Searched refs:ciphertext (Results 1 - 25 of 55) sorted by relevance

123

/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c39 cipher->ciphertext.length = enclen;
42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) {
43 cipher->ciphertext.length = 0;
48 free(cipher->ciphertext.data);
49 cipher->ciphertext.data = NULL;
H A Dencode_kdc.c42 dec_rep->enc_part.ciphertext is allocated and filled in.
102 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \
103 dec_rep->enc_part.ciphertext.length); \
104 free(dec_rep->enc_part.ciphertext.data); \
105 dec_rep->enc_part.ciphertext.length = 0; \
106 dec_rep->enc_part.ciphertext.data = 0;}
H A Dmk_rep.c86 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length);
87 free(reply.enc_part.ciphertext.data);
88 reply.enc_part.ciphertext.length = 0;
89 reply.enc_part.ciphertext.data = 0;
H A Ddecrypt_tk.c53 scratch.length = ticket->enc_part.ciphertext.length;
54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
H A Dkdc_rep_dc.c55 scratch.length = dec_rep->enc_part.ciphertext.length;
56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) {
H A Dmk_priv.c71 privmsg.enc_part.ciphertext.length = enclen;
72 if (!(privmsg.enc_part.ciphertext.data =
73 malloc(privmsg.enc_part.ciphertext.length))) {
102 memset(privmsg.enc_part.ciphertext.data, 0,
103 privmsg.enc_part.ciphertext.length);
104 free(privmsg.enc_part.ciphertext.data);
105 privmsg.enc_part.ciphertext.length = 0;
106 privmsg.enc_part.ciphertext.data = 0;
H A Dsend_tgs.c93 request.authenticator.ciphertext.data = 0;
116 memset(request.authenticator.ciphertext.data, 0,
117 request.authenticator.ciphertext.length);
118 free(request.authenticator.ciphertext.data);
207 krb5_xfree(tgsreq.authorization_data.ciphertext.data);
332 if (tgsreq.authorization_data.ciphertext.data) {
333 memset(tgsreq.authorization_data.ciphertext.data, 0,
334 tgsreq.authorization_data.ciphertext.length);
335 krb5_xfree(tgsreq.authorization_data.ciphertext.data);
H A Dcopy_tick.c109 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch);
115 tempto->enc_part.ciphertext = *scratch;
119 krb5_xfree(tempto->enc_part.ciphertext.data);
H A Dmk_cred.c42 * data to the ciphertext area.
45 pencdata->ciphertext.data = scratch->data;
46 pencdata->ciphertext.length = scratch->length;
57 memset(pencdata->ciphertext.data, 0, pencdata->ciphertext.length);
58 free(pencdata->ciphertext.data);
59 pencdata->ciphertext.length = 0;
60 pencdata->ciphertext.data = 0;
H A Dmk_req_ext.c144 request.authenticator.ciphertext.data = 0;
266 if (request.authenticator.ciphertext.data) {
267 (void) memset(request.authenticator.ciphertext.data, 0,
268 request.authenticator.ciphertext.length);
269 free(request.authenticator.ciphertext.data);
/opensolaris-onvv-gate/usr/src/uts/common/crypto/io/
H A Dblowfish.c344 crypto_data_t *ciphertext, crypto_req_handle_t req)
363 BLOWFISH_ARG_INPLACE(plaintext, ciphertext);
369 if (ciphertext->cd_length < plaintext->cd_length) {
370 ciphertext->cd_length = plaintext->cd_length;
377 ret = blowfish_encrypt_update(ctx, plaintext, ciphertext, req);
389 blowfish_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument
403 if ((ciphertext->cd_length & (BLOWFISH_BLOCK_LEN - 1)) != 0)
409 BLOWFISH_ARG_INPLACE(ciphertext, plaintext);
415 if (plaintext->cd_length < ciphertext->cd_length) {
416 plaintext->cd_length = ciphertext
343 blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
435 blowfish_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
498 blowfish_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument
619 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
706 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
[all...]
H A Daes.c433 crypto_data_t *ciphertext, crypto_req_handle_t req)
453 AES_ARG_INPLACE(plaintext, ciphertext);
476 if (ciphertext->cd_length < length_needed) {
477 ciphertext->cd_length = length_needed;
481 saved_length = ciphertext->cd_length;
482 saved_offset = ciphertext->cd_offset;
487 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req);
499 * it to existing ciphertext. So, need to adjust the left over
504 ciphertext->cd_offset = ciphertext
432 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
551 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument
670 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
745 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument
1004 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1134 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
[all...]
H A Drsa.c539 crypto_data_t *ciphertext, crypto_req_handle_t req)
547 RSA_ARG_INPLACE(plaintext, ciphertext);
556 ciphertext);
568 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext,
575 RSA_ARG_INPLACE(plaintext, ciphertext);
578 ciphertext));
604 crypto_data_t *plaintext, crypto_data_t *ciphertext)
635 if (ciphertext->cd_length < modulus_len) {
636 ciphertext->cd_length = modulus_len;
658 /* copy out to ciphertext */
538 rsaprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
566 rsa_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
603 rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument
718 rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument
741 rsa_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
757 rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/des/
H A Ddes_crypt.c554 crypto_data_t *ciphertext, crypto_req_handle_t req)
572 DES_ARG_INPLACE(plaintext, ciphertext);
578 if (ciphertext->cd_length < plaintext->cd_length) {
579 ciphertext->cd_length = plaintext->cd_length;
586 ret = des_encrypt_update(ctx, plaintext, ciphertext, req);
598 des_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument
611 if ((ciphertext->cd_length & (DES_BLOCK_LEN - 1)) != 0)
617 DES_ARG_INPLACE(ciphertext, plaintext);
623 if (plaintext->cd_length < ciphertext->cd_length) {
