/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | read_msg.c | 35 krb5_read_message(krb5_context context, krb5_pointer fdp, krb5_data *inbuf) argument 42 inbuf->data = NULL; 43 inbuf->length = 0; 52 inbuf->length = ilen = (int) len; 57 if (!(buf = malloc(inbuf->length))) { 65 inbuf->data = buf;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_ef_generic.c | 59 char *inbuf = NULL; local 71 inbuf = (char *)malloc(inlen); 72 if (inbuf == NULL) 76 inbuf = input->data; 81 if (outbuf != NULL && inbuf != NULL) { 83 (void) memset(inbuf, 0, inlen); 84 (void) memcpy(inbuf, input->data, input->length); 87 (const mit_des_cblock *)inbuf, 97 if (inlen != input->length && inbuf != NULL) 98 free(inbuf); [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | rd_rep.c | 80 const krb5_data *inbuf, krb5_ap_rep_enc_part **repl) 89 if (!krb5_is_ap_rep(inbuf)) 92 /* Decode inbuf. */ 93 retval = decode_krb5_ap_rep(inbuf, &reply); 110 KERBEROS_PROBE_KRB_AP_REP(READ, inbuf, reply, NULL); 120 KERBEROS_PROBE_KRB_AP_REP(READ, inbuf, reply, enc); 162 const krb5_data *inbuf, krb5_ui_4 *nonce) 169 if (!krb5_is_ap_rep(inbuf)) 174 if ((retval = decode_krb5_ap_rep(inbuf, &reply))) 79 krb5_rd_rep(krb5_context context, krb5_auth_context auth_context, const krb5_data *inbuf, krb5_ap_rep_enc_part **repl) argument 161 krb5_rd_rep_dce(krb5_context context, krb5_auth_context auth_context, const krb5_data *inbuf, krb5_ui_4 *nonce) argument
|
H A D | rd_req.c | 54 const krb5_data *inbuf, krb5_const_principal server, 63 if (!krb5_is_ap_req(inbuf)) 66 if ((retval = decode_krb5_ap_req(inbuf, &request))) { 95 retval = krb5_rd_req_decoded_ext(context, auth_context, request, inbuf, 53 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
|
H A D | rd_priv.c | 43 Parses a KRB_PRIV message from inbuf, placing the confidential user 63 krb5_rd_priv_basic(krb5_context context, const krb5_data *inbuf, argument 76 if (!krb5_is_krb_priv(inbuf)) 80 if ((retval = decode_krb5_priv(inbuf, &privmsg))) 103 KERBEROS_PROBE_KRB_PRIV(READ, inbuf, privmsg, NULL); 112 KERBEROS_PROBE_KRB_PRIV(READ, inbuf, privmsg, privmsg_enc_part); 168 const krb5_data *inbuf, krb5_data *outbuf, 229 if ((retval = krb5_rd_priv_basic(context, inbuf, key, 167 krb5_rd_priv(krb5_context context, krb5_auth_context auth_context, const krb5_data *inbuf, krb5_data *outbuf, krb5_replay_data *outdata) argument
|
H A D | rd_safe.c | 42 parses a KRB_SAFE message from inbuf, placing the integrity-protected user 55 krb5_rd_safe_basic(krb5_context context, const krb5_data *inbuf, argument 70 if (!krb5_is_krb_safe(inbuf)) 73 if ((retval = decode_krb5_safe_with_body(inbuf, &message, &safe_body))) 77 KERBEROS_PROBE_KRB_SAFE(READ, inbuf, message); 173 const krb5_data *inbuf, krb5_data *outbuf, 233 if ((retval = krb5_rd_safe_basic(context, inbuf, key, 172 krb5_rd_safe(krb5_context context, krb5_auth_context auth_context, const krb5_data *inbuf, krb5_data *outbuf, krb5_replay_data *outdata) argument
|
