Searched refs:crypt (Results 1 - 25 of 81) sorted by relevance

1234

/freebsd-10.0-release/usr.bin/enigma/
H A DMakefile5 LINKS= ${BINDIR}/enigma ${BINDIR}/crypt
6 MLINKS= enigma.1 crypt.1
/freebsd-10.0-release/lib/libcrypt/
H A DMakefile10 LIB= crypt
13 SRCS= crypt.c misc.c \
14 crypt-md5.c md5c.c \
15 crypt-nthash.c md4c.c \
16 crypt-sha256.c sha256c.c \
17 crypt-sha512.c sha512c.c
18 MAN= crypt.3
19 MLINKS= crypt.3 crypt_get_format.3 crypt.3 crypt_set_format.3
25 SRCS+= crypt
[all...]
H A Dcrypt.c34 #include "crypt.h"
130 crypt(const char *passwd, const char *salt) function
/freebsd-10.0-release/usr.sbin/keyserv/
H A DMakefile5 SRCS= keyserv.c setkey.c crypt_svc.c crypt_server.c crypt.h
16 CLEANFILES= crypt_svc.c crypt.h
20 crypt_svc.c: ${RPCDIR}/crypt.x
21 ${RPCGEN} -m -o ${.TARGET} ${RPCDIR}/crypt.x
23 crypt.h: ${RPCDIR}/crypt.x
24 ${RPCGEN} -h -o ${.TARGET} ${RPCDIR}/crypt.x
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Ddes_i.h18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain);
22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt);
23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain);
H A Daes.h15 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt);
18 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
H A Dcrypto_internal-cipher.c104 u8 *crypt, size_t len)
110 if (plain != crypt)
111 os_memcpy(crypt, plain, len);
113 ctx->u.rc4.used_bytes, crypt, len);
125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE);
127 crypt += AES_BLOCK_SIZE;
139 os_memcpy(crypt, ctx->u.des3.cbc, 8);
141 crypt += 8;
153 os_memcpy(crypt, ctx->u.des.cbc, 8);
155 crypt
103 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
H A Daes_wrap.h47 u8 *crypt, u8 *tag);
50 const u8 *crypt, size_t crypt_len,
58 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
60 size_t M, const u8 *crypt, size_t crypt_len,
H A Dcrypto.h102 * @crypt: Buffer for the encrypted data (16 bytes)
104 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt);
123 * @crypt: Encrypted data (16 bytes)
126 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
218 * @crypt: Resulting ciphertext
227 const u8 *plain, u8 *crypt, size_t len);
232 * @crypt: Ciphertext to decrypt
242 const u8 *crypt, u8 *plain, size_t len);
380 * @crypt: Encrypted signature data (using the private key)
387 struct crypto_public_key *key, const u8 *crypt, size_
[all...]
H A Dcrypto_nss.c144 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
160 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
192 u8 *crypt, size_t len)
198 int crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, argument
191 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
H A Daes-gcm.c230 const u8 *crypt, size_t crypt_len, u8 *S)
242 ghash(H, crypt, crypt_len, S);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
270 aes_gcm_gctr(aes, J0, plain, plain_len, crypt);
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
289 const u8 *crypt, size_t crypt_len,
304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain);
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) argument
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
H A Dcrypto_gnutls.c110 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
113 gcry_cipher_encrypt(hd, crypt, 16, plain, 16);
140 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
143 gcry_cipher_decrypt(hd, plain, 16, crypt, 16);
275 u8 *crypt, size_t len)
277 if (gcry_cipher_encrypt(ctx->enc, crypt, len, plain, len) !=
284 int crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, argument
287 if (gcry_cipher_decrypt(ctx->dec, plain, len, crypt, len) !=
274 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
H A Dcrypto_internal-rsa.c103 const u8 *crypt, size_t crypt_len,
107 crypt, crypt_len, plain, plain_len);
102 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
H A Dcrypto_libtomcrypt.c99 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
102 aes_ecb_encrypt(plain, crypt, skey);
128 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
131 aes_ecb_encrypt(plain, (u8 *) crypt, skey);
351 u8 *crypt, size_t len)
356 if (plain != crypt)
357 os_memcpy(crypt, plain, len);
359 ctx->u.rc4.used_bytes, crypt, len);
364 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
374 int crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, argument
350 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
611 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
[all...]
H A Dcrypto_cryptoapi.c291 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument
296 os_memcpy(crypt, plain, 16);
298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) {
301 os_memset(crypt, 0, 16);
323 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument
328 os_memcpy(plain, crypt, 16);
591 u8 *crypt, size_t len)
595 os_memcpy(crypt, plain, len);
597 if (!CryptEncrypt(ctx->key, 0, FALSE, 0, crypt, &dlen, len)) {
599 os_memset(crypt,
590 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument
607 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
H A Ddes-internal.c434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument
440 WPA_PUT_BE32(crypt, work[0]);
441 WPA_PUT_BE32(crypt + 4, work[1]);
445 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain) argument
448 work[0] = WPA_GET_BE32(crypt);
449 work[1] = WPA_GET_BE32(crypt + 4);
468 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt) argument
477 WPA_PUT_BE32(crypt, work[0]);
478 WPA_PUT_BE32(crypt + 4, work[1]);
482 void des3_decrypt(const u8 *crypt, cons argument
[all...]
H A Daes-ccm.c98 /* crypt = msg XOR (S_1 | S_2 | ... | S_n) */
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a);
179 size_t M, const u8 *crypt, size_t crypt_len,
199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a);
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
/freebsd-10.0-release/crypto/heimdal/lib/roken/
H A Dverify.c41 #include <crypt.h>
55 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
/freebsd-10.0-release/lib/libcrypt/tests/
H A Dcrypt_tests.c5 #include <crypt.h>
24 pw = crypt(LEET, want);
40 pw = crypt(LEET, want);
/freebsd-10.0-release/crypto/openssh/openbsd-compat/
H A Dxcrypt.c32 # include <crypt.h>
62 # define crypt DES_crypt macro
74 crypted = crypt(password, salt);
79 crypted = crypt(password, salt);
83 crypted = crypt(password, salt);
H A Dport-uw.c31 # include <crypt.h>
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dpkcs1.h19 const u8 *crypt, size_t crypt_len,
/freebsd-10.0-release/include/rpcsvc/
H A DMakefile11 bootparam_prot.h crypt.h
15 nis_callback.x crypt.x
/freebsd-10.0-release/contrib/apr-util/crypto/
H A Dapr_passwd.c28 #include <crypt.h>
71 * crypt() (if available) or apr_md5_encode() or apr_sha1_base64(), depending
74 * support crypt, then the default check is against a clear text string.
101 * It's not our algorithm, so feed it to crypt() if possible.
162 * call to crypt().
165 crypt_pw = crypt(passwd, hash);
/freebsd-10.0-release/contrib/openpam/modules/pam_unix/
H A Dpam_unix.c51 # include <crypt.h>
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||

Completed in 237 milliseconds

1234