usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
144
DesEncrypt(clear, key, cipher)
usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
147
u_char *cipher; /* OUT 8 octets */
usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
164
Collapse(des_input, cipher);
usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
167
CHAPDEBUG((LOG_INFO, "DesEncrypt: 8 octet output: %.8B", cipher));
usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
174
DesEncrypt(clear, key, cipher)
usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
177
u_char *cipher; /* OUT 8 octets */
usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
190
des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1);
usr/src/cmd/cmd-inet/usr.bin/pppd/chap_ms.c
193
CHAPDEBUG((LOG_INFO, "DesEncrypt: 8 octet output: %.8B", cipher));
usr/src/cmd/cmd-inet/usr.lib/wpad/driver_wifi.c
196
dladm_wlan_cipher_t cipher;
usr/src/cmd/cmd-inet/usr.lib/wpad/driver_wifi.c
207
cipher = DLADM_WLAN_CIPHER_WEP;
usr/src/cmd/cmd-inet/usr.lib/wpad/driver_wifi.c
211
cipher = DLADM_WLAN_CIPHER_TKIP;
usr/src/cmd/cmd-inet/usr.lib/wpad/driver_wifi.c
215
cipher = DLADM_WLAN_CIPHER_AES_CCM;
usr/src/cmd/cmd-inet/usr.lib/wpad/driver_wifi.c
235
status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx,
usr/src/cmd/cmd-inet/usr.lib/wpad/wpa_enc.c
31
aes_wrap(uint8_t *kek, int n, uint8_t *plain, uint8_t *cipher)
usr/src/cmd/cmd-inet/usr.lib/wpad/wpa_enc.c
37
a = cipher;
usr/src/cmd/cmd-inet/usr.lib/wpad/wpa_enc.c
38
r = cipher + 8;
usr/src/cmd/cmd-inet/usr.lib/wpad/wpa_enc.c
55
r = cipher + 8;
usr/src/cmd/cmd-inet/usr.lib/wpad/wpa_enc.c
82
aes_unwrap(uint8_t *kek, int n, uint8_t *cipher, uint8_t *plain)
usr/src/cmd/cmd-inet/usr.lib/wpad/wpa_enc.c
89
(void) memcpy(a, cipher, 8);
usr/src/cmd/cmd-inet/usr.lib/wpad/wpa_enc.c
91
(void) memcpy(r, cipher + 8, 8 * n);
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2117
krb5_enc_data cipher;
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2125
cipher.ciphertext.length = 8;
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2126
cipher.ciphertext.data = outputblock;
usr/src/cmd/krb5/krb5kdc/kdc_preauth.c
2129
/* XXX */ 0, 0, &plain, &cipher))) {
usr/src/cmd/lofiadm/main.c
1030
if (*ksz < cipher->min_keysize || cipher->max_keysize < *ksz) {
usr/src/cmd/lofiadm/main.c
1034
cipher->min_keysize, cipher->max_keysize);
usr/src/cmd/lofiadm/main.c
1037
*ksz = cipher->max_keysize;
usr/src/cmd/lofiadm/main.c
1057
if (nread == 0 && notplain && cursz >= cipher->min_keysize) {
usr/src/cmd/lofiadm/main.c
1058
*ksz = (cursz / cipher->min_keysize) *
usr/src/cmd/lofiadm/main.c
1059
cipher->min_keysize;
usr/src/cmd/lofiadm/main.c
1073
token_spec_t *token, const char *keyfile, mech_alias_t *cipher,
usr/src/cmd/lofiadm/main.c
1102
if (cipher->slot == (CK_SLOT_ID)-1 || cipher->max_keysize == 0) {
usr/src/cmd/lofiadm/main.c
1120
rv = pkcs11_mech2keytype(cipher->type, &raw_ktype);
usr/src/cmd/lofiadm/main.c
1123
cipher->name, pkcs11_strerror(rv));
usr/src/cmd/lofiadm/main.c
1196
getkeyfromfile(keyfile, cipher, &rkey, &rksz);
usr/src/cmd/lofiadm/main.c
1224
if (rksz < cipher->min_keysize || cipher->max_keysize < rksz) {
usr/src/cmd/lofiadm/main.c
1226
die(gettext("\t%d <= keysize <= %d\n"), cipher->min_keysize,
usr/src/cmd/lofiadm/main.c
1227
cipher->max_keysize);
usr/src/cmd/lofiadm/main.c
1243
mech_alias_t *cipher;
usr/src/cmd/lofiadm/main.c
1270
cipher = (mech_alias_t *)args;
usr/src/cmd/lofiadm/main.c
1271
token = cipher->token;
usr/src/cmd/lofiadm/main.c
1273
if (C_GetMechanismInfo(slot_id, cipher->type, &mechinfo) != CKR_OK) {
usr/src/cmd/lofiadm/main.c
1308
cipher->slot = slot_id;
usr/src/cmd/lofiadm/main.c
1326
init_crypto(token_spec_t *token, mech_alias_t *cipher,
