/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local 173 ciphertext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize); 174 ciphertext.data=output->data+hashsize; 248 ret = (*(enc->encrypt))(context, &k3, ivec, &plaintext, &ciphertext); 280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; local 354 ciphertext.length=input->length-hashsize; 355 ciphertext.data=input->data+hashsize; 357 plaintext.length=ciphertext.length; 412 ret=(*(enc->decrypt))(context, &k3, ivec, &ciphertext, &plaintext);
|
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 200 uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local 279 cdata[i] = Blowfish_stream2word(ciphertext, 287 ciphertext[4 * i + 3] = cdata[i] & 0xff; 289 ciphertext[4 * i + 2] = cdata[i] & 0xff; 291 ciphertext[4 * i + 1] = cdata[i] & 0xff; 293 ciphertext[4 * i + 0] = cdata[i] & 0xff; 307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext,
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_cipher.c | 61 * CRYPTO_INVALID_CIPHERTEXT: bogus 'ciphertext' argument. 297 * ciphertext: Storage for the encrypted message. The length needed 308 * When complete and successful, 'ciphertext' will contain the encrypted 320 crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 340 plaintext, ciphertext, tmpl); 355 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 402 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq)); 406 mech, key, plaintext, ciphertext, spi_ctx_tmpl); 459 * ciphertext: Storage for the encrypted message part. 474 crypto_data_t *ciphertext, crypto_call_req_ 318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 473 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 533 crypto_encrypt_final(crypto_context_t context, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 755 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 852 crypto_encrypt_single(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 887 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument [all...] |
H A D | kcf_dual.c | 914 * or the last ciphertext portion. 1000 /* Get the last chunk of ciphertext */ 2143 crypto_data_t *ciphertext, crypto_call_req_t *crq) 2159 crypto_context_t encrypt_ctx, crypto_data_t *ciphertext, 2177 crypto_data_t *ciphertext, crypto_call_req_t *crq) 2193 crypto_context_t verify_ctx, crypto_data_t *ciphertext, 2141 crypto_digest_encrypt_update(crypto_context_t digest_ctx, crypto_context_t encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 2158 crypto_decrypt_digest_update(crypto_context_t decryptctx, crypto_context_t encrypt_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 2175 crypto_sign_encrypt_update(crypto_context_t sign_ctx, crypto_context_t encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 2192 crypto_decrypt_verify_update(crypto_context_t decrypt_ctx, crypto_context_t verify_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | blowfish.c | 337 crypto_data_t *ciphertext, crypto_req_handle_t req) 354 BLOWFISH_ARG_INPLACE(plaintext, ciphertext); 360 if (ciphertext->cd_length < plaintext->cd_length) { 361 ciphertext->cd_length = plaintext->cd_length; 368 ret = blowfish_encrypt_update(ctx, plaintext, ciphertext, req); 378 blowfish_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 390 if ((ciphertext->cd_length & (BLOWFISH_BLOCK_LEN - 1)) != 0) 396 BLOWFISH_ARG_INPLACE(ciphertext, plaintext); 402 if (plaintext->cd_length < ciphertext->cd_length) { 403 plaintext->cd_length = ciphertext 336 blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 420 blowfish_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 483 blowfish_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 594 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 681 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | aes.c | 406 crypto_data_t *ciphertext, crypto_req_handle_t req) 424 AES_ARG_INPLACE(plaintext, ciphertext); 447 if (ciphertext->cd_length < length_needed) { 448 ciphertext->cd_length = length_needed; 452 saved_length = ciphertext->cd_length; 453 saved_offset = ciphertext->cd_offset; 458 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req); 470 * it to existing ciphertext. So, need to adjust the left over 475 ciphertext->cd_offset = ciphertext 405 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 520 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 635 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 710 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 959 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1089 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | rsa.c | 524 crypto_data_t *ciphertext, crypto_req_handle_t req) 532 RSA_ARG_INPLACE(plaintext, ciphertext); 541 ciphertext); 553 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, 560 RSA_ARG_INPLACE(plaintext, ciphertext); 563 ciphertext)); 589 crypto_data_t *plaintext, crypto_data_t *ciphertext) 618 if (ciphertext->cd_length < modulus_len) { 619 ciphertext->cd_length = modulus_len; 641 /* copy out to ciphertext */ 523 rsaprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 551 rsa_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 588 rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument 695 rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 718 rsa_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 734 rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument [all...] |
H A D | dca.c | 3728 crypto_data_t *ciphertext, crypto_req_handle_t req) 3740 if (!ciphertext) { 3743 ciphertext = plaintext; 3749 error = dca_3des(ctx, plaintext, ciphertext, req, DR_ENCRYPT); 3752 error = dca_3des(ctx, plaintext, ciphertext, req, 3757 error = dca_rsastart(ctx, plaintext, ciphertext, req, 3769 ciphertext->cd_length = 0; 3780 crypto_data_t *ciphertext, crypto_req_handle_t req) 3792 if (!ciphertext) { 3795 ciphertext 3727 dca_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3779 dca_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3822 dca_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3856 dca_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3949 dca_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4002 dca_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4079 dca_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument [all...] |
H A D | dprov.c | 2371 crypto_data_t *ciphertext, crypto_req_handle_t req) 2384 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); 2395 crypto_data_t *ciphertext, crypto_req_handle_t req) 2409 req, NULL, NULL, plaintext, ciphertext, ctx, 0, KM_NOSLEEP); 2419 dprov_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 2434 req, NULL, NULL, NULL, ciphertext, ctx, 0, KM_NOSLEEP); 2445 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, 2467 req, mechanism, key, plaintext, ciphertext, NULL, session_id, 2511 dprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 2526 req, NULL, NULL, plaintext, ciphertext, ct 2370 dprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 2394 dprov_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 2443 dprov_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2536 dprov_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 2585 dprov_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3093 dprov_digest_encrypt_update(crypto_ctx_t *digest_ctx, crypto_ctx_t *encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3121 dprov_decrypt_digest_update(crypto_ctx_t *decrypt_ctx, crypto_ctx_t *digest_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3149 dprov_sign_encrypt_update(crypto_ctx_t *sign_ctx, crypto_ctx_t *encrypt_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3177 dprov_decrypt_verify_update(crypto_ctx_t *decrypt_ctx, crypto_ctx_t *verify_ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3254 dprov_encrypt_mac(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_req_handle_t req) argument 3282 dprov_encrypt_mac_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_req_handle_t req) argument 3307 dprov_encrypt_mac_final(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_req_handle_t req) argument 3333 dprov_encrypt_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *encrypt_mech, crypto_key_t *encrypt_key, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_spi_ctx_template_t encr_ctx_template, crypto_spi_ctx_template_t mac_ctx_template, crypto_req_handle_t req) argument 3425 dprov_mac_decrypt(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3450 dprov_mac_decrypt_update(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3500 dprov_mac_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_mechanism_t *decrypt_mech, crypto_key_t *decrypt_key, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_spi_ctx_template_t mac_ctx_template, crypto_spi_ctx_template_t decr_ctx_template, crypto_req_handle_t req) argument 3547 dprov_mac_verify_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_mechanism_t *decrypt_mech, crypto_key_t *decrypt_key, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_spi_ctx_template_t mac_ctx_template, crypto_spi_ctx_template_t decr_ctx_template, crypto_req_handle_t req) argument 5146 dprov_dual_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_ctx_t *signverify_ctx, crypto_ctx_t *cipher_ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument 5202 dprov_cipher_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument 7801 crypto_data_t ciphertext; local 7924 crypto_data_t ciphertext; local [all...] |
