/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 38 const krb5_data *plain, krb5_enc_data *cipher) 47 cipher->ciphertext.length = enclen; 48 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) 50 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); 52 free(cipher->ciphertext.data); 53 cipher->ciphertext.data = NULL; 36 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
|
H A D | enc_keyhelper.c | 37 const krb5_data *plain, krb5_enc_data *cipher) 48 cipher->ciphertext.length = enclen; 49 cipher->ciphertext.data = malloc(enclen); 50 if (cipher->ciphertext.data == NULL) 52 ret = krb5_k_encrypt(context, key, usage, 0, plain, cipher); 54 free(cipher->ciphertext.data); 55 cipher->ciphertext.data = NULL; 36 krb5_encrypt_keyhelper(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 76 krb5_enc_data cipher; local 85 cipher.enctype = ENCTYPE_UNKNOWN; 86 cipher.ciphertext.length = key_data->key_data_length[0]-2; 87 cipher.ciphertext.data = (char *)ptr; /* Solaris Kerberos cast */ 93 &cipher, &plain))) {
|
H A D | encrypt_key.c | 83 krb5_enc_data cipher; local 113 cipher.ciphertext.length = len; 114 cipher.ciphertext.data = (char *)ptr; /* Solaris Kerberos cast */ 117 &plain, &cipher))) {
|
/osnet-11/usr/src/lib/libnsl/des/ |
H A D | des_soft.c | 400 * Do a cipher step 403 #define cipher(iter, inR, inL, outR, outL) { \ macro 417 cipher(0, r0, l0, r1, l1); 418 cipher(1, r1, l1, r0, l0); 419 cipher(2, r0, l0, r1, l1); 420 cipher(3, r1, l1, r0, l0); 421 cipher(4, r0, l0, r1, l1); 422 cipher(5, r1, l1, r0, l0); 423 cipher(6, r0, l0, r1, l1); 424 cipher( [all...] |
/osnet-11/usr/src/lib/libcrypt/common/ |
H A D | des_soft.c | 365 * Do a cipher step 368 #define cipher(iter, inR, inL, outR, outL) { \ macro 382 cipher(0, r0, l0, r1, l1); 383 cipher(1, r1, l1, r0, l0); 384 cipher(2, r0, l0, r1, l1); 385 cipher(3, r1, l1, r0, l0); 386 cipher(4, r0, l0, r1, l1); 387 cipher(5, r1, l1, r0, l0); 388 cipher(6, r0, l0, r1, l1); 389 cipher( [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 70 krb5_data cipher, clear; local 91 cipher.length = 0; 92 cipher.data = NULL; 332 cipher.length = (req->data + req->length) - ptr; 333 cipher.data = ptr; 335 if (ret = krb5_rd_priv(context, auth_context, &cipher, 488 cipher.length = 0; 499 &cipher, &replay)) { 512 if (cipher.length == 0) { 549 ret = krb5_mk_error(context, &krberror, &cipher); [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | luks.c | 80 grub_crypto_cipher_handle_t cipher = NULL, secondary_cipher = NULL; local 137 /* Configure the cipher used for the bulk data. */ 138 cipher = grub_crypto_cipher_open (ciph); 139 if (!cipher) 149 /* Configure the cipher mode. */ 179 grub_crypto_cipher_close (cipher); 182 if (cipher->cipher->blocksize != GRUB_CRYPTODISK_GF_BYTES) 184 grub_crypto_cipher_close (cipher); 186 cipher [all...] |
H A D | geli.c | 254 grub_crypto_cipher_handle_t cipher = NULL, secondary_cipher = NULL; local 331 /* Configure the cipher used for the bulk data. */ 332 cipher = grub_crypto_cipher_open (ciph); 333 if (!cipher) 353 newdev->cipher = cipher; 400 grub_uint8_t zero[dev->cipher->cipher->blocksize]; 493 gcry_err = grub_crypto_cipher_set_key (dev->cipher, 498 gcry_err = grub_crypto_cbc_decrypt (dev->cipher, [all...] |
H A D | cryptodisk.c | 109 grub_crypto_pcbc_decrypt (grub_crypto_cipher_handle_t cipher, argument 114 grub_uint8_t ivt[cipher->cipher->blocksize]; 115 if (!cipher->cipher->decrypt) 117 if (size % cipher->cipher->blocksize != 0) 121 inptr += cipher->cipher->blocksize, outptr += cipher [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | cast5.c | 1 /* cast5.c - CAST5 cipher (RFC2144) 44 #include "cipher.h" 474 byte cipher[8]= { 0x23, 0x8B, 0x4F, 0xE5, 0x84, 0x7E, 0x44, 0xB2 }; local 479 if( memcmp( buffer, cipher, 8 ) )
