Searched refs:ciphertext (Results 1 - 25 of 42) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c47 cipher->ciphertext.length = enclen;
48 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL)
52 free(cipher->ciphertext.data);
53 cipher->ciphertext.data = NULL;
H A Denc_keyhelper.c48 cipher->ciphertext.length = enclen;
49 cipher->ciphertext.data = malloc(enclen);
50 if (cipher->ciphertext.data == NULL)
54 free(cipher->ciphertext.data);
55 cipher->ciphertext.data = NULL;
H A Dencode_kdc.c45 dec_rep->enc_part.ciphertext is allocated and filled in.
105 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \
106 dec_rep->enc_part.ciphertext.length); \
107 free(dec_rep->enc_part.ciphertext.data); \
108 dec_rep->enc_part.ciphertext.length = 0; \
109 dec_rep->enc_part.ciphertext.data = 0;}
H A Ddecrypt_tk.c55 scratch.length = ticket->enc_part.ciphertext.length;
56 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length)))
H A Dkdc_rep_dc.c56 scratch.length = dec_rep->enc_part.ciphertext.length;
57 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) {
H A Dmk_rep.c138 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length);
139 free(reply.enc_part.ciphertext.data);
140 reply.enc_part.ciphertext.length = 0;
141 reply.enc_part.ciphertext.data = 0;
H A Dmk_priv.c75 privmsg.enc_part.ciphertext.length = enclen;
76 if (!(privmsg.enc_part.ciphertext.data =
77 malloc(privmsg.enc_part.ciphertext.length))) {
108 memset(privmsg.enc_part.ciphertext.data, 0,
109 privmsg.enc_part.ciphertext.length);
110 free(privmsg.enc_part.ciphertext.data);
111 privmsg.enc_part.ciphertext.length = 0;
112 privmsg.enc_part.ciphertext.data = 0;
H A Dcopy_kdcreq.c89 if (in->authorization_data.ciphertext.data != NULL) {
91 &in->authorization_data.ciphertext,
92 &req->authorization_data.ciphertext);
H A Dsend_tgs.c68 request.authenticator.ciphertext.data = NULL;
129 memset(request.authenticator.ciphertext.data, 0,
130 request.authenticator.ciphertext.length);
131 free(request.authenticator.ciphertext.data);
132 request.authenticator.ciphertext.length = 0;
133 request.authenticator.ciphertext.data = 0;
210 tgsreq.authorization_data.ciphertext.data = NULL;
235 free(tgsreq.authorization_data.ciphertext.data);
374 if (tgsreq.authorization_data.ciphertext.data) {
375 memset(tgsreq.authorization_data.ciphertext
[all...]
H A Dmk_cred.c45 * data to the ciphertext area.
48 pencdata->ciphertext.data = scratch->data;
49 pencdata->ciphertext.length = scratch->length;
60 memset(pencdata->ciphertext.data, 0, pencdata->ciphertext.length);
61 free(pencdata->ciphertext.data);
62 pencdata->ciphertext.length = 0;
63 pencdata->ciphertext.data = 0;
H A Dcopy_tick.c111 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch);
117 tempto->enc_part.ciphertext = *scratch;
121 free(tempto->enc_part.ciphertext.data);
H A Dmk_req_ext.c105 request.authenticator.ciphertext.data = NULL;
262 if (request.authenticator.ciphertext.data) {
263 (void) memset(request.authenticator.ciphertext.data, 0,
264 request.authenticator.ciphertext.length);
265 free(request.authenticator.ciphertext.data);
H A Dpreauth.c280 enc_data.ciphertext.data = 0;
313 if (enc_data.ciphertext.data)
314 free(enc_data.ciphertext.data);
456 sam_response.sam_enc_nonce_or_ts.ciphertext.data = 0;
532 sam_response.sam_enc_key.ciphertext.length = 0;
565 free(sam_response.sam_enc_nonce_or_ts.ciphertext.data);
H A Drd_rep.c98 scratch.length = reply->enc_part.ciphertext.length;
179 scratch.length = reply->enc_part.ciphertext.length;
H A Drd_cred.c31 scratch.length = pcred->enc_part.ciphertext.length;
41 memcpy(scratch.data, pcred->enc_part.ciphertext.data, scratch.length);
H A Drd_priv.c92 scratch.length = privmsg->enc_part.ciphertext.length;
160 free(privmsg->enc_part.ciphertext.data);
