/titanic_50/usr/src/uts/common/crypto/io/ |
H A D | blowfish.c | 336 blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in blowfish_encrypt() argument 348 if ((plaintext->cd_length & (BLOWFISH_BLOCK_LEN - 1)) != 0) in blowfish_encrypt() 354 BLOWFISH_ARG_INPLACE(plaintext, ciphertext); in blowfish_encrypt() 360 if (ciphertext->cd_length < plaintext->cd_length) { in blowfish_encrypt() 361 ciphertext->cd_length = plaintext->cd_length; in blowfish_encrypt() 368 ret = blowfish_encrypt_update(ctx, plaintext, ciphertext, req); in blowfish_encrypt() 379 crypto_data_t *plaintext, crypto_req_handle_t req) in blowfish_decrypt() argument 396 BLOWFISH_ARG_INPLACE(ciphertext, plaintext); in blowfish_decrypt() 402 if (plaintext->cd_length < ciphertext->cd_length) { in blowfish_decrypt() 403 plaintext->cd_length = ciphertext->cd_length; in blowfish_decrypt() [all …]
|
H A D | aes.c | 405 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in aes_encrypt() argument 421 == 0) && (plaintext->cd_length & (AES_BLOCK_LEN - 1)) != 0) in aes_encrypt() 424 AES_ARG_INPLACE(plaintext, ciphertext); in aes_encrypt() 432 length_needed = plaintext->cd_length + aes_ctx->ac_mac_len; in aes_encrypt() 435 length_needed = plaintext->cd_length + aes_ctx->ac_tag_len; in aes_encrypt() 438 if (plaintext->cd_length != 0) in aes_encrypt() 444 length_needed = plaintext->cd_length; in aes_encrypt() 458 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req); in aes_encrypt() 483 if (plaintext != ciphertext) { in aes_encrypt() 505 if (plaintext != ciphertext) { in aes_encrypt() [all …]
|
H A D | rsa.c | 523 rsaprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in rsaprov_encrypt() argument 532 RSA_ARG_INPLACE(plaintext, ciphertext); in rsaprov_encrypt() 540 rv = rsa_encrypt_common(ctxp->mech_type, ctxp->key, plaintext, in rsaprov_encrypt() 553 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in rsa_encrypt_atomic() argument 560 RSA_ARG_INPLACE(plaintext, ciphertext); in rsa_encrypt_atomic() 562 return (rsa_encrypt_common(mechanism->cm_type, key, plaintext, in rsa_encrypt_atomic() 589 crypto_data_t *plaintext, crypto_data_t *ciphertext) in rsa_encrypt_common() argument 606 plen = plaintext->cd_length; in rsa_encrypt_common() 623 ASSERT(plaintext->cd_length <= sizeof (tmp_data)); in rsa_encrypt_common() 624 if ((rv = crypto_get_input_data(plaintext, &ptptr, tmp_data)) in rsa_encrypt_common() [all …]
|
H A D | dca.c | 3735 dca_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dca_encrypt() argument 3754 ciphertext = plaintext; in dca_encrypt() 3760 error = dca_3des(ctx, plaintext, ciphertext, req, DR_ENCRYPT); in dca_encrypt() 3763 error = dca_3des(ctx, plaintext, ciphertext, req, in dca_encrypt() 3768 error = dca_rsastart(ctx, plaintext, ciphertext, req, in dca_encrypt() 3790 dca_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dca_encrypt_update() argument 3809 ciphertext = plaintext; in dca_encrypt_update() 3815 error = dca_3desupdate(ctx, plaintext, ciphertext, req, in dca_encrypt_update() 3819 error = dca_3desupdate(ctx, plaintext, ciphertext, req, in dca_encrypt_update() 3875 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in dca_encrypt_atomic() argument [all …]
|
H A D | dprov.c | 2370 dprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dprov_encrypt() argument 2384 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_encrypt() 2394 dprov_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dprov_encrypt_update() argument 2409 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_encrypt_update() 2445 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in dprov_encrypt_atomic() argument 2467 req, mechanism, key, plaintext, ciphertext, NULL, session_id, in dprov_encrypt_atomic() 2512 crypto_data_t *plaintext, crypto_req_handle_t req) in dprov_decrypt() argument 2526 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_decrypt() 2537 crypto_data_t *plaintext, crypto_req_handle_t req) in dprov_decrypt_update() argument 2551 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_decrypt_update() [all …]
|
/titanic_50/usr/src/uts/common/des/ |
H A D | des_crypt.c | 529 des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in des_encrypt() argument 541 if ((plaintext->cd_length & (DES_BLOCK_LEN - 1)) != 0) in des_encrypt() 547 DES_ARG_INPLACE(plaintext, ciphertext); in des_encrypt() 553 if (ciphertext->cd_length < plaintext->cd_length) { in des_encrypt() 554 ciphertext->cd_length = plaintext->cd_length; in des_encrypt() 561 ret = des_encrypt_update(ctx, plaintext, ciphertext, req); in des_encrypt() 572 crypto_data_t *plaintext, crypto_req_handle_t req) in des_decrypt() argument 589 DES_ARG_INPLACE(ciphertext, plaintext); in des_decrypt() 595 if (plaintext->cd_length < ciphertext->cd_length) { in des_decrypt() 596 plaintext->cd_length = ciphertext->cd_length; in des_decrypt() [all …]
