/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDecrypt.c | 69 session_p->decrypt.flags = CRYPTO_OPERATION_ACTIVE; in kernel_decrypt_init() 101 session_p->decrypt.mech = *pMechanism; in kernel_decrypt_init() 104 if (INPLACE_MECHANISM(session_p->decrypt.mech.mechanism)) { in kernel_decrypt_init() 105 session_p->decrypt.flags |= CRYPTO_OPERATION_INPLACE_OK; in kernel_decrypt_init() 121 if (session_p->decrypt.mech.mechanism == CKM_AES_CCM) { in kernel_decrypt_init() 161 session_p->decrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; in kernel_decrypt_init() 213 crypto_decrypt_t decrypt; in kernel_decrypt() local 223 if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in kernel_decrypt() 232 if (session_p->decrypt.flags & CRYPTO_OPERATION_UPDATE) { in kernel_decrypt() 243 decrypt.cd_session = session_p->k_session; in kernel_decrypt() [all …]
|
H A D | kernelSession.h | 97 crypto_active_op_t decrypt; /* context of active decrypt op */ member
|
H A D | kernelSessionUtil.c | 309 if (session_p->decrypt.context != NULL) in kernel_delete_session() 310 free(session_p->decrypt.context); in kernel_delete_session()
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDecryptUtil.c | 145 soft_des_ctx = (soft_des_ctx_t *)session_p->decrypt.context; in soft_decrypt_init() 158 freezero(session_p->decrypt.context, in soft_decrypt_init() 160 session_p->decrypt.context = NULL; in soft_decrypt_init() 198 (soft_blowfish_ctx_t *)session_p->decrypt.context; in soft_decrypt_init() 213 freezero(session_p->decrypt.context, in soft_decrypt_init() 215 session_p->decrypt.context = NULL; in soft_decrypt_init() 274 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; in soft_decrypt_common() 327 return (soft_arcfour_crypt(&(session_p->decrypt), pEncrypted, in soft_decrypt_common() 392 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; in soft_decrypt_update() 443 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; in soft_decrypt_final() [all …]
|
H A D | softDecrypt.c | 72 if (session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE) { in C_DecryptInit() 82 session_p->decrypt.flags = CRYPTO_OPERATION_ACTIVE; in C_DecryptInit() 91 session_p->decrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; in C_DecryptInit() 144 if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in C_Decrypt() 153 if (session_p->decrypt.flags & CRYPTO_OPERATION_UPDATE) { in C_Decrypt() 237 if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in C_DecryptUpdate() 242 session_p->decrypt.flags |= CRYPTO_OPERATION_UPDATE; in C_DecryptUpdate() 298 if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in C_DecryptFinal() 322 session_p->decrypt.flags = 0; in C_DecryptFinal()
|
H A D | softBlowfishCrypt.c | 66 session_p->decrypt.context = soft_blowfish_ctx; in soft_blowfish_crypt_init_common() 67 session_p->decrypt.mech.mechanism = pMechanism->mechanism; in soft_blowfish_crypt_init_common() 321 (soft_blowfish_ctx_t *)session_p->decrypt.context; in soft_blowfish_decrypt_common() 468 freezero(session_p->decrypt.context, in soft_blowfish_decrypt_common() 470 session_p->decrypt.context = NULL; in soft_blowfish_decrypt_common()
|
H A D | softAESCrypt.c | 309 session_p->decrypt.context = aes_ctx; in soft_aes_crypt_init_common() 310 session_p->decrypt.mech.mechanism = pMechanism->mechanism; in soft_aes_crypt_init_common() 638 aes_ctx_t *aes_ctx = session_p->decrypt.context; in soft_aes_decrypt() 639 CK_MECHANISM_TYPE mech = session_p->decrypt.mech.mechanism; in soft_aes_decrypt() 793 session_p->decrypt.context = NULL; in soft_aes_decrypt() 886 aes_ctx_t *aes_ctx = session_p->decrypt.context; in soft_aes_decrypt_update() 895 CK_MECHANISM_TYPE mech = session_p->decrypt.mech.mechanism; in soft_aes_decrypt_update() 1270 aes_ctx_t *aes_ctx = session_p->decrypt.context; in soft_aes_decrypt_final() 1271 CK_MECHANISM_TYPE mech = session_p->decrypt.mech.mechanism; in soft_aes_decrypt_final() 1438 session_p->decrypt.context = NULL; in soft_aes_decrypt_final()
|
H A D | softKeys.c | 282 if (session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE) { in C_UnwrapKey() 291 session_p->decrypt.flags = CRYPTO_OPERATION_ACTIVE; in C_UnwrapKey() 306 session_p->decrypt.flags = 0; in C_UnwrapKey()
|
H A D | softDESCrypt.c | 79 session_p->decrypt.context = soft_des_ctx; in soft_des_crypt_init_common() 80 session_p->decrypt.mech.mechanism = pMechanism->mechanism; in soft_des_crypt_init_common() 495 (soft_des_ctx_t *)session_p->decrypt.context; in soft_des_decrypt_common() 497 CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism; in soft_des_decrypt_common() 778 freezero(session_p->decrypt.context, sizeof (soft_des_ctx_t)); in soft_des_decrypt_common()
|
H A D | softARCFourCrypt.c | 76 active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt); in soft_arcfour_crypt_init()
|
