/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | cbc.h | 43 void (*encrypt)(void *, uint8_t *); member in struct:cbc_handle_s 53 void (*encrypt)(void *, uint8_t *),
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softARCFourCrypt.c | 45 soft_object_t *key_p, boolean_t encrypt) 76 active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt); 44 soft_arcfour_crypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
|
H A D | softBlowfishCrypt.c | 39 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) { 59 if (encrypt) { 61 session_p->encrypt.context = soft_blowfish_ctx; 62 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 130 * This function calls the corresponding encrypt routine based 137 * CKR_FUNCTION_FAILED: encrypt function failed 148 (soft_blowfish_ctx_t *)session_p->encrypt.context; 281 * For encrypt update, if there is remaining data, 308 free(session_p->encrypt.context); 309 session_p->encrypt 38 soft_blowfish_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument [all...] |
H A D | softAESCrypt.c | 44 boolean_t encrypt) 64 if (encrypt) { 66 session_p->encrypt.context = soft_aes_ctx; 67 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 143 * This function calls the corresponding encrypt routine based 150 * CKR_FUNCTION_FAILED: encrypt function failed 162 (soft_aes_ctx_t *)session_p->encrypt.context; 164 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; 333 * For encrypt update, if there is a remaining 368 * For encrypt updat 42 soft_aes_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument [all...] |
H A D | softDESCrypt.c | 46 boolean_t encrypt) 72 if (encrypt) { 74 session_p->encrypt.context = soft_des_ctx; 75 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 165 * This function calls the corresponding encrypt routine based 172 * CKR_FUNCTION_FAILED: encrypt function failed 183 (soft_des_ctx_t *)session_p->encrypt.context; 185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; 359 * For encrypt update, if there is remaining 395 * For encrypt updat 44 soft_des_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument [all...] |
H A D | softEncryptUtil.c | 50 * Perform encrypt init operation internally for the support of 64 /* Check to see if encrypt operation is already active */ 65 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { 70 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 78 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; 95 * encrypt init routine based on the mechanism. 166 soft_des_ctx = (soft_des_ctx_t *)session_p->encrypt.context; 180 free(session_p->encrypt.context); 181 session_p->encrypt.context = NULL; 220 soft_aes_ctx = (soft_aes_ctx_t *)session_p->encrypt 842 soft_crypt_cleanup(soft_session_t *session_p, boolean_t encrypt, boolean_t lock_held) argument [all...] |
H A D | softSession.h | 93 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session
|
H A D | softKeystore.c | 2260 soft_keystore_crypt(soft_object_t *key_p, uchar_t *ivec, boolean_t encrypt, argument 2278 if (encrypt) 2291 if (encrypt) 2293 (soft_aes_ctx_t *)token_session.encrypt.context; 2310 if (encrypt) { 2311 free(token_session.encrypt.context); 2312 token_session.encrypt.context = NULL; 2314 free(token_session.encrypt.context); 2315 token_session.encrypt.context = NULL; 2328 if (encrypt) { [all...] |
H A D | softRSA.c | 191 boolean_t encrypt) 225 if (encrypt) { 227 session_p->encrypt.context = rsa_ctx; 228 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 245 soft_rsa_ctx_t *rsa_ctx = session_p->encrypt.context; 319 free(session_p->encrypt.context); 320 session_p->encrypt.context = NULL; 189 soft_rsa_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | d3_cbc.c | 37 const mit_des_cblock ivec, int encrypt) 68 if (encrypt) 80 if (encrypt) 114 const mit_des_cblock ivec, int encrypt) 119 KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() start encrypt=%d", encrypt); 125 length, key, &ivdata, encrypt); 35 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument 110 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument
|