usr/src/cmd/lofiadm/main.c
1331
cipher->token = token;
usr/src/cmd/lofiadm/main.c
1338
rv = pkcs11_GetCriteriaSession(match_token_cipher, (void *)cipher,
usr/src/cmd/lofiadm/main.c
1942
mech_alias_t *cipher = NULL;
usr/src/cmd/lofiadm/main.c
1976
if ((cipher = ciph2mech(optarg)) == NULL) {
usr/src/cmd/lofiadm/main.c
2137
if (cipher == NULL)
usr/src/cmd/lofiadm/main.c
2138
cipher = DEFAULT_CIPHER;
usr/src/cmd/lofiadm/main.c
2140
if (!kernel_cipher_check(cipher))
usr/src/cmd/lofiadm/main.c
2145
init_crypto(token, cipher, &sess);
usr/src/cmd/lofiadm/main.c
2148
getkeyfromuser(cipher, &rkey, &rksz,
usr/src/cmd/lofiadm/main.c
2151
getkeyfromtoken(sess, token, keyfile, cipher,
usr/src/cmd/lofiadm/main.c
2155
getkeyfromfile(keyfile, cipher, &rkey, &rksz);
usr/src/cmd/lofiadm/main.c
2165
add_mapping(lfd, devicename, filename, cipher, rkey, rksz,
usr/src/cmd/lofiadm/main.c
438
mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly,
usr/src/cmd/lofiadm/main.c
448
if (cipher != NULL) {
usr/src/cmd/lofiadm/main.c
451
(void) strlcpy(li.li_cipher, cipher->name,
usr/src/cmd/lofiadm/main.c
459
li.li_iv_type = cipher->iv_type;
usr/src/cmd/lofiadm/main.c
460
li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */
usr/src/cmd/lofiadm/main.c
461
switch (cipher->iv_type) {
usr/src/cmd/lofiadm/main.c
463
(void) strlcpy(li.li_iv_cipher, cipher->iv_name,
usr/src/cmd/lofiadm/main.c
662
kernel_cipher_check(mech_alias_t *cipher)
usr/src/cmd/lofiadm/main.c
675
if (cipher->iv_name == NULL)
usr/src/cmd/lofiadm/main.c
731
strcasecmp(cipher->name, kciphers->ml_list[i]) == 0)
usr/src/cmd/lofiadm/main.c
734
strcasecmp(cipher->iv_name, kciphers->ml_list[i]) == 0)
usr/src/cmd/lofiadm/main.c
742
cipher->name);
usr/src/cmd/lofiadm/main.c
745
cipher->iv_name);
usr/src/cmd/lofiadm/main.c
758
(void) strlcpy(kinfo->mi_mechanism_name, cipher->name,
usr/src/cmd/lofiadm/main.c
779
(void) strlcpy(kinfo->mi_mechanism_name, cipher->name,
usr/src/cmd/lofiadm/main.c
808
cipher->min_keysize = keymin;
usr/src/cmd/lofiadm/main.c
809
cipher->max_keysize = keymax;
usr/src/cmd/lofiadm/main.c
820
cipher->name);
usr/src/cmd/lofiadm/main.c
918
getkeyfromuser(mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz,
usr/src/cmd/lofiadm/main.c
932
if (cipher->slot == (CK_SLOT_ID)-1 || cipher->max_keysize == 0) {
usr/src/cmd/lofiadm/main.c
937
rv = pkcs11_mech2keytype(cipher->type, &ktype);
usr/src/cmd/lofiadm/main.c
945
rv = C_OpenSession(cipher->slot, CKF_SERIAL_SESSION, NULL, NULL, &sess);
usr/src/cmd/lofiadm/main.c
963
klen = cipher->max_keysize;
usr/src/cmd/lofiadm/main.c
965
cipher->max_keysize, &kvalue, &klen);
usr/src/cmd/lofiadm/main.c
980
cipher->alias, pkcs11_strerror(rv));
usr/src/cmd/lofiadm/main.c
987
getkeyfromfile(const char *pathname, mech_alias_t *cipher, char **key,
usr/src/cmd/lofiadm/main.c
998
*ksz = cipher->max_keysize;
usr/src/cmd/smbsrv/test-crypt/test_decrypt.c
87
test_decrypt(const uint8_t *cipher, int mid)
usr/src/cmd/smbsrv/test-crypt/test_decrypt.c
94
cipher, CIPHER_DATA_LEN, mid);
usr/src/common/crypto/modes/ctr.c
111
ctr_new_keyblock(ctx, cipher);
usr/src/common/crypto/modes/ctr.c
169
int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct))
usr/src/common/crypto/modes/ctr.c
228
ctr_xor(ctx, inp, out_data, out_data_len, block_size, cipher);
usr/src/common/crypto/modes/ctr.c
241
int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct),
usr/src/common/crypto/modes/ctr.c
266
cipher(ctr_ctx->ctr_keysched, (uint8_t *)ctr_ctx->ctr_cb,
usr/src/common/crypto/modes/ctr.c
60
int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct))
usr/src/common/crypto/modes/ctr.c
81
cipher(ctx->ctr_keysched, (uint8_t *)ctx->ctr_cb,
usr/src/common/crypto/modes/ctr.c
