Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 27) sorted by relevance

12

/titanic_50/usr/src/uts/common/crypto/io/
H A Dblowfish.c336 blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in blowfish_encrypt() argument
348 if ((plaintext->cd_length & (BLOWFISH_BLOCK_LEN - 1)) != 0) in blowfish_encrypt()
354 BLOWFISH_ARG_INPLACE(plaintext, ciphertext); in blowfish_encrypt()
360 if (ciphertext->cd_length < plaintext->cd_length) { in blowfish_encrypt()
361 ciphertext->cd_length = plaintext->cd_length; in blowfish_encrypt()
368 ret = blowfish_encrypt_update(ctx, plaintext, ciphertext, req); in blowfish_encrypt()
379 crypto_data_t *plaintext, crypto_req_handle_t req) in blowfish_decrypt() argument
396 BLOWFISH_ARG_INPLACE(ciphertext, plaintext); in blowfish_decrypt()
402 if (plaintext->cd_length < ciphertext->cd_length) { in blowfish_decrypt()
403 plaintext->cd_length = ciphertext->cd_length; in blowfish_decrypt()
[all …]
H A Daes.c405 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in aes_encrypt() argument
421 == 0) && (plaintext->cd_length & (AES_BLOCK_LEN - 1)) != 0) in aes_encrypt()
424 AES_ARG_INPLACE(plaintext, ciphertext); in aes_encrypt()
432 length_needed = plaintext->cd_length + aes_ctx->ac_mac_len; in aes_encrypt()
435 length_needed = plaintext->cd_length + aes_ctx->ac_tag_len; in aes_encrypt()
438 if (plaintext->cd_length != 0) in aes_encrypt()
444 length_needed = plaintext->cd_length; in aes_encrypt()
458 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req); in aes_encrypt()
483 if (plaintext != ciphertext) { in aes_encrypt()
505 if (plaintext != ciphertext) { in aes_encrypt()
[all …]
H A Drsa.c523 rsaprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in rsaprov_encrypt() argument
532 RSA_ARG_INPLACE(plaintext, ciphertext); in rsaprov_encrypt()
540 rv = rsa_encrypt_common(ctxp->mech_type, ctxp->key, plaintext, in rsaprov_encrypt()
553 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in rsa_encrypt_atomic() argument
560 RSA_ARG_INPLACE(plaintext, ciphertext); in rsa_encrypt_atomic()
562 return (rsa_encrypt_common(mechanism->cm_type, key, plaintext, in rsa_encrypt_atomic()
589 crypto_data_t *plaintext, crypto_data_t *ciphertext) in rsa_encrypt_common() argument
606 plen = plaintext->cd_length; in rsa_encrypt_common()
623 ASSERT(plaintext->cd_length <= sizeof (tmp_data)); in rsa_encrypt_common()
624 if ((rv = crypto_get_input_data(plaintext, &ptptr, tmp_data)) in rsa_encrypt_common()
[all …]
H A Ddca.c3735 dca_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dca_encrypt() argument
3754 ciphertext = plaintext; in dca_encrypt()
3760 error = dca_3des(ctx, plaintext, ciphertext, req, DR_ENCRYPT); in dca_encrypt()
3763 error = dca_3des(ctx, plaintext, ciphertext, req, in dca_encrypt()
3768 error = dca_rsastart(ctx, plaintext, ciphertext, req, in dca_encrypt()
3790 dca_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dca_encrypt_update() argument
3809 ciphertext = plaintext; in dca_encrypt_update()
3815 error = dca_3desupdate(ctx, plaintext, ciphertext, req, in dca_encrypt_update()
3819 error = dca_3desupdate(ctx, plaintext, ciphertext, req, in dca_encrypt_update()
3875 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in dca_encrypt_atomic() argument
[all …]
H A Ddprov.c2370 dprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dprov_encrypt() argument
2384 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_encrypt()