|
/titanic_50/usr/src/lib/crypt_modules/bsdmd5/ |
H A D | bsdmd5.c | 72 const char *plaintext, in crypt_genhash_impl() argument 100 MD5Update(&ctx, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl() 110 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl() 112 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl() 114 for (pl = strlen(plaintext); pl > 0; pl -= 16) in crypt_genhash_impl() 121 for (i = strlen(plaintext); i; i >>= 1) { in crypt_genhash_impl() 125 MD5Update(&ctx, (uchar_t *)plaintext, 1); in crypt_genhash_impl() 144 MD5Update(&ctx1, (uchar_t *)plaintext, in crypt_genhash_impl() 145 strlen(plaintext)); in crypt_genhash_impl() 153 MD5Update(&ctx1, (uchar_t *)plaintext, in crypt_genhash_impl() [all …]
|
/titanic_50/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local 156 plaintext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize); 157 plaintext.data=MALLOC(plaintext.length); 159 if (plaintext.data == NULL) { 167 bzero(plaintext.data, plaintext.length); 177 confounder.data=plaintext.data; 179 output->length = plaintext.length+hashsize; 215 bcopy(input->data, plaintext.data+confounder.length, input->length); 225 ret = krb5_hmac(context, kptr, &plaintext, &checksum); 227 ret = krb5_hmac(context, hash, kptr, 1, &plaintext, &checksum); [all …]
|
/titanic_50/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_encrypt.c | 68 unsigned char *plaintext = NULL, *cn; in krb5_dk_encrypt() local 95 if ((plaintext = (unsigned char *) MALLOC(plainlen)) == NULL) { in krb5_dk_encrypt() 101 d1.data = (char *) plaintext; in krb5_dk_encrypt() 106 (void) memcpy(plaintext+blocksize, input->data, input->length); in krb5_dk_encrypt() 108 (void) memset(plaintext+blocksize+input->length, 0, in krb5_dk_encrypt() 113 d1.data = (char *) plaintext; in krb5_dk_encrypt() 157 FREE(plaintext, plainlen); in krb5_dk_encrypt() 232 unsigned char *plaintext, *cn; in krb5int_aes_dk_encrypt() local 258 if ((plaintext = (unsigned char *) MALLOC(plainlen)) == NULL) { in krb5int_aes_dk_encrypt() 263 d1.data = (char *)plaintext; in krb5int_aes_dk_encrypt() [all …]
|
/titanic_50/usr/src/uts/common/crypto/api/ |
H A D | kcf_cipher.c | 319 crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, in crypto_encrypt_prov() argument 340 plaintext, ciphertext, tmpl); in crypto_encrypt_prov() 354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, in crypto_encrypt() argument 369 list, CRYPTO_FG_ENCRYPT_ATOMIC, plaintext->cd_length)) == NULL) { in crypto_encrypt() 402 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq)); in crypto_encrypt() 406 mech, key, plaintext, ciphertext, spi_ctx_tmpl); in crypto_encrypt() 473 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, in crypto_encrypt_update() argument 492 error = KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, in crypto_encrypt_update() 500 if (plaintext->cd_length < kcf_ctx->kc_mech->me_threshold && in crypto_encrypt_update() 508 ctx->cc_session, NULL, NULL, plaintext, ciphertext, NULL); in crypto_encrypt_update() [all …]
|
H A D | kcf_dual.c | 2142 crypto_context_t encrypt_ctx, crypto_data_t *plaintext, in crypto_digest_encrypt_update() argument 2160 crypto_data_t *plaintext, crypto_call_req_t *crq) in crypto_decrypt_digest_update() argument 2176 crypto_context_t encrypt_ctx, crypto_data_t *plaintext, in crypto_sign_encrypt_update() argument 2194 crypto_data_t *plaintext, crypto_call_req_t *crq) in crypto_decrypt_verify_update() argument
|
/titanic_50/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | k5_kmd5des.c | 163 unsigned char plaintext[CONFLENGTH + MD5_CKSUM_LENGTH]; in k5_md5des_verify() local 210 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify() 214 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify() 231 hash_input[i].data = (char *)plaintext; in k5_md5des_verify() 248 *valid = !bcmp((const void *)(plaintext+CONFLENGTH), in k5_md5des_verify() 251 *valid = !bcmp((const void *)plaintext, in k5_md5des_verify() 254 bzero((void *)plaintext, sizeof(plaintext)); in k5_md5des_verify()
|
