Searched refs:encrypt (Results 1 - 25 of 69) sorted by relevance

123

/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelEncrypt.c87 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE;
118 session_p->encrypt.mech = *pMechanism;
121 if (INPLACE_MECHANISM(session_p->encrypt.mech.mechanism)) {
122 session_p->encrypt.flags |= CRYPTO_OPERATION_INPLACE_OK;
155 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE;
175 crypto_encrypt_t encrypt; local
206 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
215 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) {
218 * operation, so we'll leave the active encrypt operation
220 * encrypt updat
[all...]
H A DkernelSession.h96 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session
/illumos-gate/usr/src/common/net/wanboot/crypt/
H A Dcbc.h43 void (*encrypt)(void *, uint8_t *); member in struct:cbc_handle_s
53 void (*encrypt)(void *, uint8_t *),
H A Dcbc.c83 ch->encrypt(ch->ks, thisp);
129 void (*encrypt)(void *, uint8_t *),
136 ch->encrypt = encrypt;
/illumos-gate/usr/src/head/
H A Dcrypt.h55 extern void encrypt(char *, int);
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/
H A Df_cbc.c33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt)
40 int encrypt;
71 if (encrypt)
83 if (encrypt)
112 * encrypting from cleartext to ciphertext, if encrypt != 0 or
113 * decrypting from ciphertext to cleartext, if encrypt == 0.
135 mit_des_cblock ivec, int encrypt)
141 KRB5_LOG(KRB5_INFO, "mit_des_cbc_encrypt() start encrypt=%d", encrypt);
147 (char *)out, length, key, &ivdata, encrypt);
131 mit_des_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, long length, krb5_keyblock *key, mit_des_cblock ivec, int encrypt) argument
[all...]
H A Dd3_cbc.c37 const mit_des_cblock ivec, int encrypt)
68 if (encrypt)
80 if (encrypt)
114 const mit_des_cblock ivec, int encrypt)
119 KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() start encrypt=%d", encrypt);
125 length, key, &ivdata, encrypt);
35 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument
110 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftEncryptUtil.c50 * Perform encrypt init operation internally for the support of
64 /* Check to see if encrypt operation is already active */
65 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) {
70 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE;
78 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE;
95 * encrypt init routine based on the mechanism.
166 soft_des_ctx = (soft_des_ctx_t *)session_p->encrypt.context;
180 free(session_p->encrypt.context);
181 session_p->encrypt.context = NULL;
220 soft_aes_ctx = (soft_aes_ctx_t *)session_p->encrypt
842 soft_crypt_cleanup(soft_session_t *session_p, boolean_t encrypt, boolean_t lock_held) argument
[all...]
H A DsoftARCFourCrypt.c45 soft_object_t *key_p, boolean_t encrypt)
76 active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt);
44 soft_arcfour_crypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
H A DsoftEncrypt.c71 /* Check to see if encrypt operation is already active. */
72 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) {
82 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE;
91 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE;
146 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
155 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) {
158 * operation, so we'll leave the active encrypt operation
160 * encrypt update operation.
175 * We will not terminate the active encrypt operation flag,
238 if (!(session_p->encrypt
[all...]
H A DsoftBlowfishCrypt.c39 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) {
59 if (encrypt) {
61 session_p->encrypt.context = soft_blowfish_ctx;
62 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
130 * This function calls the corresponding encrypt routine based
137 * CKR_FUNCTION_FAILED: encrypt function failed
148 (soft_blowfish_ctx_t *)session_p->encrypt.context;
281 * For encrypt update, if there is remaining data,
308 free(session_p->encrypt.context);
309 session_p->encrypt
38 soft_blowfish_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
[all...]
H A DsoftDESCrypt.c46 boolean_t encrypt)
72 if (encrypt) {
74 session_p->encrypt.context = soft_des_ctx;
75 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
165 * This function calls the corresponding encrypt routine based
172 * CKR_FUNCTION_FAILED: encrypt function failed
183 (soft_des_ctx_t *)session_p->encrypt.context;
185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism;
359 * For encrypt update, if there is remaining
395 * For encrypt updat
44 soft_des_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
[all...]
H A DsoftAESCrypt.c44 boolean_t encrypt)
64 if (encrypt) {
66 session_p->encrypt.context = soft_aes_ctx;
67 session_p->encrypt.mech.mechanism = pMechanism->mechanism;
143 * This function calls the corresponding encrypt routine based
150 * CKR_FUNCTION_FAILED: encrypt function failed
162 (soft_aes_ctx_t *)session_p->encrypt.context;
164 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism;
333 * For encrypt update, if there is a remaining
368 * For encrypt updat
42 soft_aes_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
[all...]
H A DsoftSignUtil.c518 if (session_p->encrypt.context != NULL) {
519 free(session_p->encrypt.context);
520 session_p->encrypt.context = NULL;
521 session_p->encrypt.flags = 0;
H A DsoftKeys.c182 * Wrapping key objects requires calling encrypt operations.
183 * Check to see if encrypt operation is already active.
185 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) {
191 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE;
202 session_p->encrypt.flags = 0;
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/
H A DMakefile.com28 ROOTLINK32= $(ROOTBIN32)/encrypt
29 ROOTLINK64= $(ROOTBIN64)/encrypt
H A DMakefile29 ROOTLINK= $(ROOTBIN)/encrypt
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/
H A Draw_encrypt.c58 return((*(enc->encrypt))(context, key, ivec, input, output));
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Ddes.c40 krb5_data *output, int encrypt)
44 KRB5_LOG(KRB5_INFO, "k5_des_docrypt() start encrypt=%d\n", encrypt);
60 (unsigned char *)mit_des_zeroblock, encrypt);
38 k5_des_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
H A Ddes3.c39 krb5_const krb5_data *input, krb5_data *output, int encrypt)
61 encrypt);
37 k5_des3_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.telnetd.c366 encr_data.encrypt.autoflag = 0;
757 encrypt_session_key(&skey, &encr_data.encrypt);
1000 (void) memset(&encr_data.encrypt, 0, sizeof (cipher_info_t));
1003 encr_data.encrypt.state = ENCR_STATE_NOT_READY;
1027 * encrypt in the same key.
1183 lstate = encr_data.encrypt.state;
1185 if (encr_data.encrypt.type == ENCTYPE_NULL) {
1196 * - DES ECB encrypt
1197 * encrypt the IV using itself as the key.
1214 if (!VALIDKEY(encr_data.encrypt
[all...]
/illumos-gate/usr/src/lib/libcrypt/common/
H A Dllib-lcrypt43 void encrypt(char *block, int edflag);
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A DMakefile36 ENC_OBJS= enc_des.o encrypt.o
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/
H A Dold_encrypt.c95 /* encrypt it */
106 if ((ret = ((*(enc->encrypt))(context, key, ivec, output, output))))
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dk5seal.c66 int encrypt,
111 if (encrypt || (!bigend && (toktype == KG_TOK_SEAL_MSG)))
147 if ((toktype == KG_TOK_SEAL_MSG) && encrypt) {
160 /* pad the plaintext, encrypt if needed, and stick it in the token */
302 if (encrypt) {
56 make_seal_token_v1(krb5_context context, krb5_keyblock *enc, krb5_keyblock *seq, gssint_uint64 *seqnum, int direction, gss_buffer_t text, gss_buffer_t token, int signalg, size_t cksum_size, int sealalg, int encrypt, int toktype, int bigend, gss_OID oid) argument

Completed in 87 milliseconds

123