Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 50) sorted by relevance

12

/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c30 …text, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) in krb5_encrypt_helper() argument
39 cipher->ciphertext.length = enclen; in krb5_encrypt_helper()
42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { in krb5_encrypt_helper()
43 cipher->ciphertext.length = 0; in krb5_encrypt_helper()
46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); in krb5_encrypt_helper()
48 free(cipher->ciphertext.data); in krb5_encrypt_helper()
49 cipher->ciphertext.data = NULL; in krb5_encrypt_helper()
/titanic_41/usr/src/cmd/ssh/libssh/common/
H A Dcipher.c195 cipher_init(CipherContext *cc, Cipher *cipher, in cipher_init() argument
204 if (cipher->number == SSH_CIPHER_DES) { in cipher_init()
213 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); in cipher_init()
215 if (keylen < cipher->key_len) in cipher_init()
217 keylen, cipher->name); in cipher_init()
218 if (iv != NULL && ivlen < cipher->block_size) in cipher_init()
220 ivlen, cipher->name); in cipher_init()
221 cc->cipher = cipher; in cipher_init()
223 type = (*cipher->evptype)(); in cipher_init()
235 cipher->name); in cipher_init()
[all …]
H A Dauthfile.c76 Cipher *cipher; in key_save_private_rsa1() local
85 if ((cipher = cipher_by_number(cipher_num)) == NULL) in key_save_private_rsa1()
134 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_save_private_rsa1()
174 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; in key_save_private_pem() local
194 cipher, passphrase, len, NULL, NULL); in key_save_private_pem()
198 cipher, passphrase, len, NULL, NULL); in key_save_private_pem()
321 Cipher *cipher; in key_load_private_rsa1() local
373 cipher = cipher_by_number(cipher_type); in key_load_private_rsa1()
374 if (cipher == NULL) { in key_load_private_rsa1()
385 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_load_private_rsa1()
/titanic_41/usr/src/cmd/lofiadm/
H A Dmain.c375 mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly) in add_mapping() argument
382 if (cipher != NULL) { in add_mapping()
385 (void) strlcpy(li.li_cipher, cipher->name, in add_mapping()
393 li.li_iv_type = cipher->iv_type; in add_mapping()
394 li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */ in add_mapping()
395 switch (cipher->iv_type) { in add_mapping()
397 (void) strlcpy(li.li_iv_cipher, cipher->iv_name, in add_mapping()
582 kernel_cipher_check(mech_alias_t *cipher) in kernel_cipher_check() argument
595 if (cipher->iv_name == NULL) in kernel_cipher_check()
651 strcasecmp(cipher->name, kciphers->ml_list[i]) == 0) in kernel_cipher_check()
[all …]
/titanic_41/usr/src/lib/libnsl/des/
H A Ddes_soft.c396 #define cipher(iter, inR, inL, outR, outL) { \ in __des_encrypt() macro
410 cipher(0, r0, l0, r1, l1); in __des_encrypt()
411 cipher(1, r1, l1, r0, l0); in __des_encrypt()
412 cipher(2, r0, l0, r1, l1); in __des_encrypt()
413 cipher(3, r1, l1, r0, l0); in __des_encrypt()
414 cipher(4, r0, l0, r1, l1); in __des_encrypt()
415 cipher(5, r1, l1, r0, l0); in __des_encrypt()
416 cipher(6, r0, l0, r1, l1); in __des_encrypt()
417 cipher(7, r1, l1, r0, l0); in __des_encrypt()
418 cipher(8, r0, l0, r1, l1); in __des_encrypt()
[all …]
/titanic_41/usr/src/lib/libcrypt/common/
H A Ddes_soft.c361 #define cipher(iter, inR, inL, outR, outL) { \ in des_encrypt() macro
375 cipher(0, r0, l0, r1, l1); in des_encrypt()
376 cipher(1, r1, l1, r0, l0); in des_encrypt()
377 cipher(2, r0, l0, r1, l1); in des_encrypt()
378 cipher(3, r1, l1, r0, l0); in des_encrypt()
379 cipher(4, r0, l0, r1, l1); in des_encrypt()
380 cipher(5, r1, l1, r0, l0); in des_encrypt()
381 cipher(6, r0, l0, r1, l1); in des_encrypt()
382 cipher(7, r1, l1, r0, l0); in des_encrypt()
383 cipher(8, r0, l0, r1, l1); in des_encrypt()
[all …]
/titanic_41/usr/src/uts/common/des/
H A Ddes_soft.c319 #define cipher(iter, inR, inL, outR, outL) { \ in des_encrypt() macro
333 cipher(0, r0, l0, r1, l1); in des_encrypt()
334 cipher(1, r1, l1, r0, l0); in des_encrypt()
