/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_seqnum.c | 42 unsigned char plain[8]; local 44 plain[4] = direction; 45 plain[5] = direction; 46 plain[6] = direction; 47 plain[7] = direction; 50 plain[0] = (seqnum>>24) & 0xff; 51 plain[1] = (seqnum>>16) & 0xff; 52 plain[2] = (seqnum>>8) & 0xff; 53 plain[3] = seqnum & 0xff; 56 &plain[0], 8, [all …]
|
H A D | k5sealv3.c | 144 krb5_data plain; in gss_krb5int_make_seal_token_v3() local 163 plain.length = message->length + 16 + ec; in gss_krb5int_make_seal_token_v3() 164 plain.data = MALLOC(plain.length); in gss_krb5int_make_seal_token_v3() 165 if (plain.data == NULL) in gss_krb5int_make_seal_token_v3() 170 ctx->enc->enctype, plain.length, &tlen))) { in gss_krb5int_make_seal_token_v3() 171 FREE(plain.data, plain.length); in gss_krb5int_make_seal_token_v3() 179 FREE(plain.data, plain.length); in gss_krb5int_make_seal_token_v3() 197 (void) memcpy(plain.data, message->value, message->length); in gss_krb5int_make_seal_token_v3() 198 (void) memset(plain.data + message->length, 'x', ec); in gss_krb5int_make_seal_token_v3() 199 (void) memcpy(plain.data + message->length + ec, outbuf, 16); in gss_krb5int_make_seal_token_v3() [all …]
|
H A D | k5unseal.c | 82 unsigned char *plain; local 209 if ((plain = (unsigned char *) xmalloc(tmsglen)) == NULL) { 225 xfree_wrap(plain, tmsglen); 251 plain); 255 ptr+14+cksum_len, plain, tmsglen); 258 xfree_wrap(plain, tmsglen); 263 plain = ptr+14+cksum_len; 279 xfree_wrap(plain, tmsglen); 283 if (plain[tmsglen-1] > blocksize) { 285 xfree_wrap(plain, tmsglen); [all …]
|
H A D | k5seal.c | 85 unsigned char *plain; in make_seal_token_v1() local 195 if ((plain = (unsigned char *) xmalloc(msglen ? msglen : 1)) == NULL) { in make_seal_token_v1() 201 if ((code = kg_make_confounder(context, enc, plain))) { in make_seal_token_v1() 202 xfree_wrap(plain, msglen ? msglen : 1); in make_seal_token_v1() 210 (void) memcpy(plain+conflen, text->value, text->length); in make_seal_token_v1() 211 if (pad) (void) memset(plain+conflen+text->length, pad, pad); in make_seal_token_v1() 218 xfree_wrap(plain, msglen ? msglen : 1); in make_seal_token_v1() 226 (void) memcpy(data_ptr+8, plain, msglen); in make_seal_token_v1() 236 xfree_wrap(plain, msglen ? msglen : 1); in make_seal_token_v1() 316 xfree_wrap(plain, msglen ? msglen : 1); in make_seal_token_v1() [all …]
|
/titanic_44/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 82 krb5_data plain; in krb5_dbekd_decrypt_key_data() local 93 plain.length = key_data->key_data_length[0]-2; in krb5_dbekd_decrypt_key_data() 94 if ((plain.data = (char *) malloc(plain.length)) == NULL) in krb5_dbekd_decrypt_key_data() 96 (void) memset(plain.data, 0, plain.length); in krb5_dbekd_decrypt_key_data() 99 &cipher, &plain))) { in krb5_dbekd_decrypt_key_data() 100 krb5_xfree(plain.data); in krb5_dbekd_decrypt_key_data() 110 if (tmplen > plain.length) { in krb5_dbekd_decrypt_key_data() 111 krb5_xfree(plain.data); in krb5_dbekd_decrypt_key_data() 118 dbkey->contents = (unsigned char *) plain.data; /* SUNWresync121 XXX */ in krb5_dbekd_decrypt_key_data()
|
H A D | encrypt_key.c | 83 krb5_data plain; in krb5_dbekd_encrypt_key_data() local 113 plain.length = dbkey->length; in krb5_dbekd_encrypt_key_data() 114 plain.data = (char *)dbkey->contents; /* SUNWresync121 XXX */ in krb5_dbekd_encrypt_key_data() 120 &plain, &cipher))) { in krb5_dbekd_encrypt_key_data()
|
/titanic_44/usr/src/common/net/wanboot/crypt/ |
H A D | aes_test.c | 47 char plain[AES_BLOCK_SIZE * 2]; member 70 unsigned char plain[AES_BLOCK_SIZE]; in aestest() local 91 getxdata(plain, td[i].plain, AES_BLOCK_SIZE); in aestest() 95 bcopy(plain, work, AES_BLOCK_SIZE); in aestest() 103 if (bcmp(work, plain, AES_BLOCK_SIZE) != 0) { in aestest()
|
H A D | des3_test.c | 51 char plain[DES3_BLOCK_SIZE * 2]; member 113 unsigned char plain[DES3_BLOCK_SIZE]; in des3test() local 136 getxdata(plain, td[i].plain, DES3_BLOCK_SIZE); in des3test() 140 bcopy(plain, work, DES3_BLOCK_SIZE); in des3test() 150 if (bcmp(work, plain, DES3_BLOCK_SIZE) != 0) { in des3test()
