/freebsd-13-stable/crypto/openssl/crypto/camellia/ |
H A D | cmll_local.h | 35 u8 ciphertext[]); 36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
H A D | camellia.c | 399 u8 ciphertext[]) 437 PUTU32(ciphertext, s2); 438 PUTU32(ciphertext + 4, s3); 439 PUTU32(ciphertext + 8, s0); 440 PUTU32(ciphertext + 12, s1); 444 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) 447 plaintext, keyTable, ciphertext); 450 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], argument 457 s0 = GETU32(ciphertext) ^ k[0]; 458 s1 = GETU32(ciphertext 397 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 443 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 496 Camellia_DecryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument [all...] |
/freebsd-13-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | crypto.h | 75 svn_crypto__encrypt_password(const svn_string_t **ciphertext, 91 const svn_string_t *ciphertext, 112 svn_crypto__generate_secret_checktext(const svn_string_t **ciphertext, 131 const svn_string_t *ciphertext,
|
H A D | crypto.c | 251 svn_crypto__encrypt_password(const svn_string_t **ciphertext, 378 *ciphertext = wrap_as_string(result, result_len, result_pool); 395 const svn_string_t *ciphertext, 441 (unsigned char *)ciphertext->data, 442 ciphertext->len, block_ctx); 452 (unsigned char *)ciphertext->data, 453 ciphertext->len, block_ctx); 487 svn_crypto__generate_secret_checktext(const svn_string_t **ciphertext, 596 *ciphertext = wrap_as_string(result, result_len, result_pool); 615 const svn_string_t *ciphertext, 249 svn_crypto__encrypt_password(const svn_string_t **ciphertext, const svn_string_t **iv, const svn_string_t **salt, svn_crypto__ctx_t *ctx, const char *password, const svn_string_t *master, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument 391 svn_crypto__decrypt_password(const char **plaintext, svn_crypto__ctx_t *ctx, const svn_string_t *ciphertext, const svn_string_t *iv, const svn_string_t *salt, const svn_string_t *master, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument 485 svn_crypto__generate_secret_checktext(const svn_string_t **ciphertext, const svn_string_t **iv, const svn_string_t **salt, const char **checktext, svn_crypto__ctx_t *ctx, const svn_string_t *master, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument 610 svn_crypto__verify_secret(svn_boolean_t *is_valid, svn_crypto__ctx_t *ctx, const svn_string_t *master, const svn_string_t *ciphertext, const svn_string_t *iv, const svn_string_t *salt, const char *checktext, apr_pool_t *scratch_pool) argument [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/icp/io/ |
H A D | aes.c | 393 crypto_data_t *ciphertext, crypto_req_handle_t req) 411 ASSERT(ciphertext != NULL); 434 if (ciphertext->cd_length < length_needed) { 435 ciphertext->cd_length = length_needed; 439 saved_length = ciphertext->cd_length; 440 saved_offset = ciphertext->cd_offset; 445 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req); 457 * it to existing ciphertext. So, need to adjust the left over 462 ciphertext->cd_offset = ciphertext 392 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 507 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 622 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 692 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 934 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1070 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/icp/api/ |
H A D | kcf_cipher.c | 56 * CRYPTO_INVALID_CIPHERTEXT: bogus 'ciphertext' argument. 292 * ciphertext: Storage for the encrypted message. The length needed 303 * When complete and successful, 'ciphertext' will contain the encrypted 315 crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 335 plaintext, ciphertext, tmpl); 350 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 398 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq)); 402 mech, key, plaintext, ciphertext, spi_ctx_tmpl); 455 * ciphertext: Storage for the encrypted message part. 470 crypto_data_t *ciphertext, crypto_call_req_ 313 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 349 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 469 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 529 crypto_encrypt_final(crypto_context_t context, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 595 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 632 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 752 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 849 crypto_encrypt_single(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 884 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument [all...] |
/freebsd-13-stable/sys/contrib/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3083 unsigned char *ciphertext; local 3135 ciphertext = (unsigned char *) sodium_malloc(ciphertext_len); 3150 ciphertext, ciphertext_len); 3155 crypto_aead_aes256gcm_encrypt(ciphertext, &found_ciphertext_len, 3160 if (memcmp(ciphertext, expected_ciphertext, ciphertext_len) != 0) { 3164 ciphertext, ciphertext_len); 3172 NULL, ciphertext, 3189 NULL, ciphertext, ciphertext_len, 3194 NULL, ciphertext, ciphertext_len, 3216 sodium_free(ciphertext); [all...] |
/freebsd-13-stable/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 144 u_int8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local 230 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j); 237 ciphertext[4 * i + 3] = cdata[i] & 0xff; 239 ciphertext[4 * i + 2] = cdata[i] & 0xff; 241 ciphertext[4 * i + 1] = cdata[i] & 0xff; 243 ciphertext[4 * i + 0] = cdata[i] & 0xff; 258 encode_base64((u_int8_t *)buffer, ciphertext, 4 * BCRYPT_BLOCKS - 1); 260 memset(ciphertext, 0, sizeof(ciphertext));
