Symbol: decrypt
usr/src/boot/efi/include/IndustryStandard/Tpm20.h
738
UINT32 decrypt : 1;
usr/src/boot/efi/include/IndustryStandard/Tpm20.h
749
UINT8 decrypt : 1;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1001
(void) memset(&encr_data.decrypt, 0, sizeof (cipher_info_t));
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1004
encr_data.decrypt.state = ENCR_STATE_NOT_READY;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1029
(void) memcpy(p, encr_data.decrypt.keyid, encr_data.decrypt.keyidlen);
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1030
p += encr_data.decrypt.keyidlen;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1085
encr_data.decrypt.type = type;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1087
lstate = encr_data.decrypt.state;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1105
(void) memcpy(encr_data.decrypt.ivec, data,
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1111
encr_data.decrypt.type = type;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1120
encr_data.decrypt.type = 0;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1155
encr_data.decrypt.state = lstate;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1158
encr_data.decrypt.autoflag = 0;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1160
if (lstate == ENCR_STATE_OK && encr_data.decrypt.autoflag)
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1166
encr_data.decrypt.state);
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1589
if (encr_data.decrypt.type == ENCTYPE_NULL) {
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1600
if (encr_data.decrypt.type == TELOPT_ENCTYPE_DES_CFB64) {
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1606
"crypto_method %d\n", encr_data.decrypt.type);
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1609
encr_data.decrypt.type);
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1617
if (encr_data.decrypt.setup != cki.crypto_method) {
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1618
(void) memcpy(cki.key, (void *)encr_data.decrypt.krbdes_key,
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1620
(void) memcpy(cki.ivec, (void *)encr_data.decrypt.ivec,
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1643
encr_data.decrypt.setup = cki.crypto_method;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1698
ENCTYPE_NAME(encr_data.decrypt.type));
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1807
(void) memcpy(encr_data.decrypt.keyid, keyid, keylen);
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1808
encr_data.decrypt.keyidlen = keylen;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1916
encr_data.decrypt.state);
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
1957
encr_data.decrypt.state = lstate;
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
2013
encr_data.decrypt.state),
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
2016
encr_data.decrypt.autoflag));
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
2032
encr_data.decrypt.state));
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
2050
encrypt_keyid(encr_data.decrypt.keyid, &encr_data.decrypt.keyidlen,
usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
758
encrypt_session_key(&skey, &encr_data.decrypt);
usr/src/cmd/ztest/ztest.c
1227
boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp)
usr/src/cmd/ztest/ztest.c
1231
err = dmu_objset_own(name, type, readonly, decrypt, tag, osp);
usr/src/cmd/ztest/ztest.c
1232
if (decrypt && err == EACCES) {
usr/src/cmd/ztest/ztest.c
1255
err = dmu_objset_own(name, type, readonly, decrypt, tag, osp);
usr/src/common/crypto/des/des_impl.c
507
uint8_t *out_block, boolean_t decrypt)
usr/src/common/crypto/des/des_impl.c
519
if (decrypt == B_TRUE)
usr/src/common/crypto/des/des_impl.c
543
if (decrypt == B_TRUE)
usr/src/common/crypto/des/des_impl.c
569
uint8_t *out_block, boolean_t decrypt)
usr/src/common/crypto/des/des_impl.c
581
if (decrypt == B_TRUE)
usr/src/common/crypto/des/des_impl.c
607
if (decrypt == B_TRUE)
usr/src/common/crypto/modes/cbc.c
188
int (*decrypt)(const void *, const uint8_t *, uint8_t *),
usr/src/common/crypto/modes/cbc.c
237
decrypt(ctx->cbc_keysched, blockp,
usr/src/common/crypto/modes/cbc.c
241
decrypt(ctx->cbc_keysched, blockp, blockp);
usr/src/common/crypto/modes/modes.h
309
int (*decrypt)(const void *, const uint8_t *, uint8_t *),
usr/src/head/arpa/telnet.h
419
cipher_info_t decrypt;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
101
session_p->decrypt.mech = *pMechanism;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
104
if (INPLACE_MECHANISM(session_p->decrypt.mech.mechanism)) {
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
105
session_p->decrypt.flags |= CRYPTO_OPERATION_INPLACE_OK;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
121
if (session_p->decrypt.mech.mechanism == CKM_AES_CCM) {
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
161
session_p->decrypt.flags &= ~CRYPTO_OPERATION_ACTIVE;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
213
crypto_decrypt_t decrypt;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
223
if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
232
if (session_p->decrypt.flags & CRYPTO_OPERATION_UPDATE) {
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
243
decrypt.cd_session = session_p->k_session;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
252
inplace = (session_p->decrypt.flags & CRYPTO_OPERATION_INPLACE_OK) != 0;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
255
decrypt.cd_datalen = ulEncryptedData;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
257
decrypt.cd_datalen = *pulDataLen;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
262
decrypt.cd_databuf = (char *)pData;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
263
decrypt.cd_encrlen = ulEncryptedData;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
264
decrypt.cd_encrbuf = (char *)pEncryptedData;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
265
decrypt.cd_flags =
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
267
(decrypt.cd_datalen == decrypt.cd_encrlen) ?
