/freebsd/sys/contrib/openzfs/module/icp/io/ |
H A D | aes.c | 173 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in aes_encrypt_atomic() argument 196 length_needed = plaintext->cd_length + aes_ctx.ac_mac_len; in aes_encrypt_atomic() 199 length_needed = plaintext->cd_length + aes_ctx.ac_tag_len; in aes_encrypt_atomic() 218 switch (plaintext->cd_format) { in aes_encrypt_atomic() 220 ret = crypto_update_iov(&aes_ctx, plaintext, ciphertext, in aes_encrypt_atomic() 224 ret = crypto_update_uio(&aes_ctx, plaintext, ciphertext, in aes_encrypt_atomic() 250 if (plaintext != ciphertext) { in aes_encrypt_atomic() 272 crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, in aes_decrypt_atomic() argument 283 ASSERT(plaintext != NULL); in aes_decrypt_atomic() 305 if (plaintext->cd_length < length_needed) { in aes_decrypt_atomic() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | igetest.c | 32 static unsigned char plaintext[BIG_TEST_SIZE]; variable 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec() 238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec() 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining() 252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining() 260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining() 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining() 274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining() 286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining() 302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards() [all …]
|
H A D | tls13encryptiontest.c | 27 const char *plaintext[3]; member 248 pt = multihexstr2buf(recd->plaintext, &ptlen); in load_record() 285 refd = multihexstr2buf(recd->plaintext, &refdatalen); in test_record()
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_enc_more.t | 27 my $plaintext = catfile(".", "testdatafile"); 49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 56 my $cipherfile = "$plaintext.$ciphername.cipher"; 57 my $clearfile = "$plaintext.$ciphername.clear"; 60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile])) 61 && compare_text($plaintext, $cipherfile) != 0 63 && compare_text($plaintext, $clearfile) == 0
|
H A D | 70-test_sslcbcpadding.t | 98 my $plaintext = "A" x $plaintext_len; 101 $data .= $plaintext; 123 $plaintext,
|
/freebsd/crypto/openssl/crypto/camellia/ |
H A D | cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
H A D | camellia.c | 403 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], in Camellia_EncryptBlock_Rounds() argument 410 s0 = GETU32(plaintext) ^ k[0]; in Camellia_EncryptBlock_Rounds() 411 s1 = GETU32(plaintext + 4) ^ k[1]; in Camellia_EncryptBlock_Rounds() 412 s2 = GETU32(plaintext + 8) ^ k[2]; in Camellia_EncryptBlock_Rounds() 413 s3 = GETU32(plaintext + 12) ^ k[3]; in Camellia_EncryptBlock_Rounds() 449 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], in Camellia_EncryptBlock() argument 453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 458 u8 plaintext[]) in Camellia_DecryptBlock_Rounds() argument 496 PUTU32(plaintext, s2); in Camellia_DecryptBlock_Rounds() 497 PUTU32(plaintext + 4, s3); in Camellia_DecryptBlock_Rounds() [all …]
|
/freebsd/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 131 const u_int8_t *plaintext; member 219 memcpy(mtod(m, void *), t->plaintext, len); in runtest() 237 t->plaintext, t->plaintext_len); in runtest() 240 if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 243 t->plaintext, t->plaintext_len); in runtest() 276 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest() 299 t->plaintext, t->plaintext_len); in runtest() 309 t->plaintext, t->plaintext_len); in runtest() 312 if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 315 t->plaintext, t->plaintext_len); in runtest()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | des_modes.pod | 31 The same plaintext block always produces the same ciphertext block 55 plaintext is encrypted using the same key and starting variable. 60 current and all preceding plaintext blocks and therefore blocks can not 65 The use of different starting variables prevents the same plaintext 87 plaintext is encrypted using the same key and starting variable. 97 The use of different starting variables prevents the same plaintext 108 the encipherment algorithm per unit of plaintext and thus cause 134 plaintext enciphered using the same key and starting variable. More 146 plaintext enciphering to the same ciphertext, by producing different 152 the encipherment algorithm per unit of plaintext and thus cause [all …]
|
/freebsd/contrib/libfido2/tools/ |
H A D | largeblob.c | 351 decompress(const struct blob *plaintext, uint64_t origsiz) in decompress() argument 353 if (try_decompress(plaintext, origsiz, MAX_WBITS) == 0) /* rfc1950 */ in decompress() 355 return try_decompress(plaintext, origsiz, -MAX_WBITS); /* rfc1951 */ in decompress() 365 struct blob plaintext; in decode() local 369 memset(&plaintext, 0, sizeof(plaintext)); in decode() 381 plaintext.len = ciphertext->len - 16; in decode() 382 if ((plaintext.ptr = calloc(1, plaintext.len)) == NULL) in decode() 399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr, in decode() 400 (u_int)plaintext.len) < 0 || in decode() 403 if (decompress(&plaintext, origsiz) < 0) in decode() [all …]
|
/freebsd/sys/contrib/openzfs/module/icp/api/ |
H A D | kcf_cipher.c | 68 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, in crypto_encrypt() argument 93 plaintext, ciphertext, spi_ctx_tmpl); in crypto_encrypt() 140 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext) in crypto_decrypt() argument 165 ciphertext, plaintext, spi_ctx_tmpl); in crypto_decrypt()
|
