/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 33 size_t enclen; local 36 &enclen))) 39 cipher->ciphertext.length = enclen; 42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) {
|
H A D | mk_priv.c | 48 size_t blocksize, enclen; local 68 scratch1->length, &enclen))) 71 privmsg.enc_part.ciphertext.length = enclen;
|
H A D | preauth2.c | 790 size_t enclen; local 980 scratch->length, &enclen))) { 989 enc_data->ciphertext.length = enclen; 991 if ((enc_data->ciphertext.data = MALLOC(enclen)) == NULL) { 999 FREE(enc_data->ciphertext.data, enclen);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_decrypt.c | 85 size_t hashsize, blocksize, enclen, plainlen; local 120 enclen = input->length - hmacsize; 122 if ((plaindata = (unsigned char *) MALLOC(enclen)) == NULL) { 129 d1.length = enclen; 132 d2.length = enclen; 163 if (memcmp(cksum, input->data+enclen, hmacsize) != 0) { 172 plainlen = enclen - blocksize; 197 (void) memset(plaindata, 0, enclen); 198 FREE(plaindata, enclen);
|
H A D | dk_encrypt.c | 65 size_t blocksize, plainlen, enclen; local 90 krb5_dk_encrypt_length(enc, hash, input->length, &enclen); 92 if (output->length < enclen) 132 d2.length = enclen - plainlen; 135 output->length = enclen; 229 size_t blocksize, plainlen, enclen; local 252 krb5int_aes_encrypt_length(enc, hash, input->length, &enclen); 255 if (output->length < enclen) 295 d2.length = enclen - plainlen; 305 output->length = enclen; [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_encrypt.c | 62 size_t blocksize, hashsize, enclen; local 69 krb5_old_encrypt_length(enc, hash, input->length, &enclen); 71 if (output->length < enclen) 74 output->length = enclen;
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 290 size_t enclen, blocksize; local 294 &enclen))) 308 enc_data->ciphertext.length = enclen; 309 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL)
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_crypt.c | 112 size_t enclen; local 114 if (krb5_c_encrypt_length(context, key->enctype, n, &enclen) != 0) 117 return(enclen);
|
/illumos-gate/usr/src/lib/libdscfg/common/ |
H A D | cfg.c | 1209 int enclen; local 1231 enclen = cfg_encode_string(tag, &encode_buf[1], CFG_MAX_BUF - 1) + 1; 1232 if (enclen < 1 || (enclen + 1) >= CFG_MAX_BUF) { 1237 encode_buf[enclen] = '='; 1238 encode_buf[enclen + 1] = '\0'; 1241 if (strncmp(buf, &encode_buf[1], enclen) == 0) { 1284 enclen = cfg_encode_string(val, encode_buf, CFG_MAX_BUF); 1285 if (enclen < 0 || (strlen(buf) + enclen) > 1317 int enclen; local 1398 int enclen, rc; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_encode.c | 552 assert(a->enclen != NULL); 553 retval = a->enclen(buf, (unsigned int) slen, dataptr, &length);
|
H A D | asn1_encode.h | 262 asn1_error_code (*enclen)(asn1buf *, unsigned int, const void *, member in struct:atype_info
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 2004 size_t enclen; local 2009 scratch->length, &enclen))) 2012 if ((tmpdata.ciphertext.data = (char *) malloc(enclen)) == NULL) { 2016 tmpdata.ciphertext.length = enclen; 2179 size_t enclen; local 2184 scratch->length, &enclen))) 2187 if ((tmpdata.ciphertext.data = (char *) malloc(enclen)) == NULL) { 2191 tmpdata.ciphertext.length = enclen;
|
/illumos-gate/usr/src/uts/common/io/scsi/targets/ |
H A D | ses_ses.c | 647 int s, e, enclen, off = 8; local 656 gget8(buffer, off+3, enclen); 661 e = off + enclen;
|
/illumos-gate/usr/src/uts/common/io/ |
H A D | cryptmod.c | 1576 size_t enclen; local 1583 enclen = inlen - AES_TRUNCATED_HMAC_LEN; 1586 int nblocks = (enclen + DEFAULT_AES_BLOCKLEN - 1) / 1593 result = aes_cbc_cts_decrypt(tmi, mp->b_rptr, enclen); 1605 (char *)mp->b_rptr, enclen, 1614 if (bcmp(hmacbuff, mp->b_rptr + enclen, 1622 mp->b_wptr = mp->b_rptr + enclen;
|