| /freebsd/sys/contrib/openzfs/module/icp/io/ |
| H A D | aes.c | 174 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in aes_encrypt_atomic() argument 197 length_needed = plaintext->cd_length + aes_ctx.ac_mac_len; in aes_encrypt_atomic() 200 length_needed = plaintext->cd_length + aes_ctx.ac_tag_len; in aes_encrypt_atomic() 219 switch (plaintext->cd_format) { in aes_encrypt_atomic() 221 ret = crypto_update_iov(&aes_ctx, plaintext, ciphertext, in aes_encrypt_atomic() 225 ret = crypto_update_uio(&aes_ctx, plaintext, ciphertext, in aes_encrypt_atomic() 251 if (plaintext != ciphertext) { in aes_encrypt_atomic() 273 crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, in aes_decrypt_atomic() argument 284 ASSERT(plaintext != NULL); in aes_decrypt_atomic() 306 if (plaintext->cd_length < length_needed) { in aes_decrypt_atomic() [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | igetest.c | 32 static unsigned char plaintext[BIG_TEST_SIZE]; variable 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec() 238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec() 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining() 252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining() 260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining() 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining() 274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining() 286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining() 302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards() [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 20-test_enc_more.t | 27 my $plaintext = catfile(".", "testdatafile"); 49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 56 my $cipherfile = "$plaintext.$ciphername.cipher"; 57 my $clearfile = "$plaintext.$ciphername.clear"; 60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile])) 61 && compare_text($plaintext, $cipherfile) != 0 63 && compare_text($plaintext, $clearfile) == 0
|
| H A D | 70-test_sslcbcpadding.t | 97 my $plaintext = "A" x $plaintext_len; 100 $data .= $plaintext; 122 $plaintext,
|
| /freebsd/crypto/openssl/crypto/camellia/ |
| H A D | cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
| H A D | camellia.c | 405 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], in Camellia_EncryptBlock_Rounds() argument 412 s0 = GETU32(plaintext) ^ k[0]; in Camellia_EncryptBlock_Rounds() 413 s1 = GETU32(plaintext + 4) ^ k[1]; in Camellia_EncryptBlock_Rounds() 414 s2 = GETU32(plaintext + 8) ^ k[2]; in Camellia_EncryptBlock_Rounds() 415 s3 = GETU32(plaintext + 12) ^ k[3]; in Camellia_EncryptBlock_Rounds() 451 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], in Camellia_EncryptBlock() argument 455 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 460 u8 plaintext[]) in Camellia_DecryptBlock_Rounds() argument 498 PUTU32(plaintext, s2); in Camellia_DecryptBlock_Rounds() 499 PUTU32(plaintext + 4, s3); in Camellia_DecryptBlock_Rounds() [all …]
|
| /freebsd/tools/regression/net80211/tkip/ |
| H A D | test_tkip.c | 131 const u_int8_t *plaintext; member 219 memcpy(mtod(m, void *), t->plaintext, len); in runtest() 237 t->plaintext, t->plaintext_len); in runtest() 240 if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 243 t->plaintext, t->plaintext_len); in runtest() 276 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest() 299 t->plaintext, t->plaintext_len); in runtest() 309 t->plaintext, t->plaintext_len); in runtest() 312 if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 315 t->plaintext, t->plaintext_len); in runtest()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | rd_priv.c | 51 krb5_data plaintext = empty_data(); in read_krbpriv() local 63 ret = alloc_data(&plaintext, privmsg->enc_part.ciphertext.length); in read_krbpriv() 69 &privmsg->enc_part, &plaintext); in read_krbpriv() 73 ret = decode_krb5_enc_priv_part(&plaintext, &encpart); in read_krbpriv() 95 zapfree(plaintext.data, plaintext.length); in read_krbpriv()
|
| /freebsd/crypto/krb5/src/plugins/preauth/otp/ |