|
/freebsd-13-stable/crypto/openssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 73 u_int8_t ciphertext[BCRYPT_HASHSIZE] = local 91 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), 105 explicit_bzero(ciphertext, sizeof(ciphertext));
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/include/sys/crypto/ |
H A D | impl.h | 636 #define KCF_PROV_ENCRYPT(pd, ctx, plaintext, ciphertext, req) ( \ 638 KCF_PROV_CIPHER_OPS(pd)->encrypt(ctx, plaintext, ciphertext, req) : \ 641 #define KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, ciphertext, req) ( \ 644 ciphertext, req) : \ 647 #define KCF_PROV_ENCRYPT_FINAL(pd, ctx, ciphertext, req) ( \ 649 KCF_PROV_CIPHER_OPS(pd)->encrypt_final(ctx, ciphertext, req) : \ 652 #define KCF_PROV_ENCRYPT_ATOMIC(pd, session, mech, key, plaintext, ciphertext, \ 656 (pd)->pd_prov_handle, session, mech, key, plaintext, ciphertext, \ 666 #define KCF_PROV_DECRYPT(pd, ctx, ciphertext, plaintext, req) ( \ 668 KCF_PROV_CIPHER_OPS(pd)->decrypt(ctx, ciphertext, plaintex [all...] |
/freebsd-13-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 729 char *buffer, *cleartext, *ciphertext; local 763 ciphertext = malloc(size); 766 openssl_cipher(alg, cipher, key, iv, cleartext, ciphertext, size, 1); 767 if (size > 0 && memcmp(cleartext, ciphertext, size) == 0) 770 openssl_cipher(alg, cipher, key, iv, ciphertext, buffer, size, 0); 786 if (memcmp(ciphertext, buffer, size) != 0) { 789 hexdump(ciphertext, size, NULL, 0); 796 if (!ocf_cipher(&ses, alg, iv, ciphertext, buffer, size, COP_DECRYPT)) 813 free(ciphertext); 884 char *buffer, *cleartext, *ciphertext; local 1321 char *aad, *buffer, *cleartext, *ciphertext; local [all...] |
H A D | cryptotest.c | 252 char *cleartext, *ciphertext, *originaltext, *key; local 314 ciphertext = cleartext+size; 341 cop.dst = ciphertext; 351 if (verify && bcmp(ciphertext, cleartext, size) == 0) { 353 hexdump(ciphertext, size); 361 cop.src = ciphertext; 388 cop.mac = ciphertext;
|
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | sm2.h | 74 const uint8_t *ciphertext,
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 1701 heim_octet_string *ciphertext) 1711 ciphertext->data = NULL; 1712 ciphertext->length = 0; 1746 ciphertext->length = ret; 1747 ciphertext->data = to; 1751 der_free_octet_string(ciphertext); 1761 const heim_octet_string *ciphertext, 1783 ret = RSA_private_decrypt(ciphertext->length, ciphertext->data, 2591 heim_octet_string **ciphertext) 1697 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument 1760 hx509_private_key_private_decrypt(hx509_context context, const heim_octet_string *ciphertext, const heim_oid *encryption_oid, hx509_private_key p, heim_octet_string *cleartext) argument 2587 hx509_crypto_encrypt(hx509_crypto crypto, const void *data, const size_t length, const heim_octet_string *ivec, heim_octet_string **ciphertext) argument [all...] |
H A D | cert.c | 1600 const heim_octet_string *ciphertext, 1615 ciphertext, 1626 heim_octet_string *ciphertext) 1630 encryption_oid, ciphertext); 1599 _hx509_cert_private_decrypt(hx509_context context, const heim_octet_string *ciphertext, const heim_oid *encryption_oid, hx509_cert p, heim_octet_string *cleartext) argument 1622 hx509_cert_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const hx509_cert p, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
|
/freebsd-13-stable/sys/contrib/openzfs/include/sys/crypto/ |
H A D | api.h | 172 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 183 crypto_data_t *plaintext, crypto_data_t *ciphertext, 186 crypto_data_t *ciphertext, crypto_call_req_t *cr); 191 extern int crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, 204 crypto_data_t *ciphertext, crypto_data_t *plaintext,
|
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | mit_glue.c | 235 input->ciphertext.data, input->ciphertext.length, 276 &output->ciphertext,
|
H A D | krb5.h | 116 krb5_data ciphertext; member in struct:krb5_enc_data
|
H A D | aes-test.c | 535 e.ciphertext = *cipher;
|
/freebsd-13-stable/crypto/openssl/crypto/sm2/ |
H A D | sm2_crypt.c | 265 const uint8_t *ciphertext, 291 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len);
|
/freebsd-13-stable/sys/crypto/camellia/ |
H A D | camellia.c | 1274 unsigned char *ciphertext) 1296 PUTU32(ciphertext, tmp[0]); 1297 PUTU32(ciphertext+4, tmp[1]); 1298 PUTU32(ciphertext+8, tmp[2]); 1299 PUTU32(ciphertext+12, tmp[3]); 1304 const unsigned char *ciphertext, 1310 tmp[0] = GETU32(ciphertext); 1311 tmp[1] = GETU32(ciphertext + 4); 1312 tmp[2] = GETU32(ciphertext + 8); 1313 tmp[3] = GETU32(ciphertext 1271 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const uint32_t *subkey, unsigned char *ciphertext) argument 1303 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const uint32_t *subkey, unsigned char *plaintext) argument [all...] |
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | crypto_module_tests.c | 423 char *ciphertext; member in struct:ecb_test_vector 482 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
|
/freebsd-13-stable/sys/crypto/openssl/arm/ |
H A D | bsaes-armv7.S | 2491 @ calculate one round of extra tweak for the stolen ciphertext
|
/freebsd-13-stable/crypto/openssl/crypto/aes/asm/ |
H A D | bsaes-armv7.pl | 2405 @ calculate one round of extra tweak for the stolen ciphertext
|