/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 30 …text, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) in krb5_encrypt_helper() argument 39 cipher->ciphertext.length = enclen; in krb5_encrypt_helper() 42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { in krb5_encrypt_helper() 43 cipher->ciphertext.length = 0; in krb5_encrypt_helper() 46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); in krb5_encrypt_helper() 48 free(cipher->ciphertext.data); in krb5_encrypt_helper() 49 cipher->ciphertext.data = NULL; in krb5_encrypt_helper()
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | cipher.c | 195 cipher_init(CipherContext *cc, Cipher *cipher, in cipher_init() argument 204 if (cipher->number == SSH_CIPHER_DES) { in cipher_init() 213 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); in cipher_init() 215 if (keylen < cipher->key_len) in cipher_init() 217 keylen, cipher->name); in cipher_init() 218 if (iv != NULL && ivlen < cipher->block_size) in cipher_init() 220 ivlen, cipher->name); in cipher_init() 221 cc->cipher = cipher; in cipher_init() 223 type = (*cipher->evptype)(); in cipher_init() 235 cipher->name); in cipher_init() [all …]
|
H A D | authfile.c | 76 Cipher *cipher; in key_save_private_rsa1() local 85 if ((cipher = cipher_by_number(cipher_num)) == NULL) in key_save_private_rsa1() 134 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_save_private_rsa1() 174 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; in key_save_private_pem() local 194 cipher, passphrase, len, NULL, NULL); in key_save_private_pem() 198 cipher, passphrase, len, NULL, NULL); in key_save_private_pem() 321 Cipher *cipher; in key_load_private_rsa1() local 373 cipher = cipher_by_number(cipher_type); in key_load_private_rsa1() 374 if (cipher == NULL) { in key_load_private_rsa1() 385 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_load_private_rsa1()
|
/titanic_41/usr/src/cmd/lofiadm/ |
H A D | main.c | 375 mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly) in add_mapping() argument 382 if (cipher != NULL) { in add_mapping() 385 (void) strlcpy(li.li_cipher, cipher->name, in add_mapping() 393 li.li_iv_type = cipher->iv_type; in add_mapping() 394 li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */ in add_mapping() 395 switch (cipher->iv_type) { in add_mapping() 397 (void) strlcpy(li.li_iv_cipher, cipher->iv_name, in add_mapping() 582 kernel_cipher_check(mech_alias_t *cipher) in kernel_cipher_check() argument 595 if (cipher->iv_name == NULL) in kernel_cipher_check() 651 strcasecmp(cipher->name, kciphers->ml_list[i]) == 0) in kernel_cipher_check() [all …]
|
/titanic_41/usr/src/lib/libnsl/des/ |
H A D | des_soft.c | 396 #define cipher(iter, inR, inL, outR, outL) { \ in __des_encrypt() macro 410 cipher(0, r0, l0, r1, l1); in __des_encrypt() 411 cipher(1, r1, l1, r0, l0); in __des_encrypt() 412 cipher(2, r0, l0, r1, l1); in __des_encrypt() 413 cipher(3, r1, l1, r0, l0); in __des_encrypt() 414 cipher(4, r0, l0, r1, l1); in __des_encrypt() 415 cipher(5, r1, l1, r0, l0); in __des_encrypt() 416 cipher(6, r0, l0, r1, l1); in __des_encrypt() 417 cipher(7, r1, l1, r0, l0); in __des_encrypt() 418 cipher(8, r0, l0, r1, l1); in __des_encrypt() [all …]
|
/titanic_41/usr/src/lib/libcrypt/common/ |
H A D | des_soft.c | 361 #define cipher(iter, inR, inL, outR, outL) { \ in des_encrypt() macro 375 cipher(0, r0, l0, r1, l1); in des_encrypt() 376 cipher(1, r1, l1, r0, l0); in des_encrypt() 377 cipher(2, r0, l0, r1, l1); in des_encrypt() 378 cipher(3, r1, l1, r0, l0); in des_encrypt() 379 cipher(4, r0, l0, r1, l1); in des_encrypt() 380 cipher(5, r1, l1, r0, l0); in des_encrypt() 381 cipher(6, r0, l0, r1, l1); in des_encrypt() 382 cipher(7, r1, l1, r0, l0); in des_encrypt() 383 cipher(8, r0, l0, r1, l1); in des_encrypt() [all …]
|
/titanic_41/usr/src/uts/common/des/ |
