Searched defs:cipher (Results 1 - 21 of 21) sorted by relevance

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
39 cipher->ciphertext.length = enclen;
42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) {
43 cipher->ciphertext.length = 0;
46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
48 free(cipher->ciphertext.data);
49 cipher->ciphertext.data = NULL;
/illumos-gate/usr/src/common/net/wanboot/crypt/
H A Daes_test.c33 * is the expected cipher. Then decrypts the cipher and verifies that the
48 char cipher[AES_BLOCK_SIZE * 2]; member in struct:test_data
71 unsigned char cipher[AES_BLOCK_SIZE]; local
93 getxdata(cipher, td[i].cipher, AES_BLOCK_SIZE);
98 if (bcmp(work, cipher, AES_BLOCK_SIZE) != 0) {
H A Ddes3_test.c33 * key and verifies the result against the cipher value. Then decrypts
34 * the cipher and compares the result against the plain value.
52 char cipher[DES3_BLOCK_SIZE * 2]; member in struct:test_data
114 unsigned char cipher[DES3_BLOCK_SIZE]; local
138 getxdata(cipher, td[i].cipher, DES3_BLOCK_SIZE);
143 if (bcmp(work, cipher, DES3_BLOCK_SIZE) != 0) {
/illumos-gate/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c81 krb5_enc_data cipher; local
90 cipher.enctype = ENCTYPE_UNKNOWN;
91 cipher.ciphertext.length = key_data->key_data_length[0]-2;
92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
99 &cipher, &plain))) {
H A Dencrypt_key.c84 krb5_enc_data cipher; local
116 cipher.ciphertext.length = len;
117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
120 &plain, &cipher))) {
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Ddriver_wifi.c196 dladm_wlan_cipher_t cipher; local
207 cipher = DLADM_WLAN_CIPHER_WEP;
211 cipher = DLADM_WLAN_CIPHER_TKIP;
215 cipher = DLADM_WLAN_CIPHER_AES_CCM;
235 status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx,
293 * NB: Don't need to set the freq or cipher-related state as
H A Dwpa_enc.c28 * @cipher: wrapped key, (n + 1) * 64 bit
31 aes_wrap(uint8_t *kek, int n, uint8_t *plain, uint8_t *cipher) argument
37 a = cipher;
38 r = cipher + 8;
55 r = cipher + 8;
70 * These are already in @cipher due to the location of temporary
78 * @cipher: wrapped key to be unwrapped, (n + 1) * 64 bit
82 aes_unwrap(uint8_t *kek, int n, uint8_t *cipher, uint8_t *plain) argument
89 (void) memcpy(a, cipher, 8);
91 (void) memcpy(r, cipher
[all...]
/illumos-gate/usr/src/uts/common/des/
H A Ddes_soft.c316 * Do a cipher step
319 #define cipher(iter, inR, inL, outR, outL) { \ macro
333 cipher(0, r0, l0, r1, l1);
334 cipher(1, r1, l1, r0, l0);
335 cipher(2, r0, l0, r1, l1);
336 cipher(3, r1, l1, r0, l0);
337 cipher(4, r0, l0, r1, l1);
338 cipher(5, r1, l1, r0, l0);
339 cipher(6, r0, l0, r1, l1);
340 cipher(
[all...]
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto.c55 * Table of registered cipher modules.
116 * Establish a relationship between the specified key and cipher
129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, argument
138 * Validate cipher and set reference to cipher routines.
140 if (cipher >= IEEE80211_CIPHER_MAX) {
142 "invalid cipher %u\n", cipher);
145 cip = ic->ic_ciphers[cipher];
149 "unable to load cipher
360 uint32_t cipher; local
[all...]
/illumos-gate/usr/src/lib/libcrypt/common/
H A Ddes_soft.c358 * Do a cipher step
361 #define cipher(iter, inR, inL, outR, outL) { \ macro
375 cipher(0, r0, l0, r1, l1);
376 cipher(1, r1, l1, r0, l0);
377 cipher(2, r0, l0, r1, l1);
378 cipher(3, r1, l1, r0, l0);
379 cipher(4, r0, l0, r1, l1);
380 cipher(5, r1, l1, r0, l0);
381 cipher(6, r0, l0, r1, l1);
382 cipher(
[all...]