/freebsd/tools/regression/net80211/ccmp/ |
H A D | test_ccmp.c | 538 const u_int8_t *plaintext; member 629 memcpy(mtod(m, void *), t->plaintext, t->plaintext_len); in runtest() 656 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest() 667 t->plaintext, t->plaintext_len); in runtest() 677 t->plaintext, t->plaintext_len); in runtest() 679 } else if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 683 t->plaintext, t->plaintext_len); in runtest()
|
/freebsd/tools/regression/net80211/wep/ |
H A D | test_wep.c | 143 const u_int8_t *plaintext; member 231 t->plaintext, t->plaintext_len); in runtest() 240 t->plaintext, t->plaintext_len); in runtest() 242 } else if (memcmp(mtod(m, const void *), t->plaintext, t->plaintext_len)) { in runtest() 245 t->plaintext, t->plaintext_len); in runtest() 272 dumpdata("Plaintext", t->plaintext, t->plaintext_len); in runtest()
|
/freebsd/contrib/llvm-project/lld/docs/ |
H A D | partitions.dot | 2 part_main [label="Main partition",shape=plaintext]; 3 part1 [label="Loadable partition 1",shape=plaintext]; 4 part2 [label="Loadable partition 2",shape=plaintext];
|
/freebsd/contrib/libfido2/src/ |
H A D | largeblob.c | 67 fido_blob_t *plaintext = NULL, *aad = NULL; in largeblob_decrypt() local 70 if ((plaintext = fido_blob_new()) == NULL || in largeblob_decrypt() 80 plaintext) < 0) { in largeblob_decrypt() 90 fido_blob_free(&plaintext); in largeblob_decrypt() 92 return plaintext; in largeblob_decrypt() 121 fido_blob_t *plaintext = NULL, *aad = NULL; in largeblob_seal() local 124 if ((plaintext = fido_blob_new()) == NULL || in largeblob_seal() 129 if (fido_compress(plaintext, body) != FIDO_OK) { in largeblob_seal() 141 if (aes256_gcm_enc(key, &blob->nonce, aad, plaintext, in largeblob_seal() 150 fido_blob_free(&plaintext); in largeblob_seal() [all …]
|
/freebsd/sys/contrib/openzfs/module/icp/include/sys/crypto/ |
H A D | impl.h | 263 #define KCF_PROV_ENCRYPT_ATOMIC(pd, mech, key, plaintext, ciphertext, \ argument 267 mech, key, plaintext, ciphertext, template) : \ 270 #define KCF_PROV_DECRYPT_ATOMIC(pd, mech, key, ciphertext, plaintext, \ argument 274 mech, key, ciphertext, plaintext, template) : \
|
/freebsd/tests/sys/kern/ |
H A D | ktls_test.c | 1024 /* Copy plaintext to ciphertext region. */ in encrypt_tls_aes_cbc_mte() 1030 debug_hexdump(tc, src, len, "plaintext"); in encrypt_tls_aes_cbc_mte() 1080 debug_hexdump(tc, src, len, "plaintext"); in encrypt_tls_12_aead() 1125 debug_hexdump(tc, buf, len + 1 + padding, "plaintext + type + padding"); in encrypt_tls_13_aead() 1179 char *plaintext, *decrypted, *outbuf; in test_ktls_transmit_app_data() local 1185 plaintext = alloc_buffer(len); in test_ktls_transmit_app_data() 1186 debug_hexdump(tc, plaintext, len, "plaintext"); in test_ktls_transmit_app_data() 1216 rv = write(ev.ident, plaintext + written, in test_ktls_transmit_app_data() 1288 ATF_REQUIRE(memcmp(plaintext, decrypte in test_ktls_transmit_app_data() 1329 char *plaintext, *decrypted, *outbuf; test_ktls_transmit_control() local 1498 char *plaintext, *received, *outbuf; test_ktls_receive_app_data() local 1618 char *plaintext, *outbuf; test_ktls_receive_corrupted_record() local 1707 char *plaintext, *outbuf; test_ktls_receive_truncated_record() local 1748 char *plaintext, *outbuf; test_ktls_receive_bad_major() local 1790 char *plaintext, *outbuf; test_ktls_receive_bad_minor() local 1832 char *plaintext, *outbuf; test_ktls_receive_bad_type() local [all...] |
/freebsd/sys/crypto/camellia/ |
H A D | camellia.h | 49 const unsigned char *plaintext, 56 unsigned char *plaintext);
|
/freebsd/sys/contrib/openzfs/include/sys/crypto/ |
H A D | api.h | 65 extern int crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, 68 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext);
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | aes_platform.h | 110 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphe… 112 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphe… 114 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphe… 116 … aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 118 … aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 120 … aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RSA_public_encrypt.pod | 61 plaintext and the public key are exactly identical. 67 private key B<rsa> and stores the plaintext in B<to>. B<flen> should 82 recovered plaintext. A return value of 0 is not an error and 83 means only that the plaintext was empty.
|
H A D | RSA_padding_add_PKCS1_type_1.pod | 130 plaintext and additionally some application specific consistency 131 checks on the plaintext need to be performed in constant time. 132 If the plaintext is rejected it must be kept secret which of the
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_common.txt | 76 # AES-bits-ECB:key::plaintext:ciphertext:encdec 144 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 234 # AES-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec 434 # AES-bits-CFB:key:IV/output':plaintext:ciphertext:encdec 829 # 48 bytes plaintext 839 # 80 bytes plaintext 849 # 128 bytes plaintext 859 # 192 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF 868 # 240 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF 877 # 288 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF [all …]
|
H A D | evppkey_sm2.txt | 62 # Test with an C1x and C1y valuey > 32 bytes in length, and longer plaintext (self generated) 66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah…
|
/freebsd/crypto/openssh/ |
H A D | cipher.c | 59 int plaintext; member 199 return cc->plaintext; in cipher_ctx_is_plaintext() 261 cc->plaintext = (cipher->flags & CFLAG_NONE) != 0; in cipher_init()
|