|
H A D | des.c | 120 #include "cipher.h" 897 struct { byte key[24]; byte plain[8]; byte cipher[8]; } testdata[] = { member in struct:__anon502 971 if (memcmp (testdata[i].cipher, result, 8)) 974 tripledes_ecb_decrypt (des3, testdata[i].cipher, result); 1144 report ("cipher", GCRY_CIPHER_3DES, what, errtxt);
|
H A D | cipher.c | 0 /* cipher.c - cipher dispatcher 28 #include "cipher.h" 50 gcry_cipher_spec_t *cipher; member in struct:cipher_table_entry 163 gcry_cipher_spec_t *cipher; member in struct:gcry_cipher_handle 173 API) we need to keep these function pointers here. The cipher 209 /* What follows are two contexts of the cipher in use. The first 210 one needs to be aligned well enough for the cipher operation 220 /* These dummy functions are used in case a cipher implementation 287 for (i = 0; !err && cipher_table[i].cipher; 316 gcry_cipher_spec_t *cipher = (gcry_cipher_spec_t *) spec; local 332 gcry_cipher_spec_t *cipher = (gcry_cipher_spec_t *) spec; local 349 gcry_module_t cipher; local 361 gcry_module_t cipher; local 373 _gcry_cipher_register(gcry_cipher_spec_t *cipher, cipher_extra_spec_t *extraspec, int *algorithm_id, gcry_module_t *module) argument 431 gcry_cipher_spec_t *cipher = module->spec; local 456 gcry_module_t cipher; local 516 gcry_module_t cipher; local 553 gcry_module_t cipher; local 576 gcry_module_t cipher; local 603 gcry_module_t cipher; local 631 gcry_module_t cipher; local 672 gcry_cipher_spec_t *cipher = NULL; local [all...] |
/osnet-11/usr/src/grub/grub2/include/grub/ |
H A D | cryptodisk.h | 68 grub_crypto_cipher_handle_t cipher; member in struct:grub_cryptodisk
|
H A D | crypto.h | 176 const struct gcry_cipher_spec *cipher; member in struct:grub_crypto_cipher_handle 188 grub_crypto_cipher_open (const struct gcry_cipher_spec *cipher); 191 grub_crypto_cipher_set_key (grub_crypto_cipher_handle_t cipher, 196 grub_crypto_cipher_close (grub_crypto_cipher_handle_t cipher) argument 198 grub_free (cipher); 237 grub_crypto_ecb_decrypt (grub_crypto_cipher_handle_t cipher, 241 grub_crypto_ecb_encrypt (grub_crypto_cipher_handle_t cipher, 244 grub_crypto_cbc_encrypt (grub_crypto_cipher_handle_t cipher, 248 grub_crypto_cbc_decrypt (grub_crypto_cipher_handle_t cipher, 252 grub_cipher_register (gcry_cipher_spec_t *cipher); [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 55 cipher_proc cipher; /* Routine to en/decrypt with */ member in struct:cipher_entry 71 * Return the length produced by using cipher entry c given the supplied len 121 /* For each key do the appropriate cipher */ 155 * DesN crypt packaged for use as a cipher entry 191 * Package up plain des cbc crypt for use as a cipher entry. 235 gss_buffer_desc buf; /* GSS buffer to hold keys for cipher routine */ 390 * is null, the the v->signer->cipher routine will not be called 393 stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig); 410 cipher_proc cipher; /* cipher routin local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/fs/zfs/ |
