/titanic_44/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelEncrypt.c | 87 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; in C_EncryptInit() 118 session_p->encrypt.mech = *pMechanism; in C_EncryptInit() 121 if (INPLACE_MECHANISM(session_p->encrypt.mech.mechanism)) { in C_EncryptInit() 122 session_p->encrypt.flags |= CRYPTO_OPERATION_INPLACE_OK; in C_EncryptInit() 155 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; in C_EncryptInit() 175 crypto_encrypt_t encrypt; in C_Encrypt() local 206 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in C_Encrypt() 215 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) { in C_Encrypt() 226 encrypt.ce_session = session_p->k_session; in C_Encrypt() 235 inplace = (session_p->encrypt.flags & CRYPTO_OPERATION_INPLACE_OK) != 0; in C_Encrypt() [all …]
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softEncryptUtil.c | 65 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { in soft_encrypt_init_internal() 70 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; in soft_encrypt_init_internal() 78 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; in soft_encrypt_init_internal() 166 soft_des_ctx = (soft_des_ctx_t *)session_p->encrypt.context; in soft_encrypt_init() 180 free(session_p->encrypt.context); in soft_encrypt_init() 181 session_p->encrypt.context = NULL; in soft_encrypt_init() 220 soft_aes_ctx = (soft_aes_ctx_t *)session_p->encrypt.context; in soft_encrypt_init() 234 free(session_p->encrypt.context); in soft_encrypt_init() 235 session_p->encrypt.context = NULL; in soft_encrypt_init() 264 soft_aes_ctx = (soft_aes_ctx_t *)session_p->encrypt.context; in soft_encrypt_init() [all …]
|
H A D | softEncrypt.c | 72 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { in C_EncryptInit() 82 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; in C_EncryptInit() 91 session_p->encrypt.flags &= ~CRYPTO_OPERATION_ACTIVE; in C_EncryptInit() 146 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in C_Encrypt() 155 if (session_p->encrypt.flags & CRYPTO_OPERATION_UPDATE) { in C_Encrypt() 238 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in C_EncryptUpdate() 243 session_p->encrypt.flags |= CRYPTO_OPERATION_UPDATE; in C_EncryptUpdate() 300 if (!(session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE)) { in C_EncryptFinal() 325 session_p->encrypt.flags = 0; in C_EncryptFinal()
|
H A D | softARCFourCrypt.c | 45 soft_object_t *key_p, boolean_t encrypt) in soft_arcfour_crypt_init() argument 76 active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt); in soft_arcfour_crypt_init()
|
H A D | softBlowfishCrypt.c | 39 CK_MECHANISM_PTR pMechanism, soft_object_t *key_p, boolean_t encrypt) { in soft_blowfish_crypt_init_common() argument 59 if (encrypt) { in soft_blowfish_crypt_init_common() 61 session_p->encrypt.context = soft_blowfish_ctx; in soft_blowfish_crypt_init_common() 62 session_p->encrypt.mech.mechanism = pMechanism->mechanism; in soft_blowfish_crypt_init_common() 148 (soft_blowfish_ctx_t *)session_p->encrypt.context; in soft_blowfish_encrypt_common() 308 free(session_p->encrypt.context); in soft_blowfish_encrypt_common() 309 session_p->encrypt.context = NULL; in soft_blowfish_encrypt_common()
|
H A D | softDESCrypt.c | 46 boolean_t encrypt) in soft_des_crypt_init_common() argument 72 if (encrypt) { in soft_des_crypt_init_common() 74 session_p->encrypt.context = soft_des_ctx; in soft_des_crypt_init_common() 75 session_p->encrypt.mech.mechanism = pMechanism->mechanism; in soft_des_crypt_init_common() 183 (soft_des_ctx_t *)session_p->encrypt.context; in soft_des_encrypt_common() 185 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; in soft_des_encrypt_common() 458 free(session_p->encrypt.context); in soft_des_encrypt_common() 459 session_p->encrypt.context = NULL; in soft_des_encrypt_common() 954 (soft_des_ctx_t *)session_p->encrypt.context; in soft_des_sign_verify_common() 982 (soft_des_ctx_t *)session_p->encrypt.context; in soft_des_sign_verify_common() [all …]
|
H A D | softAESCrypt.c | 44 boolean_t encrypt) in soft_aes_crypt_init_common() argument 64 if (encrypt) { in soft_aes_crypt_init_common() 66 session_p->encrypt.context = soft_aes_ctx; in soft_aes_crypt_init_common() 67 session_p->encrypt.mech.mechanism = pMechanism->mechanism; in soft_aes_crypt_init_common() 162 (soft_aes_ctx_t *)session_p->encrypt.context; in soft_aes_encrypt_common() 164 CK_MECHANISM_TYPE mechanism = session_p->encrypt.mech.mechanism; in soft_aes_encrypt_common() 459 free(session_p->encrypt.context); in soft_aes_encrypt_common() 460 session_p->encrypt.context = NULL; in soft_aes_encrypt_common()
|
H A D | softSignUtil.c | 518 if (session_p->encrypt.context != NULL) { in soft_sign_verify_cleanup() 519 free(session_p->encrypt.context); in soft_sign_verify_cleanup() 520 session_p->encrypt.context = NULL; in soft_sign_verify_cleanup() 521 session_p->encrypt.flags = 0; in soft_sign_verify_cleanup()