335 cipher(2, r0, l0, r1, l1); in des_encrypt()
336 cipher(3, r1, l1, r0, l0); in des_encrypt()
337 cipher(4, r0, l0, r1, l1); in des_encrypt()
338 cipher(5, r1, l1, r0, l0); in des_encrypt()
339 cipher(6, r0, l0, r1, l1); in des_encrypt()
340 cipher(7, r1, l1, r0, l0); in des_encrypt()
341 cipher(8, r0, l0, r1, l1); in des_encrypt()
[all …]
/titanic_41/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto.c129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, in ieee80211_crypto_newkey() argument
140 if (cipher >= IEEE80211_CIPHER_MAX) { in ieee80211_crypto_newkey()
142 "invalid cipher %u\n", cipher); in ieee80211_crypto_newkey()
145 cip = ic->ic_ciphers[cipher]; in ieee80211_crypto_newkey()
150 cipher, cipher < IEEE80211_N(cipher_modnames) ? in ieee80211_crypto_newkey()
151 cipher_modnames[cipher] : "<unknown>"); in ieee80211_crypto_newkey()
161 if ((ic->ic_caps & (1<<cipher)) == 0) { in ieee80211_crypto_newkey()
172 if (cipher == IEEE80211_CIPHER_TKIP && in ieee80211_crypto_newkey()
235 if (cipher == IEEE80211_CIPHER_TKIP) in ieee80211_crypto_newkey()
360 uint32_t cipher; in ieee80211_crypto_getciphertype() local
[all …]
/titanic_41/usr/src/common/net/wanboot/crypt/
H A Daes_test.c48 char cipher[AES_BLOCK_SIZE * 2]; member
71 unsigned char cipher[AES_BLOCK_SIZE]; in aestest() local
93 getxdata(cipher, td[i].cipher, AES_BLOCK_SIZE); in aestest()
98 if (bcmp(work, cipher, AES_BLOCK_SIZE) != 0) { in aestest()
H A Ddes3_test.c52 char cipher[DES3_BLOCK_SIZE * 2]; member
114 unsigned char cipher[DES3_BLOCK_SIZE]; in des3test() local
138 getxdata(cipher, td[i].cipher, DES3_BLOCK_SIZE); in des3test()
143 if (bcmp(work, cipher, DES3_BLOCK_SIZE) != 0) { in des3test()
/titanic_41/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c60 krb5_data cipher, clear; in process_chpw_request() local
81 cipher.length = 0; in process_chpw_request()
82 cipher.data = NULL; in process_chpw_request()
333 cipher.length = (req->data + req->length) - ptr; in process_chpw_request()
334 cipher.data = ptr; in process_chpw_request()
336 if (ret = krb5_rd_priv(context, auth_context, &cipher, in process_chpw_request()
431 cipher.length = 0; in process_chpw_request()
442 &cipher, &replay)) { in process_chpw_request()
455 if (cipher.length == 0) { in process_chpw_request()
492 ret = krb5_mk_error(context, &krberror, &cipher); in process_chpw_request()
[all …]
/titanic_41/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c81 krb5_enc_data cipher; in krb5_dbekd_decrypt_key_data() local
90 cipher.enctype = ENCTYPE_UNKNOWN; in krb5_dbekd_decrypt_key_data()
91 cipher.ciphertext.length = key_data->key_data_length[0]-2; in krb5_dbekd_decrypt_key_data()
92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ in krb5_dbekd_decrypt_key_data()
99 &cipher, &plain))) { in krb5_dbekd_decrypt_key_data()
H A Dencrypt_key.c84 krb5_enc_data cipher; in krb5_dbekd_encrypt_key_data() local
116 cipher.ciphertext.length = len; in krb5_dbekd_encrypt_key_data()
117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ in krb5_dbekd_encrypt_key_data()
120 &plain, &cipher))) { in krb5_dbekd_encrypt_key_data()
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa_enc.c31 aes_wrap(uint8_t *kek, int n, uint8_t *plain, uint8_t *cipher) in aes_wrap() argument
37 a = cipher; in aes_wrap()
38 r = cipher + 8; in aes_wrap()
55 r = cipher + 8; in aes_wrap()
82 aes_unwrap(uint8_t *kek, int n, uint8_t *cipher, uint8_t *plain) in aes_unwrap() argument
89 (void) memcpy(a, cipher, 8); in aes_unwrap()
91 (void) memcpy(r, cipher + 8, 8 * n); in aes_unwrap()
H A Ddriver_wifi.c196 dladm_wlan_cipher_t cipher; in wpa_driver_wifi_set_key() local
207 cipher = DLADM_WLAN_CIPHER_WEP; in wpa_driver_wifi_set_key()
211 cipher = DLADM_WLAN_CIPHER_TKIP; in wpa_driver_wifi_set_key()
215 cipher = DLADM_WLAN_CIPHER_AES_CCM; in wpa_driver_wifi_set_key()
235 status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx, in wpa_driver_wifi_set_key()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dk5sealv3.c145 krb5_enc_data cipher; in gss_krb5int_make_seal_token_v3() local
