Searched refs:ciphertext (Results 1 - 25 of 31) sorted by relevance

12

/freebsd-current/crypto/openssl/crypto/camellia/
H A Dcmll_local.h35 u8 ciphertext[]);
36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[],
40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]);
41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
H A Dcamellia.c405 u8 ciphertext[])
443 PUTU32(ciphertext, s2);
444 PUTU32(ciphertext + 4, s3);
445 PUTU32(ciphertext + 8, s0);
446 PUTU32(ciphertext + 12, s1);
450 const KEY_TABLE_TYPE keyTable, u8 ciphertext[])
453 plaintext, keyTable, ciphertext);
456 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], argument
463 s0 = GETU32(ciphertext) ^ k[0];
464 s1 = GETU32(ciphertext
403 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument
449 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument
502 Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], const KEY_TABLE_TYPE keyTable, u8 plaintext[]) argument
[all...]
/freebsd-current/sys/contrib/openzfs/module/icp/io/
H A Daes.c303 crypto_data_t *ciphertext)
321 ASSERT(ciphertext != NULL);
344 if (ciphertext->cd_length < length_needed) {
345 ciphertext->cd_length = length_needed;
349 saved_length = ciphertext->cd_length;
350 saved_offset = ciphertext->cd_offset;
355 ret = aes_encrypt_update(ctx, plaintext, ciphertext);
367 * it to existing ciphertext. So, need to adjust the left over
372 ciphertext->cd_offset = ciphertext
302 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument
417 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument
531 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument
599 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument
831 aes_encrypt_atomic(crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template) argument
957 aes_decrypt_atomic(crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template) argument
[all...]
/freebsd-current/sys/contrib/openzfs/include/sys/crypto/
H A Dapi.h66 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext);
67 extern int crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext,
/freebsd-current/sys/contrib/libsodium/test/default/
H A Daead_aes256gcm.c3083 unsigned char *ciphertext; local
3135 ciphertext = (unsigned char *) sodium_malloc(ciphertext_len);
3150 ciphertext, ciphertext_len);
3155 crypto_aead_aes256gcm_encrypt(ciphertext, &found_ciphertext_len,
3160 if (memcmp(ciphertext, expected_ciphertext, ciphertext_len) != 0) {
3164 ciphertext, ciphertext_len);
3172 NULL, ciphertext,
3189 NULL, ciphertext, ciphertext_len,
3194 NULL, ciphertext, ciphertext_len,
3216 sodium_free(ciphertext);
[all...]
/freebsd-current/crypto/openssh/
H A Dkexsntrup761x25519.c80 u_char *kem_key, *ciphertext, *server_pub; local
118 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0)
121 crypto_kem_sntrup761_enc(ciphertext, kem_key, client_pub);
122 /* generate ECDH key pair, store server pubkey after ciphertext */
123 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES;
133 dump_digest("server cipher text:", ciphertext,
165 const u_char *ciphertext, *server_pub; local
177 ciphertext = sshbuf_ptr(server_blob);
178 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES;
180 dump_digest("server cipher text:", ciphertext,
[all...]
