Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 25 of 54) sorted by relevance

123

/illumos-gate/usr/src/uts/common/crypto/io/
H A Dblowfish.c439 ciphertext->cd_length = out_len; in blowfish_encrypt_update()
443 saved_offset = ciphertext->cd_offset; in blowfish_encrypt_update()
470 if (plaintext != ciphertext) in blowfish_encrypt_update()
471 ciphertext->cd_length = in blowfish_encrypt_update()
497 out_len += ciphertext->cd_length; in blowfish_decrypt_update()
512 switch (ciphertext->cd_format) { in blowfish_decrypt_update()
533 if (ciphertext != plaintext) in blowfish_decrypt_update()
668 if (plaintext != ciphertext) in blowfish_encrypt_atomic()
669 ciphertext->cd_length = in blowfish_encrypt_atomic()
727 switch (ciphertext->cd_format) { in blowfish_decrypt_atomic()
[all …]
H A Daes.c484 ciphertext->cd_offset = ciphertext->cd_length; in aes_encrypt()
485 ciphertext->cd_length = saved_length - ciphertext->cd_length; in aes_encrypt()
492 if (plaintext != ciphertext) { in aes_encrypt()
493 ciphertext->cd_length = in aes_encrypt()
505 ciphertext->cd_offset = ciphertext->cd_length; in aes_encrypt()
506 ciphertext->cd_length = saved_length - ciphertext->cd_length; in aes_encrypt()
514 if (plaintext != ciphertext) { in aes_encrypt()
515 ciphertext->cd_length = in aes_encrypt()
712 ciphertext->cd_length = in aes_encrypt_update()
793 if (ciphertext != plaintext) in aes_decrypt_update()
[all …]
H A Drsa.c532 RSA_ARG_INPLACE(plaintext, ciphertext); in rsaprov_encrypt()
541 ciphertext); in rsaprov_encrypt()
560 RSA_ARG_INPLACE(plaintext, ciphertext); in rsa_encrypt_atomic()
563 ciphertext)); in rsa_encrypt_atomic()
618 if (ciphertext->cd_length < modulus_len) { in rsa_encrypt_common()
619 ciphertext->cd_length = modulus_len; in rsa_encrypt_common()
646 ciphertext->cd_length = modulus_len; in rsa_encrypt_common()
704 RSA_ARG_INPLACE(ciphertext, plaintext); in rsaprov_decrypt()
708 ciphertext, plaintext); in rsaprov_decrypt()
727 RSA_ARG_INPLACE(ciphertext, plaintext); in rsa_decrypt_atomic()
[all …]
/illumos-gate/usr/src/uts/common/des/
H A Ddes_crypt.c631 ciphertext->cd_length = out_len; in des_encrypt_update()
662 if (plaintext != ciphertext) in des_encrypt_update()
663 ciphertext->cd_length = in des_encrypt_update()
688 out_len += ciphertext->cd_length; in des_decrypt_update()
703 switch (ciphertext->cd_format) { in des_decrypt_update()
724 if (ciphertext != plaintext) in des_decrypt_update()
754 ciphertext->cd_length = 0; in des_encrypt_final()
874 if (plaintext != ciphertext) in des_encrypt_atomic()
875 ciphertext->cd_length = in des_encrypt_atomic()
953 switch (ciphertext->cd_format) { in des_decrypt_atomic()
[all …]
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_cipher.c340 plaintext, ciphertext, tmpl); in crypto_encrypt_prov()
406 mech, key, plaintext, ciphertext, spi_ctx_tmpl); in crypto_encrypt()
474 crypto_data_t *ciphertext, crypto_call_req_t *cr) in crypto_encrypt_update() argument
493 ciphertext, NULL); in crypto_encrypt_update()
621 ciphertext, plaintext, tmpl); in crypto_decrypt_prov()
688 mech, key, ciphertext, plaintext, spi_ctx_tmpl); in crypto_decrypt()
853 crypto_data_t *ciphertext, crypto_call_req_t *cr) in crypto_encrypt_single() argument
870 ciphertext, NULL); in crypto_encrypt_single()
874 NULL, NULL, plaintext, ciphertext, NULL); in crypto_encrypt_single()
904 error = KCF_PROV_DECRYPT(pd, ctx, ciphertext, in crypto_decrypt_single()
[all …]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Denc_helper.c39 cipher->ciphertext.length = enclen; in krb5_encrypt_helper()
42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { in krb5_encrypt_helper()
43 cipher->ciphertext.length = 0; in krb5_encrypt_helper()
48 free(cipher->ciphertext.data); in krb5_encrypt_helper()
49 cipher->ciphertext.data = NULL; in krb5_encrypt_helper()
H A Dencode_kdc.c102 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \ in krb5_encode_kdc_rep()
103 dec_rep->enc_part.ciphertext.length); \ in krb5_encode_kdc_rep()
104 free(dec_rep->enc_part.ciphertext.data); \ in krb5_encode_kdc_rep()
