121 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4()
1123 if (decrypted == NULL) { in wps_process_m4()
[all …]
Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings()
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings()
188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
Dwps_enrollee.c996 struct wpabuf *decrypted; in wps_process_m2() local
999 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m2()
1001 if (decrypted == NULL) { in wps_process_m2()
1010 if (wps_parse_msg(decrypted, &eattr) < 0 || in wps_process_m2()
1011 wps_process_key_wrap_auth(wps, decrypted, in wps_process_m2()
1015 wpabuf_clear_free(decrypted); in wps_process_m2()
1019 wpabuf_clear_free(decrypted); in wps_process_m2()
1090 struct wpabuf *decrypted; in wps_process_m4() local
1110 decrypted = wps_decrypt_encr_settings(wps, attr->encr_settings, in wps_process_m4()
1112 if (decrypted == NULL) { in wps_process_m4()
[all …]
Dwps_common.c158 struct wpabuf *decrypted; in wps_decrypt_encr_settings() local
171 decrypted = wpabuf_alloc(encr_len - block_size); in wps_decrypt_encr_settings()
172 if (decrypted == NULL) in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
178 wpabuf_len(decrypted))) { in wps_decrypt_encr_settings()
179 wpabuf_clear_free(decrypted); in wps_decrypt_encr_settings()
184 decrypted); in wps_decrypt_encr_settings()
186 pos = wpabuf_head_u8(decrypted) + wpabuf_len(decrypted) - 1; in wps_decrypt_encr_settings()
188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
[all …]
/third_party/node/test/parallel/
Dtest-crypto-padding-aes256.js51 let decrypted = decrypt(encrypted, false); variable
52 assert.strictEqual(decrypted, plaintext);
59 decrypted = decrypt(encrypted, true);
60 assert.strictEqual(decrypted, plaintext);
Dtest-crypto-private-decrypt-gh32240.js32 const decrypted = privateDecrypt(key, encrypted);
33 assert.deepStrictEqual(decrypted, expected);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3()
[all …]
Deap_sim.c835 u8 *decrypted; in eap_sim_process_challenge() local
836 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
839 if (decrypted == NULL) { in eap_sim_process_challenge()
844 os_free(decrypted); in eap_sim_process_challenge()
869 u8 *decrypted; in eap_sim_process_notification_reauth() local
877 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
880 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
890 os_free(decrypted); in eap_sim_process_notification_reauth()
894 os_free(decrypted); in eap_sim_process_notification_reauth()
968 u8 *decrypted; in eap_sim_process_reauthentication() local
[all …]
Deap_aka.c1103 u8 *decrypted; in eap_aka_process_challenge() local
1104 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1107 if (decrypted == NULL) { in eap_aka_process_challenge()
1112 os_free(decrypted); in eap_aka_process_challenge()
1137 u8 *decrypted; in eap_aka_process_notification_reauth() local
1145 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1148 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1158 os_free(decrypted); in eap_aka_process_notification_reauth()
1162 os_free(decrypted); in eap_aka_process_notification_reauth()
1235 u8 *decrypted; in eap_aka_process_reauthentication() local
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
276 if (decrypted == NULL) { in eap_psk_process_3()
285 sizeof(*hdr3) - EAP_PSK_MAC_LEN, decrypted, in eap_psk_process_3()
288 os_free(decrypted); in eap_psk_process_3()
292 decrypted, left); in eap_psk_process_3()
295 switch (decrypted[0] >> 6) { in eap_psk_process_3()
312 if ((decrypted[0] & EAP_PSK_E_FLAG) && left > 1) in eap_psk_process_3()
318 os_free(decrypted); in eap_psk_process_3()
330 if (decrypted[0] & EAP_PSK_E_FLAG) { in eap_psk_process_3()
[all …]
Deap_sim.c823 u8 *decrypted; in eap_sim_process_challenge() local
824 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_challenge()
827 if (decrypted == NULL) { in eap_sim_process_challenge()
832 os_free(decrypted); in eap_sim_process_challenge()
857 u8 *decrypted; in eap_sim_process_notification_reauth() local
865 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_sim_process_notification_reauth()
868 if (decrypted == NULL) { in eap_sim_process_notification_reauth()
878 os_free(decrypted); in eap_sim_process_notification_reauth()
882 os_free(decrypted); in eap_sim_process_notification_reauth()
956 u8 *decrypted; in eap_sim_process_reauthentication() local
[all …]
Deap_aka.c1089 u8 *decrypted; in eap_aka_process_challenge() local
1090 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_challenge()
1093 if (decrypted == NULL) { in eap_aka_process_challenge()
1098 os_free(decrypted); in eap_aka_process_challenge()
1123 u8 *decrypted; in eap_aka_process_notification_reauth() local
1131 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data, in eap_aka_process_notification_reauth()
1134 if (decrypted == NULL) { in eap_aka_process_notification_reauth()
1144 os_free(decrypted); in eap_aka_process_notification_reauth()
1148 os_free(decrypted); in eap_aka_process_notification_reauth()
1221 u8 *decrypted; in eap_aka_process_reauthentication() local
[all …]
/third_party/boost/libs/convert/doc/
Dother.qbk14 string decrypted = boost::convert<string>(encrypted, my_cypher).value();
17 BOOST_ASSERT(decrypted == "ABC");
19 The original "ABC" string is "encrypted" as "123" first and then "123" is "decrypted" back to its o…
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
715 u8 *decrypted; in ikev2_process_sa_auth() local
719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
723 if (decrypted == NULL) in ikev2_process_sa_auth()
727 decrypted, decrypted_len); in ikev2_process_sa_auth()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_psk.c333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
374 if (decrypted == NULL) in eap_psk_process_4()
378 wpabuf_head(respData), 22, decrypted, left, in eap_psk_process_4()
381 os_free(decrypted); in eap_psk_process_4()
386 decrypted, left); in eap_psk_process_4()
389 switch (decrypted[0] >> 6) { in eap_psk_process_4()
403 os_free(decrypted); in eap_psk_process_4()
Dikev2.c451 u8 *decrypted; in ikev2_process_sa_init_encr() local
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
460 if (decrypted == NULL) in ikev2_process_sa_init_encr()
465 if (ikev2_parse_payloads(&pl, next_payload, decrypted, in ikev2_process_sa_init_encr()
466 decrypted + decrypted_len) < 0) { in ikev2_process_sa_init_encr()
475 os_free(decrypted); in ikev2_process_sa_init_encr()
715 u8 *decrypted; in ikev2_process_sa_auth() local
719 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
723 if (decrypted == NULL) in ikev2_process_sa_auth()
727 decrypted, decrypted_len); in ikev2_process_sa_auth()
[all …]
/third_party/boost/libs/convert/test/
Dencryption.cpp36 std::string decrypted = boost::convert<std::string>(encrypted, my_cypher).value(); in main() local
39 BOOST_TEST(decrypted == "ABC"); in main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Dikev2_common.c436 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; in ikev2_decrypt_payload() local
495 decrypted = os_malloc(decrypted_len); in ikev2_decrypt_payload()
496 if (decrypted == NULL) in ikev2_decrypt_payload()
500 decrypted, decrypted_len) < 0) { in ikev2_decrypt_payload()
501 os_free(decrypted); in ikev2_decrypt_payload()
505 pad_len = decrypted[decrypted_len - 1]; in ikev2_decrypt_payload()
509 os_free(decrypted); in ikev2_decrypt_payload()
516 return decrypted; in ikev2_decrypt_payload()

123456