Searched defs:encrypt (Results 1 - 11 of 11) sorted by relevance
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEncrypt.c | 87 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 118 session_p->encrypt.mech = *pMechanism; 121 if (INPLACE_MECHANISM(session_p->encrypt.mech.mechanism)) { 122 session_p->encrypt.flags |= CRYPTO_OPERATION_INPLACE_OK; 155 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; 175 crypto_encrypt_t encrypt; local 206 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { 215 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) { 218 * operation, so we'll leave the active encrypt operation 220 * encrypt updat [all...] |
H A D | kernelSession.h | 95 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsEncrypt.c | 60 kms_aes_ctx = (kms_aes_ctx_t *)session_p->encrypt.context; 75 free(session_p->encrypt.context); 76 session_p->encrypt.context = NULL; 86 kms_crypt_cleanup(kms_session_t *session_p, boolean_t encrypt, argument 97 active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt); 165 /* Check to see if encrypt operation is already active. */ 166 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { 176 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 185 session_p->encrypt [all...] |
H A D | kmsAESCrypt.c | 85 boolean_t encrypt) 105 if (encrypt) { 107 session_p->encrypt.context = kms_aes_ctx; 108 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 183 * This function calls the corresponding encrypt routine based 190 * CKR_FUNCTION_FAILED: encrypt function failed 202 (kms_aes_ctx_t *)session_p->encrypt.context; 204 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; 377 * For encrypt update, if there is remaining data, 443 free(session_p->encrypt 83 kms_aes_crypt_init_common(kms_session_t *session_p, CK_MECHANISM_PTR pMechanism, kms_object_t *key_p, boolean_t encrypt) argument [all...] |
H A D | kmsSession.h | 96 kms_active_op_t encrypt; member in struct:session
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softEncryptUtil.c | 50 * Perform encrypt init operation internally for the support of 64 /* Check to see if encrypt operation is already active */ 65 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { 70 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 78 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; 95 * encrypt init routine based on the mechanism. 143 soft_des_ctx = (soft_des_ctx_t *)session_p->encrypt.context; 154 free(session_p->encrypt.context); 155 session_p->encrypt.context = NULL; 166 B_TRUE /* encrypt */); 938 soft_crypt_cleanup(soft_session_t *session_p, boolean_t encrypt, boolean_t lock_held) argument [all...] |
H A D | softSession.h | 93 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session 169 soft_crypt_function_t *encrypt; member in struct:__anon2818
|
H A D | softKeystore.c | 2266 soft_keystore_crypt(soft_object_t *key_p, uchar_t *ivec, boolean_t encrypt, argument 2285 key_p, encrypt ? SOFT_ENCRYPT_OP : SOFT_DECRYPT_OP); 2293 if (encrypt) 2295 (soft_aes_ctx_t *)token_session.encrypt.context; 2312 if (encrypt) { 2313 free(token_session.encrypt.context); 2314 token_session.encrypt.context = NULL; 2316 free(token_session.encrypt.context); 2317 token_session.encrypt.context = NULL; 2330 if (encrypt) { [all...] |
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | sasl.c | 413 int encrypt = 0; local 416 encrypt = 1; 427 if (encrypt) { 474 if (encrypt) { 500 if (encrypt) {
|
/osnet-11/usr/src/grub/grub2/include/grub/ |
H A D | crypto.h | 126 gcry_cipher_encrypt_t encrypt; member in struct:gcry_cipher_spec
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 28 #pragma weak _encrypt = encrypt 817 * This program implements a data encryption algorithm to encrypt passwords. 895 * one of _unix_crypt(), encrypt() or setkey() is called. 1136 encrypt(char *block, int fake) function
|
Completed in 59 milliseconds