/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument 39 cipher->ciphertext.length = enclen; 42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { 43 cipher->ciphertext.length = 0; 46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); 48 free(cipher->ciphertext.data); 49 cipher->ciphertext.data = NULL;
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/evp/ |
H A D | evp_enc.c | 74 /* ctx->cipher=NULL; */ 78 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 81 if (cipher) 83 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc); 86 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, argument 102 if (ctx->engine && ctx->cipher && (!cipher || 103 (cipher && (cipher->nid == ctx->cipher 246 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 252 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 258 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 264 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument [all...] |
H A D | p5_crpt.c | 104 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, 149 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 150 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 151 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 152 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 153 EVP_CIPHER_iv_length(cipher)); 154 EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); 103 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | evp_pbe.c | 68 /* Setup a cipher context from a PBE algorithm */ 72 const EVP_CIPHER *cipher; member in struct:__anon2241 98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher, 116 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument 126 pbe_tmp->cipher = cipher;
|
H A D | evp_lib.c | 68 if (c->cipher->set_asn1_parameters != NULL) 69 ret=c->cipher->set_asn1_parameters(c,type); 79 if (c->cipher->get_asn1_parameters != NULL) 80 ret=c->cipher->get_asn1_parameters(c,type); 118 /* Convert the various cipher NIDs and dummies to a proper OID NID */
|
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
H A D | bio_enc.c | 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct 92 BIO_TYPE_CIPHER,"cipher", 114 EVP_CIPHER_CTX_init(&ctx->cipher); 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 201 EVP_CipherUpdate(&(ctx->cipher), 260 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher=EVP_get_cipherbyname( 84 if (ret->cipher.cipher == NULL) 99 memcpy(ret->cipher.iv, 103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH); 120 ret->cipher.cipher=NULL; 121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
|
H A D | p5_pbev2.c | 87 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 99 alg_nid = EVP_CIPHER_type(cipher); 116 if (EVP_CIPHER_iv_length(cipher) && 117 RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 123 EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0); 154 EVP_CIPHER_key_length(cipher))) goto merr;
|
/opensolaris-onvv-gate/usr/src/common/net/wanboot/crypt/ |
H A D | aes_test.c | 33 * is the expected cipher. Then decrypts the cipher and verifies that the 48 char cipher[AES_BLOCK_SIZE * 2]; member in struct:test_data 71 unsigned char cipher[AES_BLOCK_SIZE]; local 93 getxdata(cipher, td[i].cipher, AES_BLOCK_SIZE); 98 if (bcmp(work, cipher, AES_BLOCK_SIZE) != 0) {
|
H A D | des3_test.c | 33 * key and verifies the result against the cipher value. Then decrypts 34 * the cipher and compares the result against the plain value. 52 char cipher[DES3_BLOCK_SIZE * 2]; member in struct:test_data 114 unsigned char cipher[DES3_BLOCK_SIZE]; local 138 getxdata(cipher, td[i].cipher, DES3_BLOCK_SIZE); 143 if (bcmp(work, cipher, DES3_BLOCK_SIZE) != 0) {
|
/opensolaris-onvv-gate/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 81 krb5_enc_data cipher; local 90 cipher.enctype = ENCTYPE_UNKNOWN; 91 cipher.ciphertext.length = key_data->key_data_length[0]-2; 92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ 99 &cipher, &plain))) {
|
H A D | encrypt_key.c | 84 krb5_enc_data cipher; local 116 cipher.ciphertext.length = len; 117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ 120 &plain, &cipher))) {
|
/opensolaris-onvv-gate/usr/src/cmd/ssh/libssh/common/ |
H A D | cipher.c | 43 RCSID("$OpenBSD: cipher.c,v 1.61 2002/07/12 15:50:17 markus Exp $"); 47 #include "cipher.h" 160 debug("bad cipher %s [%s]", p, names); 164 debug3("cipher ok: %s [%s]", p, names); 173 * Parses the name of the cipher. Returns the number of the corresponding 174 * cipher, or -1 on error. 195 cipher_init(CipherContext *cc, Cipher *cipher, argument 204 if (cipher->number == SSH_CIPHER_DES) { 213 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); 215 if (keylen < cipher 281 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int encrypt) argument [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/des/ |
