/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 39 cipher->ciphertext.length = enclen; 42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { 43 cipher->ciphertext.length = 0; 48 free(cipher->ciphertext.data); 49 cipher->ciphertext.data = NULL;
|
H A D | encode_kdc.c | 42 dec_rep->enc_part.ciphertext is allocated and filled in. 102 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \ 103 dec_rep->enc_part.ciphertext.length); \ 104 free(dec_rep->enc_part.ciphertext.data); \ 105 dec_rep->enc_part.ciphertext.length = 0; \ 106 dec_rep->enc_part.ciphertext.data = 0;}
|
H A D | mk_rep.c | 86 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); 87 free(reply.enc_part.ciphertext.data); 88 reply.enc_part.ciphertext.length = 0; 89 reply.enc_part.ciphertext.data = 0;
|
H A D | decrypt_tk.c | 53 scratch.length = ticket->enc_part.ciphertext.length; 54 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
|
H A D | kdc_rep_dc.c | 55 scratch.length = dec_rep->enc_part.ciphertext.length; 56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) {
|
H A D | mk_priv.c | 71 privmsg.enc_part.ciphertext.length = enclen; 72 if (!(privmsg.enc_part.ciphertext.data = 73 malloc(privmsg.enc_part.ciphertext.length))) { 102 memset(privmsg.enc_part.ciphertext.data, 0, 103 privmsg.enc_part.ciphertext.length); 104 free(privmsg.enc_part.ciphertext.data); 105 privmsg.enc_part.ciphertext.length = 0; 106 privmsg.enc_part.ciphertext.data = 0;
|
H A D | send_tgs.c | 93 request.authenticator.ciphertext.data = 0; 116 memset(request.authenticator.ciphertext.data, 0, 117 request.authenticator.ciphertext.length); 118 free(request.authenticator.ciphertext.data); 207 krb5_xfree(tgsreq.authorization_data.ciphertext.data); 332 if (tgsreq.authorization_data.ciphertext.data) { 333 memset(tgsreq.authorization_data.ciphertext.data, 0, 334 tgsreq.authorization_data.ciphertext.length); 335 krb5_xfree(tgsreq.authorization_data.ciphertext.data);
|
H A D | copy_tick.c | 109 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch); 115 tempto->enc_part.ciphertext = *scratch; 119 krb5_xfree(tempto->enc_part.ciphertext.data);
|
H A D | mk_cred.c | 42 * data to the ciphertext area. 45 pencdata->ciphertext.data = scratch->data; 46 pencdata->ciphertext.length = scratch->length; 57 memset(pencdata->ciphertext.data, 0, pencdata->ciphertext.length); 58 free(pencdata->ciphertext.data); 59 pencdata->ciphertext.length = 0; 60 pencdata->ciphertext.data = 0;
|
H A D | mk_req_ext.c | 144 request.authenticator.ciphertext.data = 0; 266 if (request.authenticator.ciphertext.data) { 267 (void) memset(request.authenticator.ciphertext.data, 0, 268 request.authenticator.ciphertext.length); 269 free(request.authenticator.ciphertext.data);
|
/opensolaris-onvv-gate/usr/src/uts/common/crypto/io/ |
H A D | blowfish.c | 344 crypto_data_t *ciphertext, crypto_req_handle_t req) 363 BLOWFISH_ARG_INPLACE(plaintext, ciphertext); 369 if (ciphertext->cd_length < plaintext->cd_length) { 370 ciphertext->cd_length = plaintext->cd_length; 377 ret = blowfish_encrypt_update(ctx, plaintext, ciphertext, req); 389 blowfish_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 403 if ((ciphertext->cd_length & (BLOWFISH_BLOCK_LEN - 1)) != 0) 409 BLOWFISH_ARG_INPLACE(ciphertext, plaintext); 415 if (plaintext->cd_length < ciphertext->cd_length) { 416 plaintext->cd_length = ciphertext 343 blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 435 blowfish_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 498 blowfish_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 619 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 706 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | aes.c | 433 crypto_data_t *ciphertext, crypto_req_handle_t req) 453 AES_ARG_INPLACE(plaintext, ciphertext); 476 if (ciphertext->cd_length < length_needed) { 477 ciphertext->cd_length = length_needed; 481 saved_length = ciphertext->cd_length; 482 saved_offset = ciphertext->cd_offset; 487 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req); 499 * it to existing ciphertext. So, need to adjust the left over 504 ciphertext->cd_offset = ciphertext 432 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 551 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 670 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 745 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 1004 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1134 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | rsa.c | 539 crypto_data_t *ciphertext, crypto_req_handle_t req) 547 RSA_ARG_INPLACE(plaintext, ciphertext); 556 ciphertext); 568 crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, 575 RSA_ARG_INPLACE(plaintext, ciphertext); 578 ciphertext)); 604 crypto_data_t *plaintext, crypto_data_t *ciphertext) 635 if (ciphertext->cd_length < modulus_len) { 636 ciphertext->cd_length = modulus_len; 658 /* copy out to ciphertext */ 538 rsaprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 566 rsa_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 603 rsa_encrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext) argument 718 rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 741 rsa_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 757 rsa_decrypt_common(rsa_mech_type_t mech_type, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext) argument [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/des/ |