2394 dprov_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, in dprov_encrypt_update() argument
2409 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_encrypt_update()
2445 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, in dprov_encrypt_atomic() argument
2467 req, mechanism, key, plaintext, ciphertext, NULL, session_id, in dprov_encrypt_atomic()
2512 crypto_data_t *plaintext, crypto_req_handle_t req) in dprov_decrypt() argument
2526 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_decrypt()
2537 crypto_data_t *plaintext, crypto_req_handle_t req) in dprov_decrypt_update() argument
2551 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); in dprov_decrypt_update()
[all …]
/titanic_50/usr/src/uts/common/des/
H A Ddes_crypt.c529 des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, in des_encrypt() argument
541 if ((plaintext->cd_length & (DES_BLOCK_LEN - 1)) != 0) in des_encrypt()
547 DES_ARG_INPLACE(plaintext, ciphertext); in des_encrypt()
553 if (ciphertext->cd_length < plaintext->cd_length) { in des_encrypt()
554 ciphertext->cd_length = plaintext->cd_length; in des_encrypt()
561 ret = des_encrypt_update(ctx, plaintext, ciphertext, req); in des_encrypt()
572 crypto_data_t *plaintext, crypto_req_handle_t req) in des_decrypt() argument
589 DES_ARG_INPLACE(ciphertext, plaintext); in des_decrypt()
595 if (plaintext->cd_length < ciphertext->cd_length) { in des_decrypt()
596 plaintext->cd_length = ciphertext->cd_length; in des_decrypt()
[all …]
/titanic_50/usr/src/lib/crypt_modules/bsdmd5/
H A Dbsdmd5.c72 const char *plaintext, in crypt_genhash_impl() argument
100 MD5Update(&ctx, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl()
110 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl()
112 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl()
114 for (pl = strlen(plaintext); pl > 0; pl -= 16) in crypt_genhash_impl()
121 for (i = strlen(plaintext); i; i >>= 1) { in crypt_genhash_impl()
125 MD5Update(&ctx, (uchar_t *)plaintext, 1); in crypt_genhash_impl()
144 MD5Update(&ctx1, (uchar_t *)plaintext, in crypt_genhash_impl()
145 strlen(plaintext)); in crypt_genhash_impl()
153 MD5Update(&ctx1, (uchar_t *)plaintext, in crypt_genhash_impl()
[all …]
/titanic_50/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/
H A Dk5_arcfour.c84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local
156 plaintext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize);
157 plaintext.data=MALLOC(plaintext.length);
159 if (plaintext.data == NULL) {
167 bzero(plaintext.data, plaintext.length);
177 confounder.data=plaintext.data;
179 output->length = plaintext.length+hashsize;
215 bcopy(input->data, plaintext.data+confounder.length, input->length);
225 ret = krb5_hmac(context, kptr, &plaintext, &checksum);
227 ret = krb5_hmac(context, hash, kptr, 1, &plaintext, &checksum);
[all …]
/titanic_50/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/
H A Ddk_encrypt.c68 unsigned char *plaintext = NULL, *cn; in krb5_dk_encrypt() local
95 if ((plaintext = (unsigned char *) MALLOC(plainlen)) == NULL) { in krb5_dk_encrypt()
101 d1.data = (char *) plaintext; in krb5_dk_encrypt()
106 (void) memcpy(plaintext+blocksize, input->data, input->length); in krb5_dk_encrypt()
108 (void) memset(plaintext+blocksize+input->length, 0, in krb5_dk_encrypt()
113 d1.data = (char *) plaintext; in krb5_dk_encrypt()
157 FREE(plaintext, plainlen); in krb5_dk_encrypt()