|
H A D | softKeys.c | 185 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { in C_WrapKey() 191 session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE; in C_WrapKey() 202 session_p->encrypt.flags = 0; in C_WrapKey()
|
H A D | softRSA.c | 191 boolean_t encrypt) in soft_rsa_crypt_init_common() argument 225 if (encrypt) { in soft_rsa_crypt_init_common() 227 session_p->encrypt.context = rsa_ctx; in soft_rsa_crypt_init_common() 228 session_p->encrypt.mech.mechanism = pMechanism->mechanism; in soft_rsa_crypt_init_common() 245 soft_rsa_ctx_t *rsa_ctx = session_p->encrypt.context; in soft_rsa_encrypt_common() 319 free(session_p->encrypt.context); in soft_rsa_encrypt_common() 320 session_p->encrypt.context = NULL; in soft_rsa_encrypt_common()
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | f_cbc.c | 33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt) in mit_des_cbc_encrypt() argument 40 int encrypt; 71 if (encrypt) 83 if (encrypt) 135 mit_des_cblock ivec, int encrypt) in mit_des_cbc_encrypt() argument 141 KRB5_LOG(KRB5_INFO, "mit_des_cbc_encrypt() start encrypt=%d", encrypt); in mit_des_cbc_encrypt() 147 (char *)out, length, key, &ivdata, encrypt); in mit_des_cbc_encrypt()
|
H A D | d3_cbc.c | 37 const mit_des_cblock ivec, int encrypt) in mit_des3_cbc_encrypt() argument 68 if (encrypt) in mit_des3_cbc_encrypt() 80 if (encrypt) in mit_des3_cbc_encrypt() 114 const mit_des_cblock ivec, int encrypt) in mit_des3_cbc_encrypt() argument 119 KRB5_LOG(KRB5_INFO, "mit_des3_cbc_encrypt() start encrypt=%d", encrypt); in mit_des3_cbc_encrypt() 125 length, key, &ivdata, encrypt); in mit_des3_cbc_encrypt()
|
/titanic_44/usr/src/common/net/wanboot/crypt/ |
H A D | cbc.c | 83 ch->encrypt(ch->ks, thisp); in cbc_encrypt() 129 void (*encrypt)(void *, uint8_t *), in cbc_makehandle() 136 ch->encrypt = encrypt; in cbc_makehandle()
|
H A D | cbc.h | 43 void (*encrypt)(void *, uint8_t *); member 53 void (*encrypt)(void *, uint8_t *),
|
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 366 encr_data.encrypt.autoflag = 0; in auth_finished() 757 encrypt_session_key(&skey, &encr_data.encrypt); in kerberos5_is() 1000 (void) memset(&encr_data.encrypt, 0, sizeof (cipher_info_t)); in encrypt_init() 1003 encr_data.encrypt.state = ENCR_STATE_NOT_READY; in encrypt_init() 1183 lstate = encr_data.encrypt.state; in encrypt_send_encrypt_is() 1185 if (encr_data.encrypt.type == ENCTYPE_NULL) { in encrypt_send_encrypt_is() 1214 if (!VALIDKEY(encr_data.encrypt.krbdes_key)) { in encrypt_send_encrypt_is() 1219 encr_data.encrypt.need_start = 1; in encrypt_send_encrypt_is() 1236 kret = getrandom((char *)encr_data.encrypt.ivec, sizeof (Block)); in encrypt_send_encrypt_is() 1244 encr_data.encrypt.type = ENCTYPE_NULL; in encrypt_send_encrypt_is() [all …]
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | des.c | 40 krb5_data *output, int encrypt) in k5_des_docrypt() argument 44 KRB5_LOG(KRB5_INFO, "k5_des_docrypt() start encrypt=%d\n", encrypt); in k5_des_docrypt() 60 (unsigned char *)mit_des_zeroblock, encrypt); in k5_des_docrypt()
|
H A D | des3.c | 39 krb5_const krb5_data *input, krb5_data *output, int encrypt) in k5_des3_docrypt() argument 61 encrypt); in k5_des3_docrypt()
|
/titanic_44/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | Makefile.com | 28 ROOTLINK32= $(ROOTBIN32)/encrypt 29 ROOTLINK64= $(ROOTBIN64)/encrypt
|
H A D | Makefile | 29 ROOTLINK= $(ROOTBIN)/encrypt
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5seal.c | 66 int encrypt, in make_seal_token_v1() argument 111 if (encrypt || (!bigend && (toktype == KG_TOK_SEAL_MSG))) in make_seal_token_v1() 147 if ((toktype == KG_TOK_SEAL_MSG) && encrypt) { in make_seal_token_v1() 302 if (encrypt) { in make_seal_token_v1()
|
/titanic_44/usr/src/cmd/ssh/libssh/common/ |
H A D | cipher.c | 197 int encrypt) in cipher_init() argument 233 (encrypt == CIPHER_ENCRYPT)) == 0) in cipher_init() 282 const char *passphrase, int encrypt) in cipher_set_key_string() argument 291 cipher_init(cc, cipher, digest, 16, NULL, 0, encrypt); in cipher_set_key_string() 332 enc = ctx->encrypt; in ssh1_3des_init()
|
/titanic_44/usr/src/common/crypto/modes/ |
H A D | cbc.c | 44 int (*encrypt)(const void *, const uint8_t *, uint8_t *), in cbc_encrypt_contiguous_blocks() 95 encrypt(ctx->cbc_keysched, blockp, blockp); in cbc_encrypt_contiguous_blocks() 112 encrypt(ctx->cbc_keysched, lastp, lastp); in cbc_encrypt_contiguous_blocks()
|
/titanic_44/usr/src/head/ |
H A D | crypt.h | 55 extern void encrypt(char *, int);
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_encrypt.c | 58 return((*(enc->encrypt))(context, key, ivec, input, output)); in krb5_raw_encrypt()
|
/titanic_44/usr/src/lib/libbc/libc/gen/common/ |
H A D | _crypt.c | 296 encrypt(char *block, int edflag) in encrypt() function 435 encrypt(ablock,0); in _crypt()
|