105 dec_rep->enc_part.ciphertext.length = 0; \ in krb5_encode_kdc_rep()
106 dec_rep->enc_part.ciphertext.data = 0;} in krb5_encode_kdc_rep()
H A Dmk_rep.c86 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); in krb5_mk_rep()
87 free(reply.enc_part.ciphertext.data); in krb5_mk_rep()
88 reply.enc_part.ciphertext.length = 0; in krb5_mk_rep()
89 reply.enc_part.ciphertext.data = 0; in krb5_mk_rep()
H A Dmk_priv.c71 privmsg.enc_part.ciphertext.length = enclen; in krb5_mk_priv_basic()
72 if (!(privmsg.enc_part.ciphertext.data = in krb5_mk_priv_basic()
73 malloc(privmsg.enc_part.ciphertext.length))) { in krb5_mk_priv_basic()
102 memset(privmsg.enc_part.ciphertext.data, 0, in krb5_mk_priv_basic()
103 privmsg.enc_part.ciphertext.length); in krb5_mk_priv_basic()
104 free(privmsg.enc_part.ciphertext.data); in krb5_mk_priv_basic()
105 privmsg.enc_part.ciphertext.length = 0; in krb5_mk_priv_basic()
106 privmsg.enc_part.ciphertext.data = 0; in krb5_mk_priv_basic()
H A Dsend_tgs.c94 request.authenticator.ciphertext.data = 0; in krb5_send_tgs_basic()
117 memset(request.authenticator.ciphertext.data, 0, in krb5_send_tgs_basic()
118 request.authenticator.ciphertext.length); in krb5_send_tgs_basic()
119 free(request.authenticator.ciphertext.data); in krb5_send_tgs_basic()
214 krb5_xfree(tgsreq.authorization_data.ciphertext.data); in krb5_send_tgs2()
339 if (tgsreq.authorization_data.ciphertext.data) { in krb5_send_tgs2()
340 memset(tgsreq.authorization_data.ciphertext.data, 0, in krb5_send_tgs2()
341 tgsreq.authorization_data.ciphertext.length); in krb5_send_tgs2()
342 krb5_xfree(tgsreq.authorization_data.ciphertext.data); in krb5_send_tgs2()
H A Dmk_cred.c45 pencdata->ciphertext.data = scratch->data; in encrypt_credencpart()
46 pencdata->ciphertext.length = scratch->length; in encrypt_credencpart()
57 memset(pencdata->ciphertext.data, 0, pencdata->ciphertext.length); in encrypt_credencpart()
58 free(pencdata->ciphertext.data); in encrypt_credencpart()
59 pencdata->ciphertext.length = 0; in encrypt_credencpart()
60 pencdata->ciphertext.data = 0; in encrypt_credencpart()
H A Dmk_req_ext.c144 request.authenticator.ciphertext.data = 0; in krb5_mk_req_extended()
266 if (request.authenticator.ciphertext.data) { in krb5_mk_req_extended()
267 (void) memset(request.authenticator.ciphertext.data, 0, in krb5_mk_req_extended()
268 request.authenticator.ciphertext.length); in krb5_mk_req_extended()
269 free(request.authenticator.ciphertext.data); in krb5_mk_req_extended()
H A Dcopy_tick.c109 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch); in krb5_copy_ticket()
115 tempto->enc_part.ciphertext = *scratch; in krb5_copy_ticket()
119 krb5_xfree(tempto->enc_part.ciphertext.data); in krb5_copy_ticket()
H A Ddecrypt_tk.c52 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part()
53 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part()
H A Dkdc_rep_dc.c55 scratch.length = dec_rep->enc_part.ciphertext.length; in krb5_kdc_rep_decrypt_proc()
56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { in krb5_kdc_rep_decrypt_proc()
H A Dpreauth2.c673 0xff & enc_data.ciphertext.data[0], in pa_enc_timestamp()
674 0xff & enc_data.ciphertext.data[1]); in pa_enc_timestamp()
680 krb5_xfree(enc_data.ciphertext.data); in pa_enc_timestamp()
686 krb5_xfree(enc_data.ciphertext.data); in pa_enc_timestamp()
989 enc_data->ciphertext.length = enclen; in pa_sam()
992 enc_data->ciphertext.length = 0; in pa_sam()
999 FREE(enc_data->ciphertext.data, enclen); in pa_sam()
1000 enc_data->ciphertext.data = NULL; in pa_sam()
1001 enc_data->ciphertext.length = 0; in pa_sam()
1010 sam_response.sam_enc_key.ciphertext.length = 0; in pa_sam()
[all …]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dkfree.c64 if (val->enc_part.ciphertext.data) { in krb5_free_ap_rep()
65 krb5_xfree(val->enc_part.ciphertext.data); in krb5_free_ap_rep()
66 val->enc_part.ciphertext.data = 0; in krb5_free_ap_rep()
80 val->authenticator.ciphertext.data = 0; in krb5_free_ap_req()
165 if (val->enc_part.ciphertext.data) { in krb5_free_cred()
