/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bsdbf.c | 59 const char *plaintext, 63 (void) strlcpy(ctbuffer, bcrypt(plaintext, salt), ctbufflen); 57 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | k5_md5des.c | 162 unsigned char plaintext[CONFLENGTH+MD5_CKSUM_LENGTH]; local 214 (krb5_pointer) plaintext, hash->length, 219 (krb5_pointer) plaintext, hash->length, 238 (CK_BYTE_PTR)plaintext, (CK_ULONG)CONFLENGTH)) != CKR_OK) { 263 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0); 265 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0); 267 (void) memset(plaintext, 0, sizeof(plaintext));
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local 156 plaintext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize); 157 plaintext.data=MALLOC(plaintext.length); 159 if (plaintext.data == NULL) { 167 bzero(plaintext.data, plaintext.length); 177 confounder.data=plaintext.data; 179 output->length = plaintext.length+hashsize; 215 bcopy(input->data, plaintext 280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; local [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | k5_kmd5des.c | 163 unsigned char plaintext[CONFLENGTH + MD5_CKSUM_LENGTH]; local 210 (krb5_pointer) plaintext, hash->length, 214 (krb5_pointer) plaintext, hash->length, 231 hash_input[i].data = (char *)plaintext; 248 *valid = !bcmp((const void *)(plaintext+CONFLENGTH), 251 *valid = !bcmp((const void *)plaintext, 254 bzero((void *)plaintext, sizeof(plaintext));
|
/illumos-gate/usr/src/lib/crypt_modules/bsdmd5/ |
H A D | bsdmd5.c | 72 const char *plaintext, 100 MD5Update(&ctx, (uchar_t *)plaintext, strlen(plaintext)); 108 /* Then just as many characters of the MD5(plaintext,salt,plaintext) */ 110 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); 112 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); 114 for (pl = strlen(plaintext); p 70 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *switchsalt, const char **params) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_encrypt.c | 68 unsigned char *plaintext = NULL, *cn; local 95 if ((plaintext = (unsigned char *) MALLOC(plainlen)) == NULL) { 99 /* put together the plaintext */ 101 d1.data = (char *) plaintext; 106 (void) memcpy(plaintext+blocksize, input->data, input->length); 108 (void) memset(plaintext+blocksize+input->length, 0, 111 /* encrypt the plaintext */ 113 d1.data = (char *) plaintext; 130 /* hash the plaintext */ 157 FREE(plaintext, plainle 232 unsigned char *plaintext, *cn; local [all...] |
/illumos-gate/usr/src/lib/crypt_modules/sha256/ |
H A D | crypt_sha.c | 165 const char *plaintext, 201 plaintext_len = strlen(plaintext); 207 DIGESTUpdate(&ctxA, plaintext, plaintext_len); 214 DIGESTUpdate(&ctxB, plaintext, plaintext_len); 216 DIGESTUpdate(&ctxB, plaintext, plaintext_len); 229 DIGESTUpdate(&ctxA, plaintext, plaintext_len); 239 DIGESTUpdate(&ctxDP, plaintext, plaintext_len); 163 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *switchsalt, const char **params) argument
|
/illumos-gate/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 244 const char *plaintext, 308 /* update with the (hopefully entropic) plaintext */ 310 MD5Update(&data.context, (uchar_t *)plaintext, strlen(plaintext)); 242 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_cipher.c | 60 * CRYPTO_INVALID_PLAINTEXT: bogus 'plaintext' argument. 296 * plaintext: The message to be encrypted 298 * depends on the mechanism, and the plaintext's size. 306 * single-part encryption of 'plaintext' with the mechanism 'mech', using 319 crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, 340 plaintext, ciphertext, tmpl); 354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, argument 369 list, CRYPTO_FG_ENCRYPT_ATOMIC, plaintext->cd_length)) == NULL) { 402 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq)); 406 mech, key, plaintext, ciphertex 318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 473 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 755 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 815 crypto_decrypt_final(crypto_context_t context, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 852 crypto_encrypt_single(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 887 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument [all...] |
