/freebsd-current/crypto/openssl/crypto/camellia/ |
H A D | cmll_local.h | 35 u8 ciphertext[]); 36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
H A D | camellia.c | 405 u8 ciphertext[]) 443 PUTU32(ciphertext, s2); 444 PUTU32(ciphertext + 4, s3); 445 PUTU32(ciphertext + 8, s0); 446 PUTU32(ciphertext + 12, s1); 450 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) 453 plaintext, keyTable, ciphertext); 456 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], argument 463 s0 = GETU32(ciphertext) ^ k[0]; 464 s1 = GETU32(ciphertext 403 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 449 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 502 Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], const KEY_TABLE_TYPE keyTable, u8 plaintext[]) argument [all...] |
/freebsd-current/sys/contrib/openzfs/module/icp/io/ |
H A D | aes.c | 303 crypto_data_t *ciphertext) 321 ASSERT(ciphertext != NULL); 344 if (ciphertext->cd_length < length_needed) { 345 ciphertext->cd_length = length_needed; 349 saved_length = ciphertext->cd_length; 350 saved_offset = ciphertext->cd_offset; 355 ret = aes_encrypt_update(ctx, plaintext, ciphertext); 367 * it to existing ciphertext. So, need to adjust the left over 372 ciphertext->cd_offset = ciphertext 302 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument 417 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument 531 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument 599 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument 831 aes_encrypt_atomic(crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template) argument 957 aes_decrypt_atomic(crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template) argument [all...] |
/freebsd-current/sys/contrib/openzfs/include/sys/crypto/ |
H A D | api.h | 66 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext); 67 extern int crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext,
|
/freebsd-current/sys/contrib/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3083 unsigned char *ciphertext; local 3135 ciphertext = (unsigned char *) sodium_malloc(ciphertext_len); 3150 ciphertext, ciphertext_len); 3155 crypto_aead_aes256gcm_encrypt(ciphertext, &found_ciphertext_len, 3160 if (memcmp(ciphertext, expected_ciphertext, ciphertext_len) != 0) { 3164 ciphertext, ciphertext_len); 3172 NULL, ciphertext, 3189 NULL, ciphertext, ciphertext_len, 3194 NULL, ciphertext, ciphertext_len, 3216 sodium_free(ciphertext); [all...] |
/freebsd-current/crypto/openssh/ |
H A D | kexsntrup761x25519.c | 80 u_char *kem_key, *ciphertext, *server_pub; local 118 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0) 121 crypto_kem_sntrup761_enc(ciphertext, kem_key, client_pub); 122 /* generate ECDH key pair, store server pubkey after ciphertext */ 123 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES; 133 dump_digest("server cipher text:", ciphertext, 165 const u_char *ciphertext, *server_pub; local 177 ciphertext = sshbuf_ptr(server_blob); 178 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES; 180 dump_digest("server cipher text:", ciphertext, [all...] |
/freebsd-current/sys/contrib/openzfs/module/icp/api/ |
H A D | kcf_cipher.c | 50 * ciphertext: Storage for the encrypted message. The length needed 60 * When complete and successful, 'ciphertext' will contain the encrypted 69 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext) 93 plaintext, ciphertext, spi_ctx_tmpl); 120 * ciphertext: The message to be encrypted 129 * single-part decryption of 'ciphertext' with the mechanism 'mech', using 139 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, argument 165 ciphertext, plaintext, spi_ctx_tmpl); 68 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext) argument
|
/freebsd-current/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 142 u_int8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local 228 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j); 235 ciphertext[4 * i + 3] = cdata[i] & 0xff; 237 ciphertext[4 * i + 2] = cdata[i] & 0xff; 239 ciphertext[4 * i + 1] = cdata[i] & 0xff; 241 ciphertext[4 * i + 0] = cdata[i] & 0xff; 256 encode_base64((u_int8_t *)buffer, ciphertext, 4 * BCRYPT_BLOCKS - 1); 258 memset(ciphertext, 0, sizeof(ciphertext));
|
/freebsd-current/crypto/openssl/test/ |
H A D | igetest.c | 227 unsigned char ciphertext[BIG_TEST_SIZE]; local 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 245 unsigned char ciphertext[BIG_TEST_SIZE]; local 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 267 unsigned char ciphertext[BIG_TEST_SIZE]; local 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 275 ciphertext 293 unsigned char ciphertext[BIG_TEST_SIZE]; local 331 unsigned char ciphertext[BIG_TEST_SIZE]; local 352 unsigned char ciphertext[BIG_TEST_SIZE]; local 383 unsigned char ciphertext[BIG_TEST_SIZE]; local 414 unsigned char ciphertext[BIG_TEST_SIZE]; local [all...] |
H A D | tls13encryptiontest.c | 28 const char *ciphertext[3]; member in struct:__anon177 283 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
|
H A D | modes_internal_test.c | 194 unsigned char cleartext[64], ciphertext[64], vector[64]; local 203 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len, 206 || !TEST_mem_eq(ciphertext, len, vector, len) 212 size = fixture->decrypt_block(ciphertext, cleartext, len, 222 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len, 226 || !TEST_mem_eq(ciphertext, len, vector, len) 232 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
|
