Searched defs:plain (Results 1 - 10 of 10) sorted by relevance

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c38 const krb5_data *plain, krb5_enc_data *cipher)
43 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length,
50 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
36 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
H A Denc_keyhelper.c37 const krb5_data *plain, krb5_enc_data *cipher)
44 ret = krb5_c_encrypt_length(context, enctype, plain->length, &enclen);
52 ret = krb5_k_encrypt(context, key, usage, 0, plain, cipher);
36 krb5_encrypt_keyhelper(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
/osnet-11/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c77 krb5_data plain; local
88 plain.length = key_data->key_data_length[0]-2;
89 if ((plain.data = malloc(plain.length)) == NULL) /* Solaris Kerberos */
93 &cipher, &plain))) {
94 free(plain.data);
98 /* tmplen is the true length of the key. plain.data is the
104 if (tmplen > plain.length) {
105 free(plain.data);
114 dbkey->contents = (unsigned char *)plain
[all...]
H A Dencrypt_key.c82 krb5_data plain; local
110 plain.length = dbkey->length;
111 plain.data = (char *)dbkey->contents; /* Solaris Kerberos cast */
117 &plain, &cipher))) {
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/
H A Dencrypted_challenge_main.c206 krb5_data scratch, plain; local
215 plain.data = NULL;
230 plain.data = malloc(enc->ciphertext.length);
231 plain.length = enc->ciphertext.length;
232 if (plain.data == NULL)
248 NULL, enc, &plain);
271 retval = kaccess.decode_enc_ts(&plain, &ts);
297 if (plain.data)
298 free(plain.data);
318 krb5_data *plain local
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dblowfish.c27 * plain "BLOWFISH"
469 byte plain[] = "BLOWFISH"; local
477 encrypt_block( (void *) &c, buffer, plain );
481 if( memcmp( buffer, plain, 8 ) )
H A Dcast5.c473 byte plain[8] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }; local
478 encrypt_block( &c, buffer, plain );
482 if( memcmp( buffer, plain, 8 ) )
H A Ddes.c897 struct { byte key[24]; byte plain[8]; byte cipher[8]; } testdata[] = { member in struct:__anon502
970 tripledes_ecb_encrypt (des3, testdata[i].plain, result);
975 if (memcmp (testdata[i].plain, result, 8))
H A Drsa.c1187 gcry_sexp_t plain = NULL;
1199 err = gcry_sexp_build (&plain, NULL,
1208 err = gcry_pk_encrypt (&encr, plain, pkey);
1271 gcry_sexp_release (plain);
1185 gcry_sexp_t plain = NULL; local
H A Dpubkey.c692 log_mpidump (" plain:", *result);
1736 gcry_mpi_t *skey = NULL, *data = NULL, plain = NULL; local
1762 rc = pubkey_decrypt (module_key->mod_id, &plain, data, skey, flags);
1766 if (gcry_sexp_build (r_plain, NULL, modern? "(value %m)" : "%m", plain))
1776 if (plain)
1777 mpi_free (plain);

Completed in 76 milliseconds