Searched defs:plaintext (Results 1 - 16 of 16) sorted by relevance

/osnet-11/usr/src/lib/crypt_modules/bsdbf/
H A Dbsdbf.c59 const char *plaintext,
63 (void) strlcpy(ctbuffer, bcrypt(plaintext, salt), ctbufflen);
57 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dk5_md5des.c155 unsigned char plaintext[CONFLENGTH+MD5_CKSUM_LENGTH]; local
207 (krb5_pointer) plaintext, hash->length,
212 (krb5_pointer) plaintext, hash->length,
229 (CK_BYTE_PTR)plaintext, (CK_ULONG)CONFLENGTH)) != CKR_OK) {
248 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0);
250 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0);
252 (void) memset(plaintext, 0, sizeof(plaintext));
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dcamellia-glue.c142 const byte plaintext[]= local
180 camellia_encrypt(&ctx,scratch,plaintext);
184 if(memcmp(scratch,plaintext,sizeof(plaintext))!=0)
188 camellia_encrypt(&ctx,scratch,plaintext);
192 if(memcmp(scratch,plaintext,sizeof(plaintext))!=0)
196 camellia_encrypt(&ctx,scratch,plaintext);
200 if(memcmp(scratch,plaintext,sizeof(plaintext))!
[all...]
H A Dseed.c444 static const byte plaintext[16] = {
458 seed_encrypt (&ctx, scratch, plaintext);
462 if (memcmp (scratch, plaintext, sizeof (plaintext)))
439 static const byte plaintext[16] = { local
H A Dcamellia.c1403 const unsigned char *plaintext,
1409 tmp[0] = GETU32(plaintext);
1410 tmp[1] = GETU32(plaintext + 4);
1411 tmp[2] = GETU32(plaintext + 8);
1412 tmp[3] = GETU32(plaintext + 12);
1436 unsigned char *plaintext)
1457 PUTU32(plaintext, tmp[0]);
1458 PUTU32(plaintext + 4, tmp[1]);
1459 PUTU32(plaintext + 8, tmp[2]);
1460 PUTU32(plaintext
1402 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument
1433 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument
[all...]
H A Dtwofish.c884 static byte plaintext[16] = {
912 twofish_encrypt (&ctx, scratch, plaintext);
916 if (memcmp (scratch, plaintext, sizeof (plaintext)))
875 static byte plaintext[16] = { local
H A Drsa.c100 gcry_mpi_t plaintext = gcry_mpi_new (nbits);
109 /* Create a random plaintext. */
110 gcry_mpi_randomize (plaintext, nbits, GCRY_WEAK_RANDOM);
113 public (ciphertext, plaintext, &pk);
115 /* Check that the cipher text does not match the plaintext. */
116 if (!gcry_mpi_cmp (ciphertext, plaintext))
117 goto leave; /* Ciphertext is identical to the plaintext. */
122 /* Check that the decrypted plaintext matches the original plaintext. */
123 if (gcry_mpi_cmp (decr_plaintext, plaintext))
99 gcry_mpi_t plaintext = gcry_mpi_new (nbits); local
1184 gcry_mpi_t plaintext = NULL; local
[all...]
/osnet-11/usr/src/lib/crypt_modules/bsdmd5/
H A Dbsdmd5.c72 const char *plaintext,
100 MD5Update(&ctx, (uchar_t *)plaintext, strlen(plaintext));
108 /* Then just as many characters of the MD5(plaintext,salt,plaintext) */
110 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext));
112 MD5Update(&ctx1, (uchar_t *)plaintext, strlen(plaintext));
114 for (pl = strlen(plaintext); p
70 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *switchsalt, const char **params) argument
[all...]