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 232 uint8_t *ciphertext, int cipher_len) 272 d2.cd_raw.iov_base = (char *)ciphertext; 284 const uint8_t *ciphertext, int cipher_len, 319 d1.cd_raw.iov_base = (char *)ciphertext; 230 aes_ccm_encrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, const uint8_t *plaintext, int plain_len, uint8_t *ciphertext, int cipher_len) argument 283 aes_ccm_decrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, const uint8_t *ciphertext, int cipher_len, uint8_t *plaintext, int plain_len) argument
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 549 KMF_DATA *ciphertext) 605 if (out_len > ciphertext->Length) { 620 out_data = ciphertext->Data; 681 ciphertext->Length = total_encrypted; 545 PKCS_EncryptData(KMF_HANDLE_T kmfh, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *plaintext, KMF_DATA *ciphertext) argument
|
H A D | certop.c | 1059 * into the ciphertext. 1066 * ciphertext(output) - pointer to the ciphertext contains 1086 KMF_DATA *ciphertext; local 1113 ciphertext = kmf_get_attr_ptr(KMF_CIPHERTEXT_DATA_ATTR, attrlist, 1116 if (cert == NULL || plaintext == NULL || ciphertext == NULL) 1156 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); 1169 * the ciphertext into the plaintext. 1182 KMF_DATA *ciphertext = NULL; local 1221 /* Get the ciphertext an [all...] |
/illumos-gate/usr/src/uts/common/des/ |
H A D | des_crypt.c | 530 crypto_data_t *ciphertext, crypto_req_handle_t req) 547 DES_ARG_INPLACE(plaintext, ciphertext); 553 if (ciphertext->cd_length < plaintext->cd_length) { 554 ciphertext->cd_length = plaintext->cd_length; 561 ret = des_encrypt_update(ctx, plaintext, ciphertext, req); 571 des_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 583 if ((ciphertext->cd_length & (DES_BLOCK_LEN - 1)) != 0) 589 DES_ARG_INPLACE(ciphertext, plaintext); 595 if (plaintext->cd_length < ciphertext->cd_length) { 596 plaintext->cd_length = ciphertext 529 des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 613 des_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 675 des_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 737 des_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 785 des_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 888 des_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 148 char *ciphertext; local 185 ciphertext = NULL; 188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer); 190 ciphertext = alg->a_genhash(ctbuffer, CRYPT_MAXCIPHERTEXTLEN, 199 return (ciphertext); 292 * $<algname>[,var=val,[var=val ...][$puresalt]$<ciphertext>
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1292 KMF_OID *AlgOID, KMF_DATA *ciphertext, 1305 ciphertext == NULL || output == NULL || 1306 ciphertext->Data == NULL || 1313 blocks = ciphertext->Length/modulus_len; 1315 in_data = ciphertext->Data; 1321 &out_len, ciphertext->Length, in_data, in_len); 1291 NSS_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *AlgOID, KMF_DATA *ciphertext, KMF_DATA *output) argument
|
/illumos-gate/usr/src/uts/common/io/ |
H A D | lofi.c | 898 caddr_t ciphertext, size_t len, boolean_t op_encrypt) 913 if (ciphertext != NULL) { /* not in-place crypto */ 914 SETUP_C_DATA(wdata, ciphertext, len); 926 ((ciphertext != NULL) ? &wdata : NULL), NULL); 930 ((ciphertext != NULL) ? &wdata : NULL), NULL); 934 if (ciphertext != NULL) 897 lofi_crypto(struct lofi_state *lsp, struct buf *bp, caddr_t plaintext, caddr_t ciphertext, size_t len, boolean_t op_encrypt) argument
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2319 KMF_OID *algOID, KMF_DATA *ciphertext, 2341 ciphertext == NULL || output == NULL) 2371 blocks = ciphertext->Length/block_len; 2374 in_data = ciphertext->Data; 2318 KMFPK11_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *algOID, KMF_DATA *ciphertext, KMF_DATA *output) argument
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2294 KMF_OID *AlgOID, KMF_DATA *ciphertext, 2305 ciphertext == NULL || output == NULL || 2306 ciphertext->Data == NULL || 2317 blocks = ciphertext->Length/modulus_len; 2319 in_data = ciphertext->Data; 2293 OpenSSL_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *AlgOID, KMF_DATA *ciphertext, KMF_DATA *output) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 451 krb5_data ciphertext; member in struct:_krb5_enc_data
|