Searched refs:ciphertext (Results 1 - 24 of 24) sorted by relevance

/freebsd-13-stable/crypto/openssl/crypto/camellia/
H A Dcmll_local.h35 u8 ciphertext[]);
36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[],
40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]);
41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
H A Dcamellia.c399 u8 ciphertext[])
437 PUTU32(ciphertext, s2);
438 PUTU32(ciphertext + 4, s3);
439 PUTU32(ciphertext + 8, s0);
440 PUTU32(ciphertext + 12, s1);
444 const KEY_TABLE_TYPE keyTable, u8 ciphertext[])
447 plaintext, keyTable, ciphertext);
450 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], argument
457 s0 = GETU32(ciphertext) ^ k[0];
458 s1 = GETU32(ciphertext
397 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument
443 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument
496 Camellia_DecryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument
[all...]
/freebsd-13-stable/contrib/subversion/subversion/libsvn_subr/
H A Dcrypto.h75 svn_crypto__encrypt_password(const svn_string_t **ciphertext,
91 const svn_string_t *ciphertext,
112 svn_crypto__generate_secret_checktext(const svn_string_t **ciphertext,
131 const svn_string_t *ciphertext,
H A Dcrypto.c251 svn_crypto__encrypt_password(const svn_string_t **ciphertext,
378 *ciphertext = wrap_as_string(result, result_len, result_pool);
395 const svn_string_t *ciphertext,
441 (unsigned char *)ciphertext->data,
442 ciphertext->len, block_ctx);
452 (unsigned char *)ciphertext->data,
453 ciphertext->len, block_ctx);
487 svn_crypto__generate_secret_checktext(const svn_string_t **ciphertext,
596 *ciphertext = wrap_as_string(result, result_len, result_pool);
615 const svn_string_t *ciphertext,
249 svn_crypto__encrypt_password(const svn_string_t **ciphertext, const svn_string_t **iv, const svn_string_t **salt, svn_crypto__ctx_t *ctx, const char *password, const svn_string_t *master, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument
391 svn_crypto__decrypt_password(const char **plaintext, svn_crypto__ctx_t *ctx, const svn_string_t *ciphertext, const svn_string_t *iv, const svn_string_t *salt, const svn_string_t *master, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument
485 svn_crypto__generate_secret_checktext(const svn_string_t **ciphertext, const svn_string_t **iv, const svn_string_t **salt, const char **checktext, svn_crypto__ctx_t *ctx, const svn_string_t *master, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument
610 svn_crypto__verify_secret(svn_boolean_t *is_valid, svn_crypto__ctx_t *ctx, const svn_string_t *master, const svn_string_t *ciphertext, const svn_string_t *iv, const svn_string_t *salt, const char *checktext, apr_pool_t *scratch_pool) argument
[all...]
/freebsd-13-stable/sys/contrib/openzfs/module/icp/io/
H A Daes.c393 crypto_data_t *ciphertext, crypto_req_handle_t req)
411 ASSERT(ciphertext != NULL);
434 if (ciphertext->cd_length < length_needed) {
435 ciphertext->cd_length = length_needed;
439 saved_length = ciphertext->cd_length;
440 saved_offset = ciphertext->cd_offset;
445 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req);
457 * it to existing ciphertext. So, need to adjust the left over
462 ciphertext->cd_offset = ciphertext
392 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
507 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument
622 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
692 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument
934 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1070 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
[all...]
/freebsd-13-stable/sys/contrib/openzfs/module/icp/api/
H A Dkcf_cipher.c56 * CRYPTO_INVALID_CIPHERTEXT: bogus 'ciphertext' argument.
292 * ciphertext: Storage for the encrypted message. The length needed
303 * When complete and successful, 'ciphertext' will contain the encrypted
315 crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
335 plaintext, ciphertext, tmpl);
350 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
398 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq));
402 mech, key, plaintext, ciphertext, spi_ctx_tmpl);
455 * ciphertext: Storage for the encrypted message part.