/osnet-11/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c193 uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local
253 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j);
260 ciphertext[4 * i + 3] = cdata[i] & 0xff;
262 ciphertext[4 * i + 2] = cdata[i] & 0xff;
264 ciphertext[4 * i + 1] = cdata[i] & 0xff;
266 ciphertext[4 * i + 0] = cdata[i] & 0xff;
280 encode_base64((uint8_t *) encrypted + strlen(encrypted), ciphertext,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dold_api_glue.c66 outputd.ciphertext.length = outlen;
67 outputd.ciphertext.data = outptr;
91 /* size is the length of the input ciphertext data */
93 inputd.ciphertext.length = size;
95 inputd.ciphertext.data = (char*)inptr;
312 enc_data->ciphertext.length = enclen;
313 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL)
317 free(enc_data->ciphertext.data);
338 data->length = enc_data->ciphertext.length;
/osnet-11/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c86 cipher.ciphertext.length = key_data->key_data_length[0]-2;
87 cipher.ciphertext.data = (char *)ptr; /* Solaris Kerberos cast */
H A Dencrypt_key.c113 cipher.ciphertext.length = len;
114 cipher.ciphertext.data = (char *)ptr; /* Solaris Kerberos cast */
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/
H A Dencrypted_challenge_main.c91 scratch.data = malloc(enc->ciphertext.length);
92 scratch.length = enc->ciphertext.length;
117 enc.ciphertext.data = NULL;
136 krb5_free_data_contents(context, &enc.ciphertext);
230 plain.data = malloc(enc->ciphertext.length);
231 plain.length = enc->ciphertext.length;
330 enc.ciphertext.data = NULL; /* In case of error pass through */
360 if (enc.ciphertext.data)
361 krb5_free_data_contents(context, &enc.ciphertext);
/osnet-11/usr/src/lib/libzpool/common/
H A Dkernel.c808 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext,
812 ciphertext->cd_format == CRYPTO_DATA_RAW) {
813 bcopy(plaintext->cd_raw.iov_base, ciphertext->cd_raw.iov_base,
816 ciphertext->cd_format == CRYPTO_DATA_UIO) {
818 ciphertext->cd_uio->uio_iov[0].iov_base,
821 ciphertext->cd_format == CRYPTO_DATA_UIO) {
824 ciphertext->cd_uio->uio_iov[i].iov_base,
835 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, argument
839 if (plaintext == NULL & ciphertext != NULL) {
843 if (ciphertext
807 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Drsa.c101 gcry_mpi_t ciphertext = gcry_mpi_new (nbits);
113 public (ciphertext, plaintext, &pk);
116 if (!gcry_mpi_cmp (ciphertext, plaintext))
120 secret (decr_plaintext, ciphertext, sk);
148 gcry_mpi_release (ciphertext);
1189 gcry_mpi_t ciphertext = NULL;
1215 /* Extraxt the ciphertext from the returned S-expression. */
1217 ciphertext = extract_a_from_sexp (encr);
1218 if (!ciphertext)
1224 /* Check that the ciphertext doe
100 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); local
1187 gcry_mpi_t ciphertext = NULL; local
[all...]
/osnet-11/usr/src/lib/libc/port/gen/
H A Dcrypt.c148 char *ciphertext; local
185 ciphertext = NULL;
188 ciphertext = _unix_crypt(plaintext, salt, ctbuffer);
190 ciphertext = alg->a_genhash(ctbuffer, CRYPT_MAXCIPHERTEXTLEN,
199 return (ciphertext);
292 * $<algname>[,var=val,[var=val ...][$puresalt]$<ciphertext>
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_k_decode.c570 val->ciphertext.data = NULL;
574 get_lenfield(val->ciphertext.length,val->ciphertext.data,2,asn1_decode_charstring);
580 free(val->ciphertext.data);
581 val->ciphertext.data = NULL;
705 val->enc_part.ciphertext.data = NULL;
726 krb5_free_data_contents(NULL, &val->enc_part.ciphertext);
767 val->authorization_data.ciphertext.data = NULL;
806 val->authorization_data.ciphertext.data = NULL;
807 val->authorization_data.ciphertext
[all...]

Completed in 167 milliseconds

12