/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 47 cipher->ciphertext.length = enclen; 48 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) 52 free(cipher->ciphertext.data); 53 cipher->ciphertext.data = NULL;
|
H A D | enc_keyhelper.c | 48 cipher->ciphertext.length = enclen; 49 cipher->ciphertext.data = malloc(enclen); 50 if (cipher->ciphertext.data == NULL) 54 free(cipher->ciphertext.data); 55 cipher->ciphertext.data = NULL;
|
H A D | encode_kdc.c | 45 dec_rep->enc_part.ciphertext is allocated and filled in. 105 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \ 106 dec_rep->enc_part.ciphertext.length); \ 107 free(dec_rep->enc_part.ciphertext.data); \ 108 dec_rep->enc_part.ciphertext.length = 0; \ 109 dec_rep->enc_part.ciphertext.data = 0;}
|
H A D | decrypt_tk.c | 55 scratch.length = ticket->enc_part.ciphertext.length; 56 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
|
H A D | kdc_rep_dc.c | 56 scratch.length = dec_rep->enc_part.ciphertext.length; 57 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) {
|
H A D | mk_rep.c | 138 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); 139 free(reply.enc_part.ciphertext.data); 140 reply.enc_part.ciphertext.length = 0; 141 reply.enc_part.ciphertext.data = 0;
|
H A D | mk_priv.c | 75 privmsg.enc_part.ciphertext.length = enclen; 76 if (!(privmsg.enc_part.ciphertext.data = 77 malloc(privmsg.enc_part.ciphertext.length))) { 108 memset(privmsg.enc_part.ciphertext.data, 0, 109 privmsg.enc_part.ciphertext.length); 110 free(privmsg.enc_part.ciphertext.data); 111 privmsg.enc_part.ciphertext.length = 0; 112 privmsg.enc_part.ciphertext.data = 0;
|
H A D | copy_kdcreq.c | 89 if (in->authorization_data.ciphertext.data != NULL) { 91 &in->authorization_data.ciphertext, 92 &req->authorization_data.ciphertext);
|
H A D | send_tgs.c | 68 request.authenticator.ciphertext.data = NULL; 129 memset(request.authenticator.ciphertext.data, 0, 130 request.authenticator.ciphertext.length); 131 free(request.authenticator.ciphertext.data); 132 request.authenticator.ciphertext.length = 0; 133 request.authenticator.ciphertext.data = 0; 210 tgsreq.authorization_data.ciphertext.data = NULL; 235 free(tgsreq.authorization_data.ciphertext.data); 374 if (tgsreq.authorization_data.ciphertext.data) { 375 memset(tgsreq.authorization_data.ciphertext [all...] |
H A D | mk_cred.c | 45 * data to the ciphertext area. 48 pencdata->ciphertext.data = scratch->data; 49 pencdata->ciphertext.length = scratch->length; 60 memset(pencdata->ciphertext.data, 0, pencdata->ciphertext.length); 61 free(pencdata->ciphertext.data); 62 pencdata->ciphertext.length = 0; 63 pencdata->ciphertext.data = 0;
|
H A D | copy_tick.c | 111 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch); 117 tempto->enc_part.ciphertext = *scratch; 121 free(tempto->enc_part.ciphertext.data);
|
H A D | mk_req_ext.c | 105 request.authenticator.ciphertext.data = NULL; 262 if (request.authenticator.ciphertext.data) { 263 (void) memset(request.authenticator.ciphertext.data, 0, 264 request.authenticator.ciphertext.length); 265 free(request.authenticator.ciphertext.data);
|
H A D | preauth.c | 280 enc_data.ciphertext.data = 0; 313 if (enc_data.ciphertext.data) 314 free(enc_data.ciphertext.data); 456 sam_response.sam_enc_nonce_or_ts.ciphertext.data = 0; 532 sam_response.sam_enc_key.ciphertext.length = 0; 565 free(sam_response.sam_enc_nonce_or_ts.ciphertext.data);
|
H A D | rd_rep.c | 98 scratch.length = reply->enc_part.ciphertext.length; 179 scratch.length = reply->enc_part.ciphertext.length;
|
H A D | rd_cred.c | 31 scratch.length = pcred->enc_part.ciphertext.length; 41 memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length);
|
H A D | rd_priv.c | 92 scratch.length = privmsg->enc_part.ciphertext.length; 160 free(privmsg->enc_part.ciphertext.data);
