/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_dual.c | 52 crypto_data_t *pt, crypto_key_t *encr_key, crypto_key_t *mac_key, 72 rv = kcf_get_hardware_provider(encr_mech->cm_type, encr_key, 135 &lencr_mech, encr_key, &lmac_mech, mac_key, pt, ct, 141 sid, encr_key, mac_key, pt, ct, mac, spi_encr_tmpl, 174 crypto_key_t *encr_key, crypto_key_t *mac_key, 197 pd = kcf_get_dual_provider(encr_mech, encr_key, mac_mech, mac_key, 275 pd->pd_sid, encr_mech, encr_key, 279 pd->pd_sid, encr_mech, encr_key, pt, 374 &lencr_mech, encr_key, &lmac_mech, mac_key, pt, ct, 380 pd->pd_sid, encr_key, mac_ke 50 crypto_encrypt_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *encr_mech, crypto_mechanism_t *mac_mech, crypto_data_t *pt, crypto_key_t *encr_key, crypto_key_t *mac_key, crypto_ctx_template_t encr_tmpl, crypto_ctx_template_t mac_tmpl, crypto_dual_data_t *ct, crypto_data_t *mac, crypto_call_req_t *crq) argument 172 crypto_encrypt_mac(crypto_mechanism_t *encr_mech, crypto_mechanism_t *mac_mech, crypto_data_t *pt, crypto_key_t *encr_key, crypto_key_t *mac_key, crypto_ctx_template_t encr_tmpl, crypto_ctx_template_t mac_tmpl, crypto_dual_data_t *ct, crypto_data_t *mac, crypto_call_req_t *crq) argument 414 crypto_encrypt_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *encr_mech, crypto_mechanism_t *mac_mech, crypto_key_t *encr_key, crypto_key_t *mac_key, crypto_ctx_template_t encr_tmpl, crypto_ctx_template_t mac_tmpl, crypto_context_t *ctxp, crypto_call_req_t *cr) argument 552 crypto_encrypt_mac_init(crypto_mechanism_t *encr_mech, crypto_mechanism_t *mac_mech, crypto_key_t *encr_key, crypto_key_t *mac_key, crypto_ctx_template_t encr_tmpl, crypto_ctx_template_t mac_tmpl, crypto_context_t *ctxp, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_impl.h | 150 uint8_t encr_key[16]; /* EAPOL-Key Encryption Key (EK) */ member in struct:wpa_ptk
|
H A D | wpa.c | 1425 (void) memcpy(ek + 16, wpa_s->ptk.encr_key, 16); 1434 if (aes_unwrap(wpa_s->ptk.encr_key, maxkeylen / 8, 1599 (void) memcpy(ek + 16, wpa_s->ptk.encr_key, 16); 1615 if (aes_unwrap(wpa_s->ptk.encr_key, keydatalen / 8,
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sess_mgr.c | 989 CK_OBJECT_HANDLE encr_key, 1025 if (encr_key == 0) { 1068 if (encr_key != 0) { 1110 if (encr_key != 0) { 1164 sess->encr_ctx.key = encr_key; 1173 sess->decr_ctx.key = encr_key; 987 session_mgr_set_op_state( SESSION *sess, CK_OBJECT_HANDLE encr_key, CK_OBJECT_HANDLE auth_key, CK_BYTE *data) argument
|
/illumos-gate/usr/src/psm/stand/boot/sparc/common/ |
H A D | wbcli.c | 838 char encr_key[WANBOOT_MAXKEYLEN]; local 846 ret = prom_get_security_key(WANBOOT_AES_128_KEY_NAME, encr_key, 850 bcopy(encr_key, cliptr->varptr, AES_128_KEY_SIZE); 858 ret = prom_get_security_key(WANBOOT_DES3_KEY_NAME, encr_key, 862 bcopy(encr_key, cliptr->varptr, DES3_KEY_SIZE);
|
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | api.h | 212 crypto_key_t *encr_key, crypto_key_t *mac_key, 221 crypto_mechanism_t *mac_mech, crypto_key_t *encr_key,
|
H A D | impl.h | 924 #define KCF_PROV_ENCRYPT_MAC_INIT(pd, ctx, encr_mech, encr_key, mac_mech, \ 929 ctx, encr_mech, encr_key, mac_mech, mac_key, encr_ctx_template, \ 954 #define KCF_PROV_ENCRYPT_MAC_ATOMIC(pd, session, encr_mech, encr_key, \ 960 (pd)->pd_prov_handle, session, encr_mech, encr_key, \
|