/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softARCFourCrypt.c | 107 CK_ULONG inputlen, CK_BYTE_PTR output, CK_ULONG_PTR outputlenp) in soft_arcfour_crypt() argument 120 *outputlenp = inputlen; in soft_arcfour_crypt() 125 if (*outputlenp < inputlen) { in soft_arcfour_crypt() 126 *outputlenp = inputlen; in soft_arcfour_crypt() 129 arcfour_crypt(keystream, input, output, inputlen); in soft_arcfour_crypt() 130 *outputlenp = inputlen; in soft_arcfour_crypt()
|
/titanic_41/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 152 md5_update (const char *input, int inputlen) in md5_update() argument 155 length += inputlen; in md5_update() 156 if (buflen + inputlen < 64) in md5_update() 158 memcpy (buffer + buflen, input, inputlen); in md5_update() 159 buflen += inputlen; in md5_update() 166 inputlen -= 64 - buflen; in md5_update() 167 while (inputlen >= 64) in md5_update() 171 inputlen -= 64; in md5_update() 173 memcpy (buffer, input, inputlen); in md5_update() 174 buflen = inputlen; in md5_update()
|
/titanic_41/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 751 unsigned inputlen, argument 761 inputlen, 768 padding = output[inputlen - 11]; 775 if (output[inputlen - 10 - p] != padding) { 781 *outputlen = inputlen - padding - 10; 784 memcpy(digest, output + inputlen - 10, 10); 791 unsigned inputlen, argument 801 paddinglen = 8 - ((inputlen + 10) % 8); 804 memcpy(output, input, inputlen); /* text */ 805 memset(output+inputlen, paddinglen, paddinglen);/* pad */ [all …]
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | encrypt_length.c | 33 size_t inputlen, size_t *length) in krb5_c_encrypt_length() argument 47 inputlen, length); in krb5_c_encrypt_length()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_encrypt.c | 40 size_t inputlen, size_t *length) in krb5_raw_encrypt_length() argument 46 *length = krb5_roundup(inputlen, blocksize); in krb5_raw_encrypt_length()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_encrypt.c | 48 size_t inputlen, size_t *length) in krb5_dk_encrypt_length() argument 54 *length = krb5_roundup(blocksize+inputlen, blocksize) + hashsize; in krb5_dk_encrypt_length() 167 krb5int_aes_encrypt_length(enc, hash, inputlen, length) in krb5int_aes_encrypt_length() argument 170 size_t inputlen; 180 *length = blocksize+inputlen + hashsize;
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_encrypt.c | 39 size_t inputlen, in krb5_old_encrypt_length() argument 47 *length = krb5_roundup(blocksize+hashsize+inputlen, blocksize); in krb5_old_encrypt_length()
|
/titanic_41/usr/src/lib/libsasl/include/ |
H A D | plugin_common.h | 195 const char *input, unsigned inputlen, 198 const char **input, unsigned *inputlen,
|
H A D | sasl.h | 1240 const char *input, unsigned inputlen, 1269 const char *input, unsigned inputlen,
|
H A D | saslplug.h | 203 int (*decode)(void *context, const char *input, unsigned inputlen,
|
/titanic_41/usr/src/lib/sasl_plugins/gssapi/ |
H A D | gssapi.c | 462 const char **input, unsigned *inputlen, argument 484 int tocopy = myMIN(text->needsize, *inputlen); 489 *inputlen -= tocopy; 514 if (*inputlen == 0) { 525 if (*inputlen < diff) { 527 memcpy(text->buffer + text->cursize, *input, *inputlen); 528 text->cursize += *inputlen; 529 *inputlen = 0; 536 *inputlen -= diff; 604 const char *input, unsigned inputlen, argument [all …]
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 21 krb5_arcfour_encrypt_length(enc, hash, inputlen, length) in krb5_arcfour_encrypt_length() argument 24 size_t inputlen; 33 *length = hashsize + krb5_roundup(8 + inputlen, blocksize);
|
/titanic_41/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 714 const char *input, unsigned inputlen, argument 719 const char **input, unsigned *inputlen, argument 728 while (inputlen!=0) 731 ret = decode_pkt(context, &input, &inputlen, &tmp, &tmplen);
|
/titanic_41/usr/src/lib/libsasl/lib/ |
H A D | common.c | 271 unsigned inputlen, in sasl_encode() argument 278 if(!input || !inputlen || !output || !outputlen) in sasl_encode() 287 tmp.iov_len = inputlen; in sasl_encode() 362 const char *input, unsigned inputlen, in sasl_decode() argument 397 if(inputlen > conn->props.maxbufsize) { in sasl_decode() 413 memcpy(conn->decode_buf, input, inputlen); in sasl_decode() 414 conn->decode_buf[inputlen] = '\0'; in sasl_decode() 416 *outputlen = inputlen; in sasl_decode() 424 result = conn->oparams.decode(conn->context, input, inputlen, in sasl_decode()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | k5-int.h | 837 size_t inputlen, size_t *length);
|
H A D | krb5.h | 536 size_t inputlen, size_t *length);
|