H A D | des_crypt.c | 554 crypto_data_t *ciphertext, crypto_req_handle_t req) 572 DES_ARG_INPLACE(plaintext, ciphertext); 578 if (ciphertext->cd_length < plaintext->cd_length) { 579 ciphertext->cd_length = plaintext->cd_length; 586 ret = des_encrypt_update(ctx, plaintext, ciphertext, req); 598 des_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 611 if ((ciphertext->cd_length & (DES_BLOCK_LEN - 1)) != 0) 617 DES_ARG_INPLACE(ciphertext, plaintext); 623 if (plaintext->cd_length < ciphertext->cd_length) { 624 plaintext->cd_length = ciphertext 553 des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 643 des_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 709 des_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 775 des_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 833 des_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 940 des_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/evp/ |
H A D | evp_test.c | 139 const unsigned char *ciphertext,int cn, 152 hexdump(stdout,"Ciphertext",ciphertext,cn); 191 if(memcmp(out,ciphertext,cn)) 195 hexdump(stderr,"Expected",ciphertext,cn); 210 if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn)) 247 const unsigned char *ciphertext,int cn, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 263 const unsigned char *ciphertext, unsigned int cn) 276 hexdump(stdout,"Digest",ciphertext,cn); 305 if(memcmp(md,ciphertext,c 136 test1(const EVP_CIPHER *c,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 244 test_cipher(const char *cipher,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 261 test_digest(const char *digest, const unsigned char *plaintext,int pn, const unsigned char *ciphertext, unsigned int cn) argument 369 unsigned char *iv,*key,*plaintext,*ciphertext; local [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_cipher.c | 61 * CRYPTO_INVALID_CIPHERTEXT: bogus 'ciphertext' argument. 297 * ciphertext: Storage for the encrypted message. The length needed 308 * When complete and successful, 'ciphertext' will contain the encrypted 320 crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 340 plaintext, ciphertext, tmpl); 355 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 402 plaintext, ciphertext, spi_ctx_tmpl, KCF_SWFP_RHNDL(crq)); 406 mech, key, plaintext, ciphertext, spi_ctx_tmpl); 459 * ciphertext: Storage for the encrypted message part. 474 crypto_data_t *ciphertext, crypto_call_req_ 318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 473 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 533 crypto_encrypt_final(crypto_context_t context, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 755 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 852 crypto_encrypt_single(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 887 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 193 uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local 253 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j); 260 ciphertext[4 * i + 3] = cdata[i] & 0xff; 262 ciphertext[4 * i + 2] = cdata[i] & 0xff; 264 ciphertext[4 * i + 1] = cdata[i] & 0xff; 266 ciphertext[4 * i + 0] = cdata[i] & 0xff; 280 encode_base64((uint8_t *) encrypted + strlen(encrypted), ciphertext,
|
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 64 if (val->enc_part.ciphertext.data) { 65 krb5_xfree(val->enc_part.ciphertext.data); 66 val->enc_part.ciphertext.data = 0; 78 if (val->authenticator.ciphertext.data) { 79 krb5_xfree(val->authenticator.ciphertext.data); 80 val->authenticator.ciphertext.data = 0; 165 if (val->enc_part.ciphertext.data) { 166 krb5_xfree(val->enc_part.ciphertext.data); 167 val->enc_part.ciphertext.data = 0; 353 if (val->enc_part.ciphertext [all...] |
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 68 outputd.ciphertext.length = outlen; 69 outputd.ciphertext.data = outptr; 93 /* size is the length of the input ciphertext data */ 95 inputd.ciphertext.length = size; 97 inputd.ciphertext.data = (char*)inptr; 308 enc_data->ciphertext.length = enclen; 309 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL) 313 free(enc_data->ciphertext.data); 334 data->length = enc_data->ciphertext.length;
|
/opensolaris-onvv-gate/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 91 cipher.ciphertext.length = key_data->key_data_length[0]-2; 92 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
|
H A D | encrypt_key.c | 116 cipher.ciphertext.length = len; 117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */
|
/opensolaris-onvv-gate/usr/src/uts/common/sys/crypto/ |
H A D | impl.h | 687 #define KCF_PROV_ENCRYPT(pd, ctx, plaintext, ciphertext, req) ( \ 689 KCF_PROV_CIPHER_OPS(pd)->encrypt(ctx, plaintext, ciphertext, req) : \ 692 #define KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext, ciphertext, req) ( \ 695 ciphertext, req) : \ 698 #define KCF_PROV_ENCRYPT_FINAL(pd, ctx, ciphertext, req) ( \ 700 KCF_PROV_CIPHER_OPS(pd)->encrypt_final(ctx, ciphertext, req) : \ 703 #define KCF_PROV_ENCRYPT_ATOMIC(pd, session, mech, key, plaintext, ciphertext, \ 707 (pd)->pd_prov_handle, session, mech, key, plaintext, ciphertext, \ 717 #define KCF_PROV_DECRYPT(pd, ctx, ciphertext, plaintext, req) ( \ 719 KCF_PROV_CIPHER_OPS(pd)->decrypt(ctx, ciphertext, plaintex [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | decrypt.c | 74 key, usage, ivec, &input->ciphertext, output));
|
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_crypt.c | 155 outputd.ciphertext.length = length; 156 outputd.ciphertext.data = out; 200 inputd.ciphertext.length = length; 201 inputd.ciphertext.data = (char *)in; /* Solaris Kerberos */
|
/opensolaris-onvv-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local 173 ciphertext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize); 174 ciphertext.data=output->data+hashsize; 248 ret = (*(enc->encrypt))(context, &k3, ivec, &plaintext, &ciphertext); 280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; local 354 ciphertext.length=input->length-hashsize; 355 ciphertext.data=input->data+hashsize; 357 plaintext.length=ciphertext.length; 412 ret=(*(enc->decrypt))(context, &k3, ivec, &ciphertext, &plaintext);
|