| /openbsd-src/usr.bin/ssh/ |
| H A D | ssh-rsa.c | 632 u_char *decrypted = NULL; openssh_RSA_verify() local
|
| H A D | PROTOCOL.chacha20poly1305 | 65 When receiving a packet, the length must be decrypted first. When 4 66 bytes of ciphertext length have been received, they may be decrypted 76 packet and the packet decrypted using ChaCha20 as described above (with
|
| H A D | sshkey-xmss.c | 978 struct sshbuf *copy = NULL, *decrypted = NULL; in sshkey_xmss_decrypt_state() local 1007 (decrypted = sshbuf_new()) == NULL || in sshkey_xmss_decrypt_state() 1044 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state() 1060 if ((r = sshbuf_consume(decrypted, aadlen)) != 0) in sshkey_xmss_decrypt_state() 1067 *retp = decrypted; in sshkey_xmss_decrypt_state() 1068 decrypted = NULL; in sshkey_xmss_decrypt_state() 1073 sshbuf_free(decrypted); in sshkey_xmss_decrypt_state()
|
| H A D | sshkey.c | 1714 private2_check_padding(struct sshbuf *decrypted) in sshkey_unshield_private() 1721 while (sshbuf_len(decrypted)) { in sshkey_unshield_private() 1722 if ((r = sshbuf_get_u8(decrypted, &pad)) != 0) in sshkey_unshield_private() 3008 struct sshbuf *kdf = NULL, *decrypted = NULL; in private2_decrypt() 3020 if ((decrypted = sshbuf_new()) == NULL) { in private2_decrypt() 3096 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || in sshkey_parse_private2() 3116 if ((r = sshbuf_get_u32(decrypted, &check1)) != 0 || in sshkey_parse_private2() 3117 (r = sshbuf_get_u32(decrypted, &check2)) != 0) in sshkey_parse_private2() 3124 *decryptedp = decrypted; in sshkey_parse_private2_pubkey() 3125 decrypted in sshkey_parse_private2_pubkey() 1616 private2_check_padding(struct sshbuf * decrypted) private2_check_padding() argument 2923 struct sshbuf *kdf = NULL, *decrypted = NULL; private2_decrypt() local 3068 struct sshbuf *decoded = NULL, *decrypted = NULL; sshkey_parse_private2() local [all...] |
| /openbsd-src/lib/libssl/test/ |
| H A D | times | 17 the data is being encrypted, decrypted, encrypted and then decrypted again. 21 of bytes encrypted/decrypted/MACed. The first time value is how many seconds
|
| /openbsd-src/sys/net/ |
| H A D | pipex.c | 938 pipex_ppp_input(struct mbuf *m0, struct pipex_session *session, int decrypted) in pipex_ppp_input() argument 951 if (decrypted) in pipex_ppp_input() 961 decrypted = 1; in pipex_ppp_input() 966 if (decrypted) in pipex_ppp_input() 996 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input() 1006 if (!decrypted && pipex_session_is_mppe_required(session)) in pipex_ppp_input() 1016 if (decrypted) in pipex_ppp_input()
|
| /openbsd-src/regress/lib/libcrypto/wycheproof/ |
| H A D | wycheproof.go | 2240 decrypted := make([]byte, rsaSize) 2244 ret := C.RSA_private_decrypt(C.int(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA_NO_PADDING) 2260 ret = C.RSA_padding_check_PKCS1_OAEP_mgf1((*C.uchar)(unsafe.Pointer(&to[0])), C.int(rsaSize), (*C.uchar)(unsafe.Pointer(&decrypted[0])), C.int(rsaSize), C.int(rsaSize), (*C.uchar)(unsafe.Pointer(&label[0])), C.int(labelLen), sha, mgfSha) 2343 decrypted := make([]byte, rsaSize) 2347 ret := C.RSA_private_decrypt(C.int(ctLen), (*C.uchar)(unsafe.Pointer(&ct[0])), (*C.uchar)(unsafe.Pointer(&decrypted[0])), rsa, C.RSA_PKCS1_PADDING) 2363 } else if !bytes.Equal(msg[:msgLen], decrypted[:msgLen]) {
|
| /openbsd-src/share/snmp/ |
| H A D | SNMP-USER-BASED-SM-MIB.txt | 332 decrypted.
|
| /openbsd-src/sys/dev/ic/ |
| H A D | qwx.c | 13119 /* In case of PMF, FW delivers decrypted frames with Protected Bit set. in qwx_mgmt_rx_event() 16375 enum hal_encrypt_type enctype, int decrypted) in qwx_dp_rx_h_undecap_raw() 16389 if (!decrypted) in qwx_dp_rx_h_undecap_raw() 16455 int decrypted) in qwx_dp_rx_h_undecap() 16468 qwx_dp_rx_h_undecap_raw(sc, msdu, enctype, decrypted); in qwx_dp_rx_h_undecap() 16485 if (ATH11K_SKB_RXCB(msdu)->is_mcbc && decrypted) in qwx_dp_rx_h_undecap() 16371 qwx_dp_rx_h_undecap_raw(struct qwx_softc * sc,struct qwx_rx_msdu * msdu,enum hal_encrypt_type enctype,int decrypted) qwx_dp_rx_h_undecap_raw() argument 16451 qwx_dp_rx_h_undecap(struct qwx_softc * sc,struct qwx_rx_msdu * msdu,struct hal_rx_desc * rx_desc,enum hal_encrypt_type enctype,int decrypted) qwx_dp_rx_h_undecap() argument
|