H A D | evp_extra_test.c | 1295 unsigned char ciphertext[32], plaintext[16]; local 1312 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 1314 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 1322 ciphertext, ciphertext_len)) 2027 uint8_t ciphertext[128]; local 2028 size_t ctext_len = sizeof(ciphertext); 2161 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, 2171 if (!TEST_int_gt(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, 2977 unsigned char ciphertext[80]; local 2988 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, 3271 unsigned char ciphertext[32], oiv[16], iv[16]; local 3412 unsigned char ciphertext[32], oiv[8], iv[8]; local [all...] |
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 76 uint8_t ciphertext[BCRYPT_HASHSIZE] = local 94 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), 108 explicit_bzero(ciphertext, sizeof(ciphertext));
|
/freebsd-current/contrib/libfido2/tools/ |
H A D | largeblob.c | 359 decode(const struct blob *ciphertext, const struct blob *nonce, argument 377 if (ciphertext->len > UINT_MAX || 378 ciphertext->len > SIZE_MAX - 16 || 379 ciphertext->len < 16) 381 plaintext.len = ciphertext->len - 16; 390 ciphertext->ptr + ciphertext->len - 16) == 0) 399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr, 417 try_rp(const fido_credman_rk_t *rk, const struct blob *ciphertext, argument 424 decode(ciphertext, nonc 446 decode_blob_entry(const cbor_item_t *item, struct blob *ciphertext, struct blob *nonce, uint64_t *origsiz) argument 489 struct blob ciphertext, nonce; local [all...] |
/freebsd-current/sys/contrib/openzfs/module/icp/include/sys/crypto/ |
H A D | impl.h | 301 #define KCF_PROV_ENCRYPT_ATOMIC(pd, mech, key, plaintext, ciphertext, \ 305 mech, key, plaintext, ciphertext, template) : \ 308 #define KCF_PROV_DECRYPT_ATOMIC(pd, mech, key, ciphertext, plaintext, \ 312 mech, key, ciphertext, plaintext, template) : \
|
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | sm2.h | 80 const uint8_t *ciphertext, size_t ciphertext_len,
|
H A D | aes_platform.h | 108 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 110 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 112 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 114 size_t aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 116 size_t aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 118 size_t aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
|
/freebsd-current/tools/tools/crypto/ |
H A D | cryptocheck.c | 793 char *buffer, *cleartext, *ciphertext; local 827 ciphertext = malloc(size); 830 if (!openssl_cipher(alg, cipher, key, iv, cleartext, ciphertext, size, 833 if (size > 0 && memcmp(cleartext, ciphertext, size) == 0) { 838 if (!openssl_cipher(alg, cipher, key, iv, ciphertext, buffer, size, 0)) 855 if (memcmp(ciphertext, buffer, size) != 0) { 858 hexdump(ciphertext, size, NULL, 0); 865 if (!ocf_cipher(&ses, alg, iv, ciphertext, buffer, size, COP_DECRYPT)) 883 free(ciphertext); 954 char *buffer, *cleartext, *ciphertext; local 1602 char *aad, *buffer, *cleartext, *ciphertext; local [all...] |
H A D | cryptotest.c | 250 char *cleartext, *ciphertext, *originaltext, *key; local 312 ciphertext = cleartext+size; 339 cop.dst = ciphertext; 349 if (verify && bcmp(ciphertext, cleartext, size) == 0) { 351 hexdump(ciphertext, size); 359 cop.src = ciphertext; 386 cop.mac = ciphertext;
|
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 1701 heim_octet_string *ciphertext) 1711 ciphertext->data = NULL; 1712 ciphertext->length = 0; 1746 ciphertext->length = ret; 1747 ciphertext->data = to; 1751 der_free_octet_string(ciphertext); 1761 const heim_octet_string *ciphertext, 1783 ret = RSA_private_decrypt(ciphertext->length, ciphertext->data, 2591 heim_octet_string **ciphertext) 1697 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument 1760 hx509_private_key_private_decrypt(hx509_context context, const heim_octet_string *ciphertext, const heim_oid *encryption_oid, hx509_private_key p, heim_octet_string *cleartext) argument 2587 hx509_crypto_encrypt(hx509_crypto crypto, const void *data, const size_t length, const heim_octet_string *ivec, heim_octet_string **ciphertext) argument [all...] |
/freebsd-current/contrib/libfido2/src/ |
H A D | largeblob.c | 19 fido_blob_t ciphertext; member in struct:largeblob 32 fido_blob_reset(&blob->ciphertext); 79 if (aes256_gcm_dec(key, &blob->nonce, aad, &blob->ciphertext, 142 &blob->ciphertext) < 0) { 289 case 1: /* ciphertext */ 290 if (fido_blob_decode(val, &blob->ciphertext) < 0 || 291 blob->ciphertext.len < LARGEBLOB_TAG_LENGTH) 322 if (fido_blob_is_empty(&blob->ciphertext) || 343 if ((argv[0] = fido_blob_encode(&blob->ciphertext)) == NULL ||
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | mit_glue.c | 235 input->ciphertext.data, input->ciphertext.length, 276 &output->ciphertext,
|
/freebsd-current/crypto/openssl/crypto/sm2/ |
H A D | sm2_crypt.c | 272 const uint8_t *ciphertext, size_t ciphertext_len, 300 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len);
|
/freebsd-current/sys/crypto/camellia/ |
H A D | camellia.c | 1271 unsigned char *ciphertext) 1293 PUTU32(ciphertext, tmp[0]); 1294 PUTU32(ciphertext+4, tmp[1]); 1295 PUTU32(ciphertext+8, tmp[2]); 1296 PUTU32(ciphertext+12, tmp[3]); 1301 const unsigned char *ciphertext, 1307 tmp[0] = GETU32(ciphertext); 1308 tmp[1] = GETU32(ciphertext + 4); 1309 tmp[2] = GETU32(ciphertext + 8); 1310 tmp[3] = GETU32(ciphertext 1268 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const uint32_t *subkey, unsigned char *ciphertext) argument 1300 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const uint32_t *subkey, unsigned char *plaintext) argument [all...] |
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_gcm_hw_s390x.inc | 202 * En/de-crypt plain/cipher-text and authenticate ciphertext. Returns 1 for
|