H A D | des_soft.c | 319 #define cipher(iter, inR, inL, outR, outL) { \ in des_encrypt() macro 333 cipher(0, r0, l0, r1, l1); in des_encrypt() 334 cipher(1, r1, l1, r0, l0); in des_encrypt() 335 cipher(2, r0, l0, r1, l1); in des_encrypt() 336 cipher(3, r1, l1, r0, l0); in des_encrypt() 337 cipher(4, r0, l0, r1, l1); in des_encrypt() 338 cipher(5, r1, l1, r0, l0); in des_encrypt() 339 cipher(6, r0, l0, r1, l1); in des_encrypt() 340 cipher(7, r1, l1, r0, l0); in des_encrypt() 341 cipher(8, r0, l0, r1, l1); in des_encrypt() [all …]
|
/titanic_41/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto.c | 129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, in ieee80211_crypto_newkey() argument 140 if (cipher >= IEEE80211_CIPHER_MAX) { in ieee80211_crypto_newkey() 142 "invalid cipher %u\n", cipher); in ieee80211_crypto_newkey() 145 cip = ic->ic_ciphers[cipher]; in ieee80211_crypto_newkey() 150 cipher, cipher < IEEE80211_N(cipher_modnames) ? in ieee80211_crypto_newkey() 151 cipher_modnames[cipher] : "<unknown>"); in ieee80211_crypto_newkey() 161 if ((ic->ic_caps & (1<<cipher)) == 0) { in ieee80211_crypto_newkey() 172 if (cipher == IEEE80211_CIPHER_TKIP && in ieee80211_crypto_newkey() 235 if (cipher == IEEE80211_CIPHER_TKIP) in ieee80211_crypto_newkey() 360 uint32_t cipher; in ieee80211_crypto_getciphertype() local [all …]
|
/titanic_41/usr/src/common/net/wanboot/crypt/ |
H A D | aes_test.c | 48 char cipher[AES_BLOCK_SIZE * 2]; member 71 unsigned char cipher[AES_BLOCK_SIZE]; in aestest() local 93 getxdata(cipher, td[i].cipher, AES_BLOCK_SIZE); in aestest() 98 if (bcmp(work, cipher, AES_BLOCK_SIZE) != 0) { in aestest()
|
H A D | des3_test.c | 52 char cipher[DES3_BLOCK_SIZE * 2]; member 114 unsigned char cipher[DES3_BLOCK_SIZE]; in des3test() local 138 getxdata(cipher, td[i].cipher, DES3_BLOCK_SIZE); in des3test() 143 if (bcmp(work, cipher, DES3_BLOCK_SIZE) != 0) { in des3test()
|
/titanic_41/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 60 krb5_data cipher, clear; in process_chpw_request() local 81 cipher.length = 0; in process_chpw_request() 82 cipher.data = NULL; in process_chpw_request() 333 cipher.length = (req->data + req->length) - ptr; in process_chpw_request() 334 cipher.data = ptr; in process_chpw_request() 336 if (ret = krb5_rd_priv(context, auth_context, &cipher, in process_chpw_request() 431 cipher.length = 0; in process_chpw_request() 442 &cipher, &replay)) { in process_chpw_request() 455 if (cipher.length == 0) { in process_chpw_request() 492 ret = krb5_mk_error(context, &krberror, &cipher); in process_chpw_request() [all …]
|
/titanic_41/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 81 krb5_enc_data cipher; in krb5_dbekd_decrypt_key_data() local 90 cipher.enctype = ENCTYPE_UNKNOWN; in krb5_dbekd_decrypt_key_data() 91 cipher.ciphertext.length = key_data->key_data_length[0]-2; in krb5_dbekd_decrypt_key_data() 92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ in krb5_dbekd_decrypt_key_data() 99 &cipher, &plain))) { in krb5_dbekd_decrypt_key_data()
|
H A D | encrypt_key.c | 84 krb5_enc_data cipher; in krb5_dbekd_encrypt_key_data() local 116 cipher.ciphertext.length = len; in krb5_dbekd_encrypt_key_data() 117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ in krb5_dbekd_encrypt_key_data() 120 &plain, &cipher))) { in krb5_dbekd_encrypt_key_data()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_enc.c | 31 aes_wrap(uint8_t *kek, int n, uint8_t *plain, uint8_t *cipher) in aes_wrap() argument 37 a = cipher; in aes_wrap() 38 r = cipher + 8; in aes_wrap() 55 r = cipher + 8; in aes_wrap() 82 aes_unwrap(uint8_t *kek, int n, uint8_t *cipher, uint8_t *plain) in aes_unwrap() argument 89 (void) memcpy(a, cipher, 8); in aes_unwrap() 91 (void) memcpy(r, cipher + 8, 8 * n); in aes_unwrap()
|
