Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 62) sorted by relevance

123

/freebsd/sys/contrib/openzfs/module/icp/io/
H A Daes.c173 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in aes_encrypt_atomic() argument
196 length_needed = plaintext->cd_length + aes_ctx.ac_mac_len; in aes_encrypt_atomic()
199 length_needed = plaintext->cd_length + aes_ctx.ac_tag_len; in aes_encrypt_atomic()
218 switch (plaintext->cd_format) { in aes_encrypt_atomic()
220 ret = crypto_update_iov(&aes_ctx, plaintext, ciphertext, in aes_encrypt_atomic()
224 ret = crypto_update_uio(&aes_ctx, plaintext, ciphertext, in aes_encrypt_atomic()
250 if (plaintext != ciphertext) { in aes_encrypt_atomic()
272 crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, in aes_decrypt_atomic() argument
283 ASSERT(plaintext != NULL); in aes_decrypt_atomic()
305 if (plaintext->cd_length < length_needed) { in aes_decrypt_atomic()
[all …]
/freebsd/crypto/openssl/test/
H A Digetest.c32 static unsigned char plaintext[BIG_TEST_SIZE]; variable
232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec()
238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec()
250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining()
252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining()
260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining()
272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining()
274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining()
286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining()
302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards()
[all …]
H A Dtls13encryptiontest.c27 const char *plaintext[3]; member
248 pt = multihexstr2buf(recd->plaintext, &ptlen); in load_record()
285 refd = multihexstr2buf(recd->plaintext, &refdatalen); in test_record()
/freebsd/crypto/openssl/test/recipes/
H A D20-test_enc_more.t27 my $plaintext = catfile(".", "testdatafile");
49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) {
56 my $cipherfile = "$plaintext.$ciphername.cipher";
57 my $clearfile = "$plaintext.$ciphername.clear";
60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile]))
61 && compare_text($plaintext, $cipherfile) != 0
63 && compare_text($plaintext, $clearfile) == 0
H A D70-test_sslcbcpadding.t98 my $plaintext = "A" x $plaintext_len;
101 $data .= $plaintext;
123 $plaintext,
/freebsd/crypto/openssl/crypto/camellia/
H A Dcmll_local.h33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[],
38 u8 plaintext[]);
39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[],
42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
H A Dcamellia.c403 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], in Camellia_EncryptBlock_Rounds() argument
410 s0 = GETU32(plaintext) ^ k[0]; in Camellia_EncryptBlock_Rounds()
411 s1 = GETU32(plaintext + 4) ^ k[1]; in Camellia_EncryptBlock_Rounds()
412 s2 = GETU32(plaintext + 8) ^ k[2]; in Camellia_EncryptBlock_Rounds()
413 s3 = GETU32(plaintext + 12) ^ k[3]; in Camellia_EncryptBlock_Rounds()
449 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], in Camellia_EncryptBlock() argument
453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock()
458 u8 plaintext[]) in Camellia_DecryptBlock_Rounds() argument
496 PUTU32(plaintext, s2); in Camellia_DecryptBlock_Rounds()
497 PUTU32(plaintext + 4, s3); in Camellia_DecryptBlock_Rounds()
[all …]
/freebsd/tools/regression/net80211/tkip/
H A Dtest_tkip.c131 const u_int8_t *plaintext; member
219 memcpy(mtod(m, void *), t->plaintext, len); in runtest()
237 t->plaintext, t->plaintext_len); in runtest()
240 if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest()
243 t->plaintext, t->plaintext_len); in runtest()
276 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest()
299 t->plaintext, t->plaintext_len); in runtest()
309 t->plaintext, t->plaintext_len); in runtest()
312 if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest()
315 t->plaintext, t->plaintext_len); in runtest()
/freebsd/crypto/openssl/doc/man7/
H A Ddes_modes.pod31 The same plaintext block always produces the same ciphertext block
55 plaintext is encrypted using the same key and starting variable.
60 current and all preceding plaintext blocks and therefore blocks can not
65 The use of different starting variables prevents the same plaintext
87 plaintext is encrypted using the same key and starting variable.
97 The use of different starting variables prevents the same plaintext
108 the encipherment algorithm per unit of plaintext and thus cause
134 plaintext enciphered using the same key and starting variable. More
146 plaintext enciphering to the same ciphertext, by producing different
152 the encipherment algorithm per unit of plaintext and thus cause
[all …]
/freebsd/contrib/libfido2/tools/
H A Dlargeblob.c351 decompress(const struct blob *plaintext, uint64_t origsiz) in decompress() argument
353 if (try_decompress(plaintext, origsiz, MAX_WBITS) == 0) /* rfc1950 */ in decompress()
355 return try_decompress(plaintext, origsiz, -MAX_WBITS); /* rfc1951 */ in decompress()
365 struct blob plaintext; in decode() local
369 memset(&plaintext, 0, sizeof(plaintext)); in decode()
381 plaintext.len = ciphertext->len - 16; in decode()
382 if ((plaintext.ptr = calloc(1, plaintext.len)) == NULL) in decode()
399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr, in decode()
400 (u_int)plaintext.len) < 0 || in decode()
403 if (decompress(&plaintext, origsiz) < 0) in decode()
[all …]
/freebsd/sys/contrib/openzfs/module/icp/api/
H A Dkcf_cipher.c68 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, in crypto_encrypt() argument
93 plaintext, ciphertext, spi_ctx_tmpl); in crypto_encrypt()