98
int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct))
usr/src/common/crypto/modes/ecb.c
100
cipher(ctx->ecb_keysched, blockp, lastp);
usr/src/common/crypto/modes/ecb.c
44
int (*cipher)(const void *ks, const uint8_t *pt, uint8_t *ct))
usr/src/common/crypto/modes/ecb.c
88
cipher(ctx->ecb_keysched, blockp, blockp);
usr/src/common/crypto/modes/modes.h
298
crypto_data_t *, size_t, int (*cipher)(const void *, const uint8_t *,
usr/src/common/crypto/modes/modes.h
315
int (*cipher)(const void *, const uint8_t *, uint8_t *));
usr/src/lib/gss_mechs/mech_dh/backend/mech/crypto.c
383
stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig);
usr/src/lib/gss_mechs/mech_dh/backend/mech/crypto.c
400
cipher_proc cipher; /* cipher routine to use */
usr/src/lib/gss_mechs/mech_dh/backend/mech/crypto.c
412
cipher = QOP_table[qop].verifier->signer->cipher;
usr/src/lib/gss_mechs/mech_dh/backend/mech/crypto.c
415
if ((stat = (*cipher)(&buf, keys, ENCIPHER)) != DH_SUCCESS)
usr/src/lib/gss_mechs/mech_dh/backend/mech/crypto.c
53
cipher_proc cipher; /* Routine to en/decrypt with */
usr/src/lib/gss_mechs/mech_krb5/krb5/krb/enc_helper.c
30
krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher)
usr/src/lib/gss_mechs/mech_krb5/krb5/krb/enc_helper.c
39
cipher->ciphertext.length = enclen;
usr/src/lib/gss_mechs/mech_krb5/krb5/krb/enc_helper.c
42
if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) {
usr/src/lib/gss_mechs/mech_krb5/krb5/krb/enc_helper.c
43
cipher->ciphertext.length = 0;
usr/src/lib/gss_mechs/mech_krb5/krb5/krb/enc_helper.c
46
ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
usr/src/lib/gss_mechs/mech_krb5/krb5/krb/enc_helper.c
48
free(cipher->ciphertext.data);
usr/src/lib/gss_mechs/mech_krb5/krb5/krb/enc_helper.c
49
cipher->ciphertext.data = NULL;
usr/src/lib/krb5/kadm5/srv/chgpwd.c
333
cipher.length = (req->data + req->length) - ptr;
usr/src/lib/krb5/kadm5/srv/chgpwd.c
334
cipher.data = ptr;
usr/src/lib/krb5/kadm5/srv/chgpwd.c
336
if (ret = krb5_rd_priv(context, auth_context, &cipher,
usr/src/lib/krb5/kadm5/srv/chgpwd.c
431
cipher.length = 0;
usr/src/lib/krb5/kadm5/srv/chgpwd.c
442
&cipher, &replay)) {
usr/src/lib/krb5/kadm5/srv/chgpwd.c
455
if (cipher.length == 0) {
usr/src/lib/krb5/kadm5/srv/chgpwd.c
492
ret = krb5_mk_error(context, &krberror, &cipher);
usr/src/lib/krb5/kadm5/srv/chgpwd.c
503
rep->length = 6 + ap_rep.length + cipher.length;
usr/src/lib/krb5/kadm5/srv/chgpwd.c
539
(void) memcpy(ptr, cipher.data, cipher.length);
usr/src/lib/krb5/kadm5/srv/chgpwd.c
552
if (cipher.data != NULL)
usr/src/lib/krb5/kadm5/srv/chgpwd.c
553
krb5_xfree(cipher.data);
usr/src/lib/krb5/kadm5/srv/chgpwd.c
60
krb5_data cipher, clear;
usr/src/lib/krb5/kadm5/srv/chgpwd.c
81
cipher.length = 0;
usr/src/lib/krb5/kadm5/srv/chgpwd.c
82
cipher.data = NULL;
usr/src/lib/krb5/kdb/decrypt_key.c
81
krb5_enc_data cipher;
usr/src/lib/krb5/kdb/decrypt_key.c
90
cipher.enctype = ENCTYPE_UNKNOWN;
usr/src/lib/krb5/kdb/decrypt_key.c
91
cipher.ciphertext.length = key_data->key_data_length[0]-2;
usr/src/lib/krb5/kdb/decrypt_key.c
92
cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
usr/src/lib/krb5/kdb/decrypt_key.c
99
&cipher, &plain))) {
usr/src/lib/krb5/kdb/encrypt_key.c
116
cipher.ciphertext.length = len;
usr/src/lib/krb5/kdb/encrypt_key.c
117
cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
usr/src/lib/krb5/kdb/encrypt_key.c
120
&plain, &cipher))) {
usr/src/lib/krb5/kdb/encrypt_key.c
84
krb5_enc_data cipher;
usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c
1662
const EVP_CIPHER *cipher = NULL;
usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c
1696
cipher = EVP_des_ede3_cbc();
usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c