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
270
while ((r = ioctl(kernel_fd, CRYPTO_DECRYPT, &decrypt)) < 0) {
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
277
rv = crypto2pkcs11_error_number(decrypt.cd_return_value);
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
281
*pulDataLen = decrypt.cd_datalen;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
338
session_p->decrypt.flags = 0;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
390
if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
395
session_p->decrypt.flags |= CRYPTO_OPERATION_UPDATE;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
406
inplace = (session_p->decrypt.flags & CRYPTO_OPERATION_INPLACE_OK) != 0;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
440
session_p->decrypt.flags = 0;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
479
if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
520
session_p->decrypt.flags = 0;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDecrypt.c
69
session_p->decrypt.flags = CRYPTO_OPERATION_ACTIVE;
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelSession.c
256
session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE ||
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelSession.h
97
crypto_active_op_t decrypt; /* context of active decrypt op */
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelSessionUtil.c
309
if (session_p->decrypt.context != NULL)
usr/src/lib/pkcs11/pkcs11_kernel/common/kernelSessionUtil.c
310
free(session_p->decrypt.context);
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
1321
aes_ctx_t *aes_ctx = session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
1322
CK_MECHANISM_TYPE mech = session_p->decrypt.mech.mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
1489
session_p->decrypt.context = NULL;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
340
session_p->decrypt.context = aes_ctx;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
341
session_p->decrypt.mech.mechanism = pMechanism->mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
678
aes_ctx_t *aes_ctx = session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
679
CK_MECHANISM_TYPE mech = session_p->decrypt.mech.mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
834
session_p->decrypt.context = NULL;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
930
aes_ctx_t *aes_ctx = session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softAESCrypt.c
939
CK_MECHANISM_TYPE mech = session_p->decrypt.mech.mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softARCFourCrypt.c
76
active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt);
usr/src/lib/pkcs11/pkcs11_softtoken/common/softBlowfishCrypt.c
321
(soft_blowfish_ctx_t *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softBlowfishCrypt.c
468
freezero(session_p->decrypt.context,
usr/src/lib/pkcs11/pkcs11_softtoken/common/softBlowfishCrypt.c
470
session_p->decrypt.context = NULL;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softBlowfishCrypt.c
66
session_p->decrypt.context = soft_blowfish_ctx;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softBlowfishCrypt.c
67
session_p->decrypt.mech.mechanism = pMechanism->mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDESCrypt.c
495
(soft_des_ctx_t *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDESCrypt.c
497
CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDESCrypt.c
778
freezero(session_p->decrypt.context, sizeof (soft_des_ctx_t));
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDESCrypt.c
79
session_p->decrypt.context = soft_des_ctx;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDESCrypt.c
80
session_p->decrypt.mech.mechanism = pMechanism->mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
144
if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
153
if (session_p->decrypt.flags & CRYPTO_OPERATION_UPDATE) {
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
237
if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
242
session_p->decrypt.flags |= CRYPTO_OPERATION_UPDATE;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
298
if (!(session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE)) {
