/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_decrypt.c | 85 size_t hashsize, blocksize, enclen, plainlen; in krb5_dk_decrypt_maybe_trunc_hmac() local 120 enclen = input->length - hmacsize; in krb5_dk_decrypt_maybe_trunc_hmac() 122 if ((plaindata = (unsigned char *) MALLOC(enclen)) == NULL) { in krb5_dk_decrypt_maybe_trunc_hmac() 129 d1.length = enclen; in krb5_dk_decrypt_maybe_trunc_hmac() 132 d2.length = enclen; in krb5_dk_decrypt_maybe_trunc_hmac() 163 if (memcmp(cksum, input->data+enclen, hmacsize) != 0) { in krb5_dk_decrypt_maybe_trunc_hmac() 172 plainlen = enclen - blocksize; in krb5_dk_decrypt_maybe_trunc_hmac() 197 (void) memset(plaindata, 0, enclen); in krb5_dk_decrypt_maybe_trunc_hmac() 198 FREE(plaindata, enclen); in krb5_dk_decrypt_maybe_trunc_hmac()
|
H A D | dk_encrypt.c | 65 size_t blocksize, plainlen, enclen; in krb5_dk_encrypt() local 90 krb5_dk_encrypt_length(enc, hash, input->length, &enclen); in krb5_dk_encrypt() 92 if (output->length < enclen) in krb5_dk_encrypt() 132 d2.length = enclen - plainlen; in krb5_dk_encrypt() 135 output->length = enclen; in krb5_dk_encrypt() 229 size_t blocksize, plainlen, enclen; in krb5int_aes_dk_encrypt() local 252 krb5int_aes_encrypt_length(enc, hash, input->length, &enclen); in krb5int_aes_dk_encrypt() 255 if (output->length < enclen) in krb5int_aes_dk_encrypt() 295 d2.length = enclen - plainlen; in krb5int_aes_dk_encrypt() 305 output->length = enclen; in krb5int_aes_dk_encrypt()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 33 size_t enclen; in krb5_encrypt_helper() local 36 &enclen))) in krb5_encrypt_helper() 39 cipher->ciphertext.length = enclen; in krb5_encrypt_helper() 42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { in krb5_encrypt_helper()
|
H A D | mk_priv.c | 48 size_t blocksize, enclen; in krb5_mk_priv_basic() local 68 scratch1->length, &enclen))) in krb5_mk_priv_basic() 71 privmsg.enc_part.ciphertext.length = enclen; in krb5_mk_priv_basic()
|
H A D | preauth2.c | 790 size_t enclen; in pa_sam() local 980 scratch->length, &enclen))) { in pa_sam() 989 enc_data->ciphertext.length = enclen; in pa_sam() 991 if ((enc_data->ciphertext.data = MALLOC(enclen)) == NULL) { in pa_sam() 999 FREE(enc_data->ciphertext.data, enclen); in pa_sam()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_encrypt.c | 62 size_t blocksize, hashsize, enclen; in krb5_old_encrypt() local 69 krb5_old_encrypt_length(enc, hash, input->length, &enclen); in krb5_old_encrypt() 71 if (output->length < enclen) in krb5_old_encrypt() 74 output->length = enclen; in krb5_old_encrypt()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 290 size_t enclen, blocksize; in krb5_encrypt_data() local 294 &enclen))) in krb5_encrypt_data() 308 enc_data->ciphertext.length = enclen; in krb5_encrypt_data() 309 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL) in krb5_encrypt_data()
|
/titanic_41/usr/src/lib/libdscfg/common/ |
H A D | cfg.c | 1209 int enclen; in cfg_put_options() local 1231 enclen = cfg_encode_string(tag, &encode_buf[1], CFG_MAX_BUF - 1) + 1; in cfg_put_options() 1232 if (enclen < 1 || (enclen + 1) >= CFG_MAX_BUF) { in cfg_put_options() 1237 encode_buf[enclen] = '='; in cfg_put_options() 1238 encode_buf[enclen + 1] = '\0'; in cfg_put_options() 1241 if (strncmp(buf, &encode_buf[1], enclen) == 0) { in cfg_put_options() 1284 enclen = cfg_encode_string(val, encode_buf, CFG_MAX_BUF); in cfg_put_options() 1285 if (enclen < 0 || (strlen(buf) + enclen) >= CFG_MAX_BUF) { in cfg_put_options() 1317 int enclen; in cfg_get_single_option() local 1338 enclen = cfg_encode_string(tag, &encode_buf[1], CFG_MAX_BUF - 1) + 1; in cfg_get_single_option() [all …]
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_crypt.c | 112 size_t enclen; local 114 if (krb5_c_encrypt_length(context, key->enctype, n, &enclen) != 0) 117 return(enclen);
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | ssh-gss.c | 197 uint_t enclen; in ssh_gssapi_encode_oid_for_kex() local 239 enclen = __b64_ntop(digest, EVP_MD_size(evp_md), in ssh_gssapi_encode_oid_for_kex() 243 buffer_append(&buf, encoded, enclen); in ssh_gssapi_encode_oid_for_kex()
|
/titanic_41/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 2004 size_t enclen; in get_sam_edata() local 2009 scratch->length, &enclen))) in get_sam_edata() 2012 if ((tmpdata.ciphertext.data = (char *) malloc(enclen)) == NULL) { in get_sam_edata() 2016 tmpdata.ciphertext.length = enclen; in get_sam_edata() 2179 size_t enclen; in get_sam_edata() local 2184 scratch->length, &enclen))) in get_sam_edata() 2187 if ((tmpdata.ciphertext.data = (char *) malloc(enclen)) == NULL) { in get_sam_edata() 2191 tmpdata.ciphertext.length = enclen; in get_sam_edata()
|
/titanic_41/usr/src/uts/common/io/scsi/targets/ |
H A D | ses_ses.c | 647 int s, e, enclen, off = 8; in ses_encdesc() local 656 gget8(buffer, off+3, enclen); in ses_encdesc() 661 e = off + enclen; in ses_encdesc()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_encode.c | 552 assert(a->enclen != NULL); in encode_a_field() 553 retval = a->enclen(buf, (unsigned int) slen, dataptr, &length); in encode_a_field()
|
H A D | asn1_encode.h | 262 asn1_error_code (*enclen)(asn1buf *, unsigned int, const void *, member
|
/titanic_41/usr/src/uts/common/io/ |
H A D | cryptmod.c | 1576 size_t enclen; in aes_decrypt() local 1583 enclen = inlen - AES_TRUNCATED_HMAC_LEN; in aes_decrypt() 1586 int nblocks = (enclen + DEFAULT_AES_BLOCKLEN - 1) / in aes_decrypt() 1593 result = aes_cbc_cts_decrypt(tmi, mp->b_rptr, enclen); in aes_decrypt() 1605 (char *)mp->b_rptr, enclen, in aes_decrypt() 1614 if (bcmp(hmacbuff, mp->b_rptr + enclen, in aes_decrypt() 1622 mp->b_wptr = mp->b_rptr + enclen; in aes_decrypt()
|