1723
p7 = PKCS7_encrypt(encerts, in, cipher, flags);
usr/src/lib/libcrypt/common/des_soft.c
375
cipher(0, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
376
cipher(1, r1, l1, r0, l0);
usr/src/lib/libcrypt/common/des_soft.c
377
cipher(2, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
378
cipher(3, r1, l1, r0, l0);
usr/src/lib/libcrypt/common/des_soft.c
379
cipher(4, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
380
cipher(5, r1, l1, r0, l0);
usr/src/lib/libcrypt/common/des_soft.c
381
cipher(6, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
382
cipher(7, r1, l1, r0, l0);
usr/src/lib/libcrypt/common/des_soft.c
383
cipher(8, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
384
cipher(9, r1, l1, r0, l0);
usr/src/lib/libcrypt/common/des_soft.c
385
cipher(10, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
386
cipher(11, r1, l1, r0, l0);
usr/src/lib/libcrypt/common/des_soft.c
387
cipher(12, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
388
cipher(13, r1, l1, r0, l0);
usr/src/lib/libcrypt/common/des_soft.c
389
cipher(14, r0, l0, r1, l1);
usr/src/lib/libcrypt/common/des_soft.c
390
cipher(15, r1, l1, r0, l0);
usr/src/lib/libdladm/common/libdlwlan.c
1517
dladm_wlan_cipher_t cipher, const dladm_wlan_bssid_t *addr,
usr/src/lib/libdladm/common/libdlwlan.c
1524
switch (cipher) {
usr/src/lib/libnsl/des/des_soft.c
410
cipher(0, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
411
cipher(1, r1, l1, r0, l0);
usr/src/lib/libnsl/des/des_soft.c
412
cipher(2, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
413
cipher(3, r1, l1, r0, l0);
usr/src/lib/libnsl/des/des_soft.c
414
cipher(4, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
415
cipher(5, r1, l1, r0, l0);
usr/src/lib/libnsl/des/des_soft.c
416
cipher(6, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
417
cipher(7, r1, l1, r0, l0);
usr/src/lib/libnsl/des/des_soft.c
418
cipher(8, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
419
cipher(9, r1, l1, r0, l0);
usr/src/lib/libnsl/des/des_soft.c
420
cipher(10, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
421
cipher(11, r1, l1, r0, l0);
usr/src/lib/libnsl/des/des_soft.c
422
cipher(12, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
423
cipher(13, r1, l1, r0, l0);
usr/src/lib/libnsl/des/des_soft.c
424
cipher(14, r0, l0, r1, l1);
usr/src/lib/libnsl/des/des_soft.c
425
cipher(15, r1, l1, r0, l0);
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
195
struct digest_cipher *cipher;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2568
struct digest_cipher *cipher;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2593
cipher = available_ciphers1;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2595
cipher = available_ciphers;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2597
while (cipher->name) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2599
if (stext->requiressf <= cipher->ssf &&
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2600
stext->limitssf >= cipher->ssf) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2607
if(strlen(cipheropts) + strlen(cipher->name) + 1 >=
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2615
strcat(cipheropts, cipher->name);
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2617
cipher++;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2864
char *cipher = NULL;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
2976
_plug_strdup(sparams->utils, value, &cipher, NULL);
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3299
if ((!strcasecmp(qop, "auth-conf")) && (cipher != NULL)) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3311
if (!strcasecmp(cipher, cptr->name) &&
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3567