140 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext) in crypto_decrypt() argument
165 ciphertext, plaintext, spi_ctx_tmpl); in crypto_decrypt()
/freebsd/tools/regression/net80211/ccmp/
H A Dtest_ccmp.c538 const u_int8_t *plaintext; member
629 memcpy(mtod(m, void *), t->plaintext, t->plaintext_len); in runtest()
656 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest()
667 t->plaintext, t->plaintext_len); in runtest()
677 t->plaintext, t->plaintext_len); in runtest()
679 } else if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest()
683 t->plaintext, t->plaintext_len); in runtest()
/freebsd/tools/regression/net80211/wep/
H A Dtest_wep.c143 const u_int8_t *plaintext; member
231 t->plaintext, t->plaintext_len); in runtest()
240 t->plaintext, t->plaintext_len); in runtest()
242 } else if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest()
245 t->plaintext, t->plaintext_len); in runtest()
272 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest()
/freebsd/contrib/llvm-project/lld/docs/
H A Dpartitions.dot2 part_main [label="Main partition",shape=plaintext];
3 part1 [label="Loadable partition 1",shape=plaintext];
4 part2 [label="Loadable partition 2",shape=plaintext];
/freebsd/contrib/libfido2/src/
H A Dlargeblob.c67 fido_blob_t *plaintext = NULL, *aad = NULL; in largeblob_decrypt() local
70 if ((plaintext = fido_blob_new()) == NULL || in largeblob_decrypt()
80 plaintext) < 0) { in largeblob_decrypt()
90 fido_blob_free(&plaintext); in largeblob_decrypt()
92 return plaintext; in largeblob_decrypt()
121 fido_blob_t *plaintext = NULL, *aad = NULL; in largeblob_seal() local
124 if ((plaintext = fido_blob_new()) == NULL || in largeblob_seal()
129 if (fido_compress(plaintext, body) != FIDO_OK) { in largeblob_seal()
141 if (aes256_gcm_enc(key, &blob->nonce, aad, plaintext, in largeblob_seal()
150 fido_blob_free(&plaintext); in largeblob_seal()
[all …]
/freebsd/sys/contrib/openzfs/module/icp/include/sys/crypto/
H A Dimpl.h263 #define KCF_PROV_ENCRYPT_ATOMIC(pd, mech, key, plaintext, ciphertext, \ argument
267 mech, key, plaintext, ciphertext, template) : \
270 #define KCF_PROV_DECRYPT_ATOMIC(pd, mech, key, ciphertext, plaintext, \ argument
274 mech, key, ciphertext, plaintext, template) : \
/freebsd/tests/sys/kern/
H A Dktls_test.c1024 /* Copy plaintext to ciphertext region. */ in encrypt_tls_aes_cbc_mte()
1030 debug_hexdump(tc, src, len, "plaintext"); in encrypt_tls_aes_cbc_mte()
1080 debug_hexdump(tc, src, len, "plaintext"); in encrypt_tls_12_aead()
1125 debug_hexdump(tc, buf, len + 1 + padding, "plaintext + type + padding"); in encrypt_tls_13_aead()
1179 char *plaintext, *decrypted, *outbuf; in test_ktls_transmit_app_data() local
1185 plaintext = alloc_buffer(len); in test_ktls_transmit_app_data()
1186 debug_hexdump(tc, plaintext, len, "plaintext"); in test_ktls_transmit_app_data()
1216 rv = write(ev.ident, plaintext + written, in test_ktls_transmit_app_data()
1288 ATF_REQUIRE(memcmp(plaintext, decrypte in test_ktls_transmit_app_data()
1329 char *plaintext, *decrypted, *outbuf; test_ktls_transmit_control() local
1498 char *plaintext, *received, *outbuf; test_ktls_receive_app_data() local
1618 char *plaintext, *outbuf; test_ktls_receive_corrupted_record() local
1707 char *plaintext, *outbuf; test_ktls_receive_truncated_record() local
1748 char *plaintext, *outbuf; test_ktls_receive_bad_major() local
1790 char *plaintext, *outbuf; test_ktls_receive_bad_minor() local
1832 char *plaintext, *outbuf; test_ktls_receive_bad_type() local
[all...]
/freebsd/sys/crypto/camellia/
H A Dcamellia.h49 const unsigned char *plaintext,
56 unsigned char *plaintext);
/freebsd/sys/contrib/openzfs/include/sys/crypto/
H A Dapi.h65 extern int crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext,
68 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext);
/freebsd/crypto/openssl/include/crypto/
H A Daes_platform.h110 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphe…
112 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphe…
114 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphe…
116 … aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
118 … aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
120 … aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
/freebsd/crypto/openssl/doc/man3/
H A DRSA_public_encrypt.pod61 plaintext and the public key are exactly identical.
67 private key B<rsa> and stores the plaintext in B<to>. B<flen> should
82 recovered plaintext. A return value of 0 is not an error and
83 means only that the plaintext was empty.
H A DRSA_padding_add_PKCS1_type_1.pod130 plaintext and additionally some application specific consistency
131 checks on the plaintext need to be performed in constant time.
132 If the plaintext is rejected it must be kept secret which of the
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpciph_aes_common.txt76 # AES-bits-ECB:key::plaintext:ciphertext:encdec
144 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
234 # AES-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec
434 # AES-bits-CFB:key:IV/output':plaintext:ciphertext:encdec
829 # 48 bytes plaintext
839 # 80 bytes plaintext
849 # 128 bytes plaintext
859 # 192 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF
868 # 240 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF
877 # 288 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF
[all …]
H A Devppkey_sm2.txt62 # Test with an C1x and C1y valuey > 32 bytes in length, and longer plaintext (self generated)
66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah…
/freebsd/crypto/openssh/
H A Dcipher.c59 int plaintext; member
199 return cc->plaintext; in cipher_ctx_is_plaintext()
261 cc->plaintext = (cipher->flags & CFLAG_NONE) != 0; in cipher_init()

123