| /freebsd/crypto/openssl/test/ |
| H A D | sm2_internal_test.c | 146 uint8_t *ctext = NULL; in test_sm2_crypt() local 169 ctext = OPENSSL_zalloc(ctext_len); in test_sm2_crypt() 170 if (!TEST_ptr(ctext)) in test_sm2_crypt() 176 ctext, &ctext_len))) { in test_sm2_crypt() 182 if (!TEST_mem_eq(ctext, ctext_len, expected, ctext_len)) in test_sm2_crypt() 185 if (!TEST_true(ossl_sm2_plaintext_size(ctext, ctext_len, &ptext_len)) in test_sm2_crypt() 191 || !TEST_true(ossl_sm2_decrypt(key, digest, ctext, ctext_len, in test_sm2_crypt() 201 OPENSSL_free(ctext); in test_sm2_crypt()
|
| H A D | rsa_test.c | 190 static int rsa_setkey(RSA **key, unsigned char *ctext, int idx) in rsa_setkey() argument 198 clen = key1(*key, ctext); in rsa_setkey() 201 clen = key2(*key, ctext); in rsa_setkey() 204 clen = key3(*key, ctext); in rsa_setkey() 217 unsigned char ctext[256]; in test_rsa_simple() local 228 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, en_pad_type); in test_rsa_simple() 232 num = RSA_private_decrypt(num, ctext, ptext, key, de_pad_type); in test_rsa_simple()
|
| H A D | rsa_mp_test.c | 247 unsigned char ctext[256]; in test_rsa_mp() local 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, in test_rsa_mp() 274 num = RSA_private_decrypt(num, ctext, ptext, key, RSA_PKCS1_PADDING); in test_rsa_mp()
|
| /freebsd/crypto/openssl/providers/implementations/kem/ |
| H A D | ml_kem_kem.c | 146 static int ml_kem_encapsulate(void *vctx, unsigned char *ctext, size_t *clen, in ml_kem_encapsulate() argument 164 if (ctext == NULL) { in ml_kem_encapsulate() 204 ret = ossl_ml_kem_encap_seed(ctext, encap_clen, shsec, encap_slen, in ml_kem_encapsulate() 207 ret = ossl_ml_kem_encap_rand(ctext, encap_clen, shsec, encap_slen, key); in ml_kem_encapsulate() 225 const uint8_t *ctext, size_t clen) in ml_kem_decapsulate() argument 255 return ossl_ml_kem_decap(shsec, decap_slen, ctext, clen, key); in ml_kem_decapsulate()
|
| H A D | mlx_kem.c | 106 static int mlx_kem_encapsulate(void *vctx, unsigned char *ctext, size_t *clen, in mlx_kem_encapsulate() argument 126 if (ctext == NULL) { in mlx_kem_encapsulate() 168 cbuf = ctext + ml_kem_slot * key->xinfo->pubkey_bytes; in mlx_kem_encapsulate() 203 cbuf = ctext + (1 - ml_kem_slot) * key->minfo->ctext_bytes; in mlx_kem_encapsulate() 245 const uint8_t *ctext, size_t clen) in mlx_kem_decapsulate() argument 289 cbuf = ctext + ml_kem_slot * key->xinfo->pubkey_bytes; in mlx_kem_decapsulate() 307 cbuf = ctext + (1 - ml_kem_slot) * key->minfo->ctext_bytes; in mlx_kem_decapsulate()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | rd_cred.c | 43 decrypt_encpart(krb5_context context, krb5_enc_data *ctext, in decrypt_encpart() argument 53 return decode_krb5_enc_cred_part(&ctext->ciphertext, encpart_out); in decrypt_encpart() 55 ret = alloc_data(&plain, ctext->ciphertext.length); in decrypt_encpart() 60 KRB5_KEYUSAGE_KRB_CRED_ENCPART, 0, ctext, &plain); in decrypt_encpart() 65 KRB5_KEYUSAGE_KRB_CRED_ENCPART, 0, ctext, &plain); in decrypt_encpart()
|
| /freebsd/crypto/openssl/crypto/ml_kem/ |
| H A D | ml_kem.c | 741 const uint8_t *ctext, size_t len, in kdf() argument 746 && EVP_DigestUpdate(mdctx, ctext, len) in kdf() 1531 const uint8_t *ctext, scalar *u, const ML_KEM_KEY *key) in decrypt_cpa() argument 1539 vector_decode_decompress_ntt(u, ctext, du, rank); in decrypt_cpa() 1540 scalar_decode(&v, ctext + vinfo->u_vector_bytes, dv); in decrypt_cpa() 1758 static int encap(uint8_t *ctext, uint8_t secret[ML_KEM_SHARED_SECRET_BYTES], in encap() argument 1770 && encrypt_cpa(ctext, entropy, r, tmp, mdctx, key); in encap() 1794 const uint8_t *ctext, uint8_t *tmp_ctext, scalar *tmp, in decap() argument 1821 if (!kdf(failure_key, key->z, ctext, vinfo->ctext_bytes, mdctx, key)) { in decap() 1827 decrypt_cpa(decrypted, ctext, tmp, key); in decap() [all …]
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | ml_kem.h | 257 __owur int ossl_ml_kem_encap_seed(uint8_t *ctext, size_t clen, 261 __owur int ossl_ml_kem_encap_rand(uint8_t *ctext, size_t clen, 265 const uint8_t *ctext, size_t clen,
|
| /freebsd/crypto/openssl/providers/implementations/keymgmt/ |
| H A D | ml_kem_kmgmt.c | 76 unsigned char *ctext = NULL; in ml_kem_pairwise_test() local 105 ctext = OPENSSL_malloc(v->ctext_bytes); in ml_kem_pairwise_test() 106 if (ctext == NULL) in ml_kem_pairwise_test() 116 operation_result = ossl_ml_kem_encap_rand(ctext, v->ctext_bytes, in ml_kem_pairwise_test() 120 operation_result = ossl_ml_kem_encap_seed(ctext, v->ctext_bytes, in ml_kem_pairwise_test() 129 OSSL_SELF_TEST_oncorrupt_byte(st, ctext); in ml_kem_pairwise_test() 132 operation_result = ossl_ml_kem_decap(out, sizeof(out), ctext, v->ctext_bytes, in ml_kem_pairwise_test() 149 OPENSSL_free(ctext); in ml_kem_pairwise_test()
|
| /freebsd/libexec/phttpget/ |
| H A D | phttpget.c | 75 char *ctext, *pc; in b64enc() local 88 if ((ctext = malloc(ctlen)) == NULL) in b64enc() 90 ctext[ctlen - 1] = 0; in b64enc() 96 for (pt = ptext, pc = ctext; ptlen; ptlen -= 3, pc += 4) { in b64enc() 118 return (ctext); in b64enc()
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | unwrap.c | 210 krb5_key key, krb5_keyusage usage, const uint8_t *ctext, size_t len, in decrypt_v3() argument 226 cipher.ciphertext = make_data((uint8_t *)ctext, len); in decrypt_v3()
|
| /freebsd/crypto/openssl/providers/fips/ |
| H A D | self_test_data.inc | 3115 * -out ctext.dat 3117 * -secret goodcmp.dat -in ctext.dat
|