H A D | recvauth.c | 59 krb5_data inbuf; local 80 if ((retval = krb5_read_message(context, fd, &inbuf))) 82 if (strcmp(inbuf.data, sendauth_version)) { 86 free(inbuf.data); 96 if ((retval = krb5_read_message(context, fd, &inbuf))) 98 if (appl_version && strcmp(inbuf.data, appl_version)) { 105 *version = inbuf; 107 free(inbuf.data); 124 if ((retval = krb5_read_message(context, fd, &inbuf))) 150 problem = krb5_rd_req(context, auth_context, &inbuf, serve [all...] |
H A D | sendauth.c | 60 krb5_data inbuf, outbuf[2]; local 191 if ((retval = krb5_read_message(context, fd, &inbuf))) 194 if (inbuf.length) { 196 k5_trace_message_recv(*((int *)fd), inbuf.data, inbuf.length); 198 if ((retval = krb5_rd_error(context, &inbuf, error))) { 199 free(inbuf.data); 204 free(inbuf.data); 215 if ((retval = krb5_read_message(context, fd, &inbuf))) 219 k5_trace_message_recv(*((int *)fd), inbuf [all...] |
/osnet-11/usr/src/lib/libresolv2/common/inet/ |
H A D | inet_net_ntop.c | 176 unsigned char inbuf[16]; local 196 memcpy(inbuf, src, p); 197 memset(inbuf + p, 0, 16 - p); 201 inbuf[p-1] &= m; 204 s = inbuf;
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/ |
H A D | adler32.c | 118 adler32_write (void *context, const void *inbuf, grub_size_t inlen) argument 121 if (!inbuf) 123 ctx->adler = update_adler32 (ctx->adler, inbuf, inlen);
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | arcfour.c | 43 byte *outbuf, const byte *inbuf, unsigned int length ) 57 *outbuf++ = *inbuf++ ^ sbox[(sbox[i] + sbox[j]) & 255]; 66 byte *outbuf, const byte *inbuf, unsigned int length) 69 do_encrypt_stream (ctx, outbuf, inbuf, length ); 42 do_encrypt_stream( ARCFOUR_context *ctx, byte *outbuf, const byte *inbuf, unsigned int length ) argument 65 encrypt_stream(void *context, byte *outbuf, const byte *inbuf, unsigned int length) argument
|
H A D | camellia-glue.c | 108 camellia_encrypt(void *c, byte *outbuf, const byte *inbuf) argument 112 Camellia_EncryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf); 122 camellia_decrypt(void *c, byte *outbuf, const byte *inbuf) argument 126 Camellia_DecryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf);
|
H A D | crc.c | 160 crc32_write (void *context, const void *inbuf, size_t inlen) argument 163 if (!inbuf) 165 ctx->CRC = update_crc32 (ctx->CRC, inbuf, inlen); 250 const unsigned char *inbuf = inbuf_arg; local 254 if (!inbuf) 258 ctx->CRC ^= (*inbuf++) << 16;
|
H A D | md4.c | 198 const unsigned char *inbuf = inbuf_arg; local 208 if( !inbuf ) 214 hd->buf[hd->count++] = *inbuf++; 223 transform( hd, inbuf ); 227 inbuf += 64; 230 hd->buf[hd->count++] = *inbuf++;
|
H A D | md5.c | 223 const unsigned char *inbuf = inbuf_arg; local 233 if( !inbuf ) 239 hd->buf[hd->count++] = *inbuf++; 248 transform( hd, inbuf ); 252 inbuf += 64; 255 hd->buf[hd->count++] = *inbuf++;
|
H A D | tiger.c | 722 const unsigned char *inbuf = inbuf_arg; local 732 if( !inbuf ) 737 hd->buf[hd->count++] = *inbuf++; 745 transform( hd, inbuf ); 749 inbuf += 64; 753 hd->buf[hd->count++] = *inbuf++;
|
