/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument 39 cipher->ciphertext.length = enclen; 42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { 43 cipher->ciphertext.length = 0; 46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); 48 free(cipher->ciphertext.data); 49 cipher->ciphertext.data = NULL;
|
/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | aes_test.c | 33 * is the expected cipher. Then decrypts the cipher and verifies that the 48 char cipher[AES_BLOCK_SIZE * 2]; member in struct:test_data 71 unsigned char cipher[AES_BLOCK_SIZE]; local 93 getxdata(cipher, td[i].cipher, AES_BLOCK_SIZE); 98 if (bcmp(work, cipher, AES_BLOCK_SIZE) != 0) {
|
H A D | des3_test.c | 33 * key and verifies the result against the cipher value. Then decrypts 34 * the cipher and compares the result against the plain value. 52 char cipher[DES3_BLOCK_SIZE * 2]; member in struct:test_data 114 unsigned char cipher[DES3_BLOCK_SIZE]; local 138 getxdata(cipher, td[i].cipher, DES3_BLOCK_SIZE); 143 if (bcmp(work, cipher, DES3_BLOCK_SIZE) != 0) {
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 81 krb5_enc_data cipher; local 90 cipher.enctype = ENCTYPE_UNKNOWN; 91 cipher.ciphertext.length = key_data->key_data_length[0]-2; 92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ 99 &cipher, &plain))) {
|
H A D | encrypt_key.c | 84 krb5_enc_data cipher; local 116 cipher.ciphertext.length = len; 117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ 120 &plain, &cipher))) {
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | driver_wifi.c | 196 dladm_wlan_cipher_t cipher; local 207 cipher = DLADM_WLAN_CIPHER_WEP; 211 cipher = DLADM_WLAN_CIPHER_TKIP; 215 cipher = DLADM_WLAN_CIPHER_AES_CCM; 235 status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx, 293 * NB: Don't need to set the freq or cipher-related state as
|
H A D | wpa_enc.c | 28 * @cipher: wrapped key, (n + 1) * 64 bit 31 aes_wrap(uint8_t *kek, int n, uint8_t *plain, uint8_t *cipher) argument 37 a = cipher; 38 r = cipher + 8; 55 r = cipher + 8; 70 * These are already in @cipher due to the location of temporary 78 * @cipher: wrapped key to be unwrapped, (n + 1) * 64 bit 82 aes_unwrap(uint8_t *kek, int n, uint8_t *cipher, uint8_t *plain) argument 89 (void) memcpy(a, cipher, 8); 91 (void) memcpy(r, cipher [all...] |
/illumos-gate/usr/src/uts/common/des/ |
H A D | des_soft.c | 316 * Do a cipher step 319 #define cipher(iter, inR, inL, outR, outL) { \ macro 333 cipher(0, r0, l0, r1, l1); 334 cipher(1, r1, l1, r0, l0); 335 cipher(2, r0, l0, r1, l1); 336 cipher(3, r1, l1, r0, l0); 337 cipher(4, r0, l0, r1, l1); 338 cipher(5, r1, l1, r0, l0); 339 cipher(6, r0, l0, r1, l1); 340 cipher( [all...] |
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto.c | 55 * Table of registered cipher modules. 116 * Establish a relationship between the specified key and cipher 129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, argument 138 * Validate cipher and set reference to cipher routines. 140 if (cipher >= IEEE80211_CIPHER_MAX) { 142 "invalid cipher %u\n", cipher); 145 cip = ic->ic_ciphers[cipher]; 149 "unable to load cipher 360 uint32_t cipher; local [all...] |
/illumos-gate/usr/src/lib/libcrypt/common/ |
H A D | des_soft.c | 358 * Do a cipher step 361 #define cipher(iter, inR, inL, outR, outL) { \ macro 375 cipher(0, r0, l0, r1, l1); 376 cipher(1, r1, l1, r0, l0); 377 cipher(2, r0, l0, r1, l1); 378 cipher(3, r1, l1, r0, l0); 379 cipher(4, r0, l0, r1, l1); 380 cipher(5, r1, l1, r0, l0); 381 cipher(6, r0, l0, r1, l1); 382 cipher( [all...] |
/illumos-gate/usr/src/lib/libnsl/des/ |
H A D | des_soft.c | 393 * Do a cipher step 396 #define cipher(iter, inR, inL, outR, outL) { \ macro 410 cipher(0, r0, l0, r1, l1); 411 cipher(1, r1, l1, r0, l0); 412 cipher(2, r0, l0, r1, l1); 413 cipher(3, r1, l1, r0, l0); 414 cipher(4, r0, l0, r1, l1); 415 cipher(5, r1, l1, r0, l0); 416 cipher(6, r0, l0, r1, l1); 417 cipher( [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5sealv3.c | 145 krb5_enc_data cipher; local 202 cipher.ciphertext.data = (char *)outbuf + 16; 203 cipher.ciphertext.length = bufsize - 16; 204 cipher.enctype = key->enctype; 205 err = krb5_c_encrypt(context, key, key_usage, 0, &plain, &cipher); 442 krb5_enc_data cipher; local 452 cipher.enctype = key->enctype; 453 cipher.ciphertext.length = bodysize - 16; 454 cipher.ciphertext.data = (char *)ptr + 16; 460 &cipher, [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 60 krb5_data cipher, clear; local 81 cipher.length = 0; 82 cipher.data = NULL; 333 cipher.length = (req->data + req->length) - ptr; 334 cipher.data = ptr; 336 if (ret = krb5_rd_priv(context, auth_context, &cipher, 431 cipher.length = 0; 442 &cipher, &replay)) { 455 if (cipher.length == 0) { 492 ret = krb5_mk_error(context, &krberror, &cipher); [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 53 cipher_proc cipher; /* Routine to en/decrypt with */ member in struct:cipher_entry 69 * Return the length produced by using cipher entry c given the supplied len 117 /* For each key do the appropriate cipher */ 149 * DesN crypt packaged for use as a cipher entry 183 * Package up plain des cbc crypt for use as a cipher entry. 225 gss_buffer_desc buf; /* GSS buffer to hold keys for cipher routine */ 380 * is null, the the v->signer->cipher routine will not be called 383 stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig); 400 cipher_proc cipher; /* cipher routin local [all...] |
/illumos-gate/usr/src/uts/common/io/zyd/ |
H A D | zyd.h | 223 uint8_t cipher; member in struct:zyd_rx_stat
|
/illumos-gate/usr/src/lib/libdladm/common/ |
H A D | libdlwlan.c | 1516 dladm_wlan_cipher_t cipher, const dladm_wlan_bssid_t *addr, 1523 switch (cipher) { 1515 dladm_wlan_wpa_set_key(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_cipher_t cipher, const dladm_wlan_bssid_t *addr, boolean_t set_tx, uint64_t seq, uint_t key_idx, uint8_t *key, uint_t key_len) argument
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 2117 krb5_enc_data cipher; local 2125 cipher.ciphertext.length = 8; 2126 cipher.ciphertext.data = outputblock; 2129 /* XXX */ 0, 0, &plain, &cipher))) {
|
/illumos-gate/usr/src/cmd/lofiadm/ |
H A D | main.c | 120 * A cipher without an iv requirement would look like this: 128 /* Preferred cipher, if one isn't specified on command line. */ 423 mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly, 433 if (cipher != NULL) { 436 (void) strlcpy(li.li_cipher, cipher->name, 444 li.li_iv_type = cipher->iv_type; 445 li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */ 446 switch (cipher->iv_type) { 448 (void) strlcpy(li.li_iv_cipher, cipher->iv_name, 625 * Verify the cipher selecte 422 add_mapping(int lfd, const char *devicename, const char *filename, mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly, boolean_t label) argument 647 kernel_cipher_check(mech_alias_t *cipher) argument 903 getkeyfromuser(mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz, boolean_t with_confirmation) argument 972 getkeyfromfile(const char *pathname, mech_alias_t *cipher, char **key, size_t *ksz) argument 1057 getkeyfromtoken(CK_SESSION_HANDLE sess, token_spec_t *token, const char *keyfile, mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument 1228 mech_alias_t *cipher; local 1311 init_crypto(token_spec_t *token, mech_alias_t *cipher, CK_SESSION_HANDLE_PTR sess) argument 1927 mech_alias_t *cipher = NULL; local [all...] |
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 156 /* function definitions for cipher encode/decode */ 194 struct digest_cipher *cipher; member in struct:reauth_entry::__anon4339::__anon4341 2567 struct digest_cipher *cipher; local 2592 cipher = available_ciphers1; 2594 cipher = available_ciphers; 2596 while (cipher->name) { 2597 /* do we allow this particular cipher? */ 2598 if (stext->requiressf <= cipher->ssf && 2599 stext->limitssf >= cipher->ssf) { 2606 if(strlen(cipheropts) + strlen(cipher 2863 char *cipher = NULL; local 3794 struct digest_cipher *cipher; member in struct:client_context 4337 struct digest_cipher *cipher = available_ciphers1; local 4339 struct digest_cipher *cipher = available_ciphers; local 4509 struct digest_cipher *cipher; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | crypto.c | 92 static int cipher(dev_t, caddr_t, int, int (*)(crypto_context_t, 2726 return (cipher(dev, arg, mode, crypto_encrypt_single)); 2733 return (cipher(dev, arg, mode, crypto_decrypt_single)); 2741 cipher(dev_t dev, caddr_t arg, int mode, function 2761 cmn_err(CE_WARN, "cipher: failed holding minor"); 2787 cmn_err(CE_NOTE, "cipher: buffer greater than %ld bytes, "
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 1536 const EVP_CIPHER *cipher = NULL; local 1570 cipher = EVP_des_ede3_cbc(); 1597 p7 = PKCS7_encrypt(encerts, in, cipher, flags);
|