/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEncrypt.c | 87 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 118 session_p->encrypt.mech = *pMechanism; 121 if (INPLACE_MECHANISM(session_p->encrypt.mech.mechanism)) { 122 session_p->encrypt.flags |= CRYPTO_OPERATION_INPLACE_OK; 155 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; 175 crypto_encrypt_t encrypt; local 206 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { 215 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) { 218 * operation, so we'll leave the active encrypt operation 220 * encrypt updat [all...] |
H A D | kernelSession.h | 96 crypto_active_op_t encrypt; /* context of active encrypt op */ member in struct:session
|
/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | cbc.h | 43 void (*encrypt)(void *, uint8_t *); member in struct:cbc_handle_s 53 void (*encrypt)(void *, uint8_t *),
|
H A D | cbc.c | 83 ch->encrypt(ch->ks, thisp); 129 void (*encrypt)(void *, uint8_t *), 136 ch->encrypt = encrypt;
|
/illumos-gate/usr/src/head/ |
H A D | crypt.h | 55 extern void encrypt(char *, int);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | f_cbc.c | 33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt) 40 int encrypt; 71 if (encrypt) 83 if (encrypt) 112 * encrypting from cleartext to ciphertext, if encrypt != 0 or 113 * decrypting from ciphertext to cleartext, if encrypt == 0. 135 mit_des_cblock ivec, int encrypt) 141 KRB5_LOG(KRB5_INFO, "mit_des_cbc_encrypt() start encrypt=%d", encrypt); 147 (char *)out, length, key, &ivdata, encrypt); 131 mit_des_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, long length, krb5_keyblock *key, mit_des_cblock ivec, int encrypt) argument [all...] |
H A D | d3_cbc.c | 37 const mit_des_cblock ivec, int encrypt) 68 if (encrypt) 80 if (encrypt) 114 const mit_des_cblock ivec, int encrypt) 119 KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() start encrypt=%d", encrypt); 125 length, key, &ivdata, encrypt); 35 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument 110 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softEncryptUtil.c | 50 * Perform encrypt init operation internally for the support of 64 /* Check to see if encrypt operation is already active */ 65 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { 70 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 78 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; 95 * encrypt init routine based on the mechanism. 166 soft_des_ctx = (soft_des_ctx_t *)session_p->encrypt.context; 180 free(session_p->encrypt.context); 181 session_p->encrypt.context = NULL; 220 soft_aes_ctx = (soft_aes_ctx_t *)session_p->encrypt 842 soft_crypt_cleanup(soft_session_t *session_p, boolean_t encrypt, boolean_t lock_held) argument [all...] |
H A D | softARCFourCrypt.c | 45 soft_object_t *key_p, boolean_t encrypt) 76 active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt); 44 soft_arcfour_crypt_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument
|
H A D | softEncrypt.c | 71 /* Check to see if encrypt operation is already active. */ 72 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { 82 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 91 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; 146 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { 155 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) { 158 * operation, so we'll leave the active encrypt operation 160 * encrypt update operation. 175 * We will not terminate the active encrypt operation flag, 238 if (!(session_p->encrypt [all...] |
H A D | softBlowfishCrypt.c | 39 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) { 59 if (encrypt) { 61 session_p->encrypt.context = soft_blowfish_ctx; 62 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 130 * This function calls the corresponding encrypt routine based 137 * CKR_FUNCTION_FAILED: encrypt function failed 148 (soft_blowfish_ctx_t *)session_p->encrypt.context; 281 * For encrypt update, if there is remaining data, 308 free(session_p->encrypt.context); 309 session_p->encrypt 38 soft_blowfish_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument [all...] |
H A D | softDESCrypt.c | 46 boolean_t encrypt) 72 if (encrypt) { 74 session_p->encrypt.context = soft_des_ctx; 75 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 165 * This function calls the corresponding encrypt routine based 172 * CKR_FUNCTION_FAILED: encrypt function failed 183 (soft_des_ctx_t *)session_p->encrypt.context; 185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; 359 * For encrypt update, if there is remaining 395 * For encrypt updat 44 soft_des_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument [all...] |
H A D | softAESCrypt.c | 44 boolean_t encrypt) 64 if (encrypt) { 66 session_p->encrypt.context = soft_aes_ctx; 67 session_p->encrypt.mech.mechanism = pMechanism->mechanism; 143 * This function calls the corresponding encrypt routine based 150 * CKR_FUNCTION_FAILED: encrypt function failed 162 (soft_aes_ctx_t *)session_p->encrypt.context; 164 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; 333 * For encrypt update, if there is a remaining 368 * For encrypt updat 42 soft_aes_crypt_init_common(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) argument [all...] |
H A D | softSignUtil.c | 518 if (session_p->encrypt.context != NULL) { 519 free(session_p->encrypt.context); 520 session_p->encrypt.context = NULL; 521 session_p->encrypt.flags = 0;
|
H A D | softKeys.c | 182 * Wrapping key objects requires calling encrypt operations. 183 * Check to see if encrypt operation is already active. 185 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { 191 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; 202 session_p->encrypt.flags = 0;
|
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | Makefile.com | 28 ROOTLINK32= $(ROOTBIN32)/encrypt 29 ROOTLINK64= $(ROOTBIN64)/encrypt
|
H A D | Makefile | 29 ROOTLINK= $(ROOTBIN)/encrypt
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_encrypt.c | 58 return((*(enc->encrypt))(context, key, ivec, input, output));
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | des.c | 40 krb5_data *output, int encrypt) 44 KRB5_LOG(KRB5_INFO, "k5_des_docrypt() start encrypt=%d\n", encrypt); 60 (unsigned char *)mit_des_zeroblock, encrypt); 38 k5_des_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
|
H A D | des3.c | 39 krb5_const krb5_data *input, krb5_data *output, int encrypt) 61 encrypt); 37 k5_des3_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 366 encr_data.encrypt.autoflag = 0; 757 encrypt_session_key(&skey, &encr_data.encrypt); 1000 (void) memset(&encr_data.encrypt, 0, sizeof (cipher_info_t)); 1003 encr_data.encrypt.state = ENCR_STATE_NOT_READY; 1027 * encrypt in the same key. 1183 lstate = encr_data.encrypt.state; 1185 if (encr_data.encrypt.type == ENCTYPE_NULL) { 1196 * - DES ECB encrypt 1197 * encrypt the IV using itself as the key. 1214 if (!VALIDKEY(encr_data.encrypt [all...] |
/illumos-gate/usr/src/lib/libcrypt/common/ |
H A D | llib-lcrypt | 43 void encrypt(char *block, int edflag);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | Makefile | 36 ENC_OBJS= enc_des.o encrypt.o
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_encrypt.c | 95 /* encrypt it */ 106 if ((ret = ((*(enc->encrypt))(context, key, ivec, output, output))))
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5seal.c | 66 int encrypt, 111 if (encrypt || (!bigend && (toktype == KG_TOK_SEAL_MSG))) 147 if ((toktype == KG_TOK_SEAL_MSG) && encrypt) { 160 /* pad the plaintext, encrypt if needed, and stick it in the token */ 302 if (encrypt) { 56 make_seal_token_v1(krb5_context context, krb5_keyblock *enc, krb5_keyblock *seq, gssint_uint64 *seqnum, int direction, gss_buffer_t text, gss_buffer_t token, int signalg, size_t cksum_size, int sealalg, int encrypt, int toktype, int bigend, gss_OID oid) argument
|