470 crypto_data_t *ciphertext, crypto_call_req_
313 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
349 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
469 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument
529 crypto_encrypt_final(crypto_context_t context, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument
595 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
632 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
752 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument
849 crypto_encrypt_single(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument
884 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument
[all...]
/freebsd-13-stable/sys/contrib/libsodium/test/default/
H A Daead_aes256gcm.c3083 unsigned char *ciphertext; local
3135 ciphertext = (unsigned char *) sodium_malloc(ciphertext_len);
3150 ciphertext, ciphertext_len);
3155 crypto_aead_aes256gcm_encrypt(ciphertext, &found_ciphertext_len,
3160 if (memcmp(ciphertext, expected_ciphertext, ciphertext_len) != 0) {
3164 ciphertext, ciphertext_len);
3172 NULL, ciphertext,
3189 NULL, ciphertext, ciphertext_len,
3194 NULL, ciphertext, ciphertext_len,
3216 sodium_free(ciphertext);
[all...]
/freebsd-13-stable/secure/lib/libcrypt/
H A Dcrypt-blowfish.c144 u_int8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local
230 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j);
237 ciphertext[4 * i + 3] = cdata[i] & 0xff;
239 ciphertext[4 * i + 2] = cdata[i] & 0xff;
241 ciphertext[4 * i + 1] = cdata[i] & 0xff;
243 ciphertext[4 * i + 0] = cdata[i] & 0xff;
258 encode_base64((u_int8_t *)buffer, ciphertext, 4 * BCRYPT_BLOCKS - 1);
260 memset(ciphertext, 0, sizeof(ciphertext));
/freebsd-13-stable/crypto/openssh/openbsd-compat/
H A Dbcrypt_pbkdf.c73 u_int8_t ciphertext[BCRYPT_HASHSIZE] = local
91 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext),
105 explicit_bzero(ciphertext, sizeof(ciphertext));
/freebsd-13-stable/sys/contrib/openzfs/module/icp/include/sys/crypto/
H A Dimpl.h636 #define KCF_PROV_ENCRYPT(pd, ctx, plaintext, ciphertext, req) ( \
638 KCF_PROV_CIPHER_OPS(pd)->encrypt(ctx, plaintext, ciphertext, req) : \
641 #define KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, ciphertext, req) ( \
644 ciphertext, req) : \
647 #define KCF_PROV_ENCRYPT_FINAL(pd, ctx, ciphertext, req) ( \
649 KCF_PROV_CIPHER_OPS(pd)->encrypt_final(ctx, ciphertext, req) : \
652 #define KCF_PROV_ENCRYPT_ATOMIC(pd, session, mech, key, plaintext, ciphertext, \
656 (pd)->pd_prov_handle, session, mech, key, plaintext, ciphertext, \
666 #define KCF_PROV_DECRYPT(pd, ctx, ciphertext, plaintext, req) ( \
668 KCF_PROV_CIPHER_OPS(pd)->decrypt(ctx, ciphertext, plaintex
[all...]
/freebsd-13-stable/tools/tools/crypto/
H A Dcryptocheck.c729 char *buffer, *cleartext, *ciphertext; local
763 ciphertext = malloc(size);
766 openssl_cipher(alg, cipher, key, iv, cleartext, ciphertext, size, 1);
767 if (size > 0 && memcmp(cleartext, ciphertext, size) == 0)
770 openssl_cipher(alg, cipher, key, iv, ciphertext, buffer, size, 0);
786 if (memcmp(ciphertext, buffer, size) != 0) {
789 hexdump(ciphertext, size, NULL, 0);
796 if (!ocf_cipher(&ses, alg, iv, ciphertext, buffer, size, COP_DECRYPT))
813 free(ciphertext);
884 char *buffer, *cleartext, *ciphertext; local
1321 char *aad, *buffer, *cleartext, *ciphertext; local
[all...]