232 unsigned char *plaintext, *cn; in krb5int_aes_dk_encrypt() local
258 if ((plaintext = (unsigned char *) MALLOC(plainlen)) == NULL) { in krb5int_aes_dk_encrypt()
263 d1.data = (char *)plaintext; in krb5int_aes_dk_encrypt()
[all …]
/titanic_50/usr/src/uts/common/crypto/api/
H A Dkcf_cipher.c319 crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, in crypto_encrypt_prov() argument
340 plaintext, ciphertext, tmpl); in crypto_encrypt_prov()
354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, in crypto_encrypt() argument
369 list, CRYPTO_FG_ENCRYPT_ATOMIC, plaintext->cd_length)) == NULL) { in crypto_encrypt()
402 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq)); in crypto_encrypt()
406 mech, key, plaintext, ciphertext, spi_ctx_tmpl); in crypto_encrypt()
473 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, in crypto_encrypt_update() argument
492 error = KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, in crypto_encrypt_update()
500 if (plaintext->cd_length < kcf_ctx->kc_mech->me_threshold && in crypto_encrypt_update()
508 ctx->cc_session, NULL, NULL, plaintext, ciphertext, NULL); in crypto_encrypt_update()
[all …]
H A Dkcf_dual.c2142 crypto_context_t encrypt_ctx, crypto_data_t *plaintext, in crypto_digest_encrypt_update() argument
2160 crypto_data_t *plaintext, crypto_call_req_t *crq) in crypto_decrypt_digest_update() argument
2176 crypto_context_t encrypt_ctx, crypto_data_t *plaintext, in crypto_sign_encrypt_update() argument
2194 crypto_data_t *plaintext, crypto_call_req_t *crq) in crypto_decrypt_verify_update() argument
/titanic_50/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/
H A Dk5_kmd5des.c163 unsigned char plaintext[CONFLENGTH + MD5_CKSUM_LENGTH]; in k5_md5des_verify() local
210 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify()
214 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify()
231 hash_input[i].data = (char *)plaintext; in k5_md5des_verify()
248 *valid = !bcmp((const void *)(plaintext+CONFLENGTH), in k5_md5des_verify()
251 *valid = !bcmp((const void *)plaintext, in k5_md5des_verify()
254 bzero((void *)plaintext, sizeof(plaintext)); in k5_md5des_verify()
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dk5_md5des.c162 unsigned char plaintext[CONFLENGTH+MD5_CKSUM_LENGTH]; in k5_md5des_verify() local
214 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify()
219 (krb5_pointer) plaintext, hash->length, in k5_md5des_verify()
238 (CK_BYTE_PTR)plaintext, (CK_ULONG)CONFLENGTH)) != CKR_OK) { in k5_md5des_verify()
263 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0); in k5_md5des_verify()
265 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0); in k5_md5des_verify()
267 (void) memset(plaintext, 0, sizeof(plaintext)); in k5_md5des_verify()
/titanic_50/usr/src/uts/common/sys/crypto/
H A Dimpl.h680 #define KCF_PROV_ENCRYPT(pd, ctx, plaintext, ciphertext, req) ( \ argument
682 KCF_PROV_CIPHER_OPS(pd)->encrypt(ctx, plaintext, ciphertext, req) : \
685 #define KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, ciphertext, req) ( \ argument
687 KCF_PROV_CIPHER_OPS(pd)->encrypt_update(ctx, plaintext, \
696 #define KCF_PROV_ENCRYPT_ATOMIC(pd, session, mech, key, plaintext, ciphertext, \ argument
700 (pd)->pd_prov_handle, session, mech, key, plaintext, ciphertext, \
710 #define KCF_PROV_DECRYPT(pd, ctx, ciphertext, plaintext, req) ( \ argument
712 KCF_PROV_CIPHER_OPS(pd)->decrypt(ctx, ciphertext, plaintext, req) : \
