/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 38 const krb5_data *plain, krb5_enc_data *cipher) 43 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length, 50 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); 36 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
|
H A D | enc_keyhelper.c | 37 const krb5_data *plain, krb5_enc_data *cipher) 44 ret = krb5_c_encrypt_length(context, enctype, plain->length, &enclen); 52 ret = krb5_k_encrypt(context, key, usage, 0, plain, cipher); 36 krb5_encrypt_keyhelper(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 77 krb5_data plain; local 88 plain.length = key_data->key_data_length[0]-2; 89 if ((plain.data = malloc(plain.length)) == NULL) /* Solaris Kerberos */ 93 &cipher, &plain))) { 94 free(plain.data); 98 /* tmplen is the true length of the key. plain.data is the 104 if (tmplen > plain.length) { 105 free(plain.data); 114 dbkey->contents = (unsigned char *)plain [all...] |
H A D | encrypt_key.c | 82 krb5_data plain; local 110 plain.length = dbkey->length; 111 plain.data = (char *)dbkey->contents; /* Solaris Kerberos cast */ 117 &plain, &cipher))) {
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 206 krb5_data scratch, plain; local 215 plain.data = NULL; 230 plain.data = malloc(enc->ciphertext.length); 231 plain.length = enc->ciphertext.length; 232 if (plain.data == NULL) 248 NULL, enc, &plain); 271 retval = kaccess.decode_enc_ts(&plain, &ts); 297 if (plain.data) 298 free(plain.data); 318 krb5_data *plain local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | blowfish.c | 27 * plain "BLOWFISH" 469 byte plain[] = "BLOWFISH"; local 477 encrypt_block( (void *) &c, buffer, plain ); 481 if( memcmp( buffer, plain, 8 ) )
|
H A D | cast5.c | 473 byte plain[8] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }; local 478 encrypt_block( &c, buffer, plain ); 482 if( memcmp( buffer, plain, 8 ) )
|
H A D | des.c | 897 struct { byte key[24]; byte plain[8]; byte cipher[8]; } testdata[] = { member in struct:__anon502 970 tripledes_ecb_encrypt (des3, testdata[i].plain, result); 975 if (memcmp (testdata[i].plain, result, 8))
|
H A D | rsa.c | 1187 gcry_sexp_t plain = NULL; 1199 err = gcry_sexp_build (&plain, NULL, 1208 err = gcry_pk_encrypt (&encr, plain, pkey); 1271 gcry_sexp_release (plain); 1185 gcry_sexp_t plain = NULL; local
|
H A D | pubkey.c | 692 log_mpidump (" plain:", *result); 1736 gcry_mpi_t *skey = NULL, *data = NULL, plain = NULL; local 1762 rc = pubkey_decrypt (module_key->mod_id, &plain, data, skey, flags); 1766 if (gcry_sexp_build (r_plain, NULL, modern? "(value %m)" : "%m", plain)) 1776 if (plain) 1777 mpi_free (plain);
|