H A D | blowfish.c | 52 static void encrypt_block (void *bc, byte *outbuf, const byte *inbuf); 53 static void decrypt_block (void *bc, byte *outbuf, const byte *inbuf); 412 do_encrypt_block ( BLOWFISH_context *bc, byte *outbuf, const byte *inbuf ) 416 d1 = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3]; 417 d2 = inbuf[4] << 24 | inbuf[5] << 16 | inbuf[ 430 encrypt_block(void *context, byte *outbuf, const byte *inbuf) argument 439 do_decrypt_block(BLOWFISH_context *bc, byte *outbuf, const byte *inbuf) argument 457 decrypt_block(void *context, byte *outbuf, const byte *inbuf) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | arcfour.c | 42 byte *outbuf, const byte *inbuf, unsigned int length ) 56 *outbuf++ = *inbuf++ ^ sbox[(sbox[i] + sbox[j]) & 255]; 65 byte *outbuf, const byte *inbuf, unsigned int length) 68 do_encrypt_stream (ctx, outbuf, inbuf, length ); 41 do_encrypt_stream( ARCFOUR_context *ctx, byte *outbuf, const byte *inbuf, unsigned int length ) argument 64 encrypt_stream(void *context, byte *outbuf, const byte *inbuf, unsigned int length) argument
|
H A D | camellia-glue.c | 109 camellia_encrypt(void *c, byte *outbuf, const byte *inbuf) argument 113 Camellia_EncryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf); 123 camellia_decrypt(void *c, byte *outbuf, const byte *inbuf) argument 127 Camellia_DecryptBlock(ctx->keybitlength,inbuf,ctx->keytable,outbuf);
|
H A D | crc.c | 160 crc32_write (void *context, const void *inbuf, size_t inlen) argument 163 if (!inbuf) 165 ctx->CRC = update_crc32 (ctx->CRC, inbuf, inlen); 250 const unsigned char *inbuf = inbuf_arg; local 254 if (!inbuf) 258 ctx->CRC ^= (*inbuf++) << 16;
|
H A D | md4.c | 198 const unsigned char *inbuf = inbuf_arg; local 208 if( !inbuf ) 214 hd->buf[hd->count++] = *inbuf++; 223 transform( hd, inbuf ); 227 inbuf += 64; 230 hd->buf[hd->count++] = *inbuf++;
|
H A D | md5.c | 223 const unsigned char *inbuf = inbuf_arg; local 233 if( !inbuf ) 239 hd->buf[hd->count++] = *inbuf++; 248 transform( hd, inbuf ); 252 inbuf += 64; 255 hd->buf[hd->count++] = *inbuf++;
|
H A D | rfc2268.c | 87 do_encrypt (void *context, unsigned char *outbuf, const unsigned char *inbuf) argument 93 word0 = (word0 << 8) | inbuf[1]; 94 word0 = (word0 << 8) | inbuf[0]; 95 word1 = (word1 << 8) | inbuf[3]; 96 word1 = (word1 << 8) | inbuf[2]; 97 word2 = (word2 << 8) | inbuf[5]; 98 word2 = (word2 << 8) | inbuf[4]; 99 word3 = (word3 << 8) | inbuf[7]; 100 word3 = (word3 << 8) | inbuf[6]; 139 do_decrypt (void *context, unsigned char *outbuf, const unsigned char *inbuf) argument [all...] |
/osnet-11/usr/src/lib/fm/libfmd_agent/common/ |
H A D | fmd_agent.c | 93 char *inbuf = NULL, *outbuf = NULL; local 101 if ((inbuf = umem_alloc(insz, UMEM_DEFAULT)) == NULL) 104 if ((err = nvlist_pack(innvl, &inbuf, &insz, 106 umem_free(inbuf, insz); 125 fid.fid_inbuf = inbuf; 148 if (inbuf != NULL) 149 umem_free(inbuf, insz);
|
/osnet-11/usr/src/grub/grub2/grub-core/io/ |
H A D | xzio.c | 41 grub_uint8_t inbuf[XZBUFSIZ]; member in struct:grub_xzio 97 xzio->buf.in_size = grub_file_read (xzio->file, xzio->inbuf, 222 xzio->buf.in = xzio->inbuf; 275 readret = grub_file_read (xzio->file, xzio->inbuf, XZBUFSIZ);
|