Lines Matching refs:buf
87 * Des [en/de]crypt buffer, buf of length, len for each key provided using
91 * encrypt(buf, k[0]), decrypt(buf, k[1]), encrypt(buf, k[2])
92 * decrypt(buf, k[4]) ... encrypt(buf, k[keynum - 1])
94 * done with the first key, i.e., ecrypt(buf, k[0]);
104 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len,
124 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec);
142 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec);
158 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode)
181 (char *)buf->value, buf->length, mode, ivec.c);
194 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode)
207 stat = cbc_crypt(keys->dh_key_set_val[0].c, (char *)buf->value,
208 buf->length, mode, ivec.c);
235 gss_buffer_desc buf; /* GSS buffer to hold keys for cipher routine */
250 buf.length = signature->dh_signature_len;
251 buf.value = signature->dh_signature_val;
255 return (signer(&buf, keys, ENCIPHER));
375 gss_buffer_desc buf; /* Buffer to package tok */
385 buf.length = len;
386 buf.value = tok;
393 stat = (*v->msg)(&buf, mesg, v->signer->cipher, keys, sig);
411 gss_buffer_desc buf; /* Packaging for sig */
418 buf.length = sig->dh_signature_len;
419 buf.value = sig->dh_signature_val;
425 if ((stat = (*cipher)(&buf, keys, ENCIPHER)) != DH_SUCCESS)