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
322
session_p->decrypt.flags = 0;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
72
if (session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE) {
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
82
session_p->decrypt.flags = CRYPTO_OPERATION_ACTIVE;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecrypt.c
91
session_p->decrypt.flags &= ~CRYPTO_OPERATION_ACTIVE;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
145
soft_des_ctx = (soft_des_ctx_t *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
158
freezero(session_p->decrypt.context,
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
160
session_p->decrypt.context = NULL;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
199
(soft_blowfish_ctx_t *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
214
freezero(session_p->decrypt.context,
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
216
session_p->decrypt.context = NULL;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
275
CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
329
return (soft_arcfour_crypt(&(session_p->decrypt), pEncrypted,
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
394
CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
446
CK_MECHANISM_TYPE mechanism = session_p->decrypt.mech.mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
453
if (session_p->decrypt.context == NULL) {
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
466
soft_des_ctx = (soft_des_ctx_t *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
546
soft_des_ctx = (soft_des_ctx_t *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
584
(soft_blowfish_ctx_t *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
603
ARCFour_key *key = (ARCFour_key *)session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
616
free(session_p->decrypt.context);
usr/src/lib/pkcs11/pkcs11_softtoken/common/softDecryptUtil.c
617
session_p->decrypt.context = NULL;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softEncryptUtil.c
660
active_op = (encrypt) ? &(session_p->encrypt) : &(session_p->decrypt);
usr/src/lib/pkcs11/pkcs11_softtoken/common/softKeys.c
282
if (session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE) {
usr/src/lib/pkcs11/pkcs11_softtoken/common/softKeys.c
291
session_p->decrypt.flags = CRYPTO_OPERATION_ACTIVE;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softKeys.c
306
session_p->decrypt.flags = 0;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softRSA.c
231
session_p->decrypt.context = rsa_ctx;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softRSA.c
232
session_p->decrypt.mech.mechanism = pMechanism->mechanism;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softRSA.c
335
soft_rsa_ctx_t *rsa_ctx = session_p->decrypt.context;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softRSA.c
400
free(session_p->decrypt.context);
usr/src/lib/pkcs11/pkcs11_softtoken/common/softRSA.c
401
session_p->decrypt.context = NULL;
usr/src/lib/pkcs11/pkcs11_softtoken/common/softSession.h
98
crypto_active_op_t decrypt; /* context of active decrypt op */
usr/src/lib/pkcs11/pkcs11_softtoken/common/softSessionUtil.c
372
if (session_p->decrypt.context != NULL)
usr/src/lib/pkcs11/pkcs11_softtoken/common/softSessionUtil.c
490
if (session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE) {
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
353
crypto_decrypt_t decrypt;
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
355
bzero(&decrypt, sizeof (decrypt));
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
356
decrypt.cd_session = op->hsession;
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
357
decrypt.cd_datalen = op->outlen;
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
358
decrypt.cd_databuf = op->out;
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
359
decrypt.cd_encrlen = op->inlen;
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
360
decrypt.cd_encrbuf = op->in;
usr/src/test/crypto-tests/tests/common/cryptotest_kcf.c
362
return (kcf_do_ioctl(CRYPTO_DECRYPT, (uint_t *)&decrypt, "single"));
usr/src/uts/common/crypto/io/crypto.c
6806
return (decrypt(dev, ARG, mode, rval));
usr/src/uts/common/crypto/io/crypto.c
704
