Searched refs:crypt (Results 26 - 50 of 111) sorted by relevance

12345

/freebsd-13-stable/contrib/wpa/src/crypto/
H A Daes-gcm.c230 const u8 *crypt, size_t crypt_len, u8 *S)
242 ghash(H, crypt, crypt_len, S);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
270 aes_gcm_gctr(aes, J0, plain, plain_len, crypt);
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
289 const u8 *crypt, size_t crypt_len,
304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain);
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) argument
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
H A Dcrypto_internal-rsa.c112 const u8 *crypt, size_t crypt_len,
116 crypt, crypt_len, plain, plain_len);
111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
H A Dcrypto_libtomcrypt.c100 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
103 return aes_ecb_encrypt(plain, crypt, skey) == CRYPT_OK ? 0 : -1;
129 int aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
132 return aes_ecb_encrypt(plain, (u8 *) crypt, skey) == CRYPT_OK ? 0 : -1;
355 u8 *crypt, size_t len)
360 if (plain != crypt)
361 os_memcpy(crypt, plain, len);
363 ctx->u.rc4.used_bytes, crypt, len);
368 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
378 int crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, argument
354 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
[all...]
H A Ddes-internal.c435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument
441 WPA_PUT_BE32(crypt, work[0]);
442 WPA_PUT_BE32(crypt + 4, work[1]);
446 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain) argument
449 work[0] = WPA_GET_BE32(crypt);
450 work[1] = WPA_GET_BE32(crypt + 4);
469 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt) argument
478 WPA_PUT_BE32(crypt, work[0]);
479 WPA_PUT_BE32(crypt + 4, work[1]);
483 void des3_decrypt(const u8 *crypt, cons argument
[all...]
H A Dcrypto_nettle.c261 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
264 nettle_aes_encrypt(actx, AES_BLOCK_SIZE, crypt, plain);
292 int aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
295 nettle_aes_decrypt(actx, AES_BLOCK_SIZE, plain, crypt);
437 u8 *crypt, size_t len)
441 nettle_arcfour_crypt(&ctx->u.arcfour_ctx, len, crypt, plain);
451 int crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, argument
456 nettle_arcfour_crypt(&ctx->u.arcfour_ctx, len, plain, crypt);
436 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
H A Daes-ccm.c98 /* crypt = msg XOR (S_1 | S_2 | ... | S_n) */
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a);
179 size_t M, const u8 *crypt, size_t crypt_len,
199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a);
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
H A Dcrypto.h125 * @crypt: Buffer for the encrypted data (16 bytes)
128 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt);
147 * @crypt: Encrypted data (16 bytes)
151 int aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
244 * @crypt: Resulting ciphertext
253 const u8 *plain, u8 *crypt, size_t len);
258 * @crypt: Ciphertext to decrypt
268 const u8 *crypt, u8 *plain, size_t len);
410 * @crypt: Encrypted signature data (using the private key)
417 struct crypto_public_key *key, const u8 *crypt, size_
[all...]
H A Daes-internal-enc.c119 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
122 rijndaelEncrypt(ctx, rk[AES_PRIV_NR_POS], plain, crypt);
H A Dcrypto_gnutls.c237 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
240 gcry_cipher_encrypt(hd, crypt, 16, plain, 16);
271 int aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
274 gcry_cipher_decrypt(hd, plain, 16, crypt, 16);
482 u8 *crypt, size_t len)
484 if (gcry_cipher_encrypt(ctx->enc, crypt, len, plain, len) !=
491 int crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, argument
494 if (gcry_cipher_decrypt(ctx->dec, plain, len, crypt, len) !=
481 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
/freebsd-13-stable/include/rpcsvc/
H A DMakefile11 bootparam_prot.h crypt.h
15 nis_callback.x crypt.x
/freebsd-13-stable/contrib/openpam/modules/pam_unix/
H A Dpam_unix.c51 # include <crypt.h>
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||
/freebsd-13-stable/lib/libcrypt/
H A Dcrypt.c39 #include "crypt.h"
42 * List of supported crypt(3) formats.
47 * bottom for the algorithm guessing logic in crypt(3) to work correctly,
87 * Selects the format to use for subsequent crypt(3) invocations.