624 plaintext->cd_length = ciphertext
553 des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
643 des_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
709 des_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument
775 des_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_req_handle_t req) argument
833 des_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
940 des_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/evp/
H A Devp_test.c139 const unsigned char *ciphertext,int cn,
152 hexdump(stdout,"Ciphertext",ciphertext,cn);
191 if(memcmp(out,ciphertext,cn))
195 hexdump(stderr,"Expected",ciphertext,cn);
210 if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn))
247 const unsigned char *ciphertext,int cn,
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec);
263 const unsigned char *ciphertext, unsigned int cn)
276 hexdump(stdout,"Digest",ciphertext,cn);
305 if(memcmp(md,ciphertext,c
136 test1(const EVP_CIPHER *c,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument
244 test_cipher(const char *cipher,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument
261 test_digest(const char *digest, const unsigned char *plaintext,int pn, const unsigned char *ciphertext, unsigned int cn) argument
369 unsigned char *iv,*key,*plaintext,*ciphertext; local
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/crypto/api/
H A Dkcf_cipher.c61 * CRYPTO_INVALID_CIPHERTEXT: bogus 'ciphertext' argument.
297 * ciphertext: Storage for the encrypted message. The length needed
308 * When complete and successful, 'ciphertext' will contain the encrypted
320 crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
340 plaintext, ciphertext, tmpl);
355 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
402 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq));
406 mech, key, plaintext, ciphertext, spi_ctx_tmpl);
459 * ciphertext: Storage for the encrypted message part.
474 crypto_data_t *ciphertext, crypto_call_req_
318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
473 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument
533 crypto_encrypt_final(crypto_context_t context, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument
599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
755 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument
852 crypto_encrypt_single(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument
887 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c193 uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local
253 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j);
260 ciphertext[4 * i + 3] = cdata[i] & 0xff;
262 ciphertext[4 * i + 2] = cdata[i] & 0xff;
264 ciphertext[4 * i + 1] = cdata[i] & 0xff;
266 ciphertext[4 * i + 0] = cdata[i] & 0xff;
280 encode_base64((uint8_t *) encrypted + strlen(encrypted), ciphertext,
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dkfree.c64 if (val->enc_part.ciphertext.data) {
65 krb5_xfree(val->enc_part.ciphertext.data);
66 val->enc_part.ciphertext.data = 0;
78 if (val->authenticator.ciphertext.data) {
79 krb5_xfree(val->authenticator.ciphertext.data);
80 val->authenticator.ciphertext.data = 0;
165 if (val->enc_part.ciphertext.data) {
166 krb5_xfree(val->enc_part.ciphertext.data);
167 val->enc_part.ciphertext.data = 0;
353 if (val->enc_part.ciphertext
[all...]
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dold_api_glue.c68 outputd.ciphertext.length = outlen;
69 outputd.ciphertext.data = outptr;
93 /* size is the length of the input ciphertext data */
95 inputd.ciphertext.length = size;
97 inputd.ciphertext.data = (char*)inptr;
308 enc_data->ciphertext.length = enclen;
309 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL)
313 free(enc_data->ciphertext.data);
334 data->length = enc_data->ciphertext.length;
/opensolaris-onvv-gate/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c91 cipher.ciphertext.length = key_data->key_data_length[0]-2;
92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
H A Dencrypt_key.c116 cipher.ciphertext.length = len;
117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
/opensolaris-onvv-gate/usr/src/uts/common/sys/crypto/
H A Dimpl.h687 #define KCF_PROV_ENCRYPT(pd, ctx, plaintext, ciphertext, req) ( \
689 KCF_PROV_CIPHER_OPS(pd)->encrypt(ctx, plaintext, ciphertext, req) : \
692 #define KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, ciphertext, req) ( \
695 ciphertext, req) : \
698 #define KCF_PROV_ENCRYPT_FINAL(pd, ctx, ciphertext, req) ( \
700 KCF_PROV_CIPHER_OPS(pd)->encrypt_final(ctx, ciphertext, req) : \
703 #define KCF_PROV_ENCRYPT_ATOMIC(pd, session, mech, key, plaintext, ciphertext, \
707 (pd)->pd_prov_handle, session, mech, key, plaintext, ciphertext, \
717 #define KCF_PROV_DECRYPT(pd, ctx, ciphertext, plaintext, req) ( \
719 KCF_PROV_CIPHER_OPS(pd)->decrypt(ctx, ciphertext, plaintex
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/
H A Ddecrypt.c74 key, usage, ivec, &input->ciphertext, output));
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dutil_crypt.c155 outputd.ciphertext.length = length;
156 outputd.ciphertext.data = out;
200 inputd.ciphertext.length = length;
201 inputd.ciphertext.data = (char *)in; /* Solaris Kerberos */
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/
H A Dk5_arcfour.c84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local
173 ciphertext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize);
174 ciphertext.data=output->data+hashsize;
248 ret = (*(enc->encrypt))(context, &k3, ivec, &plaintext, &ciphertext);
280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; local
354 ciphertext.length=input->length-hashsize;
355 ciphertext.data=input->data+hashsize;
357 plaintext.length=ciphertext.length;
412 ret=(*(enc->decrypt))(context, &k3, ivec, &ciphertext, &plaintext);

Completed in 221 milliseconds

123