• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/sys/contrib/openzfs/module/icp/api/

Lines Matching refs:ciphertext

56  *	CRYPTO_INVALID_CIPHERTEXT: bogus 'ciphertext' argument.
292 * ciphertext: Storage for the encrypted message. The length needed
303 * When complete and successful, 'ciphertext' will contain the encrypted
315 crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
335 plaintext, ciphertext, tmpl);
350 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
398 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq));
402 mech, key, plaintext, ciphertext, spi_ctx_tmpl);
455 * ciphertext: Storage for the encrypted message part.
470 crypto_data_t *ciphertext, crypto_call_req_t *cr)
489 ciphertext, NULL);
504 ctx->cc_session, NULL, NULL, plaintext, ciphertext, NULL);
515 * ciphertext: Storage for the last part of encrypted message
529 crypto_encrypt_final(crypto_context_t context, crypto_data_t *ciphertext,
548 error = KCF_PROV_ENCRYPT_FINAL(pd, ctx, ciphertext, NULL);
552 ctx->cc_session, NULL, NULL, NULL, ciphertext, NULL);
573 * ciphertext: The message to be encrypted
583 * single-part decryption of 'ciphertext' with the mechanism 'mech', using
596 crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key,
617 ciphertext, plaintext, tmpl);
632 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext,
648 ciphertext->cd_length)) == NULL) {
681 ciphertext, plaintext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq));
685 mech, key, ciphertext, plaintext, spi_ctx_tmpl);
737 * ciphertext: The message part to be decrypted
752 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext,
771 error = KCF_PROV_DECRYPT_UPDATE(pd, ctx, ciphertext,
779 if (ciphertext->cd_length < kcf_ctx->kc_mech->me_threshold &&
787 ctx->cc_session, NULL, NULL, ciphertext, plaintext, NULL);
850 crypto_data_t *ciphertext, crypto_call_req_t *cr)
867 ciphertext, NULL);
871 NULL, NULL, plaintext, ciphertext, NULL);
884 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext,
901 error = KCF_PROV_DECRYPT(pd, ctx, ciphertext,
906 NULL, NULL, ciphertext, plaintext, NULL);