| H A D | main.c | 56 krb5_data plaintext; in decrypt_encdata() local 61 retval = alloc_data(&plaintext, req->enc_data.ciphertext.length); in decrypt_encdata() 66 NULL, &req->enc_data, &plaintext); in decrypt_encdata() 69 free(plaintext.data); in decrypt_encdata() 73 *out = plaintext; in decrypt_encdata() 294 krb5_data d, plaintext; in otp_verify() local 314 retval = decrypt_encdata(context, armor_key, req, &plaintext); in otp_verify() 321 retval = nonce_verify(context, armor_key, &plaintext); in otp_verify() 323 retval = timestamp_verify(context, &plaintext); in otp_verify() 324 krb5_free_data_contents(context, &plaintext); in otp_verify()
|
| /freebsd/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_cksums.c | 36 krb5_data plaintext; member 207 &test->plaintext, &cksum); in main() 213 printf("Plaintext: %.*s\n", (int)test->plaintext.length, in main() 214 test->plaintext.data); in main() 234 &test->plaintext, &cksum, &valid); in main() 251 &test->plaintext, &cksum, &valid); in main()
|
| H A D | t_decrypt.c | 37 krb5_data plaintext; member 614 assert(plain.length >= test->plaintext.length); in main() 615 if (memcmp(plain.data, test->plaintext.data, in main() 616 test->plaintext.length) != 0) { in main()
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | des_modes.pod | 31 The same plaintext block always produces the same ciphertext block 55 plaintext is encrypted using the same key and starting variable. 60 current and all preceding plaintext blocks and therefore blocks can not 65 The use of different starting variables prevents the same plaintext 87 plaintext is encrypted using the same key and starting variable. 97 The use of different starting variables prevents the same plaintext 108 the encipherment algorithm per unit of plaintext and thus cause 134 plaintext enciphered using the same key and starting variable. More 146 plaintext enciphering to the same ciphertext, by producing different 152 the encipherment algorithm per unit of plaintext and thus cause [all …]
|
| /freebsd/contrib/libfido2/tools/ |
| H A D | largeblob.c | 351 decompress(const struct blob *plaintext, uint64_t origsiz) in decompress() argument 353 if (try_decompress(plaintext, origsiz, MAX_WBITS) == 0) /* rfc1950 */ in decompress() 355 return try_decompress(plaintext, origsiz, -MAX_WBITS); /* rfc1951 */ in decompress() 365 struct blob plaintext; in decode() local 369 memset(&plaintext, 0, sizeof(plaintext)); in decode() 381 plaintext.len = ciphertext->len - 16; in decode() 382 if ((plaintext.ptr = calloc(1, plaintext.len)) == NULL) in decode() 399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr, in decode() 400 (u_int)plaintext.len) < 0 || in decode() 403 if (decompress(&plaintext, origsiz) < 0) in decode() [all …]
|
| /freebsd/sys/contrib/openzfs/module/icp/api/ |
| H A D | kcf_cipher.c | 69 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, in crypto_encrypt() argument 94 plaintext, ciphertext, spi_ctx_tmpl); in crypto_encrypt() 141 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext) in crypto_decrypt() argument 166 ciphertext, plaintext, spi_ctx_tmpl); in crypto_decrypt()
|
| /freebsd/tools/regression/net80211/ccmp/ |
| H A D | test_ccmp.c | 538 const u_int8_t *plaintext; member 629 memcpy(mtod(m, void *), t->plaintext, t->plaintext_len); in runtest() 656 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest() 667 t->plaintext, t->plaintext_len); in runtest() 677 t->plaintext, t->plaintext_len); in runtest() 679 } else if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 683 t->plaintext, t->plaintext_len); in runtest()
|
| /freebsd/contrib/llvm-project/lld/docs/ |
| H A D | partitions.dot | 2 part_main [label="Main partition",shape=plaintext]; 3 part1 [label="Loadable partition 1",shape=plaintext]; 4 part2 [label="Loadable partition 2",shape=plaintext];
|
| /freebsd/tools/regression/net80211/wep/ |
| H A D | test_wep.c | 143 const u_int8_t *plaintext; member 231 t->plaintext, t->plaintext_len); in runtest() 240 t->plaintext, t->plaintext_len); in runtest() 242 } else if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 245 t->plaintext, t->plaintext_len); in runtest() 272 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest()
|
| /freebsd/contrib/libfido2/src/ |