/freebsd-current/sys/contrib/openzfs/module/icp/api/
H A Dkcf_cipher.c50 * ciphertext: Storage for the encrypted message. The length needed
60 * When complete and successful, 'ciphertext' will contain the encrypted
69 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext)
93 plaintext, ciphertext, spi_ctx_tmpl);
120 * ciphertext: The message to be encrypted
129 * single-part decryption of 'ciphertext' with the mechanism 'mech', using
139 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, argument
165 ciphertext, plaintext, spi_ctx_tmpl);
68 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext) argument
/freebsd-current/secure/lib/libcrypt/
H A Dcrypt-blowfish.c142 u_int8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local
228 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j);
235 ciphertext[4 * i + 3] = cdata[i] & 0xff;
237 ciphertext[4 * i + 2] = cdata[i] & 0xff;
239 ciphertext[4 * i + 1] = cdata[i] & 0xff;
241 ciphertext[4 * i + 0] = cdata[i] & 0xff;
256 encode_base64((u_int8_t *)buffer, ciphertext, 4 * BCRYPT_BLOCKS - 1);
258 memset(ciphertext, 0, sizeof(ciphertext));
/freebsd-current/crypto/openssl/test/
H A Digetest.c227 unsigned char ciphertext[BIG_TEST_SIZE]; local
232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT);
236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
245 unsigned char ciphertext[BIG_TEST_SIZE]; local
250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2,
258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
267 unsigned char ciphertext[BIG_TEST_SIZE]; local
272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
275 ciphertext
293 unsigned char ciphertext[BIG_TEST_SIZE]; local
331 unsigned char ciphertext[BIG_TEST_SIZE]; local
352 unsigned char ciphertext[BIG_TEST_SIZE]; local
383 unsigned char ciphertext[BIG_TEST_SIZE]; local
414 unsigned char ciphertext[BIG_TEST_SIZE]; local
[all...]
H A Dtls13encryptiontest.c28 const char *ciphertext[3]; member in struct:__anon177
283 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
H A Dmodes_internal_test.c194 unsigned char cleartext[64], ciphertext[64], vector[64]; local
203 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len,
206 || !TEST_mem_eq(ciphertext, len, vector, len)
212 size = fixture->decrypt_block(ciphertext, cleartext, len,
222 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len,
226 || !TEST_mem_eq(ciphertext, len, vector, len)
232 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
H A Devp_extra_test.c1295 unsigned char ciphertext[32], plaintext[16]; local
1312 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len,
1314 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len,
1322 ciphertext, ciphertext_len))
2027 uint8_t ciphertext[128]; local
2028 size_t ctext_len = sizeof(ciphertext);
2161 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg,
2171 if (!TEST_int_gt(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext,
2977 unsigned char ciphertext[80]; local
2988 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext,
3271 unsigned char ciphertext[32], oiv[16], iv[16]; local
3412 unsigned char ciphertext[32], oiv[8], iv[8]; local
[all...]
/freebsd-current/crypto/openssh/openbsd-compat/
H A Dbcrypt_pbkdf.c76 uint8_t ciphertext[BCRYPT_HASHSIZE] = local
94 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext),
108 explicit_bzero(ciphertext, sizeof(ciphertext));
/freebsd-current/contrib/libfido2/tools/
H A Dlargeblob.c359 decode(const struct blob *ciphertext, const struct blob *nonce, argument
377 if (ciphertext->len > UINT_MAX ||
378 ciphertext->len > SIZE_MAX - 16 ||
379 ciphertext->len < 16)
381 plaintext.len = ciphertext->len - 16;
390 ciphertext->ptr + ciphertext->len - 16) == 0)
399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr,
417 try_rp(const fido_credman_rk_t *rk, const struct blob *ciphertext, argument
424 decode(ciphertext, nonc
446 decode_blob_entry(const cbor_item_t *item, struct blob *ciphertext, struct blob *nonce, uint64_t *origsiz) argument
489 struct blob ciphertext, nonce; local
[all...]
/freebsd-current/sys/contrib/openzfs/module/icp/include/sys/crypto/
H A Dimpl.h301 #define KCF_PROV_ENCRYPT_ATOMIC(pd, mech, key, plaintext, ciphertext, \
305 mech, key, plaintext, ciphertext, template) : \
308 #define KCF_PROV_DECRYPT_ATOMIC(pd, mech, key, ciphertext, plaintext, \
312 mech, key, ciphertext, plaintext, template) : \
/freebsd-current/crypto/openssl/include/crypto/
H A Dsm2.h80 const uint8_t *ciphertext, size_t ciphertext_len,
H A Daes_platform.h108 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
110 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
112 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
114 size_t aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
116 size_t aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
118 size_t aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
/freebsd-current/tools/tools/crypto/
H A Dcryptocheck.c793 char *buffer, *cleartext, *ciphertext; local
827 ciphertext = malloc(size);
830 if (!openssl_cipher(alg, cipher, key, iv, cleartext, ciphertext, size,
833 if (size > 0 && memcmp(cleartext, ciphertext, size) == 0) {
838 if (!openssl_cipher(alg, cipher, key, iv, ciphertext, buffer, size, 0))
855 if (memcmp(ciphertext, buffer, size) != 0) {
858 hexdump(ciphertext, size, NULL, 0);
865 if (!ocf_cipher(&ses, alg, iv, ciphertext, buffer, size, COP_DECRYPT))
883 free(ciphertext);
954 char *buffer, *cleartext, *ciphertext; local
1602 char *aad, *buffer, *cleartext, *ciphertext; local
[all...]