if (cipher != NULL)
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3568
sparams->utils->free (cipher);
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3795
struct digest_cipher *cipher;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3963
oparams->mech_ssf = ctext->cipher->ssf;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3965
nbits = ctext->cipher->n;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3966
text->cipher_enc = ctext->cipher->cipher_enc;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3967
text->cipher_dec = ctext->cipher->cipher_dec;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3968
text->cipher_free = ctext->cipher->cipher_free;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
3969
text->cipher_init = ctext->cipher->cipher_init;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4085
if (ctext->cipher != NULL) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4089
(unsigned char *) ctext->cipher->name,
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4338
struct digest_cipher *cipher = available_ciphers1;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4340
struct digest_cipher *cipher = available_ciphers;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4348
while (cipher->name) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4349
if (!strcasecmp(value, cipher->name)) break;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4350
cipher++;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4352
if (cipher->name) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4353
ciphers |= cipher->flag;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4510
struct digest_cipher *cipher;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4514
cipher = available_ciphers1;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4516
cipher = available_ciphers;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4518
while (cipher->name) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4522
if ((limit >= cipher->ssf) && (musthave <= cipher->ssf) &&
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4523
(ciphers & cipher->flag) &&
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4524
(!ctext->cipher || (cipher->ssf > ctext->cipher->ssf))) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4525
ctext->cipher = cipher;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4527
cipher++;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4530
if (ctext->cipher) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4545
if (ctext->cipher == NULL) {
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
4838
ctext->cipher = text->reauth->e[val].u.c.cipher;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
5021
text->reauth->e[val].u.c.cipher = ctext->cipher;
usr/src/lib/sasl_plugins/digestmd5/digestmd5.c
5124
ctext->cipher = NULL;
usr/src/uts/common/crypto/core/kcf_prov_lib.c
233
int (*cipher)(void *, caddr_t, size_t, crypto_data_t *),
usr/src/uts/common/crypto/core/kcf_prov_lib.c
247
rv = (cipher)(ctx, input->cd_raw.iov_base + input->cd_offset,
usr/src/uts/common/crypto/core/kcf_prov_lib.c
255
int (*cipher)(void *, caddr_t, size_t, crypto_data_t *),
usr/src/uts/common/crypto/core/kcf_prov_lib.c
297
(cipher)(ctx, uiop->uio_iov[vec_idx].iov_base + offset,
usr/src/uts/common/crypto/core/kcf_prov_lib.c
320
int (*cipher)(void *, caddr_t, size_t, crypto_data_t *),
usr/src/uts/common/crypto/core/kcf_prov_lib.c
353
(cipher)(ctx, (char *)(mp->b_rptr + offset), cur_len,
usr/src/uts/common/crypto/io/crypto.c
2819
return (cipher(dev, arg, mode, crypto_encrypt_single));
usr/src/uts/common/crypto/io/crypto.c
2826
return (cipher(dev, arg, mode, crypto_decrypt_single));