| H A D | largeblob.c | 67 fido_blob_t *plaintext = NULL, *aad = NULL; in largeblob_decrypt() local 70 if ((plaintext = fido_blob_new()) == NULL || in largeblob_decrypt() 80 plaintext) < 0) { in largeblob_decrypt() 90 fido_blob_free(&plaintext); in largeblob_decrypt() 92 return plaintext; in largeblob_decrypt() 121 fido_blob_t *plaintext = NULL, *aad = NULL; in largeblob_seal() local 124 if ((plaintext = fido_blob_new()) == NULL || in largeblob_seal() 129 if (fido_compress(plaintext, body) != FIDO_OK) { in largeblob_seal() 141 if (aes256_gcm_enc(key, &blob->nonce, aad, plaintext, in largeblob_seal() 150 fido_blob_free(&plaintext); in largeblob_seal() [all …]
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | aes_platform.h | 127 size_t aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphert… 129 size_t aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphert… 131 size_t aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphert… 133 …_t aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 135 …_t aes_gcm_dec_192_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 137 …_t aes_gcm_dec_256_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 139 size_t unroll8_eor3_aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uin… 141 size_t unroll8_eor3_aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uin… 143 size_t unroll8_eor3_aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uin… 145 …r3_aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, [all …]
|
| /freebsd/secure/lib/libcrypto/tests/ |
| H A D | libcrypto_test.sh | 11 local plaintext="test" 34 echo "$plaintext" | atf_check -s exit:0 -e empty -o not-empty \
|
| /freebsd/sys/contrib/openzfs/module/icp/include/sys/crypto/ |
| H A D | impl.h | 264 #define KCF_PROV_ENCRYPT_ATOMIC(pd, mech, key, plaintext, ciphertext, \ argument 268 mech, key, plaintext, ciphertext, template) : \ 271 #define KCF_PROV_DECRYPT_ATOMIC(pd, mech, key, ciphertext, plaintext, \ argument 275 mech, key, ciphertext, plaintext, template) : \
|
| /freebsd/sys/crypto/camellia/ |
| H A D | camellia.h | 49 const unsigned char *plaintext, 56 unsigned char *plaintext);
|
| /freebsd/sys/contrib/openzfs/include/sys/crypto/ |
| H A D | api.h | 66 extern int crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, 69 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext);
|
| /freebsd/tests/sys/kern/ |
| H A D | ktls_test.c | 1024 /* Copy plaintext to ciphertext region. */ in encrypt_tls_aes_cbc_mte() 1030 debug_hexdump(tc, src, len, "plaintext"); in encrypt_tls_aes_cbc_mte() 1080 debug_hexdump(tc, src, len, "plaintext"); in encrypt_tls_12_aead() 1125 debug_hexdump(tc, buf, len + 1 + padding, "plaintext + type + padding"); in encrypt_tls_13_aead() 1179 char *plaintext, *decrypted, *outbuf; in test_ktls_transmit_app_data() local 1185 plaintext = alloc_buffer(len); in test_ktls_transmit_app_data() 1186 debug_hexdump(tc, plaintext, len, "plaintext"); in test_ktls_transmit_app_data() 1216 rv = write(ev.ident, plaintext + written, in test_ktls_transmit_app_data() 1288 ATF_REQUIRE(memcmp(plaintext, decrypte in test_ktls_transmit_app_data() 1329 char *plaintext, *decrypted, *outbuf; test_ktls_transmit_control() local 1498 char *plaintext, *received, *outbuf; test_ktls_receive_app_data() local 1618 char *plaintext, *outbuf; test_ktls_receive_corrupted_record() local 1707 char *plaintext, *outbuf; test_ktls_receive_truncated_record() local 1748 char *plaintext, *outbuf; test_ktls_receive_bad_major() local 1790 char *plaintext, *outbuf; test_ktls_receive_bad_minor() local 1832 char *plaintext, *outbuf; test_ktls_receive_bad_type() local [all...] |
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | fast_util.c | 137 krb5_data scratch, plaintext, *inner_body = NULL; in kdc_find_fast() local 187 plaintext.length = fast_armored_req->enc_part.ciphertext.length; in kdc_find_fast() 188 plaintext.data = k5alloc(plaintext.length, &retval); in kdc_find_fast() 194 &plaintext); in kdc_find_fast() 196 retval = decode_krb5_fast_req(&plaintext, &fast_req); in kdc_find_fast() 198 retval = fetch_asn1_field((unsigned char *)plaintext.data, in kdc_find_fast() 204 if (plaintext.data) in kdc_find_fast() 205 free(plaintext.data); in kdc_find_fast()
|