Home
last modified time | relevance | path

Searched refs:enclen (Results 1 – 15 of 15) sorted by relevance

/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/
H A Ddk_decrypt.c85 size_t hashsize, blocksize, enclen, plainlen; in krb5_dk_decrypt_maybe_trunc_hmac() local
120 enclen = input->length - hmacsize; in krb5_dk_decrypt_maybe_trunc_hmac()
122 if ((plaindata = (unsigned char *) MALLOC(enclen)) == NULL) { in krb5_dk_decrypt_maybe_trunc_hmac()
129 d1.length = enclen; in krb5_dk_decrypt_maybe_trunc_hmac()
132 d2.length = enclen; in krb5_dk_decrypt_maybe_trunc_hmac()
163 if (memcmp(cksum, input->data+enclen, hmacsize) != 0) { in krb5_dk_decrypt_maybe_trunc_hmac()
172 plainlen = enclen - blocksize; in krb5_dk_decrypt_maybe_trunc_hmac()
197 (void) memset(plaindata, 0, enclen); in krb5_dk_decrypt_maybe_trunc_hmac()
198 FREE(plaindata, enclen); in krb5_dk_decrypt_maybe_trunc_hmac()
H A Ddk_encrypt.c65 size_t blocksize, plainlen, enclen; in krb5_dk_encrypt() local
90 krb5_dk_encrypt_length(enc, hash, input->length, &enclen); in krb5_dk_encrypt()
92 if (output->length < enclen) in krb5_dk_encrypt()
132 d2.length = enclen - plainlen; in krb5_dk_encrypt()
135 output->length = enclen; in krb5_dk_encrypt()
229 size_t blocksize, plainlen, enclen; in krb5int_aes_dk_encrypt() local
252 krb5int_aes_encrypt_length(enc, hash, input->length, &enclen); in krb5int_aes_dk_encrypt()
255 if (output->length < enclen) in krb5int_aes_dk_encrypt()
295 d2.length = enclen - plainlen; in krb5int_aes_dk_encrypt()
305 output->length = enclen; in krb5int_aes_dk_encrypt()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c33 size_t enclen; in krb5_encrypt_helper() local
36 &enclen))) in krb5_encrypt_helper()
39 cipher->ciphertext.length = enclen; in krb5_encrypt_helper()
42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { in krb5_encrypt_helper()
H A Dmk_priv.c48 size_t blocksize, enclen; in krb5_mk_priv_basic() local
68 scratch1->length, &enclen))) in krb5_mk_priv_basic()
71 privmsg.enc_part.ciphertext.length = enclen; in krb5_mk_priv_basic()
H A Dpreauth2.c790 size_t enclen; in pa_sam() local
980 scratch->length, &enclen))) { in pa_sam()
989 enc_data->ciphertext.length = enclen; in pa_sam()
991 if ((enc_data->ciphertext.data = MALLOC(enclen)) == NULL) { in pa_sam()
999 FREE(enc_data->ciphertext.data, enclen); in pa_sam()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/
H A Dold_encrypt.c62 size_t blocksize, hashsize, enclen; in krb5_old_encrypt() local
69 krb5_old_encrypt_length(enc, hash, input->length, &enclen); in krb5_old_encrypt()
71 if (output->length < enclen) in krb5_old_encrypt()
74 output->length = enclen; in krb5_old_encrypt()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dold_api_glue.c290 size_t enclen, blocksize; in krb5_encrypt_data() local
294 &enclen))) in krb5_encrypt_data()
308 enc_data->ciphertext.length = enclen; in krb5_encrypt_data()
309 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL) in krb5_encrypt_data()
/titanic_41/usr/src/lib/libdscfg/common/
H A Dcfg.c1209 int enclen; in cfg_put_options() local
1231 enclen = cfg_encode_string(tag, &encode_buf[1], CFG_MAX_BUF - 1) + 1; in cfg_put_options()
1232 if (enclen < 1 || (enclen + 1) >= CFG_MAX_BUF) { in cfg_put_options()
1237 encode_buf[enclen] = '='; in cfg_put_options()
1238 encode_buf[enclen + 1] = '\0'; in cfg_put_options()
1241 if (strncmp(buf, &encode_buf[1], enclen) == 0) { in cfg_put_options()
1284 enclen = cfg_encode_string(val, encode_buf, CFG_MAX_BUF); in cfg_put_options()
1285 if (enclen < 0 || (strlen(buf) + enclen) >= CFG_MAX_BUF) { in cfg_put_options()
1317 int enclen; in cfg_get_single_option() local
1338 enclen = cfg_encode_string(tag, &encode_buf[1], CFG_MAX_BUF - 1) + 1; in cfg_get_single_option()
[all …]
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dutil_crypt.c112 size_t enclen; local
114 if (krb5_c_encrypt_length(context, key->enctype, n, &enclen) != 0)
117 return(enclen);
/titanic_41/usr/src/cmd/ssh/libssh/common/
H A Dssh-gss.c197 uint_t enclen; in ssh_gssapi_encode_oid_for_kex() local
239 enclen = __b64_ntop(digest, EVP_MD_size(evp_md), in ssh_gssapi_encode_oid_for_kex()
243 buffer_append(&buf, encoded, enclen); in ssh_gssapi_encode_oid_for_kex()
/titanic_41/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_preauth.c2004 size_t enclen; in get_sam_edata() local
2009 scratch->length, &enclen))) in get_sam_edata()
2012 if ((tmpdata.ciphertext.data = (char *) malloc(enclen)) == NULL) { in get_sam_edata()
2016 tmpdata.ciphertext.length = enclen; in get_sam_edata()
2179 size_t enclen; in get_sam_edata() local
2184 scratch->length, &enclen))) in get_sam_edata()
2187 if ((tmpdata.ciphertext.data = (char *) malloc(enclen)) == NULL) { in get_sam_edata()
2191 tmpdata.ciphertext.length = enclen; in get_sam_edata()
/titanic_41/usr/src/uts/common/io/scsi/targets/
H A Dses_ses.c647 int s, e, enclen, off = 8; in ses_encdesc() local
656 gget8(buffer, off+3, enclen); in ses_encdesc()
661 e = off + enclen; in ses_encdesc()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_encode.c552 assert(a->enclen != NULL); in encode_a_field()
553 retval = a->enclen(buf, (unsigned int) slen, dataptr, &length); in encode_a_field()
H A Dasn1_encode.h262 asn1_error_code (*enclen)(asn1buf *, unsigned int, const void *, member
/titanic_41/usr/src/uts/common/io/
H A Dcryptmod.c1576 size_t enclen; in aes_decrypt() local
1583 enclen = inlen - AES_TRUNCATED_HMAC_LEN; in aes_decrypt()
1586 int nblocks = (enclen + DEFAULT_AES_BLOCKLEN - 1) / in aes_decrypt()
1593 result = aes_cbc_cts_decrypt(tmi, mp->b_rptr, enclen); in aes_decrypt()
1605 (char *)mp->b_rptr, enclen, in aes_decrypt()
1614 if (bcmp(hmacbuff, mp->b_rptr + enclen, in aes_decrypt()
1622 mp->b_wptr = mp->b_rptr + enclen; in aes_decrypt()