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | k5_md5des.c | 162 unsigned char plaintext[CONFLENGTH+MD5_CKSUM_LENGTH]; in k5_md5des_verify() local 214 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify() 219 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify() 238 (CK_BYTE_PTR)plaintext, (CK_ULONG)CONFLENGTH)) != CKR_OK) { in k5_md5des_verify() 263 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0); in k5_md5des_verify() 265 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0); in k5_md5des_verify() 267 (void) memset(plaintext, 0, sizeof(plaintext)); in k5_md5des_verify()
|
/titanic_50/usr/src/uts/common/sys/crypto/ |
H A D | impl.h | 680 #define KCF_PROV_ENCRYPT(pd, ctx, plaintext, ciphertext, req) ( \ argument 682 KCF_PROV_CIPHER_OPS(pd)->encrypt(ctx, plaintext, ciphertext, req) : \ 685 #define KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, ciphertext, req) ( \ argument 687 KCF_PROV_CIPHER_OPS(pd)->encrypt_update(ctx, plaintext, \ 696 #define KCF_PROV_ENCRYPT_ATOMIC(pd, session, mech, key, plaintext, ciphertext, \ argument 700 (pd)->pd_prov_handle, session, mech, key, plaintext, ciphertext, \ 710 #define KCF_PROV_DECRYPT(pd, ctx, ciphertext, plaintext, req) ( \ argument 712 KCF_PROV_CIPHER_OPS(pd)->decrypt(ctx, ciphertext, plaintext, req) : \ 715 #define KCF_PROV_DECRYPT_UPDATE(pd, ctx, ciphertext, plaintext, req) ( \ argument 718 plaintext, req) : \ [all …]
|
H A D | api.h | 169 extern int crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, 181 crypto_data_t *plaintext, crypto_data_t *ciphertext, 190 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, 202 crypto_data_t *ciphertext, crypto_data_t *plaintext, 204 extern int crypto_decrypt_final(crypto_context_t ctx, crypto_data_t *plaintext,
|
/titanic_50/usr/src/lib/crypt_modules/sha256/ |
H A D | crypt_sha.c | 165 const char *plaintext, in crypt_genhash_impl() argument 201 plaintext_len = strlen(plaintext); in crypt_genhash_impl() 207 DIGESTUpdate(&ctxA, plaintext, plaintext_len); in crypt_genhash_impl() 214 DIGESTUpdate(&ctxB, plaintext, plaintext_len); in crypt_genhash_impl() 216 DIGESTUpdate(&ctxB, plaintext, plaintext_len); in crypt_genhash_impl() 229 DIGESTUpdate(&ctxA, plaintext, plaintext_len); in crypt_genhash_impl() 239 DIGESTUpdate(&ctxDP, plaintext, plaintext_len); in crypt_genhash_impl()
|
/titanic_50/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bsdbf.c | 59 const char *plaintext, in crypt_genhash_impl() argument 63 (void) strlcpy(ctbuffer, bcrypt(plaintext, salt), ctbufflen); in crypt_genhash_impl()
|
/titanic_50/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 231 const uint8_t *plaintext, int plain_len, in aes_ccm_encrypt() argument 266 d1.cd_raw.iov_base = (char *)plaintext; in aes_ccm_encrypt() 285 uint8_t *plaintext, int plain_len) in aes_ccm_decrypt() argument 325 d2.cd_raw.iov_base = (char *)plaintext; in aes_ccm_decrypt()
|
/titanic_50/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 244 const char *plaintext, in crypt_genhash_impl() argument 310 MD5Update(&data.context, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl()
|
/titanic_50/usr/src/cmd/ssh/include/ |
H A D | cipher.h | 73 int plaintext; member
|
/titanic_50/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 548 KMF_DATA *plaintext, in PKCS_EncryptData() argument 619 in_data = plaintext->Data; in PKCS_EncryptData() 622 blocks = plaintext->Length/block_size; in PKCS_EncryptData() 651 if (plaintext->Length % block_size) { in PKCS_EncryptData() 663 in_len = plaintext->Length % block_size; in PKCS_EncryptData()
|
H A D | certop.c | 1085 KMF_DATA *plaintext; in kmf_encrypt() local 1111 plaintext = kmf_get_attr_ptr(KMF_PLAINTEXT_DATA_ATTR, attrlist, in kmf_encrypt() 1116 if (cert == NULL || plaintext == NULL || ciphertext == NULL) in kmf_encrypt() 1156 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); in kmf_encrypt() 1183 KMF_DATA *plaintext = NULL; in kmf_decrypt() local 1227 plaintext = kmf_get_attr_ptr(KMF_PLAINTEXT_DATA_ATTR, attrlist, in kmf_decrypt() 1229 if (plaintext == NULL) in kmf_decrypt() 1266 ciphertext, plaintext); in kmf_decrypt()
|
/titanic_50/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 144 crypt(const char *plaintext, const char *salt) in crypt() argument 164 return (_unix_crypt(plaintext, salt, ctbuffer)); in crypt() 188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer); in crypt() 191 plaintext, salt, (const char **)alg->a_params); in crypt()
|
/titanic_50/usr/src/cmd/ssh/libssh/common/ |
H A D | packet.c | 518 if (!send_context.plaintext) { in packet_send1() 787 if (enc && !send_context.plaintext) { in packet_send2_wrapped() 1070 if (!receive_context.plaintext) { in packet_read_poll1()
|
H A D | cipher.c | 213 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); in cipher_init()
|