H A D | kcf_dual.c | 2098 /* Get the last chunk of plaintext */ 2142 crypto_context_t encrypt_ctx, crypto_data_t *plaintext, 2160 crypto_data_t *plaintext, crypto_call_req_t *crq) 2176 crypto_context_t encrypt_ctx, crypto_data_t *plaintext, 2194 crypto_data_t *plaintext, crypto_call_req_t *crq) 2141 crypto_digest_encrypt_update(crypto_context_t digest_ctx, crypto_context_t encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 2158 crypto_decrypt_digest_update(crypto_context_t decryptctx, crypto_context_t encrypt_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 2175 crypto_sign_encrypt_update(crypto_context_t sign_ctx, crypto_context_t encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 2192 crypto_decrypt_verify_update(crypto_context_t decrypt_ctx, crypto_context_t verify_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | blowfish.c | 336 blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 348 if ((plaintext->cd_length & (BLOWFISH_BLOCK_LEN - 1)) != 0) 354 BLOWFISH_ARG_INPLACE(plaintext, ciphertext); 360 if (ciphertext->cd_length < plaintext->cd_length) { 361 ciphertext->cd_length = plaintext->cd_length; 368 ret = blowfish_encrypt_update(ctx, plaintext, ciphertext, req); 379 crypto_data_t *plaintext, crypto_req_handle_t req) 396 BLOWFISH_ARG_INPLACE(ciphertext, plaintext); 402 if (plaintext->cd_length < ciphertext->cd_length) { 403 plaintext 378 blowfish_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 420 blowfish_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 483 blowfish_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 594 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 681 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | aes.c | 405 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 417 * For block ciphers, plaintext must be a multiple of AES block size. 421 == 0) && (plaintext->cd_length & (AES_BLOCK_LEN - 1)) != 0) 424 AES_ARG_INPLACE(plaintext, ciphertext); 432 length_needed = plaintext->cd_length + aes_ctx->ac_mac_len; 435 length_needed = plaintext->cd_length + aes_ctx->ac_tag_len; 438 if (plaintext->cd_length != 0) 444 length_needed = plaintext->cd_length; 458 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req); 483 if (plaintext ! 520 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 635 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 710 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 959 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1089 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | rsa.c | 523 rsaprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 532 RSA_ARG_INPLACE(plaintext, ciphertext); 540 rv = rsa_encrypt_common(ctxp->mech_type, ctxp->key, plaintext, 553 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, 560 RSA_ARG_INPLACE(plaintext, ciphertext); 562 return (rsa_encrypt_common(mechanism->cm_type, key, plaintext, 589 crypto_data_t *plaintext, crypto_data_t *ciphertext) 606 plen = plaintext->cd_length; 623 ASSERT(plaintext->cd_length <= sizeof (tmp_data)); 624 if ((rv = crypto_get_input_data(plaintext, 551 rsa_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 588 rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument 695 rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 718 rsa_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 734 rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument [all...] |
H A D | dca.c | 3727 dca_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 3743 ciphertext = plaintext; 3749 error = dca_3des(ctx, plaintext, ciphertext, req, DR_ENCRYPT); 3752 error = dca_3des(ctx, plaintext, ciphertext, req, 3757 error = dca_rsastart(ctx, plaintext, ciphertext, req, 3779 dca_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 3795 ciphertext = plaintext; 3801 error = dca_3desupdate(ctx, plaintext, ciphertext, req, 3805 error = dca_3desupdate(ctx, plaintext, ciphertext, req, 3858 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_ 3856 dca_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3949 dca_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4002 dca_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4045 dca_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4079 dca_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument [all...] |
H A D | dprov.c | 2370 dprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 2384 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); 2394 dprov_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 2409 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); 2445 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, 2467 req, mechanism, key, plaintext, ciphertext, NULL, session_id, 2512 crypto_data_t *plaintext, crypto_req_handle_t req) 2526 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); 2537 crypto_data_t *plaintext, crypto_req_handle_t req) 2551 req, NULL, NULL, plaintext, ciphertex 2443 dprov_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2511 dprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 2536 dprov_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 2561 dprov_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_req_handle_t req) argument 2585 dprov_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3093 dprov_digest_encrypt_update(crypto_ctx_t *digest_ctx, crypto_ctx_t *encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3121 dprov_decrypt_digest_update(crypto_ctx_t *decrypt_ctx, crypto_ctx_t *digest_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3149 dprov_sign_encrypt_update(crypto_ctx_t *sign_ctx, crypto_ctx_t *encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3177 dprov_decrypt_verify_update(crypto_ctx_t *decrypt_ctx, crypto_ctx_t *verify_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3254 dprov_encrypt_mac(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_req_handle_t req) argument 3282 dprov_encrypt_mac_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_req_handle_t req) argument 3333 dprov_encrypt_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *encrypt_mech, crypto_key_t *encrypt_key, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_spi_ctx_template_t encr_ctx_template, crypto_spi_ctx_template_t mac_ctx_template, crypto_req_handle_t req) argument 3425 dprov_mac_decrypt(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3450 dprov_mac_decrypt_update(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3475 dprov_mac_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *mac, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3500 dprov_mac_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_mechanism_t *decrypt_mech, crypto_key_t *decrypt_key, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_spi_ctx_template_t mac_ctx_template, crypto_spi_ctx_template_t decr_ctx_template, crypto_req_handle_t req) argument 3547 dprov_mac_verify_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_mechanism_t *decrypt_mech, crypto_key_t *decrypt_key, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_spi_ctx_template_t mac_ctx_template, crypto_spi_ctx_template_t decr_ctx_template, crypto_req_handle_t req) argument 5146 dprov_dual_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_ctx_t *signverify_ctx, crypto_ctx_t *cipher_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument 5202 dprov_cipher_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument 7800 crypto_data_t plaintext; local 7923 crypto_data_t plaintext; local [all...] |
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 231 const uint8_t *plaintext, int plain_len, 266 d1.cd_raw.iov_base = (char *)plaintext; 285 uint8_t *plaintext, int plain_len) 325 d2.cd_raw.iov_base = (char *)plaintext; 230 aes_ccm_encrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, const uint8_t *plaintext, int plain_len, uint8_t *ciphertext, int cipher_len) argument 283 aes_ccm_decrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, const uint8_t *ciphertext, int cipher_len, uint8_t *plaintext, int plain_len) argument
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 548 KMF_DATA *plaintext, 619 in_data = plaintext->Data; 622 blocks = plaintext->Length/block_size; 651 if (plaintext->Length % block_size) { 663 in_len = plaintext->Length % block_size; 545 PKCS_EncryptData(KMF_HANDLE_T kmfh, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *plaintext, KMF_DATA *ciphertext) argument
|
H A D | certop.c | 1058 * Uses the public key from the cert to encrypt the plaintext 1065 * plaintext(input) - pointer to the plaintext to be encrypted 1085 KMF_DATA *plaintext; local 1111 plaintext = kmf_get_attr_ptr(KMF_PLAINTEXT_DATA_ATTR, attrlist, 1116 if (cert == NULL || plaintext == NULL || ciphertext == NULL) 1156 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); 1169 * the ciphertext into the plaintext. 1183 KMF_DATA *plaintext = NULL; local 1221 /* Get the ciphertext and plaintext attribute [all...] |
/illumos-gate/usr/src/uts/common/des/ |
H A D | des_crypt.c | 529 des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 541 if ((plaintext->cd_length & (DES_BLOCK_LEN - 1)) != 0) 547 DES_ARG_INPLACE(plaintext, ciphertext); 553 if (ciphertext->cd_length < plaintext->cd_length) { 554 ciphertext->cd_length = plaintext->cd_length; 561 ret = des_encrypt_update(ctx, plaintext, ciphertext, req); 572 crypto_data_t *plaintext, crypto_req_handle_t req) 589 DES_ARG_INPLACE(ciphertext, plaintext); 595 if (plaintext->cd_length < ciphertext->cd_length) { 596 plaintext 571 des_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 613 des_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 675 des_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 761 des_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_req_handle_t req) argument 785 des_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 888 des_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 129 * as passwords. It generates the password hash given the plaintext and salt. 144 crypt(const char *plaintext, const char *salt) argument 164 return (_unix_crypt(plaintext, salt, ctbuffer)); 188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer); 191 plaintext, salt, (const char **)alg->a_params);
|
/illumos-gate/usr/src/uts/common/io/ |
H A D | lofi.c | 897 lofi_crypto(struct lofi_state *lsp, struct buf *bp, caddr_t plaintext, argument 911 SETUP_C_DATA(cdata, plaintext, len);
|