/osnet-11/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bsdbf.c | 59 const char *plaintext, 63 (void) strlcpy(ctbuffer, bcrypt(plaintext, salt), ctbufflen); 57 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | k5_md5des.c | 155 unsigned char plaintext[CONFLENGTH+MD5_CKSUM_LENGTH]; local 207 (krb5_pointer) plaintext, hash->length, 212 (krb5_pointer) plaintext, hash->length, 229 (CK_BYTE_PTR)plaintext, (CK_ULONG)CONFLENGTH)) != CKR_OK) { 248 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0); 250 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0); 252 (void) memset(plaintext, 0, sizeof(plaintext));
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | camellia-glue.c | 142 const byte plaintext[]= local 180 camellia_encrypt(&ctx,scratch,plaintext); 184 if(memcmp(scratch,plaintext,sizeof(plaintext))!=0) 188 camellia_encrypt(&ctx,scratch,plaintext); 192 if(memcmp(scratch,plaintext,sizeof(plaintext))!=0) 196 camellia_encrypt(&ctx,scratch,plaintext); 200 if(memcmp(scratch,plaintext,sizeof(plaintext))! [all...] |
H A D | seed.c | 444 static const byte plaintext[16] = { 458 seed_encrypt (&ctx, scratch, plaintext); 462 if (memcmp (scratch, plaintext, sizeof (plaintext))) 439 static const byte plaintext[16] = { local
|
H A D | camellia.c | 1403 const unsigned char *plaintext, 1409 tmp[0] = GETU32(plaintext); 1410 tmp[1] = GETU32(plaintext + 4); 1411 tmp[2] = GETU32(plaintext + 8); 1412 tmp[3] = GETU32(plaintext + 12); 1436 unsigned char *plaintext) 1457 PUTU32(plaintext, tmp[0]); 1458 PUTU32(plaintext + 4, tmp[1]); 1459 PUTU32(plaintext + 8, tmp[2]); 1460 PUTU32(plaintext 1402 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument 1433 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument [all...] |
H A D | twofish.c | 884 static byte plaintext[16] = { 912 twofish_encrypt (&ctx, scratch, plaintext); 916 if (memcmp (scratch, plaintext, sizeof (plaintext))) 875 static byte plaintext[16] = { local
|
H A D | rsa.c | 100 gcry_mpi_t plaintext = gcry_mpi_new (nbits); 109 /* Create a random plaintext. */ 110 gcry_mpi_randomize (plaintext, nbits, GCRY_WEAK_RANDOM); 113 public (ciphertext, plaintext, &pk); 115 /* Check that the cipher text does not match the plaintext. */ 116 if (!gcry_mpi_cmp (ciphertext, plaintext)) 117 goto leave; /* Ciphertext is identical to the plaintext. */ 122 /* Check that the decrypted plaintext matches the original plaintext. */ 123 if (gcry_mpi_cmp (decr_plaintext, plaintext)) 99 gcry_mpi_t plaintext = gcry_mpi_new (nbits); local 1184 gcry_mpi_t plaintext = NULL; local [all...] |
/osnet-11/usr/src/lib/crypt_modules/bsdmd5/ |
H A D | bsdmd5.c | 72 const char *plaintext, 100 MD5Update(&ctx, (uchar_t *)plaintext, strlen(plaintext)); 108 /* Then just as many characters of the MD5(plaintext,salt,plaintext) */ 110 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); 112 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext)); 114 for (pl = strlen(plaintext); p 70 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *switchsalt, const char **params) argument [all...] |
/osnet-11/usr/src/lib/crypt_modules/sha256/ |
H A D | crypt_sha.c | 165 const char *plaintext, 201 plaintext_len = strlen(plaintext); 207 DIGESTUpdate(&ctxA, plaintext, plaintext_len); 214 DIGESTUpdate(&ctxB, plaintext, plaintext_len); 216 DIGESTUpdate(&ctxB, plaintext, plaintext_len); 229 DIGESTUpdate(&ctxA, plaintext, plaintext_len); 239 DIGESTUpdate(&ctxDP, plaintext, plaintext_len); 163 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *switchsalt, const char **params) argument
|
/osnet-11/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 244 const char *plaintext, 308 /* update with the (hopefully entropic) plaintext */ 310 MD5Update(&data.context, (uchar_t *)plaintext, strlen(plaintext)); 242 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | camellia.c | 1405 const unsigned char *plaintext, 1411 tmp[0] = GETU32(plaintext); 1412 tmp[1] = GETU32(plaintext + 4); 1413 tmp[2] = GETU32(plaintext + 8); 1414 tmp[3] = GETU32(plaintext + 12); 1438 unsigned char *plaintext) 1459 PUTU32(plaintext, tmp[0]); 1460 PUTU32(plaintext + 4, tmp[1]); 1461 PUTU32(plaintext + 8, tmp[2]); 1462 PUTU32(plaintext 1404 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument 1435 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument [all...] |
H A D | rsa.c | 99 gcry_mpi_t plaintext = gcry_mpi_new (nbits); 108 /* Create a random plaintext. */ 109 gcry_mpi_randomize (plaintext, nbits, GCRY_WEAK_RANDOM); 112 public (ciphertext, plaintext, &pk); 114 /* Check that the cipher text does not match the plaintext. */ 115 if (!gcry_mpi_cmp (ciphertext, plaintext)) 116 goto leave; /* Ciphertext is identical to the plaintext. */ 121 /* Check that the decrypted plaintext matches the original plaintext. */ 122 if (gcry_mpi_cmp (decr_plaintext, plaintext)) 98 gcry_mpi_t plaintext = gcry_mpi_new (nbits); local [all...] |
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 556 KMF_DATA *plaintext, 627 in_data = plaintext->Data; 630 blocks = plaintext->Length/block_size; 659 if (plaintext->Length % block_size) { 671 in_len = plaintext->Length % block_size; 553 PKCS_EncryptData(KMF_HANDLE_T kmfh, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *plaintext, KMF_DATA *ciphertext) argument
|
H A D | certop.c | 1061 * Uses the public key from the cert to encrypt the plaintext 1068 * plaintext(input) - pointer to the plaintext to be encrypted 1088 KMF_DATA *plaintext; local 1114 plaintext = kmf_get_attr_ptr(KMF_PLAINTEXT_DATA_ATTR, attrlist, 1119 if (cert == NULL || plaintext == NULL || ciphertext == NULL) 1159 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); 1172 * the ciphertext into the plaintext. 1186 KMF_DATA *plaintext = NULL; local 1224 /* Get the ciphertext and plaintext attribute [all...] |
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 129 * as passwords. It generates the password hash given the plaintext and salt. 144 crypt(const char *plaintext, const char *salt) argument 164 return (_unix_crypt(plaintext, salt, ctbuffer)); 188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer); 191 plaintext, salt, (const char **)alg->a_params);
|
/osnet-11/usr/src/lib/libzpool/common/ |
H A D | kernel.c | 807 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, argument 811 if (plaintext->cd_format == CRYPTO_DATA_RAW && 813 bcopy(plaintext->cd_raw.iov_base, ciphertext->cd_raw.iov_base, 814 plaintext->cd_length); 815 } else if (plaintext->cd_format == CRYPTO_DATA_RAW && 817 bcopy(plaintext->cd_raw.iov_base, 819 plaintext->cd_length); 820 } else if (plaintext->cd_format == CRYPTO_DATA_UIO && 822 for (int i = 0; i < plaintext->cd_uio->uio_iovcnt; i++) { 823 bcopy(plaintext 835 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *cr) argument [all...] |