H A D | zfscrypt.c | 94 grub_ccm_decrypt (grub_crypto_cipher_handle_t cipher, argument 111 err = grub_crypto_ecb_encrypt (cipher, mac, iv, 16); 125 err = grub_crypto_ecb_encrypt (cipher, mul, iv, 16); 130 err = grub_crypto_ecb_encrypt (cipher, mac, mac, 16); 136 err = grub_crypto_ecb_encrypt (cipher, mul, iv, 16); 177 grub_gcm_decrypt (grub_crypto_cipher_handle_t cipher, argument 191 err = grub_crypto_ecb_encrypt (cipher, h, mac, 16); 212 err = grub_crypto_ecb_encrypt (cipher, mac_xor, iv, 16); 230 err = grub_crypto_ecb_encrypt (cipher, mul, iv, 16); 247 algo_decrypt (grub_crypto_cipher_handle_t cipher, grub_uint64_ argument 267 grub_zfs_decrypt_real(grub_crypto_cipher_handle_t cipher, grub_uint64_t algo, void *nonce, char *buf, grub_size_t size, const grub_uint32_t *expected_mac, grub_zfs_endian_t endian) argument 328 grub_crypto_cipher_handle_t cipher; local [all...] |
H A D | zfs.c | 212 grub_crypto_cipher_handle_t cipher; member in struct:subvolume::__anon444 279 grub_err_t (*grub_zfs_decrypt) (grub_crypto_cipher_handle_t cipher, 2095 data->subvol.keyring[besti].cipher, 2098 err = grub_zfs_decrypt (data->subvol.keyring[besti].cipher, 3481 subvol->keyring[keyn].cipher = grub_zfs_load_key (val_in, nelem, salt, 3919 grub_crypto_cipher_close (data->subvol.keyring[i].cipher); 3964 grub_crypto_cipher_close (data->subvol.keyring[i].cipher);
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/ |
H A D | crypto.c | 60 grub_cipher_register (gcry_cipher_spec_t *cipher) argument 62 cipher->next = grub_ciphers; 63 grub_ciphers = cipher; 67 grub_cipher_unregister (gcry_cipher_spec_t *cipher) argument 71 if (*ciph == cipher) 86 grub_md_unregister (gcry_md_spec_t *cipher) argument 90 if (*ciph == cipher) 154 grub_crypto_cipher_open (const struct gcry_cipher_spec *cipher) argument 157 ret = grub_malloc (sizeof (*ret) + cipher->contextsize); 160 ret->cipher 165 grub_crypto_cipher_set_key(grub_crypto_cipher_handle_t cipher, const unsigned char *key, unsigned keylen) argument 173 grub_crypto_ecb_decrypt(grub_crypto_cipher_handle_t cipher, void *out, const void *in, grub_size_t size) argument 190 grub_crypto_ecb_encrypt(grub_crypto_cipher_handle_t cipher, void *out, const void *in, grub_size_t size) argument 207 grub_crypto_cbc_encrypt(grub_crypto_cipher_handle_t cipher, void *out, void *in, grub_size_t size, void *iv_in) argument 231 grub_crypto_cbc_decrypt(grub_crypto_cipher_handle_t cipher, void *out, const void *in, grub_size_t size, void *iv) argument [all...] |
/osnet-11/usr/src/lib/libdladm/common/ |
H A D | libdlwlan.c | 1516 dladm_wlan_cipher_t cipher, const dladm_wlan_bssid_t *addr, 1523 switch (cipher) { 1515 dladm_wlan_wpa_set_key(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_cipher_t cipher, const dladm_wlan_bssid_t *addr, boolean_t set_tx, uint64_t seq, uint_t key_idx, uint8_t *key, uint_t key_len) argument
|
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 157 /* function definitions for cipher encode/decode */ 195 struct digest_cipher *cipher; member in struct:reauth_entry::__anon2829::__anon2831 2572 struct digest_cipher *cipher; local 2597 cipher = available_ciphers1; 2599 cipher = available_ciphers; 2601 while (cipher->name) { 2602 /* do we allow this particular cipher? */ 2603 if (stext->requiressf <= cipher->ssf && 2604 stext->limitssf >= cipher->ssf) { 2611 if(strlen(cipheropts) + strlen(cipher 2868 char *cipher = NULL; local 3807 struct digest_cipher *cipher; member in struct:client_context 4350 struct digest_cipher *cipher = available_ciphers1; local 4352 struct digest_cipher *cipher = available_ciphers; local 4522 struct digest_cipher *cipher; local [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 1715 const EVP_CIPHER *cipher = NULL; local 1749 cipher = EVP_des_ede3_cbc(); 1776 p7 = PKCS7_encrypt(encerts, in, cipher, flags);
|