202 cipher.ciphertext.data = (char *)outbuf + 16; in gss_krb5int_make_seal_token_v3()
203 cipher.ciphertext.length = bufsize - 16; in gss_krb5int_make_seal_token_v3()
204 cipher.enctype = key->enctype; in gss_krb5int_make_seal_token_v3()
205 err = krb5_c_encrypt(context, key, key_usage, 0, &plain, &cipher); in gss_krb5int_make_seal_token_v3()
442 krb5_enc_data cipher; in gss_krb5int_unseal_token_v3() local
452 cipher.enctype = key->enctype; in gss_krb5int_unseal_token_v3()
453 cipher.ciphertext.length = bodysize - 16; in gss_krb5int_unseal_token_v3()
454 cipher.ciphertext.data = (char *)ptr + 16; in gss_krb5int_unseal_token_v3()
460 &cipher, &plain); in gss_krb5int_unseal_token_v3()
/titanic_41/usr/src/cmd/ssh/ssh/
H A Dsshconnect1.c897 if (options.cipher == SSH_CIPHER_NONE) in try_challenge_response_authentication()
932 if (options.cipher == SSH_CIPHER_NONE) in try_password_authentication()
1089 if (options.cipher == SSH_CIPHER_NOT_SET) { in ssh_kex()
1091 options.cipher = ssh_cipher_default; in ssh_kex()
1092 } else if (options.cipher == SSH_CIPHER_ILLEGAL || in ssh_kex()
1093 !(cipher_mask_ssh1(1) & (1 << options.cipher))) { in ssh_kex()
1096 options.cipher = ssh_cipher_default; in ssh_kex()
1099 if (!(supported_ciphers & (1 << options.cipher))) in ssh_kex()
1101 cipher_name(options.cipher)); in ssh_kex()
1103 debug("Encryption type: %.100s", cipher_name(options.cipher)); in ssh_kex()
[all …]
/titanic_41/usr/src/common/crypto/modes/
H A Decb.c44 int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct)) in ecb_cipher_contiguous_blocks()
88 cipher(ctx->ecb_keysched, blockp, blockp); in ecb_cipher_contiguous_blocks()
100 cipher(ctx->ecb_keysched, blockp, lastp); in ecb_cipher_contiguous_blocks()
H A Dctr.c45 int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct), in ctr_mode_contiguous_blocks()
91 cipher(ctx->ctr_keysched, (uint8_t *)ctx->ctr_cb, in ctr_mode_contiguous_blocks()
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dchap_ms.c151 DesEncrypt(clear, key, cipher) in DesEncrypt() argument
154 u_char *cipher; /* OUT 8 octets */
171 Collapse(des_input, cipher);
174 CHAPDEBUG((LOG_INFO, "DesEncrypt: 8 octet output: %.8B", cipher));
181 DesEncrypt(clear, key, cipher) in DesEncrypt() argument
184 u_char *cipher; /* OUT 8 octets */
197 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1);
200 CHAPDEBUG((LOG_INFO, "DesEncrypt: 8 octet output: %.8B", cipher));
/titanic_41/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.c53 cipher_proc cipher; /* Routine to en/decrypt with */ member
383 stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig); in __mk_sig()
400 cipher_proc cipher; /* cipher routine to use */ in __verify_sig() local
412 cipher = QOP_table[qop].verifier->signer->cipher; in __verify_sig()
415 if ((stat = (*cipher)(&buf, keys, ENCIPHER)) != DH_SUCCESS) in __verify_sig()
/titanic_41/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c194 struct digest_cipher *cipher; member
2567 struct digest_cipher *cipher; local
2592 cipher = available_ciphers1;
2594 cipher = available_ciphers;
2596 while (cipher->name) {
2598 if (stext->requiressf <= cipher->ssf &&
2599 stext->limitssf >= cipher->ssf) {
2606 if(strlen(cipheropts) + strlen(cipher->name) + 1 >=
2614 strcat(cipheropts, cipher->name);
2616 cipher++;
[all …]
/titanic_41/usr/src/uts/common/crypto/core/
H A Dkcf_prov_lib.c398 int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), in crypto_update_iov()
412 rv = (cipher)(ctx, input->cd_raw.iov_base + input->cd_offset, in crypto_update_iov()
420 int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), in crypto_update_uio()
462 (cipher)(ctx, uiop->uio_iov[vec_idx].iov_base + offset, in crypto_update_uio()
485 int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), in crypto_update_mp()
518 (cipher)(ctx, (char *)(mp->b_rptr + offset), cur_len, in crypto_update_mp()
/titanic_41/usr/src/cmd/ssh/libssh/
H A DMakefile.com37 cipher.o \
38 cipher-ctr.o \
/titanic_41/usr/src/cmd/ssh/include/
H A Dcipher.h75 Cipher *cipher; member

12