/osnet-11/usr/src/lib/crypt_modules/sha256/
H A Dcrypt_sha.c165 const char *plaintext,
201 plaintext_len = strlen(plaintext);
207 DIGESTUpdate(&ctxA, plaintext, plaintext_len);
214 DIGESTUpdate(&ctxB, plaintext, plaintext_len);
216 DIGESTUpdate(&ctxB, plaintext, plaintext_len);
229 DIGESTUpdate(&ctxA, plaintext, plaintext_len);
239 DIGESTUpdate(&ctxDP, plaintext, plaintext_len);
163 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *switchsalt, const char **params) argument
/osnet-11/usr/src/lib/crypt_modules/sunmd5/
H A Dsunmd5.c244 const char *plaintext,
308 /* update with the (hopefully entropic) plaintext */
310 MD5Update(&data.context, (uchar_t *)plaintext, strlen(plaintext));
242 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Dcamellia.c1405 const unsigned char *plaintext,
1411 tmp[0] = GETU32(plaintext);
1412 tmp[1] = GETU32(plaintext + 4);
1413 tmp[2] = GETU32(plaintext + 8);
1414 tmp[3] = GETU32(plaintext + 12);
1438 unsigned char *plaintext)
1459 PUTU32(plaintext, tmp[0]);
1460 PUTU32(plaintext + 4, tmp[1]);
1461 PUTU32(plaintext + 8, tmp[2]);
1462 PUTU32(plaintext
1404 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument
1435 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument
[all...]
H A Drsa.c99 gcry_mpi_t plaintext = gcry_mpi_new (nbits);
108 /* Create a random plaintext. */
109 gcry_mpi_randomize (plaintext, nbits, GCRY_WEAK_RANDOM);
112 public (ciphertext, plaintext, &pk);
114 /* Check that the cipher text does not match the plaintext. */
115 if (!gcry_mpi_cmp (ciphertext, plaintext))
116 goto leave; /* Ciphertext is identical to the plaintext. */
121 /* Check that the decrypted plaintext matches the original plaintext. */
122 if (gcry_mpi_cmp (decr_plaintext, plaintext))
98 gcry_mpi_t plaintext = gcry_mpi_new (nbits); local
[all...]
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c556 KMF_DATA *plaintext,
627 in_data = plaintext->Data;
630 blocks = plaintext->Length/block_size;
659 if (plaintext->Length % block_size) {
671 in_len = plaintext->Length % block_size;
553 PKCS_EncryptData(KMF_HANDLE_T kmfh, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *plaintext, KMF_DATA *ciphertext) argument
H A Dcertop.c1061 * Uses the public key from the cert to encrypt the plaintext
1068 * plaintext(input) - pointer to the plaintext to be encrypted
1088 KMF_DATA *plaintext; local
1114 plaintext = kmf_get_attr_ptr(KMF_PLAINTEXT_DATA_ATTR, attrlist,
1119 if (cert == NULL || plaintext == NULL || ciphertext == NULL)
1159 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext);
1172 * the ciphertext into the plaintext.
1186 KMF_DATA *plaintext = NULL; local
1224 /* Get the ciphertext and plaintext attribute
[all...]
/osnet-11/usr/src/lib/libc/port/gen/
H A Dcrypt.c129 * as passwords. It generates the password hash given the plaintext and salt.
144 crypt(const char *plaintext, const char *salt) argument
164 return (_unix_crypt(plaintext, salt, ctbuffer));
188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer);
191 plaintext, salt, (const char **)alg->a_params);
/osnet-11/usr/src/lib/libzpool/common/
H A Dkernel.c807 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, argument
811 if (plaintext->cd_format == CRYPTO_DATA_RAW &&
813 bcopy(plaintext->cd_raw.iov_base, ciphertext->cd_raw.iov_base,
814 plaintext->cd_length);
815 } else if (plaintext->cd_format == CRYPTO_DATA_RAW &&
817 bcopy(plaintext->cd_raw.iov_base,
819 plaintext->cd_length);
820 } else if (plaintext->cd_format == CRYPTO_DATA_UIO &&
822 for (int i = 0; i < plaintext->cd_uio->uio_iovcnt; i++) {
823 bcopy(plaintext
835 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *cr) argument
[all...]

Completed in 88 milliseconds