/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsCrypt.h | 46 uint8_t ivec[AES_BLOCK_LEN]; /* initialization vector */ member in struct:kms_aes_ctx
|
H A D | kmsAESCrypt.c | 748 aes_cbc_ctx_init(void *key_sched, size_t size, uint8_t *ivec) argument 757 (void) memcpy(&aes_ctx->ac_iv[0], ivec, AES_BLOCK_LEN);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_ef_generic.c | 53 krb5_data *ivec, 90 (unsigned char *)ivec->data, 1); 51 k5_ef_mac(krb5_context context, krb5_keyblock *key, krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softCrypt.h | 47 uint8_t ivec[AES_BLOCK_LEN]; /* initialization vector */ member in struct:soft_aes_ctx 56 uint8_t ivec[BLOWFISH_BLOCK_LEN]; /* initialization vector */ member in struct:soft_blowfish_ctx 65 uint8_t ivec[DES_BLOCK_LEN]; /* initialization vector */ member in struct:soft_des_ctx 79 void *aes_cbc_ctx_init(void *key_sched, size_t size, uint8_t *ivec); 80 void *aes_ctr_ctx_init(void *key_sched, size_t size, uint8_t *ivec); 108 void *blowfish_cbc_ctx_init(void *key_sched, size_t size, uint8_t *ivec); 125 void *des_cbc_ctx_init(void *key_sched, size_t size, uint8_t *ivec,
|
H A D | softBlowfishCrypt.c | 484 blowfish_cbc_ctx_init(void *key_sched, size_t size, uint8_t *ivec) argument 494 (void) memcpy(&cbc_ctx->cbc_iv[0], ivec, BLOWFISH_BLOCK_LEN);
|
H A D | softAESCrypt.c | 935 aes_cbc_ctx_init(void *key_sched, size_t size, uint8_t *ivec) argument 946 (void) memcpy(&cbc_ctx->cbc_iv[0], ivec, AES_BLOCK_LEN);
|
H A D | softDESCrypt.c | 719 des_cbc_ctx_init(void *key_sched, size_t size, uint8_t *ivec, CK_KEY_TYPE type) argument 729 (void) memcpy(&cbc_ctx->cbc_iv[0], ivec, DES_BLOCK_LEN); 768 bzero(soft_des_ctx->ivec, DES_BLOCK_LEN); 802 encrypt_mech.pParameter = (void *)soft_des_ctx->ivec;
|
H A D | softKeystore.c | 2266 soft_keystore_crypt(soft_object_t *key_p, uchar_t *ivec, boolean_t encrypt, argument 2281 mech.pParameter = (void *)ivec; 2301 (void) memcpy(soft_aes_ctx->ivec, ivec, AES_BLOCK_LEN); 2306 soft_aes_ctx->ivec);
|
/osnet-11/usr/src/lib/libcrypt/common/ |
H A D | des.c | 99 cbc_crypt(char *key, char *buf, size_t len, unsigned int mode, char *ivec) argument 107 COPY8(ivec, dp.des_ivec); 109 COPY8(dp.des_ivec, ivec);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | k5_md5des.c | 48 krb5_keyusage usage, const krb5_data *ivec, 65 if (ivec) 149 krb5_const krb5_data *ivec, 166 if (ivec) 47 k5_md5des_hash(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 146 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
|
/osnet-11/usr/src/lib/libnsl/des/ |
H A D | des_crypt.c | 98 cbc_crypt(char *key, char *buf, size_t len, unsigned int mode, char *ivec) argument 105 COPY8(ivec, dp.des_ivec); 107 COPY8(dp.des_ivec, ivec); 193 unsigned int mode, char *ivec) 203 (void) memcpy(svec.c, ivec, sizeof (des_block)); 206 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 208 (void) memcpy(dvec.c, ivec, sizeof (des_block)); 216 (void) memcpy(ivec, svec.c, sizeof (des_block)); 219 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 222 (void) memcpy(ivec, dve 192 desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, unsigned int mode, char *ivec) argument 231 __cbc_triple_crypt(des_block keys[], char *buf, uint_t len, uint_t mode, char *ivec) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | aead.c | 236 krb5_keyusage keyusage, const krb5_data *ivec, 295 ret = ktp->decrypt(ktp, key, keyusage, ivec, iov, i); 235 krb5int_c_iov_decrypt_stream(const struct krb5_keytypes *ktp, krb5_key key, krb5_keyusage keyusage, const krb5_data *ivec, krb5_crypto_iov *data, size_t num_data) argument
|
H A D | old_api_glue.c | 41 krb5_pointer ivec) 48 if (ivec) { 53 ivecd.data = ivec; 69 return(krb5_c_encrypt(context, eblock->key, 0, ivec?&ivecd:0, 76 krb5_pointer ivec) 83 if (ivec) { 88 ivecd.data = ivec; 103 return(krb5_c_decrypt(context, eblock->key, 0, ivec?&ivecd:0, 290 krb5_pointer ivec, krb5_data *data, 301 if (ivec) { 39 krb5_encrypt(krb5_context context, krb5_const_pointer inptr, krb5_pointer outptr, size_t size, krb5_encrypt_block *eblock, krb5_pointer ivec) argument 74 krb5_decrypt(krb5_context context, krb5_const_pointer inptr, krb5_pointer outptr, size_t size, krb5_encrypt_block *eblock, krb5_pointer ivec) argument 289 krb5_encrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_data *data, krb5_enc_data *enc_data) argument 322 krb5_decrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_enc_data *enc_data, krb5_data *data) argument [all...] |
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 86 char ivec[8]; local 97 (void) memset(ivec, 0, 8); 99 err = cbc_crypt(key, buf, len, DES_ENCRYPT | DES_HW, ivec); 127 char ivec[8]; local 139 (void) memset(ivec, 0, 8); 141 err = cbc_crypt(key, buf, len, DES_DECRYPT | DES_HW, ivec); 265 char ivec[8]; local 329 (void) memset(ivec, 0, 8); 332 ivec); 377 char ivec[ local 470 des_block ivec, tkey; local [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | auth_des.c | 253 des_block ivec; local 280 ivec.key.high = ivec.key.low = 0; 283 DES_ENCRYPT | DES_HW, (char *)&ivec);
|
H A D | svcauth_des.c | 130 des_block ivec; local 271 ivec.key.high = ivec.key.low = 0; 274 (char *)&ivec);
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 88 * an CBC initialization vector ivec. 100 * the return ivec will be from the first decryption. 105 unsigned int mode, char *ivec) 118 /* Save the passed in ivec */ 119 memcpy(svec.c, ivec, sizeof (des_block)); 124 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 126 memcpy(dvec.c, ivec, sizeof (des_block)); 134 memcpy(ivec, svec.c, sizeof (des_block)); 142 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 144 /* If were decrypting ivec i 104 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, unsigned int mode, char *ivec) argument 164 des_block ivec; local 200 des_block ivec; local [all...] |
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 725 des_cblock ivec; /* initial vector for encoding */ member in struct:des_context_s 766 &c->ivec, 817 &c->ivec, 844 memcpy(c->ivec, ((char *) enckey) + 8, 8); 858 memcpy(c->ivec, ((char *) deckey) + 8, 8); 886 &c->ivec, 889 /* Update the ivec (des_cbc_encrypt implementations tend to be broken in 891 memcpy(c->ivec, input + (inputlen - 8), 8); 940 &c->ivec, 943 /* Update the ivec (des_cbc_encryp [all...] |