H A D | f_cbc.c | 33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt) 40 int encrypt; 71 if (encrypt) 83 if (encrypt) 112 * encrypting from cleartext to ciphertext, if encrypt != 0 or 113 * decrypting from ciphertext to cleartext, if encrypt == 0. 135 mit_des_cblock ivec, int encrypt) 141 KRB5_LOG(KRB5_INFO, "mit_des_cbc_encrypt() start encrypt=%d", encrypt); 147 (char *)out, length, key, &ivdata, encrypt); 131 mit_des_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, long length, krb5_keyblock *key, mit_des_cblock ivec, int encrypt) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | des.c | 40 krb5_data *output, int encrypt) 44 KRB5_LOG(KRB5_INFO, "k5_des_docrypt() start encrypt=%d\n", encrypt); 60 (unsigned char *)mit_des_zeroblock, encrypt); 38 k5_des_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
|
H A D | des3.c | 39 krb5_const krb5_data *input, krb5_data *output, int encrypt) 61 encrypt); 37 k5_des3_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEncrypt.c | 87 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 118 session_p->encrypt.mech = *pMechanism; 121 if (INPLACE_MECHANISM(session_p->encrypt.mech.mechanism)) { 122 session_p->encrypt.flags |= CRYPTO_OPERATION_INPLACE_OK; 155 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; 175 crypto_encrypt_t encrypt; local 206 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { 215 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) { 218 * operation, so we'll leave the active encrypt operation 220 * encrypt updat [all...] |
H A D | kernelSession.h | 96 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5seal.c | 66 int encrypt, 111 if (encrypt || (!bigend && (toktype == KG_TOK_SEAL_MSG))) 147 if ((toktype == KG_TOK_SEAL_MSG) && encrypt) { 160 /* pad the plaintext, encrypt if needed, and stick it in the token */ 302 if (encrypt) { 56 make_seal_token_v1(krb5_context context, krb5_keyblock *enc, krb5_keyblock *seq, gssint_uint64 *seqnum, int direction, gss_buffer_t text, gss_buffer_t token, int signalg, size_t cksum_size, int sealalg, int encrypt, int toktype, int bigend, gss_OID oid) argument
|
/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | _crypt.c | 292 * The payoff: encrypt a block. 296 encrypt(char *block, int edflag) function 435 encrypt(ablock,0);
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | sasl.c | 413 int encrypt = 0; local 416 encrypt = 1; 427 if (encrypt) { 474 if (encrypt) { 500 if (encrypt) {
|
/illumos-gate/usr/src/lib/libast/common/uwin/ |
H A D | crypt.c | 46 #define encrypt ______encrypt macro 55 #undef encrypt macro 813 * "encrypt" routine (for backwards compatibility) 815 extern int encrypt(register char *block, int flag) { function
|
/illumos-gate/usr/src/lib/print/libhttp-core/common/ |
H A D | http.c | 359 http_encryption_t encrypt; /* Type of encryption to use */ local 367 encrypt = HTTP_ENCRYPT_ALWAYS; 369 encrypt = HTTP_ENCRYPT_IF_REQUESTED; 371 return (httpConnectEncrypt(host, port, encrypt)); 382 http_encryption_t encrypt) 390 DEBUG_printf(("httpConnectEncrypt(host=\"%s\", port=%d, encrypt=%d)\n", 391 host ? host : "(null)", port, encrypt)); 449 http->encryption = encrypt; 380 httpConnectEncrypt(const char *host, int port, http_encryption_t encrypt) argument
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 28 #pragma weak _encrypt = encrypt 817 * This program implements a data encryption algorithm to encrypt passwords. 895 * one of _unix_crypt(), encrypt() or setkey() is called. 1136 encrypt(char *block, int fake) function
|
/illumos-gate/usr/src/head/arpa/ |
H A D | telnet.h | 419 cipher_info_t encrypt; member in struct:__anon2242
|
/illumos-gate/usr/src/uts/common/io/ |
H A D | cryptmod.c | 425 * vector, D[n] is the nth chunk of 64 bits of data to encrypt 1161 * encrypt and decrypt in-place 1336 /* encrypt XOR-ed block N-2 */ 1366 /* encrypt block N-2 */ 1646 * AES encrypt 1678 * Because we encrypt in-place, we need to calculate 1883 "for RC4 encrypt: %0x", result); 1969 * ARCFOUR-HMAC-MD5 encrypt 2125 * key to be used for the encrypt operation. 2156 "for RC4 encrypt 2640 setup_crypto(struct cr_info_t *ci, struct cipher_data_t *cd, int encrypt) argument [all...] |
/illumos-gate/usr/src/man/man3ext/ |
H A D | Makefile | 82 encrypt.3ext \ 144 encrypt.3ext := LINKSRC = crypt.3ext
|
/illumos-gate/usr/src/uts/common/io/ral/ |
H A D | rt2560.c | 1384 uint32_t flags, int len, int rate, int encrypt) 1392 desc->flags |= encrypt ? LE_32(RT2560_TX_CIPHER_BUSY) : 1383 rt2560_setup_tx_desc(struct rt2560_softc *sc, struct rt2560_tx_desc *desc, uint32_t flags, int len, int rate, int encrypt) argument
|