Searched refs:cipher (Results 1 - 25 of 105) sorted by relevance

12345

/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
39 cipher->ciphertext.length = enclen;
42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) {
43 cipher->ciphertext.length = 0;
46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
48 free(cipher->ciphertext.data);
49 cipher->ciphertext.data = NULL;
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/evp/
H A Devp_enc.c74 /* ctx->cipher=NULL; */
78 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
81 if (cipher)
83 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc);
86 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, argument
102 if (ctx->engine && ctx->cipher && (!cipher ||
103 (cipher && (cipher->nid == ctx->cipher
246 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
252 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
258 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
264 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
[all...]
H A Dp5_crpt.c104 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md,
149 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp));
150 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
151 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16);
152 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)),
153 EVP_CIPHER_iv_length(cipher));
154 EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de);
103 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Devp_pbe.c68 /* Setup a cipher context from a PBE algorithm */
72 const EVP_CIPHER *cipher; member in struct:__anon2241
98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher,
116 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument
126 pbe_tmp->cipher = cipher;
H A Devp_lib.c68 if (c->cipher->set_asn1_parameters != NULL)
69 ret=c->cipher->set_asn1_parameters(c,type);
79 if (c->cipher->get_asn1_parameters != NULL)
80 ret=c->cipher->get_asn1_parameters(c,type);
118 /* Convert the various cipher NIDs and dummies to a proper OID NID */
H A Devp_test.c146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
[all...]
H A Dbio_enc.c83 EVP_CIPHER_CTX cipher; member in struct:enc_struct
92 BIO_TYPE_CIPHER,"cipher",
114 EVP_CIPHER_CTX_init(&ctx->cipher);
134 EVP_CIPHER_CTX_cleanup(&(b->cipher));
187 i=EVP_CipherFinal_ex(&(ctx->cipher),
201 EVP_CipherUpdate(&(ctx->cipher),
260 EVP_CipherUpdate(&(ctx->cipher),
301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
302 ctx->cipher.encrypt);
335 ret=EVP_CipherFinal_ex(&(ctx->cipher),
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher=EVP_get_cipherbyname(
84 if (ret->cipher.cipher == NULL)
99 memcpy(ret->cipher.iv,
103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
120 ret->cipher.cipher=NULL;
121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
H A Dp5_pbev2.c87 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
99 alg_nid = EVP_CIPHER_type(cipher);
116 if (EVP_CIPHER_iv_length(cipher) &&
117 RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0)
123 EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0);
154 EVP_CIPHER_key_length(cipher))) goto merr;
/opensolaris-onvv-gate/usr/src/common/net/wanboot/crypt/
H A Daes_test.c33 * is the expected cipher. Then decrypts the cipher and verifies that the
48 char cipher[AES_BLOCK_SIZE * 2]; member in struct:test_data
71 unsigned char cipher[AES_BLOCK_SIZE]; local
93 getxdata(cipher, td[i].cipher, AES_BLOCK_SIZE);
98 if (bcmp(work, cipher, AES_BLOCK_SIZE) != 0) {
H A Ddes3_test.c33 * key and verifies the result against the cipher value. Then decrypts
34 * the cipher and compares the result against the plain value.
52 char cipher[DES3_BLOCK_SIZE * 2]; member in struct:test_data
114 unsigned char cipher[DES3_BLOCK_SIZE]; local
138 getxdata(cipher, td[i].cipher, DES3_BLOCK_SIZE);
143 if (bcmp(work, cipher, DES3_BLOCK_SIZE) != 0) {
/opensolaris-onvv-gate/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c81 krb5_enc_data cipher; local
90 cipher.enctype = ENCTYPE_UNKNOWN;
91 cipher.ciphertext.length = key_data->key_data_length[0]-2;
92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
99 &cipher, &plain))) {
H A Dencrypt_key.c84 krb5_enc_data cipher; local
116 cipher.ciphertext.length = len;
117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
120 &plain, &cipher))) {
/opensolaris-onvv-gate/usr/src/cmd/ssh/libssh/common/
H A Dcipher.c43 RCSID("$OpenBSD: cipher.c,v 1.61 2002/07/12 15:50:17 markus Exp $");
47 #include "cipher.h"
160 debug("bad cipher %s [%s]", p, names);
164 debug3("cipher ok: %s [%s]", p, names);
173 * Parses the name of the cipher. Returns the number of the corresponding
174 * cipher, or -1 on error.
195 cipher_init(CipherContext *cc, Cipher *cipher, argument