715 #define KCF_PROV_DECRYPT_UPDATE(pd, ctx, ciphertext, plaintext, req) ( \ argument
718 plaintext, req) : \
[all …]
H A Dapi.h169 extern int crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext,
181 crypto_data_t *plaintext, crypto_data_t *ciphertext,
190 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext,
202 crypto_data_t *ciphertext, crypto_data_t *plaintext,
204 extern int crypto_decrypt_final(crypto_context_t ctx, crypto_data_t *plaintext,
/titanic_50/usr/src/lib/crypt_modules/sha256/
H A Dcrypt_sha.c165 const char *plaintext, in crypt_genhash_impl() argument
201 plaintext_len = strlen(plaintext); in crypt_genhash_impl()
207 DIGESTUpdate(&ctxA, plaintext, plaintext_len); in crypt_genhash_impl()
214 DIGESTUpdate(&ctxB, plaintext, plaintext_len); in crypt_genhash_impl()
216 DIGESTUpdate(&ctxB, plaintext, plaintext_len); in crypt_genhash_impl()
229 DIGESTUpdate(&ctxA, plaintext, plaintext_len); in crypt_genhash_impl()
239 DIGESTUpdate(&ctxDP, plaintext, plaintext_len); in crypt_genhash_impl()
/titanic_50/usr/src/lib/crypt_modules/bsdbf/
H A Dbsdbf.c59 const char *plaintext, in crypt_genhash_impl() argument
63 (void) strlcpy(ctbuffer, bcrypt(plaintext, salt), ctbufflen); in crypt_genhash_impl()
/titanic_50/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto_ccmp.c231 const uint8_t *plaintext, int plain_len, in aes_ccm_encrypt() argument
266 d1.cd_raw.iov_base = (char *)plaintext; in aes_ccm_encrypt()
285 uint8_t *plaintext, int plain_len) in aes_ccm_decrypt() argument
325 d2.cd_raw.iov_base = (char *)plaintext; in aes_ccm_decrypt()
/titanic_50/usr/src/lib/crypt_modules/sunmd5/
H A Dsunmd5.c244 const char *plaintext, in crypt_genhash_impl() argument
310 MD5Update(&data.context, (uchar_t *)plaintext, strlen(plaintext)); in crypt_genhash_impl()
/titanic_50/usr/src/cmd/ssh/include/
H A Dcipher.h73 int plaintext; member
/titanic_50/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c548 KMF_DATA *plaintext, in PKCS_EncryptData() argument
619 in_data = plaintext->Data; in PKCS_EncryptData()
622 blocks = plaintext->Length/block_size; in PKCS_EncryptData()
651 if (plaintext->Length % block_size) { in PKCS_EncryptData()
663 in_len = plaintext->Length % block_size; in PKCS_EncryptData()
H A Dcertop.c1085 KMF_DATA *plaintext; in kmf_encrypt() local
1111 plaintext = kmf_get_attr_ptr(KMF_PLAINTEXT_DATA_ATTR, attrlist, in kmf_encrypt()
1116 if (cert == NULL || plaintext == NULL || ciphertext == NULL) in kmf_encrypt()
1156 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); in kmf_encrypt()
1183 KMF_DATA *plaintext = NULL; in kmf_decrypt() local
1227 plaintext = kmf_get_attr_ptr(KMF_PLAINTEXT_DATA_ATTR, attrlist, in kmf_decrypt()
1229 if (plaintext == NULL) in kmf_decrypt()
1266 ciphertext, plaintext); in kmf_decrypt()
/titanic_50/usr/src/lib/libc/port/gen/
H A Dcrypt.c144 crypt(const char *plaintext, const char *salt) in crypt() argument
164 return (_unix_crypt(plaintext, salt, ctbuffer)); in crypt()
188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer); in crypt()
191 plaintext, salt, (const char **)alg->a_params); in crypt()
/titanic_50/usr/src/cmd/ssh/libssh/common/
H A Dpacket.c518 if (!send_context.plaintext) { in packet_send1()
787 if (enc && !send_context.plaintext) { in packet_send2_wrapped()
1070 if (!receive_context.plaintext) { in packet_read_poll1()
H A Dcipher.c213 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); in cipher_init()

12