167 val->enc_part.ciphertext.data = 0; in krb5_free_cred()
353 if (val->enc_part.ciphertext.data) { in krb5_free_kdc_rep()
355 val->enc_part.ciphertext.data = 0; in krb5_free_kdc_rep()
530 if (val->enc_part.ciphertext.data) { in krb5_free_priv()
532 val->enc_part.ciphertext.data = 0; in krb5_free_priv()
[all …]
/illumos-gate/usr/src/uts/common/sys/crypto/
H A Dimpl.h688 ciphertext, req) : \
889 ciphertext, req) ( \ argument
905 ciphertext, req) ( \ argument
937 ctx, plaintext, ciphertext, mac, req) : \
944 ctx, plaintext, ciphertext, req) : \
951 ctx, ciphertext, mac, req) : \
955 mac_mech, mac_key, plaintext, ciphertext, mac, \ argument
961 mac_mech, mac_key, plaintext, ciphertext, mac, \
978 ctx, ciphertext, mac, plaintext, req) : \
985 ctx, ciphertext, plaintext, req) : \
[all …]
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c200 uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local
279 cdata[i] = Blowfish_stream2word(ciphertext,
287 ciphertext[4 * i + 3] = cdata[i] & 0xff;
289 ciphertext[4 * i + 2] = cdata[i] & 0xff;
291 ciphertext[4 * i + 1] = cdata[i] & 0xff;
293 ciphertext[4 * i + 0] = cdata[i] & 0xff;
307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext,
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dold_api_glue.c68 outputd.ciphertext.length = outlen; in krb5_encrypt()
69 outputd.ciphertext.data = outptr; in krb5_encrypt()
95 inputd.ciphertext.length = size; in krb5_decrypt()
97 inputd.ciphertext.data = (char*)inptr; in krb5_decrypt()
308 enc_data->ciphertext.length = enclen; in krb5_encrypt_data()
309 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL) in krb5_encrypt_data()
313 free(enc_data->ciphertext.data); in krb5_encrypt_data()
334 data->length = enc_data->ciphertext.length; in krb5_decrypt_data()
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/
H A Dk5_arcfour.c84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local
173 ciphertext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize);
174 ciphertext.data=output->data+hashsize;
248 ret = (*(enc->encrypt))(context, &k3, ivec, &plaintext, &ciphertext);
280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; local
354 ciphertext.length=input->length-hashsize;
355 ciphertext.data=input->data+hashsize;
357 plaintext.length=ciphertext.length;
412 ret=(*(enc->decrypt))(context, &k3, ivec, &ciphertext, &plaintext);
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Ddo_tgs_req.c437 if (request->authorization_data.ciphertext.data) { in process_tgs_req()
684 if (ticket_reply.enc_part.ciphertext.data) { in process_tgs_req()
685 memset(ticket_reply.enc_part.ciphertext.data, 0, in process_tgs_req()
686 ticket_reply.enc_part.ciphertext.length); in process_tgs_req()
687 free(ticket_reply.enc_part.ciphertext.data); in process_tgs_req()
688 ticket_reply.enc_part.ciphertext.data = NULL; in process_tgs_req()
692 if (reply.enc_part.ciphertext.data) { in process_tgs_req()
693 memset(reply.enc_part.ciphertext.data, 0, in process_tgs_req()
694 reply.enc_part.ciphertext.length); in process_tgs_req()
695 free(reply.enc_part.ciphertext.data); in process_tgs_req()
[all …]
H A Ddo_as_req.c92 ticket_reply.enc_part.ciphertext.data = 0; in process_as_req()
448 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); in process_as_req()
449 free(reply.enc_part.ciphertext.data); in process_as_req()
547 if (ticket_reply.enc_part.ciphertext.data) { in process_as_req()
548 memset(ticket_reply.enc_part.ciphertext.data , 0, in process_as_req()
549 ticket_reply.enc_part.ciphertext.length); in process_as_req()
550 free(ticket_reply.enc_part.ciphertext.data); in process_as_req()
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dutil_crypt.c155 outputd.ciphertext.length = length;
156 outputd.ciphertext.data = out;
200 inputd.ciphertext.length = length;
201 inputd.ciphertext.data = (char *)in; /* Solaris Kerberos */
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dencrypt_key.c116 cipher.ciphertext.length = len; in krb5_dbekd_encrypt_key_data()
117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ in krb5_dbekd_encrypt_key_data()

123