H A D | softRSA.c | 231 session_p->decrypt.context = rsa_ctx; in soft_rsa_crypt_init_common() 232 session_p->decrypt.mech.mechanism = pMechanism->mechanism; in soft_rsa_crypt_init_common() 335 soft_rsa_ctx_t *rsa_ctx = session_p->decrypt.context; in soft_rsa_decrypt_common() 400 free(session_p->decrypt.context); in soft_rsa_decrypt_common() 401 session_p->decrypt.context = NULL; in soft_rsa_decrypt_common()
|
/illumos-gate/usr/src/uts/common/fs/zfs/sys/ |
H A D | dmu_objset.h | 205 int dmu_objset_hold_flags(const char *name, boolean_t decrypt, void *tag, 208 boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp); 210 dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt, 215 void dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, void *tag); 216 void dmu_objset_disown(objset_t *os, boolean_t decrypt, void *tag);
|
/illumos-gate/usr/src/cmd/smbsrv/test-crypt/ |
H A D | Makefile | 27 PROG= test-encrypt test-decrypt 94 test-decrypt := OBJS = $(TDOBJS) 95 test-decrypt : $(TDOBJS)
|
H A D | Run.sh | 41 $ROOT/usr/lib/smbsrv/test-decrypt
|
H A D | .gdbrc | 21 gdb.execute('file' + os.environ['ROOT'] + '/usr/lib/smbsrv/test-decrypt')
|
/illumos-gate/usr/src/test/crypto-tests/tests/common/ |
H A D | cryptotest_kcf.c | 349 crypto_decrypt_t decrypt; in decrypt_single() local 351 bzero(&decrypt, sizeof (decrypt)); in decrypt_single() 352 decrypt.cd_session = op->hsession; in decrypt_single() 353 decrypt.cd_datalen = op->outlen; in decrypt_single() 354 decrypt.cd_databuf = op->out; in decrypt_single() 355 decrypt.cd_encrlen = op->inlen; in decrypt_single() 356 decrypt.cd_encrbuf = op->in; in decrypt_single() 358 return (kcf_do_ioctl(CRYPTO_DECRYPT, (uint_t *)&decrypt, "single")); in decrypt_single()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 758 encrypt_session_key(&skey, &encr_data.decrypt); in kerberos5_is() 1001 (void) memset(&encr_data.decrypt, 0, sizeof (cipher_info_t)); in encrypt_init() 1004 encr_data.decrypt.state = ENCR_STATE_NOT_READY; in encrypt_init() 1029 (void) memcpy(p, encr_data.decrypt.keyid, encr_data.decrypt.keyidlen); in encrypt_send_request_start() 1030 p += encr_data.decrypt.keyidlen; in encrypt_send_request_start() 1085 encr_data.decrypt.type = type; in encrypt_is() 1087 lstate = encr_data.decrypt.state; in encrypt_is() 1105 (void) memcpy(encr_data.decrypt.ivec, data, in encrypt_is() 1111 encr_data.decrypt.type = type; in encrypt_is() 1120 encr_data.decrypt.type = 0; in encrypt_is() [all …]
|
/illumos-gate/usr/src/common/crypto/des/ |
H A D | des_impl.c | 507 uint8_t *out_block, boolean_t decrypt) in des3_crunch_block() argument 519 if (decrypt == B_TRUE) in des3_crunch_block() 543 if (decrypt == B_TRUE) in des3_crunch_block() 569 uint8_t *out_block, boolean_t decrypt) in des_crunch_block() argument 581 if (decrypt == B_TRUE) in des_crunch_block() 607 if (decrypt == B_TRUE) in des_crunch_block()
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | dmu_objset.c | 681 dmu_objset_hold_flags(const char *name, boolean_t decrypt, void *tag, in dmu_objset_hold_flags() argument 689 flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE; in dmu_objset_hold_flags() 717 boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) in dmu_objset_own_impl() argument 728 } else if (!readonly && decrypt && in dmu_objset_own_impl() 734 if (decrypt && arc_is_unauthenticated((*osp)->os_phys_buf)) { in dmu_objset_own_impl() 757 boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) in dmu_objset_own() argument 764 flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE; in dmu_objset_own() 773 err = dmu_objset_own_impl(ds, type, readonly, decrypt, tag, osp); in dmu_objset_own() 789 (ds->ds_dir->dd_crypto_obj == 0 || decrypt)) in dmu_objset_own() 798 boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp) in dmu_objset_own_obj() argument [all …]
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_decrypt.c | 47 return((*(enc->decrypt))(context, key, ivec, input, output)); in krb5_raw_decrypt()
|
/illumos-gate/usr/src/common/crypto/modes/ |
H A D | cbc.c | 188 int (*decrypt)(const void *, const uint8_t *, uint8_t *), in cbc_decrypt_contiguous_blocks() 237 decrypt(ctx->cbc_keysched, blockp, in cbc_decrypt_contiguous_blocks() 241 decrypt(ctx->cbc_keysched, blockp, blockp); in cbc_decrypt_contiguous_blocks()
|
/illumos-gate/usr/src/cmd/cmd-crypto/ |
H A D | Makefile | 28 decrypt \
|
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | Makefile | 26 PROG = decrypt
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | decrypt.c | 72 return((*(krb5_enctypes_list[i].decrypt)) in krb5_c_decrypt()
|
/illumos-gate/usr/src/lib/libcryptoutil/ |
H A D | README | 104 digest(1), mac(1), encrypt(1), decrypt(1) for translating 184 encrypt(1), decrypt(1), and libpkcs11(3crypto) for getting 197 encrypt(1) and decrypt(1) uses this function for reporting errors.
|