137 crypt(const char *passwd, const char *salt) function
/freebsd-13-stable/libexec/ftpd/
H A DMakefile17 LIBADD= crypt xo util
/freebsd-13-stable/crypto/openssh/openbsd-compat/
H A Dport-uw.c31 # include <crypt.h>
/freebsd-13-stable/usr.bin/chpass/
H A DMakefile20 LIBADD= crypt util
/freebsd-13-stable/usr.bin/svn/svndumpfilter/
H A DMakefile36 crypt \
/freebsd-13-stable/sys/contrib/openzfs/module/os/freebsd/zfs/
H A Dzio_crypt.c35 * Encryption /Authentication Algorithm Suite (crypt):
235 zio_crypt_key_init(uint64_t crypt, zio_crypt_key_t *key) argument
243 ASSERT3U(crypt, <, ZIO_CRYPT_FUNCTIONS);
245 ci = &zio_crypt_table[crypt];
250 keydata_len = zio_crypt_table[crypt].ci_keylen;
287 ci = &zio_crypt_table[crypt];
297 key->zk_crypt = crypt;
406 uint64_t crypt, crypto_key_t *key, uint8_t *ivbuf, uint_t datalen,
412 ci = &zio_crypt_table[crypt];
445 uint64_t crypt local
405 zio_do_crypt_uio_opencrypto(boolean_t encrypt, freebsd_crypt_session_t *sess, uint64_t crypt, crypto_key_t *key, uint8_t *ivbuf, uint_t datalen, zfs_uio_t *uio, uint_t auth_len) argument
512 zio_crypt_key_unwrap(crypto_key_t *cwkey, uint64_t crypt, uint64_t version, uint64_t guid, uint8_t *keydata, uint8_t *hmac_keydata, uint8_t *iv, uint8_t *mac, zio_crypt_key_t *key) argument
1671 uint64_t crypt = key->zk_crypt; local
[all...]
/freebsd-13-stable/sys/contrib/openzfs/module/os/linux/zfs/
H A Dzio_crypt.c36 * Encryption /Authentication Algorithm Suite (crypt):
223 zio_crypt_key_init(uint64_t crypt, zio_crypt_key_t *key) argument
230 ASSERT3U(crypt, <, ZIO_CRYPT_FUNCTIONS);
232 keydata_len = zio_crypt_table[crypt].ci_keylen;
272 mech.cm_type = crypto_mech2id(zio_crypt_table[crypt].ci_mechname);
284 key->zk_crypt = crypt;
377 zio_do_crypt_uio(boolean_t encrypt, uint64_t crypt, crypto_key_t *key, argument
389 ASSERT3U(crypt, <, ZIO_CRYPT_FUNCTIONS);
393 crypt_info = zio_crypt_table[crypt];
400 /* setup encryption mechanism (same as crypt) */
485 uint64_t crypt = key->zk_crypt; local
548 zio_crypt_key_unwrap(crypto_key_t *cwkey, uint64_t crypt, uint64_t version, uint64_t guid, uint8_t *keydata, uint8_t *hmac_keydata, uint8_t *iv, uint8_t *mac, zio_crypt_key_t *key) argument
1872 uint64_t crypt = key->zk_crypt; local
[all...]
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/
H A Ddsl_crypt.c140 uint64_t crypt = ZIO_CRYPT_INHERIT; local
155 zfs_prop_to_name(ZFS_PROP_ENCRYPTION), &crypt);
165 dcp->cp_crypt = crypt;
181 /* check for valid crypt */
186 dcp->cp_crypt = crypt;
211 /* if the user asked for the default crypt, determine that now */
529 uint64_t crypt = 0, guid = 0, version = 0; local
541 &crypt);
576 ret = zio_crypt_key_unwrap(&wkey->wk_key, crypt, version, guid,
1153 dsl_dir_get_crypt(dsl_dir_t *dd, uint64_t *crypt) argument
1165 dsl_crypto_key_sync_impl(objset_t *mos, uint64_t dckobj, uint64_t crypt, uint64_t root_ddobj, uint64_t guid, uint8_t *iv, uint8_t *mac, uint8_t *keydata, uint8_t *hmac_keydata, uint64_t keyformat, uint64_t salt, uint64_t iters, dmu_tx_t *tx) argument
1760 uint64_t pcrypt, crypt; local
1870 uint64_t crypt; local
2238 uint64_t crypt, key_guid, keyformat, iters, salt; local
2393 uint64_t crypt = 0, key_guid = 0, format = 0; local
2532 dsl_crypto_key_create_sync(uint64_t crypt, dsl_wrapping_key_t *wkey, dmu_tx_t *tx) argument
[all...]
/freebsd-13-stable/contrib/apr-util/crypto/
H A Dapr_passwd.c28 #include <crypt.h>
77 * crypt() (if available) or apr_md5_encode() or apr_sha1_base64(), depending
80 * support crypt, then the default check is against a clear text string.
107 * It's not our algorithm, so feed it to crypt() if possible.
168 * call to crypt().
171 crypt_pw = crypt(passwd, hash);
/freebsd-13-stable/sys/contrib/openzfs/include/sys/
H A Dzio_crypt.h123 int zio_crypt_key_init(uint64_t crypt, zio_crypt_key_t *key);
128 int zio_crypt_key_unwrap(crypto_key_t *cwkey, uint64_t crypt, uint64_t version,
H A Dqat.h183 crypto_key_t *key, uint64_t crypt, uint32_t enc_len);
/freebsd-13-stable/lib/libc/rpc/
H A Dcrypt_client.c44 #include <rpcsvc/crypt.h>
/freebsd-13-stable/lib/libpam/modules/pam_unix/
H A Dpam_unix.c135 if (strcmp(crypt(pass, realpw), realpw) == 0)
351 encrypted = crypt(old_pass, pwd->pw_passwd);
401 pwd->pw_passwd = crypt(new_pass, salt);
/freebsd-13-stable/kerberos5/lib/libroken/
H A DMakefile4 LIBADD= crypt

Completed in 280 milliseconds

12345