Searched defs:encrypt (Results 1 - 25 of 30) sorted by relevance

12

/illumos-gate/usr/src/common/net/wanboot/crypt/
H A Dcbc.h43 void (*encrypt)(void *, uint8_t *); member in struct:cbc_handle_s
53 void (*encrypt)(void *, uint8_t *),
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftARCFourCrypt.c45 soft_object_t *key_p, boolean_t encrypt)
76 active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt);
44 soft_arcfour_crypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
H A DsoftBlowfishCrypt.c39 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) {
59 if (encrypt) {
61 session_p->encrypt.context = soft_blowfish_ctx;
62 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
130 * This function calls the corresponding encrypt routine based
137 * CKR_FUNCTION_FAILED: encrypt function failed
148 (soft_blowfish_ctx_t *)session_p->encrypt.context;
281 * For encrypt update, if there is remaining data,
308 free(session_p->encrypt.context);
309 session_p->encrypt
38 soft_blowfish_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
[all...]
H A DsoftAESCrypt.c44 boolean_t encrypt)
64 if (encrypt) {
66 session_p->encrypt.context = soft_aes_ctx;
67 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
143 * This function calls the corresponding encrypt routine based
150 * CKR_FUNCTION_FAILED: encrypt function failed
162 (soft_aes_ctx_t *)session_p->encrypt.context;
164 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism;
333 * For encrypt update, if there is a remaining
368 * For encrypt updat
42 soft_aes_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
[all...]
H A DsoftDESCrypt.c46 boolean_t encrypt)
72 if (encrypt) {
74 session_p->encrypt.context = soft_des_ctx;
75 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
165 * This function calls the corresponding encrypt routine based
172 * CKR_FUNCTION_FAILED: encrypt function failed
183 (soft_des_ctx_t *)session_p->encrypt.context;
185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism;
359 * For encrypt update, if there is remaining
395 * For encrypt updat
44 soft_des_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
[all...]
H A DsoftEncryptUtil.c50 * Perform encrypt init operation internally for the support of
64 /* Check to see if encrypt operation is already active */
65 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) {
70 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE;
78 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE;
95 * encrypt init routine based on the mechanism.
166 soft_des_ctx = (soft_des_ctx_t *)session_p->encrypt.context;
180 free(session_p->encrypt.context);
181 session_p->encrypt.context = NULL;
220 soft_aes_ctx = (soft_aes_ctx_t *)session_p->encrypt
842 soft_crypt_cleanup(soft_session_t *session_p, boolean_t encrypt, boolean_t lock_held) argument
[all...]
H A DsoftSession.h93 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session
H A DsoftKeystore.c2260 soft_keystore_crypt(soft_object_t *key_p, uchar_t *ivec, boolean_t encrypt, argument
2278 if (encrypt)
2291 if (encrypt)
2293 (soft_aes_ctx_t *)token_session.encrypt.context;
2310 if (encrypt) {
2311 free(token_session.encrypt.context);
2312 token_session.encrypt.context = NULL;
2314 free(token_session.encrypt.context);
2315 token_session.encrypt.context = NULL;
2328 if (encrypt) {
[all...]
H A DsoftRSA.c191 boolean_t encrypt)
225 if (encrypt) {
227 session_p->encrypt.context = rsa_ctx;
228 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
245 soft_rsa_ctx_t *rsa_ctx = session_p->encrypt.context;
319 free(session_p->encrypt.context);
320 session_p->encrypt.context = NULL;
189 soft_rsa_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/
H A Dd3_cbc.c37 const mit_des_cblock ivec, int encrypt)
68 if (encrypt)
80 if (encrypt)
114 const mit_des_cblock ivec, int encrypt)
119 KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() start encrypt=%d", encrypt);
125 length, key, &ivdata, encrypt);
35 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument
110 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument
H A Df_cbc.c33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt)
40 int encrypt;
71 if (encrypt)
83 if (encrypt)
112 * encrypting from cleartext to ciphertext, if encrypt != 0 or
113 * decrypting from ciphertext to cleartext, if encrypt == 0.