H A D | des_soft.c | 325 * Do a cipher step 328 #define cipher(iter, inR, inL, outR, outL) { \ macro 342 cipher(0, r0, l0, r1, l1); 343 cipher(1, r1, l1, r0, l0); 344 cipher(2, r0, l0, r1, l1); 345 cipher(3, r1, l1, r0, l0); 346 cipher(4, r0, l0, r1, l1); 347 cipher(5, r1, l1, r0, l0); 348 cipher(6, r0, l0, r1, l1); 349 cipher( [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/ |
H A D | p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
H A D | p12_crpt.c | 88 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) 114 iter, EVP_CIPHER_key_length(cipher), key, md)) { 120 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 126 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 87 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs7/ |
H A D | enc.c | 77 const EVP_CIPHER *cipher=NULL; local 91 if(!(cipher = EVP_get_cipherbyname(argv[2]))) { 92 fprintf(stderr, "Unknown cipher %s\n", argv[2]); 130 if(!cipher) { 132 cipher = EVP_des_ede3_cbc(); 134 fprintf(stderr, "No cipher selected\n"); 139 if (!PKCS7_set_cipher(p7,cipher)) goto err;
|
H A D | pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
|
/opensolaris-onvv-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto.c | 55 * Table of registered cipher modules. 116 * Establish a relationship between the specified key and cipher 129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, argument 138 * Validate cipher and set reference to cipher routines. 140 if (cipher >= IEEE80211_CIPHER_MAX) { 142 "invalid cipher %u\n", cipher); 145 cip = ic->ic_ciphers[cipher]; 149 "unable to load cipher 360 uint32_t cipher; local [all...] |
/opensolaris-onvv-gate/usr/src/lib/libcrypt/common/ |
H A D | des_soft.c | 365 * Do a cipher step 368 #define cipher(iter, inR, inL, outR, outL) { \ macro 382 cipher(0, r0, l0, r1, l1); 383 cipher(1, r1, l1, r0, l0); 384 cipher(2, r0, l0, r1, l1); 385 cipher(3, r1, l1, r0, l0); 386 cipher(4, r0, l0, r1, l1); 387 cipher(5, r1, l1, r0, l0); 388 cipher(6, r0, l0, r1, l1); 389 cipher( [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/ssl/ |
H A D | d1_enc.c | 148 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 150 if (!RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher))) 180 bs=EVP_CIPHER_block_size(ds->cipher); 207 ds->buf_len, ds->cipher->key_len, 209 ds->cipher->iv_len); 211 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
/opensolaris-onvv-gate/usr/src/cmd/lofiadm/ |
H A D | main.c | 108 * A cipher without an iv requirement would look like this: 116 /* Preferred cipher, if one isn't specified on command line. */ 366 mech_alias_t *cipher, const char *rkey, size_t rksz) 371 if (cipher != NULL) { 374 (void) strlcpy(li.li_cipher, cipher->name, 382 li.li_iv_type = cipher->iv_type; 383 li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */ 384 switch (cipher->iv_type) { 386 (void) strlcpy(li.li_iv_cipher, cipher->iv_name, 536 * Verify the cipher selecte 365 add_mapping(int lfd, const char *devicename, const char *filename, mech_alias_t *cipher, const char *rkey, size_t rksz) argument 558 kernel_cipher_check(mech_alias_t *cipher) argument 814 getkeyfromuser(mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument 881 getkeyfromfile(const char *pathname, mech_alias_t *cipher, char **key, size_t *ksz) argument 966 getkeyfromtoken(CK_SESSION_HANDLE sess, token_spec_t *token, const char *keyfile, mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument 1137 mech_alias_t *cipher; local 1220 init_crypto(token_spec_t *token, mech_alias_t *cipher, CK_SESSION_HANDLE_PTR sess) argument 1798 mech_alias_t *cipher = NULL; local [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/apps/ |
H A D | enc.c | 120 const EVP_CIPHER *cipher=NULL,*c; local 145 cipher=EVP_get_cipherbyname(pname); 146 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 148 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 267 cipher=c; 270 cipher=NULL; 391 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 398 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), 460 if (cipher != NULL) 507 EVP_BytesToKey(cipher,dgs [all...] |
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 60 krb5_data cipher, clear; local 81 cipher.length = 0; 82 cipher.data = NULL; 333 cipher.length = (req->data + req->length) - ptr; 334 cipher.data = ptr; 336 if (ret = krb5_rd_priv(context, auth_context, &cipher, 431 cipher.length = 0; 442 &cipher, &replay)) { 455 if (cipher.length == 0) { 492 ret = krb5_mk_error(context, &krberror, &cipher); [all...] |