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 30 … context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *ci… in krb5_encrypt_helper() argument 35 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length, in krb5_encrypt_helper() 46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); in krb5_encrypt_helper()
|
/titanic_44/usr/src/lib/sasl_plugins/plain/ |
H A D | Makefile.com | 7 LIBRARY= plain.a 10 PLUG_OBJS= plain.o plain_init.o
|
H A D | plain_init.c | 42 SASL_CLIENT_PLUG_INIT( plain ) 43 SASL_SERVER_PLUG_INIT( plain )
|
/titanic_44/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_enc.c | 31 aes_wrap(uint8_t *kek, int n, uint8_t *plain, uint8_t *cipher) in aes_wrap() argument 42 (void) memcpy(r, plain, 8 * n); in aes_wrap() 82 aes_unwrap(uint8_t *kek, int n, uint8_t *cipher, uint8_t *plain) in aes_unwrap() argument 90 r = plain; in aes_unwrap() 104 r = plain + (n - 1) * 8; in aes_unwrap()
|
/titanic_44/usr/src/lib/libsasl/ |
H A D | Makefile | 52 $(SRC)/lib/sasl_plugins/plain/plain.c
|
/titanic_44/usr/src/cmd/cmd-inet/usr.lib/wanboot/bootlog-cgi/ |
H A D | bootlog-cgi | 52 echo Content-type: text/plain
|
/titanic_44/usr/src/lib/sasl_plugins/ |
H A D | Makefile | 32 SUBDIRS = cram digestmd5 gssapi plain login
|
/titanic_44/usr/src/lib/print/libpapi-ipp/common/ |
H A D | ipp-support.c | 454 char plain[BUFSIZ]; in setAuthString() local 456 snprintf(plain, sizeof (plain), "%s:%s", user, passphrase); in setAuthString() 457 httpEncode64(encoded, plain); in setAuthString()
|
/titanic_44/usr/src/uts/common/io/ |
H A D | cryptmod.c | 1244 aes_cbc_cts_encrypt(struct tmodinfo *tmi, uchar_t *plain, size_t length) in aes_cbc_cts_encrypt() argument 1271 pt.cd_raw.iov_base = (char *)plain; in aes_cbc_cts_encrypt() 1304 xorblock(tmp, plain + blockno * DEFAULT_AES_BLOCKLEN); in aes_cbc_cts_encrypt() 1309 ct.cd_raw.iov_base = (char *)plain + in aes_cbc_cts_encrypt() 1324 bcopy(plain + blockno * DEFAULT_AES_BLOCKLEN, in aes_cbc_cts_encrypt() 1328 xorblock(tmp, plain + (nblocks - 2) * DEFAULT_AES_BLOCKLEN); in aes_cbc_cts_encrypt() 1349 bcopy(plain + (nblocks - 1) * DEFAULT_AES_BLOCKLEN, tmp3, in aes_cbc_cts_encrypt() 1353 bcopy(tmp2, plain + (nblocks - 1) * DEFAULT_AES_BLOCKLEN, in aes_cbc_cts_encrypt() 1377 bcopy(tmp2, plain + (nblocks - 2) * DEFAULT_AES_BLOCKLEN, in aes_cbc_cts_encrypt()
|
/titanic_44/usr/src/pkg/manifests/ |
H A D | system-library-security-libsasl.mf | 53 file path=usr/lib/sasl/$(ARCH64)/plain.so.1 57 file path=usr/lib/sasl/plain.so.1
|
/titanic_44/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 2116 krb5_data plain; in get_sam_edata() local 2119 plain.length = 8; in get_sam_edata() 2120 plain.data = inputblock; in get_sam_edata() 2129 /* XXX */ 0, 0, &plain, &cipher))) { in get_sam_edata()
|
/titanic_44/usr/src/cmd/sgs/elfedit/common/ |
H A D | elfedit.msg | 339 character) and plain arguments (which do not start with a '-').\n\ 340 The plain arguments follow the options. The options and plain\n\ 410 name of the command to the help command as a plain argument.\n\
|
/titanic_44/usr/src/grub/grub-0.97/docs/ |
H A D | texinfo.tex | 3 % Load plain if necessary, i.e., if running under initex. 4 \expandafter\ifx\csname fmtname\endcsname\relax\input plain\fi 73 % We never want plain's \outer definition of \+ in Texinfo. 77 % Save some plain tex macros whose names we will redefine. 256 % add check for \lastpenalty to plain's definitions. If the last thing 337 % The \baselineskip=24pt in plain's \makefootline has no effect. 583 % Others are defined by plain TeX: @` @' @" @^ @~ @= @u @v @H. 609 % The \TeX{} logo, as in plain, but resetting the spacing so that a 1041 % FYI, plain.tex uses \\ as a temporary control sequence (why?), but 1413 % Texinfo sort of supports the sans serif font style, which plain TeX does not. [all …]
|
H A D | grub.info-2 | 611 * The files _must_ be in plain-text format.
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | k5-int.h | 1021 krb5_keyusage keyusage, const krb5_data *plain,
|
/titanic_44/usr/src/cmd/ssh/doc/ |
H A D | README.Ylonen | 122 When you log in, your password goes in the network in plain
|
/titanic_44/usr/src/cmd/fm/dicts/ |
H A D | ZFS.po | 154 …ed depending on the\ntype of corruption. If the corruption is within the plain data, the file sho…
|