H A D | driver_wifi.c | 196 dladm_wlan_cipher_t cipher; in wpa_driver_wifi_set_key() local 207 cipher = DLADM_WLAN_CIPHER_WEP; in wpa_driver_wifi_set_key() 211 cipher = DLADM_WLAN_CIPHER_TKIP; in wpa_driver_wifi_set_key() 215 cipher = DLADM_WLAN_CIPHER_AES_CCM; in wpa_driver_wifi_set_key() 235 status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx, in wpa_driver_wifi_set_key()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5sealv3.c | 145 krb5_enc_data cipher; in gss_krb5int_make_seal_token_v3() local 202 cipher.ciphertext.data = (char *)outbuf + 16; in gss_krb5int_make_seal_token_v3() 203 cipher.ciphertext.length = bufsize - 16; in gss_krb5int_make_seal_token_v3() 204 cipher.enctype = key->enctype; in gss_krb5int_make_seal_token_v3() 205 err = krb5_c_encrypt(context, key, key_usage, 0, &plain, &cipher); in gss_krb5int_make_seal_token_v3() 442 krb5_enc_data cipher; in gss_krb5int_unseal_token_v3() local 452 cipher.enctype = key->enctype; in gss_krb5int_unseal_token_v3() 453 cipher.ciphertext.length = bodysize - 16; in gss_krb5int_unseal_token_v3() 454 cipher.ciphertext.data = (char *)ptr + 16; in gss_krb5int_unseal_token_v3() 460 &cipher, &plain); in gss_krb5int_unseal_token_v3()
|
/titanic_41/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect1.c | 897 if (options.cipher == SSH_CIPHER_NONE) in try_challenge_response_authentication() 932 if (options.cipher == SSH_CIPHER_NONE) in try_password_authentication() 1089 if (options.cipher == SSH_CIPHER_NOT_SET) { in ssh_kex() 1091 options.cipher = ssh_cipher_default; in ssh_kex() 1092 } else if (options.cipher == SSH_CIPHER_ILLEGAL || in ssh_kex() 1093 !(cipher_mask_ssh1(1) & (1 << options.cipher))) { in ssh_kex() 1096 options.cipher = ssh_cipher_default; in ssh_kex() 1099 if (!(supported_ciphers & (1 << options.cipher))) in ssh_kex() 1101 cipher_name(options.cipher)); in ssh_kex() 1103 debug("Encryption type: %.100s", cipher_name(options.cipher)); in ssh_kex() [all …]
|
/titanic_41/usr/src/common/crypto/modes/ |
H A D | ecb.c | 44 int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct)) in ecb_cipher_contiguous_blocks() 88 cipher(ctx->ecb_keysched, blockp, blockp); in ecb_cipher_contiguous_blocks() 100 cipher(ctx->ecb_keysched, blockp, lastp); in ecb_cipher_contiguous_blocks()
|
H A D | ctr.c | 45 int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct), in ctr_mode_contiguous_blocks() 91 cipher(ctx->ctr_keysched, (uint8_t *)ctx->ctr_cb, in ctr_mode_contiguous_blocks()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | chap_ms.c | 151 DesEncrypt(clear, key, cipher) in DesEncrypt() argument 154 u_char *cipher; /* OUT 8 octets */ 171 Collapse(des_input, cipher); 174 CHAPDEBUG((LOG_INFO, "DesEncrypt: 8 octet output: %.8B", cipher)); 181 DesEncrypt(clear, key, cipher) in DesEncrypt() argument 184 u_char *cipher; /* OUT 8 octets */ 197 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1); 200 CHAPDEBUG((LOG_INFO, "DesEncrypt: 8 octet output: %.8B", cipher));
|
/titanic_41/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 53 cipher_proc cipher; /* Routine to en/decrypt with */ member 383 stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig); in __mk_sig() 400 cipher_proc cipher; /* cipher routine to use */ in __verify_sig() local 412 cipher = QOP_table[qop].verifier->signer->cipher; in __verify_sig() 415 if ((stat = (*cipher)(&buf, keys, ENCIPHER)) != DH_SUCCESS) in __verify_sig()
|
/titanic_41/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 194 struct digest_cipher *cipher; member 2567 struct digest_cipher *cipher; local 2592 cipher = available_ciphers1; 2594 cipher = available_ciphers; 2596 while (cipher->name) { 2598 if (stext->requiressf <= cipher->ssf && 2599 stext->limitssf >= cipher->ssf) { 2606 if(strlen(cipheropts) + strlen(cipher->name) + 1 >= 2614 strcat(cipheropts, cipher->name); 2616 cipher++; [all …]
|
/titanic_41/usr/src/uts/common/crypto/core/ |
H A D | kcf_prov_lib.c | 398 int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), in crypto_update_iov() 412 rv = (cipher)(ctx, input->cd_raw.iov_base + input->cd_offset, in crypto_update_iov() 420 int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), in crypto_update_uio() 462 (cipher)(ctx, uiop->uio_iov[vec_idx].iov_base + offset, in crypto_update_uio() 485 int (*cipher)(void *, caddr_t, size_t, crypto_data_t *), in crypto_update_mp() 518 (cipher)(ctx, (char *)(mp->b_rptr + offset), cur_len, in crypto_update_mp()
|
/titanic_41/usr/src/cmd/ssh/libssh/ |
H A D | Makefile.com | 37 cipher.o \ 38 cipher-ctr.o \
|
/titanic_41/usr/src/cmd/ssh/include/ |
H A D | cipher.h | 75 Cipher *cipher; member
|