usr/src/uts/common/crypto/io/crypto.c
96
static int cipher(dev_t, caddr_t, int, int (*)(crypto_context_t,
usr/src/uts/common/des/des_soft.c
333
cipher(0, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
334
cipher(1, r1, l1, r0, l0);
usr/src/uts/common/des/des_soft.c
335
cipher(2, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
336
cipher(3, r1, l1, r0, l0);
usr/src/uts/common/des/des_soft.c
337
cipher(4, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
338
cipher(5, r1, l1, r0, l0);
usr/src/uts/common/des/des_soft.c
339
cipher(6, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
340
cipher(7, r1, l1, r0, l0);
usr/src/uts/common/des/des_soft.c
341
cipher(8, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
342
cipher(9, r1, l1, r0, l0);
usr/src/uts/common/des/des_soft.c
343
cipher(10, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
344
cipher(11, r1, l1, r0, l0);
usr/src/uts/common/des/des_soft.c
345
cipher(12, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
346
cipher(13, r1, l1, r0, l0);
usr/src/uts/common/des/des_soft.c
347
cipher(14, r0, l0, r1, l1);
usr/src/uts/common/des/des_soft.c
348
cipher(15, r1, l1, r0, l0);
usr/src/uts/common/gssapi/mechs/krb5/include/k5-int.h
1022
krb5_enc_data *cipher);
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
145
krb5_enc_data cipher;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
202
cipher.ciphertext.data = (char *)outbuf + 16;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
203
cipher.ciphertext.length = bufsize - 16;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
204
cipher.enctype = key->enctype;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
205
err = krb5_c_encrypt(context, key, key_usage, 0, &plain, &cipher);
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
442
krb5_enc_data cipher;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
452
cipher.enctype = key->enctype;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
453
cipher.ciphertext.length = bodysize - 16;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
454
cipher.ciphertext.data = (char *)ptr + 16;
usr/src/uts/common/gssapi/mechs/krb5/mech/k5sealv3.c
460
&cipher, &plain);
usr/src/uts/common/io/net80211/net80211_crypto.c
127
ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags,
usr/src/uts/common/io/net80211/net80211_crypto.c
138
if (cipher >= IEEE80211_CIPHER_MAX) {
usr/src/uts/common/io/net80211/net80211_crypto.c
140
"invalid cipher %u\n", cipher);
usr/src/uts/common/io/net80211/net80211_crypto.c
143
cip = ic->ic_ciphers[cipher];
usr/src/uts/common/io/net80211/net80211_crypto.c
148
cipher, cipher < IEEE80211_N(cipher_modnames) ?
usr/src/uts/common/io/net80211/net80211_crypto.c
149
cipher_modnames[cipher] : "<unknown>");
usr/src/uts/common/io/net80211/net80211_crypto.c
159
if ((ic->ic_caps & (1<<cipher)) == 0) {
usr/src/uts/common/io/net80211/net80211_crypto.c
170
if (cipher == IEEE80211_CIPHER_TKIP &&
usr/src/uts/common/io/net80211/net80211_crypto.c
233
if (cipher == IEEE80211_CIPHER_TKIP)
usr/src/uts/common/io/net80211/net80211_crypto.c
358
uint32_t cipher;
usr/src/uts/common/io/net80211/net80211_crypto.c
375
cipher = key->wk_cipher->ic_cipher;
usr/src/uts/common/io/net80211/net80211_crypto.c
376
ASSERT(cipher < IEEE80211_N(ciphermap));
usr/src/uts/common/io/net80211/net80211_crypto.c
377
return (ciphermap[cipher]);
usr/src/uts/common/io/zyd/zyd.h
223
uint8_t cipher;
usr/src/uts/common/sys/crypto/impl.h
1367
int (*cipher)(void *, caddr_t, size_t, crypto_data_t *),
usr/src/uts/common/sys/crypto/impl.h
1370
int (*cipher)(void *, caddr_t, size_t, crypto_data_t *),
usr/src/uts/common/sys/crypto/impl.h
1373
int (*cipher)(void *, caddr_t, size_t, crypto_data_t *),