/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | krb5_decode.c | 291 clear_field(rep,enc_part.ciphertext.data); 398 clear_field(rep,enc_part.ciphertext.data); 423 clear_field(rep,enc_part.ciphertext.data); 445 clear_field(rep,authenticator.ciphertext.data); 475 clear_field(rep,enc_part.ciphertext.data); 531 clear_field(rep,authorization_data.ciphertext.data); 562 clear_field(rep,authorization_data.ciphertext.data); 669 clear_field(rep,enc_part.ciphertext.data); 734 clear_field(rep,enc_part.ciphertext.data);
|
H A D | asn1_k_encode.c | 150 FIELDOF_NORM(krb5_enc_data, ostring_data, ciphertext, 2), 315 if (val->authorization_data.ciphertext.data != NULL) 660 if (val->sam_enc_key.ciphertext.length)
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth2.c | 747 0xff & enc_data.ciphertext.data[0], 748 0xff & enc_data.ciphertext.data[1]); 754 free(enc_data.ciphertext.data); 760 free(enc_data.ciphertext.data); 1051 sam_response.sam_enc_key.ciphertext.length = 0; 1661 sr2.sam_enc_nonce_or_sad.ciphertext.length = ciph_len; 1663 sr2.sam_enc_nonce_or_sad.ciphertext.data = 1664 (char *)malloc(sr2.sam_enc_nonce_or_sad.ciphertext.length); 1666 if (!sr2.sam_enc_nonce_or_sad.ciphertext.data) { 1679 krb5_free_data_contents(context, &sr2.sam_enc_nonce_or_sad.ciphertext); [all...] |
H A D | fast.c | 304 scratch.data = malloc(encrypted_response->ciphertext.length); 307 scratch.length = encrypted_response->ciphertext.length;
|
H A D | rd_req_dec.c | 432 &req->authenticator.ciphertext, 800 scratch.length = request->authenticator.ciphertext.length;
|
H A D | get_in_tkt.c | 347 scratch.data = k5alloc(enc->ciphertext.length, &ret); 350 scratch.length = enc->ciphertext.length; 816 request.authorization_data.ciphertext.length = 0; 817 request.authorization_data.ciphertext.data = 0;
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | rsa.c | 100 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); 112 public (ciphertext, plaintext, &pk); 115 if (!gcry_mpi_cmp (ciphertext, plaintext)) 119 secret (decr_plaintext, ciphertext, sk); 147 gcry_mpi_release (ciphertext); 99 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); local
|
H A D | camellia.c | 1407 unsigned char *ciphertext) 1429 PUTU32(ciphertext, tmp[0]); 1430 PUTU32(ciphertext + 4, tmp[1]); 1431 PUTU32(ciphertext + 8, tmp[2]); 1432 PUTU32(ciphertext + 12, tmp[3]); 1436 const unsigned char *ciphertext, 1442 tmp[0] = GETU32(ciphertext); 1443 tmp[1] = GETU32(ciphertext + 4); 1444 tmp[2] = GETU32(ciphertext + 8); 1445 tmp[3] = GETU32(ciphertext 1404 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument 1435 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument [all...] |
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 557 KMF_DATA *ciphertext) 613 if (out_len > ciphertext->Length) { 628 out_data = ciphertext->Data; 689 ciphertext->Length = total_encrypted; 553 PKCS_EncryptData(KMF_HANDLE_T kmfh, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *plaintext, KMF_DATA *ciphertext) argument
|
H A D | certop.c | 1062 * into the ciphertext. 1069 * ciphertext(output) - pointer to the ciphertext contains 1089 KMF_DATA *ciphertext; local 1116 ciphertext = kmf_get_attr_ptr(KMF_CIPHERTEXT_DATA_ATTR, attrlist, 1119 if (cert == NULL || plaintext == NULL || ciphertext == NULL) 1159 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); 1172 * the ciphertext into the plaintext. 1185 KMF_DATA *ciphertext = NULL; local 1224 /* Get the ciphertext an [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | camellia.c | 1405 unsigned char *ciphertext) 1427 PUTU32(ciphertext, tmp[0]); 1428 PUTU32(ciphertext + 4, tmp[1]); 1429 PUTU32(ciphertext + 8, tmp[2]); 1430 PUTU32(ciphertext + 12, tmp[3]); 1434 const unsigned char *ciphertext, 1440 tmp[0] = GETU32(ciphertext); 1441 tmp[1] = GETU32(ciphertext + 4); 1442 tmp[2] = GETU32(ciphertext + 8); 1443 tmp[3] = GETU32(ciphertext 1402 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument 1433 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument [all...] |
H A D | seed.c | 452 static const byte ciphertext[16] = { 459 if (memcmp (scratch, ciphertext, sizeof (ciphertext))) 447 static const byte ciphertext[16] = { local
|
H A D | twofish.c | 892 static const byte ciphertext[16] = { 913 if (memcmp (scratch, ciphertext, sizeof (ciphertext))) 883 static const byte ciphertext[16] = { local
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1292 KMF_OID *AlgOID, KMF_DATA *ciphertext, 1305 ciphertext == NULL || output == NULL || 1306 ciphertext->Data == NULL || 1313 blocks = ciphertext->Length/modulus_len; 1315 in_data = ciphertext->Data; 1321 &out_len, ciphertext->Length, in_data, in_len); 1291 NSS_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *AlgOID, KMF_DATA *ciphertext, KMF_DATA *output) argument
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_srv.c | 618 enc.ciphertext.data = NULL; 660 krb5_free_data_contents(context, &enc.ciphertext);
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2348 KMF_OID *algOID, KMF_DATA *ciphertext, 2370 ciphertext == NULL || output == NULL) 2400 blocks = ciphertext->Length/block_len; 2403 in_data = ciphertext->Data; 2347 KMFPK11_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *algOID, KMF_DATA *ciphertext, KMF_DATA *output) argument
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2292 KMF_OID *AlgOID, KMF_DATA *ciphertext, 2303 ciphertext == NULL || output == NULL || 2304 ciphertext->Data == NULL || 2315 blocks = ciphertext->Length/modulus_len; 2317 in_data = ciphertext->Data; 2291 OpenSSL_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *AlgOID, KMF_DATA *ciphertext, KMF_DATA *output) argument
|