|
/osnet-11/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 193 uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local 253 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j); 260 ciphertext[4 * i + 3] = cdata[i] & 0xff; 262 ciphertext[4 * i + 2] = cdata[i] & 0xff; 264 ciphertext[4 * i + 1] = cdata[i] & 0xff; 266 ciphertext[4 * i + 0] = cdata[i] & 0xff; 280 encode_base64((uint8_t *) encrypted + strlen(encrypted), ciphertext,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 66 outputd.ciphertext.length = outlen; 67 outputd.ciphertext.data = outptr; 91 /* size is the length of the input ciphertext data */ 93 inputd.ciphertext.length = size; 95 inputd.ciphertext.data = (char*)inptr; 312 enc_data->ciphertext.length = enclen; 313 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL) 317 free(enc_data->ciphertext.data); 338 data->length = enc_data->ciphertext.length;
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 86 cipher.ciphertext.length = key_data->key_data_length[0]-2; 87 cipher.ciphertext.data = (char *)ptr; /* Solaris Kerberos cast */
|
H A D | encrypt_key.c | 113 cipher.ciphertext.length = len; 114 cipher.ciphertext.data = (char *)ptr; /* Solaris Kerberos cast */
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 91 scratch.data = malloc(enc->ciphertext.length); 92 scratch.length = enc->ciphertext.length; 117 enc.ciphertext.data = NULL; 136 krb5_free_data_contents(context, &enc.ciphertext); 230 plain.data = malloc(enc->ciphertext.length); 231 plain.length = enc->ciphertext.length; 330 enc.ciphertext.data = NULL; /* In case of error pass through */ 360 if (enc.ciphertext.data) 361 krb5_free_data_contents(context, &enc.ciphertext);
|
/osnet-11/usr/src/lib/libzpool/common/ |
H A D | kernel.c | 808 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 812 ciphertext->cd_format == CRYPTO_DATA_RAW) { 813 bcopy(plaintext->cd_raw.iov_base, ciphertext->cd_raw.iov_base, 816 ciphertext->cd_format == CRYPTO_DATA_UIO) { 818 ciphertext->cd_uio->uio_iov[0].iov_base, 821 ciphertext->cd_format == CRYPTO_DATA_UIO) { 824 ciphertext->cd_uio->uio_iov[i].iov_base, 835 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, argument 839 if (plaintext == NULL & ciphertext != NULL) { 843 if (ciphertext 807 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | rsa.c | 101 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); 113 public (ciphertext, plaintext, &pk); 116 if (!gcry_mpi_cmp (ciphertext, plaintext)) 120 secret (decr_plaintext, ciphertext, sk); 148 gcry_mpi_release (ciphertext); 1189 gcry_mpi_t ciphertext = NULL; 1215 /* Extraxt the ciphertext from the returned S-expression. */ 1217 ciphertext = extract_a_from_sexp (encr); 1218 if (!ciphertext) 1224 /* Check that the ciphertext doe 100 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); local 1187 gcry_mpi_t ciphertext = NULL; local [all...] |
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 148 char *ciphertext; local 185 ciphertext = NULL; 188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer); 190 ciphertext = alg->a_genhash(ctbuffer, CRYPT_MAXCIPHERTEXTLEN, 199 return (ciphertext); 292 * $<algname>[,var=val,[var=val ...][$puresalt]$<ciphertext>
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_decode.c | 570 val->ciphertext.data = NULL; 574 get_lenfield(val->ciphertext.length,val->ciphertext.data,2,asn1_decode_charstring); 580 free(val->ciphertext.data); 581 val->ciphertext.data = NULL; 705 val->enc_part.ciphertext.data = NULL; 726 krb5_free_data_contents(NULL, &val->enc_part.ciphertext); 767 val->authorization_data.ciphertext.data = NULL; 806 val->authorization_data.ciphertext.data = NULL; 807 val->authorization_data.ciphertext [all...] |