if (cipher_ops->decrypt != NULL)
usr/src/uts/common/crypto/io/dca_rsa.c
58
static int decrypt_error_code(int mode, int decrypt, int verify, int def);
usr/src/uts/common/crypto/io/dca_rsa.c
813
static int decrypt_error_code(int mode, int decrypt, int verify, int def)
usr/src/uts/common/crypto/io/dca_rsa.c
817
return (decrypt);
usr/src/uts/common/fs/zfs/dmu_objset.c
681
dmu_objset_hold_flags(const char *name, boolean_t decrypt, void *tag,
usr/src/uts/common/fs/zfs/dmu_objset.c
689
flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE;
usr/src/uts/common/fs/zfs/dmu_objset.c
717
boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp)
usr/src/uts/common/fs/zfs/dmu_objset.c
728
} else if (!readonly && decrypt &&
usr/src/uts/common/fs/zfs/dmu_objset.c
734
if (decrypt && arc_is_unauthenticated((*osp)->os_phys_buf)) {
usr/src/uts/common/fs/zfs/dmu_objset.c
757
boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp)
usr/src/uts/common/fs/zfs/dmu_objset.c
764
flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE;
usr/src/uts/common/fs/zfs/dmu_objset.c
773
err = dmu_objset_own_impl(ds, type, readonly, decrypt, tag, osp);
usr/src/uts/common/fs/zfs/dmu_objset.c
789
(ds->ds_dir->dd_crypto_obj == 0 || decrypt))
usr/src/uts/common/fs/zfs/dmu_objset.c
798
boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp)
usr/src/uts/common/fs/zfs/dmu_objset.c
804
flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE;
usr/src/uts/common/fs/zfs/dmu_objset.c
809
err = dmu_objset_own_impl(ds, type, readonly, decrypt, tag, osp);
usr/src/uts/common/fs/zfs/dmu_objset.c
819
dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, void *tag)
usr/src/uts/common/fs/zfs/dmu_objset.c
824
flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE;
usr/src/uts/common/fs/zfs/dmu_objset.c
848
boolean_t decrypt, void *tag)
usr/src/uts/common/fs/zfs/dmu_objset.c
854
flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE;
usr/src/uts/common/fs/zfs/dmu_objset.c
869
dmu_objset_disown(objset_t *os, boolean_t decrypt, void *tag)
usr/src/uts/common/fs/zfs/dmu_objset.c
873
flags = (decrypt) ? DS_HOLD_FLAG_DECRYPT : DS_HOLD_FLAG_NONE;
usr/src/uts/common/fs/zfs/sys/dmu_objset.h
205
int dmu_objset_hold_flags(const char *name, boolean_t decrypt, void *tag,
usr/src/uts/common/fs/zfs/sys/dmu_objset.h
208
boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp);
usr/src/uts/common/fs/zfs/sys/dmu_objset.h
210
dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt,
usr/src/uts/common/fs/zfs/sys/dmu_objset.h
215
void dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, void *tag);
usr/src/uts/common/fs/zfs/sys/dmu_objset.h
216
void dmu_objset_disown(objset_t *os, boolean_t decrypt, void *tag);
usr/src/uts/common/fs/zfs/sys/zil.h
412
boolean_t decrypt);
usr/src/uts/common/fs/zfs/zil.c
195
zil_read_log_block(zilog_t *zilog, boolean_t decrypt, const blkptr_t *bp,
usr/src/uts/common/fs/zfs/zil.c
210
if (!decrypt)
usr/src/uts/common/fs/zfs/zil.c
321
boolean_t decrypt)
usr/src/uts/common/fs/zfs/zil.c
371
error = zil_read_log_block(zilog, decrypt, &blk, &next_blk,
usr/src/uts/common/fs/zfs/zil.c
400
(decrypt && error == EIO));
usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/k5_arcfour.c
412
ret=(*(enc->decrypt))(context, &k3, ivec, &ciphertext, &plaintext);
usr/src/uts/common/gssapi/mechs/krb5/crypto/decrypt.c
72
return((*(krb5_enctypes_list[i].decrypt))
usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/dk_decrypt.c
135
if ((ret = ((*(enc->decrypt))(context, derived_encr_key,
usr/src/uts/common/gssapi/mechs/krb5/crypto/old/old_decrypt.c
100
if ((ret = ((*(enc->decrypt))(context, key, ivec, input, &output))))
usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/raw_decrypt.c
47
return((*(enc->decrypt))(context, key, ivec, input, output));
usr/src/uts/common/gssapi/mechs/krb5/include/k5-int.h
790
krb5_error_code (*decrypt) (
usr/src/uts/common/gssapi/mechs/krb5/include/k5-int.h
869
krb5_crypt_func decrypt;
usr/src/uts/common/sys/crypto/impl.h
719
(KCF_PROV_CIPHER_OPS(pd) && KCF_PROV_CIPHER_OPS(pd)->decrypt) ? \
usr/src/uts/common/sys/crypto/impl.h
720
KCF_PROV_CIPHER_OPS(pd)->decrypt(ctx, ciphertext, plaintext, req) : \
usr/src/uts/common/sys/crypto/spi.h
189
int (*decrypt)(crypto_ctx_t *,