/illumos-gate/usr/src/lib/libnsl/des/
H A Ddes_soft.c393 * Do a cipher step
396 #define cipher(iter, inR, inL, outR, outL) { \ macro
410 cipher(0, r0, l0, r1, l1);
411 cipher(1, r1, l1, r0, l0);
412 cipher(2, r0, l0, r1, l1);
413 cipher(3, r1, l1, r0, l0);
414 cipher(4, r0, l0, r1, l1);
415 cipher(5, r1, l1, r0, l0);
416 cipher(6, r0, l0, r1, l1);
417 cipher(
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dk5sealv3.c145 krb5_enc_data cipher; local
202 cipher.ciphertext.data = (char *)outbuf + 16;
203 cipher.ciphertext.length = bufsize - 16;
204 cipher.enctype = key->enctype;
205 err = krb5_c_encrypt(context, key, key_usage, 0, &plain, &cipher);
442 krb5_enc_data cipher; local
452 cipher.enctype = key->enctype;
453 cipher.ciphertext.length = bodysize - 16;
454 cipher.ciphertext.data = (char *)ptr + 16;
460 &cipher,
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c60 krb5_data cipher, clear; local
81 cipher.length = 0;
82 cipher.data = NULL;
333 cipher.length = (req->data + req->length) - ptr;
334 cipher.data = ptr;
336 if (ret = krb5_rd_priv(context, auth_context, &cipher,
431 cipher.length = 0;
442 &cipher, &replay)) {
455 if (cipher.length == 0) {
492 ret = krb5_mk_error(context, &krberror, &cipher);
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.c53 cipher_proc cipher; /* Routine to en/decrypt with */ member in struct:cipher_entry
69 * Return the length produced by using cipher entry c given the supplied len
117 /* For each key do the appropriate cipher */
149 * DesN crypt packaged for use as a cipher entry
183 * Package up plain des cbc crypt for use as a cipher entry.
225 gss_buffer_desc buf; /* GSS buffer to hold keys for cipher routine */
380 * is null, the the v->signer->cipher routine will not be called
383 stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig);
400 cipher_proc cipher; /* cipher routin local
[all...]
/illumos-gate/usr/src/uts/common/io/zyd/
H A Dzyd.h223 uint8_t cipher; member in struct:zyd_rx_stat
/illumos-gate/usr/src/lib/libdladm/common/
H A Dlibdlwlan.c1516 dladm_wlan_cipher_t cipher, const dladm_wlan_bssid_t *addr,
1523 switch (cipher) {
1515 dladm_wlan_wpa_set_key(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_cipher_t cipher, const dladm_wlan_bssid_t *addr, boolean_t set_tx, uint64_t seq, uint_t key_idx, uint8_t *key, uint_t key_len) argument
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_preauth.c2117 krb5_enc_data cipher; local
2125 cipher.ciphertext.length = 8;
2126 cipher.ciphertext.data = outputblock;
2129 /* XXX */ 0, 0, &plain, &cipher))) {
/illumos-gate/usr/src/cmd/lofiadm/
H A Dmain.c120 * A cipher without an iv requirement would look like this:
128 /* Preferred cipher, if one isn't specified on command line. */
423 mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly,
433 if (cipher != NULL) {
436 (void) strlcpy(li.li_cipher, cipher->name,
444 li.li_iv_type = cipher->iv_type;
445 li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */
446 switch (cipher->iv_type) {
448 (void) strlcpy(li.li_iv_cipher, cipher->iv_name,
625 * Verify the cipher selecte
422 add_mapping(int lfd, const char *devicename, const char *filename, mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly, boolean_t label) argument
647 kernel_cipher_check(mech_alias_t *cipher) argument
903 getkeyfromuser(mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz, boolean_t with_confirmation) argument
972 getkeyfromfile(const char *pathname, mech_alias_t *cipher, char **key, size_t *ksz) argument
1057 getkeyfromtoken(CK_SESSION_HANDLE sess, token_spec_t *token, const char *keyfile, mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument
1228 mech_alias_t *cipher; local
1311 init_crypto(token_spec_t *token, mech_alias_t *cipher, CK_SESSION_HANDLE_PTR sess) argument
1927 mech_alias_t *cipher = NULL; local
[all...]
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c156 /* function definitions for cipher encode/decode */
194 struct digest_cipher *cipher; member in struct:reauth_entry::__anon4339::__anon4341
2567 struct digest_cipher *cipher; local
2592 cipher = available_ciphers1;
2594 cipher = available_ciphers;
2596 while (cipher->name) {
2597 /* do we allow this particular cipher? */
2598 if (stext->requiressf <= cipher->ssf &&
2599 stext->limitssf >= cipher->ssf) {
2606 if(strlen(cipheropts) + strlen(cipher
2863 char *cipher = NULL; local
3794 struct digest_cipher *cipher; member in struct:client_context
4337 struct digest_cipher *cipher = available_ciphers1; local
4339 struct digest_cipher *cipher = available_ciphers; local
4509 struct digest_cipher *cipher; local
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Dcrypto.c92 static int cipher(dev_t, caddr_t, int, int (*)(crypto_context_t,
2726 return (cipher(dev, arg, mode, crypto_encrypt_single));
2733 return (cipher(dev, arg, mode, crypto_decrypt_single));
2741 cipher(dev_t dev, caddr_t arg, int mode, function
2761 cmn_err(CE_WARN, "cipher: failed holding minor");
2787 cmn_err(CE_NOTE, "cipher: buffer greater than %ld bytes, "
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c1536 const EVP_CIPHER *cipher = NULL; local
1570 cipher = EVP_des_ede3_cbc();
1597 p7 = PKCS7_encrypt(encerts, in, cipher, flags);

Completed in 162 milliseconds