135 mit_des_cblock ivec, int encrypt)
141 KRB5_LOG(KRB5_INFO, "mit_des_cbc_encrypt() start encrypt=%d", encrypt);
147 (char *)out, length, key, &ivdata, encrypt);
131 mit_des_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, long length, krb5_keyblock *key, mit_des_cblock ivec, int encrypt) argument
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Ddes.c40 krb5_data *output, int encrypt)
44 KRB5_LOG(KRB5_INFO, "k5_des_docrypt() start encrypt=%d\n", encrypt);
60 (unsigned char *)mit_des_zeroblock, encrypt);
38 k5_des_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
H A Ddes3.c39 krb5_const krb5_data *input, krb5_data *output, int encrypt)
61 encrypt);
37 k5_des3_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelEncrypt.c87 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE;
118 session_p->encrypt.mech = *pMechanism;
121 if (INPLACE_MECHANISM(session_p->encrypt.mech.mechanism)) {
122 session_p->encrypt.flags |= CRYPTO_OPERATION_INPLACE_OK;
155 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE;
175 crypto_encrypt_t encrypt; local
206 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
215 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) {
218 * operation, so we'll leave the active encrypt operation
220 * encrypt updat
[all...]
H A DkernelSession.h96 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dk5seal.c66 int encrypt,
111 if (encrypt || (!bigend && (toktype == KG_TOK_SEAL_MSG)))
147 if ((toktype == KG_TOK_SEAL_MSG) && encrypt) {
160 /* pad the plaintext, encrypt if needed, and stick it in the token */
302 if (encrypt) {
56 make_seal_token_v1(krb5_context context, krb5_keyblock *enc, krb5_keyblock *seq, gssint_uint64 *seqnum, int direction, gss_buffer_t text, gss_buffer_t token, int signalg, size_t cksum_size, int sealalg, int encrypt, int toktype, int bigend, gss_OID oid) argument
/illumos-gate/usr/src/lib/libbc/libc/gen/common/
H A D_crypt.c292 * The payoff: encrypt a block.
296 encrypt(char *block, int edflag) function
435 encrypt(ablock,0);
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dsasl.c413 int encrypt = 0; local
416 encrypt = 1;
427 if (encrypt) {
474 if (encrypt) {
500 if (encrypt) {
/illumos-gate/usr/src/lib/libast/common/uwin/
H A Dcrypt.c46 #define encrypt ______encrypt macro
55 #undef encrypt macro
813 * "encrypt" routine (for backwards compatibility)
815 extern int encrypt(register char *block, int flag) { function
/illumos-gate/usr/src/lib/print/libhttp-core/common/
H A Dhttp.c359 http_encryption_t encrypt; /* Type of encryption to use */ local
367 encrypt = HTTP_ENCRYPT_ALWAYS;
369 encrypt = HTTP_ENCRYPT_IF_REQUESTED;
371 return (httpConnectEncrypt(host, port, encrypt));
382 http_encryption_t encrypt)
390 DEBUG_printf(("httpConnectEncrypt(host=\"%s\", port=%d, encrypt=%d)\n",
391 host ? host : "(null)", port, encrypt));
449 http->encryption = encrypt;
380 httpConnectEncrypt(const char *host, int port, http_encryption_t encrypt) argument
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dcrypt.c28 #pragma weak _encrypt = encrypt
817 * This program implements a data encryption algorithm to encrypt passwords.
895 * one of _unix_crypt(), encrypt() or setkey() is called.
1136 encrypt(char *block, int fake) function
/illumos-gate/usr/src/head/arpa/
H A Dtelnet.h419 cipher_info_t encrypt; member in struct:__anon2242
/illumos-gate/usr/src/uts/common/io/
H A Dcryptmod.c425 * vector, D[n] is the nth chunk of 64 bits of data to encrypt
1161 * encrypt and decrypt in-place
1336 /* encrypt XOR-ed block N-2 */
1366 /* encrypt block N-2 */
1646 * AES encrypt
1678 * Because we encrypt in-place, we need to calculate
1883 "for RC4 encrypt: %0x", result);
1969 * ARCFOUR-HMAC-MD5 encrypt
2125 * key to be used for the encrypt operation.
2156 "for RC4 encrypt
2640 setup_crypto(struct cr_info_t *ci, struct cipher_data_t *cd, int encrypt) argument
[all...]
/illumos-gate/usr/src/man/man3ext/
H A DMakefile82 encrypt.3ext \
144 encrypt.3ext := LINKSRC = crypt.3ext
/illumos-gate/usr/src/uts/common/io/ral/
H A Drt2560.c1384 uint32_t flags, int len, int rate, int encrypt)
1392 desc->flags |= encrypt ? LE_32(RT2560_TX_CIPHER_BUSY) :
1383 rt2560_setup_tx_desc(struct rt2560_softc *sc, struct rt2560_tx_desc *desc, uint32_t flags, int len, int rate, int encrypt) argument

Completed in 121 milliseconds

12