H A Dcryptotest.c252 char *cleartext, *ciphertext, *originaltext, *key; local
314 ciphertext = cleartext+size;
341 cop.dst = ciphertext;
351 if (verify && bcmp(ciphertext, cleartext, size) == 0) {
353 hexdump(ciphertext, size);
361 cop.src = ciphertext;
388 cop.mac = ciphertext;
/freebsd-13-stable/crypto/openssl/include/crypto/
H A Dsm2.h74 const uint8_t *ciphertext,
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dcrypto.c1701 heim_octet_string *ciphertext)
1711 ciphertext->data = NULL;
1712 ciphertext->length = 0;
1746 ciphertext->length = ret;
1747 ciphertext->data = to;
1751 der_free_octet_string(ciphertext);
1761 const heim_octet_string *ciphertext,
1783 ret = RSA_private_decrypt(ciphertext->length, ciphertext->data,
2591 heim_octet_string **ciphertext)
1697 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
1760 hx509_private_key_private_decrypt(hx509_context context, const heim_octet_string *ciphertext, const heim_oid *encryption_oid, hx509_private_key p, heim_octet_string *cleartext) argument
2587 hx509_crypto_encrypt(hx509_crypto crypto, const void *data, const size_t length, const heim_octet_string *ivec, heim_octet_string **ciphertext) argument
[all...]
H A Dcert.c1600 const heim_octet_string *ciphertext,
1615 ciphertext,
1626 heim_octet_string *ciphertext)
1630 encryption_oid, ciphertext);
1599 _hx509_cert_private_decrypt(hx509_context context, const heim_octet_string *ciphertext, const heim_oid *encryption_oid, hx509_cert p, heim_octet_string *cleartext) argument
1622 hx509_cert_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const hx509_cert p, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
/freebsd-13-stable/sys/contrib/openzfs/include/sys/crypto/
H A Dapi.h172 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
183 crypto_data_t *plaintext, crypto_data_t *ciphertext,
186 crypto_data_t *ciphertext, crypto_call_req_t *cr);
191 extern int crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext,
204 crypto_data_t *ciphertext, crypto_data_t *plaintext,
/freebsd-13-stable/crypto/heimdal/lib/krb5/
H A Dmit_glue.c235 input->ciphertext.data, input->ciphertext.length,
276 &output->ciphertext,
H A Dkrb5.h116 krb5_data ciphertext; member in struct:krb5_enc_data
H A Daes-test.c535 e.ciphertext = *cipher;
/freebsd-13-stable/crypto/openssl/crypto/sm2/
H A Dsm2_crypt.c265 const uint8_t *ciphertext,
291 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len);
/freebsd-13-stable/sys/crypto/camellia/
H A Dcamellia.c1274 unsigned char *ciphertext)
1296 PUTU32(ciphertext, tmp[0]);
1297 PUTU32(ciphertext+4, tmp[1]);
1298 PUTU32(ciphertext+8, tmp[2]);
1299 PUTU32(ciphertext+12, tmp[3]);
1304 const unsigned char *ciphertext,
1310 tmp[0] = GETU32(ciphertext);
1311 tmp[1] = GETU32(ciphertext + 4);
1312 tmp[2] = GETU32(ciphertext + 8);
1313 tmp[3] = GETU32(ciphertext
1271 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const uint32_t *subkey, unsigned char *ciphertext) argument
1303 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const uint32_t *subkey, unsigned char *plaintext) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dcrypto_module_tests.c423 char *ciphertext; member in struct:ecb_test_vector
482 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
/freebsd-13-stable/sys/crypto/openssl/arm/
H A Dbsaes-armv7.S2491 @ calculate one round of extra tweak for the stolen ciphertext
/freebsd-13-stable/crypto/openssl/crypto/aes/asm/
H A Dbsaes-armv7.pl2405 @ calculate one round of extra tweak for the stolen ciphertext

Completed in 270 milliseconds