H A Dcryptotest.c250 char *cleartext, *ciphertext, *originaltext, *key; local
312 ciphertext = cleartext+size;
339 cop.dst = ciphertext;
349 if (verify && bcmp(ciphertext, cleartext, size) == 0) {
351 hexdump(ciphertext, size);
359 cop.src = ciphertext;
386 cop.mac = ciphertext;
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dcrypto.c1701 heim_octet_string *ciphertext)
1711 ciphertext->data = NULL;
1712 ciphertext->length = 0;
1746 ciphertext->length = ret;
1747 ciphertext->data = to;
1751 der_free_octet_string(ciphertext);
1761 const heim_octet_string *ciphertext,
1783 ret = RSA_private_decrypt(ciphertext->length, ciphertext->data,
2591 heim_octet_string **ciphertext)
1697 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
1760 hx509_private_key_private_decrypt(hx509_context context, const heim_octet_string *ciphertext, const heim_oid *encryption_oid, hx509_private_key p, heim_octet_string *cleartext) argument
2587 hx509_crypto_encrypt(hx509_crypto crypto, const void *data, const size_t length, const heim_octet_string *ivec, heim_octet_string **ciphertext) argument
[all...]
/freebsd-current/contrib/libfido2/src/
H A Dlargeblob.c19 fido_blob_t ciphertext; member in struct:largeblob
32 fido_blob_reset(&blob->ciphertext);
79 if (aes256_gcm_dec(key, &blob->nonce, aad, &blob->ciphertext,
142 &blob->ciphertext) < 0) {
289 case 1: /* ciphertext */
290 if (fido_blob_decode(val, &blob->ciphertext) < 0 ||
291 blob->ciphertext.len < LARGEBLOB_TAG_LENGTH)
322 if (fido_blob_is_empty(&blob->ciphertext) ||
343 if ((argv[0] = fido_blob_encode(&blob->ciphertext)) == NULL ||
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dmit_glue.c235 input->ciphertext.data, input->ciphertext.length,
276 &output->ciphertext,
/freebsd-current/crypto/openssl/crypto/sm2/
H A Dsm2_crypt.c272 const uint8_t *ciphertext, size_t ciphertext_len,
300 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len);
/freebsd-current/sys/crypto/camellia/
H A Dcamellia.c1271 unsigned char *ciphertext)
1293 PUTU32(ciphertext, tmp[0]);
1294 PUTU32(ciphertext+4, tmp[1]);
1295 PUTU32(ciphertext+8, tmp[2]);
1296 PUTU32(ciphertext+12, tmp[3]);
1301 const unsigned char *ciphertext,
1307 tmp[0] = GETU32(ciphertext);
1308 tmp[1] = GETU32(ciphertext + 4);
1309 tmp[2] = GETU32(ciphertext + 8);
1310 tmp[3] = GETU32(ciphertext
1268 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const uint32_t *subkey, unsigned char *ciphertext) argument
1300 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const uint32_t *subkey, unsigned char *plaintext) argument
[all...]
/freebsd-current/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_aes_gcm_hw_s390x.inc202 * En/de-crypt plain/cipher-text and authenticate ciphertext. Returns 1 for

Completed in 250 milliseconds

12