| /freebsd/crypto/krb5/src/lib/crypto/krb/ |
| H A D | cf2.c | 55 ret = alloc_data(&prf_in, input->length + 1); in krb5_c_prfplus() 58 ret = alloc_data(&prf_out, prflen); in krb5_c_prfplus() 98 ret = alloc_data(&rnd, ktp->enc->keybytes); in krb5_c_derive_prfplus() 144 ret = alloc_data(&prf1, ktp->enc->keybytes); in krb5_c_fx_cf2_simple() 150 ret = alloc_data(&prf2, ktp->enc->keybytes); in krb5_c_fx_cf2_simple()
|
| H A D | checksum_hmac_md5.c | 53 ret = alloc_data(&ds, ctp->hash->hashsize); in krb5int_hmacmd5_checksum() 77 ret = alloc_data(&hashval, ctp->hash->hashsize); in krb5int_hmacmd5_checksum()
|
| H A D | enc_etm.c | 76 ret = alloc_data(&ki, ktp->hash->hashsize / 2); in derive_keys() 122 ret = alloc_data(out, ktp->hash->hashsize); in hmac_ivec_data() 165 ret = alloc_data(&ivcopy, ivec->length); in krb5int_etm_encrypt()
|
| H A D | default_state.c | 39 if (alloc_data(state_out, 8)) in krb5int_des_init_state()
|
| H A D | checksum_etm.c | 49 ret = alloc_data(&kc, ctp->hash->hashsize / 2); in krb5int_etm_checksum()
|
| H A D | prf_dk.c | 41 ret = alloc_data(&cksum, hash->hashsize); in krb5int_dk_prf()
|
| H A D | make_checksum_iov.c | 60 ret = alloc_data(&cksum_data, ctp->compute_size); in krb5_k_make_checksum_iov()
|
| H A D | make_checksum.c | 57 ret = alloc_data(&cksum_data, ctp->compute_size); in krb5_k_make_checksum()
|
| H A D | verify_checksum_iov.c | 68 ret = alloc_data(&computed, ctp->compute_size); in krb5_k_verify_checksum_iov()
|
| H A D | old_api_glue.c | 330 ret = alloc_data(&enc_data->ciphertext, enclen); in krb5_encrypt_data() 357 ret = alloc_data(data, enc_data->ciphertext.length); in krb5_decrypt_data()
|
| /freebsd/crypto/krb5/src/lib/krb5/ccache/ |
| H A D | t_marshal.c | 278 krb5_data ser_data, *alloc_data; in main() local 294 if (krb5_marshal_credentials(context, alloc_cred, &alloc_data) != 0) in main() 296 assert(alloc_data->length == tests[3].cred1len); in main() 297 assert(memcmp(tests[3].cred1, alloc_data->data, alloc_data->length) == 0); in main() 298 krb5_free_data(context, alloc_data); in main()
|
| /freebsd/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | util.c | 88 ret = alloc_data(thash, hashlen); in update_thash() 118 ret = alloc_data(&wbytes, mult_len); in derive_wbytes() 123 ret = alloc_data(&prf_input, prefix_len + 4); in derive_wbytes() 185 ret = alloc_data(&seed, nblocks * hashlen); in derive_key()
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/ |
| H A D | kdf.c | 46 ret = alloc_data(&prf, hash->hashsize); in k5_sp800_108_counter_hmac() 93 ret = alloc_data(&prf, blocksize); in k5_sp800_108_feedback_cmac() 157 ret = alloc_data(&block, blocksize); in k5_derive_random_rfc3961()
|
| /freebsd/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_sha2.c | 97 if (alloc_data(&hval, hash->hashsize)) in hash_test() 106 if (alloc_data(&iovs[i].data, 1000) != 0) in hash_test()
|
| H A D | t_fork.c | 54 t(alloc_data(&enc_data->ciphertext, out_len)); in prepare_enc_data() 88 t(alloc_data(&decrypted, plain.length)); in main()
|
| H A D | t_decrypt.c | 567 ret = alloc_data(&enc.ciphertext, enclen); in generate() 603 ret = alloc_data(&plain, test->ciphertext.length); in main()
|
| H A D | t_prf.c | 136 ret = alloc_data(&output, prfsz); in main()
|
| /freebsd/crypto/krb5/src/lib/kdb/ |
| H A D | decrypt_key.c | 87 ret = alloc_data(&plain, kd->key_data_length[0] - 2); in krb5_dbe_def_decrypt_key_data() 115 ret = alloc_data(&salt.data, kd->key_data_length[1]); in krb5_dbe_def_decrypt_key_data()
|
| /freebsd/crypto/krb5/src/plugins/preauth/securid_sam2/ |
| H A D | grail.c | 93 ret = alloc_data(&result, enc_track_data->length); in decrypt_track_data() 133 ret = alloc_data(&enc.ciphertext, olen); in encrypt_track_data() 226 ret = alloc_data(&scratch, sr2->sam_enc_nonce_or_sad.ciphertext.length); in verify_grail_data()
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | k5sealv3.c | 132 err = alloc_data(&plain, message->length + 16 + ec); in gss_krb5int_make_seal_token_v3() 195 err = alloc_data(&plain, message->length + 16); in gss_krb5int_make_seal_token_v3()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | pr_to_salt.c | 53 if (alloc_data(ret, size)) in principal2salt_internal()
|
| H A D | rd_priv.c | 63 ret = alloc_data(&plaintext, privmsg->enc_part.ciphertext.length); in read_krbpriv()
|
| /freebsd/crypto/krb5/src/plugins/preauth/otp/ |
| H A D | main.c | 61 retval = alloc_data(&plaintext, req->enc_data.ciphertext.length); in decrypt_encdata() 141 retval = alloc_data(&nonce, sizeof(now) + length); in nonce_generate()
|
| /freebsd/crypto/krb5/src/lib/krad/ |
| H A D | attr.c | 166 retval = alloc_data(&tmp, seclen + BLOCKSIZE); in user_password_encode() 216 retval = alloc_data(&tmp, seclen + BLOCKSIZE); in user_password_decode()
|
| /freebsd/crypto/krb5/src/kadmin/server/ |
| H A D | schpw.c | 275 ret = alloc_data(&clear, 2 + strlen(strresult)); in process_chpw_request() 354 ret = alloc_data(rep, 6 + ap_rep.length + cipher.length); in process_chpw_request()
|