204 if (cipher->number == SSH_CIPHER_DES) {
213 cc->plaintext = (cipher->number == SSH_CIPHER_NONE);
215 if (keylen < cipher
281 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int encrypt) argument
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/des/
H A Ddes_soft.c325 * Do a cipher step
328 #define cipher(iter, inR, inL, outR, outL) { \ macro
342 cipher(0, r0, l0, r1, l1);
343 cipher(1, r1, l1, r0, l0);
344 cipher(2, r0, l0, r1, l1);
345 cipher(3, r1, l1, r0, l0);
346 cipher(4, r0, l0, r1, l1);
347 cipher(5, r1, l1, r0, l0);
348 cipher(6, r0, l0, r1, l1);
349 cipher(
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/
H A Dp12_p8e.c63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
H A Dp12_crpt.c88 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de)
114 iter, EVP_CIPHER_key_length(cipher), key, md)) {
120 iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
126 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
87 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs7/
H A Denc.c77 const EVP_CIPHER *cipher=NULL; local
91 if(!(cipher = EVP_get_cipherbyname(argv[2]))) {
92 fprintf(stderr, "Unknown cipher %s\n", argv[2]);
130 if(!cipher) {
132 cipher = EVP_des_ede3_cbc();
134 fprintf(stderr, "No cipher selected\n");
139 if (!PKCS7_set_cipher(p7,cipher)) goto err;
H A Dpk7_enc.c71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
/opensolaris-onvv-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto.c55 * Table of registered cipher modules.
116 * Establish a relationship between the specified key and cipher
129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, argument
138 * Validate cipher and set reference to cipher routines.
140 if (cipher >= IEEE80211_CIPHER_MAX) {
142 "invalid cipher %u\n", cipher);
145 cip = ic->ic_ciphers[cipher];
149 "unable to load cipher
360 uint32_t cipher; local
[all...]
/opensolaris-onvv-gate/usr/src/lib/libcrypt/common/
H A Ddes_soft.c365 * Do a cipher step
368 #define cipher(iter, inR, inL, outR, outL) { \ macro
382 cipher(0, r0, l0, r1, l1);
383 cipher(1, r1, l1, r0, l0);
384 cipher(2, r0, l0, r1, l1);
385 cipher(3, r1, l1, r0, l0);
386 cipher(4, r0, l0, r1, l1);
387 cipher(5, r1, l1, r0, l0);
388 cipher(6, r0, l0, r1, l1);
389 cipher(
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/ssl/
H A Dd1_enc.c148 else if ( EVP_CIPHER_block_size(ds->cipher) > 1)
150 if (!RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)))
180 bs=EVP_CIPHER_block_size(ds->cipher);
207 ds->buf_len, ds->cipher->key_len,
209 ds->cipher->iv_len);
211 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
/opensolaris-onvv-gate/usr/src/cmd/lofiadm/
H A Dmain.c108 * A cipher without an iv requirement would look like this:
116 /* Preferred cipher, if one isn't specified on command line. */
366 mech_alias_t *cipher, const char *rkey, size_t rksz)
371 if (cipher != NULL) {
374 (void) strlcpy(li.li_cipher, cipher->name,
382 li.li_iv_type = cipher->iv_type;
383 li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */
384 switch (cipher->iv_type) {
386 (void) strlcpy(li.li_iv_cipher, cipher->iv_name,
536 * Verify the cipher selecte
365 add_mapping(int lfd, const char *devicename, const char *filename, mech_alias_t *cipher, const char *rkey, size_t rksz) argument
558 kernel_cipher_check(mech_alias_t *cipher) argument
814 getkeyfromuser(mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument
881 getkeyfromfile(const char *pathname, mech_alias_t *cipher, char **key, size_t *ksz) argument
966 getkeyfromtoken(CK_SESSION_HANDLE sess, token_spec_t *token, const char *keyfile, mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument
1137 mech_alias_t *cipher; local
1220 init_crypto(token_spec_t *token, mech_alias_t *cipher, CK_SESSION_HANDLE_PTR sess) argument
1798 mech_alias_t *cipher = NULL; local
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/apps/
H A Denc.c120 const EVP_CIPHER *cipher=NULL,*c; local
145 cipher=EVP_get_cipherbyname(pname);
146 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
148 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
267 cipher=c;
270 cipher=NULL;
391 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
398 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
460 if (cipher != NULL)
507 EVP_BytesToKey(cipher,dgs
[all...]
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c60 krb5_data cipher, clear; local
81 cipher.length = 0;
82 cipher.data = NULL;
333 cipher.length = (req->data + req->length) - ptr;
334 cipher.data = ptr;
336 if (ret = krb5_rd_priv(context, auth_context, &cipher,
431 cipher.length = 0;
442 &cipher, &replay)) {
455 if (cipher.length == 0) {
492 ret = krb5_mk_error(context, &krberror, &cipher);
[all...]

Completed in 272 milliseconds

12345