/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | blowfish.c | 439 ciphertext->cd_length = out_len; in blowfish_encrypt_update() 443 saved_offset = ciphertext->cd_offset; in blowfish_encrypt_update() 470 if (plaintext != ciphertext) in blowfish_encrypt_update() 471 ciphertext->cd_length = in blowfish_encrypt_update() 497 out_len += ciphertext->cd_length; in blowfish_decrypt_update() 512 switch (ciphertext->cd_format) { in blowfish_decrypt_update() 533 if (ciphertext != plaintext) in blowfish_decrypt_update() 668 if (plaintext != ciphertext) in blowfish_encrypt_atomic() 669 ciphertext->cd_length = in blowfish_encrypt_atomic() 727 switch (ciphertext->cd_format) { in blowfish_decrypt_atomic() [all …]
|
H A D | aes.c | 484 ciphertext->cd_offset = ciphertext->cd_length; in aes_encrypt() 485 ciphertext->cd_length = saved_length - ciphertext->cd_length; in aes_encrypt() 492 if (plaintext != ciphertext) { in aes_encrypt() 493 ciphertext->cd_length = in aes_encrypt() 505 ciphertext->cd_offset = ciphertext->cd_length; in aes_encrypt() 506 ciphertext->cd_length = saved_length - ciphertext->cd_length; in aes_encrypt() 514 if (plaintext != ciphertext) { in aes_encrypt() 515 ciphertext->cd_length = in aes_encrypt() 712 ciphertext->cd_length = in aes_encrypt_update() 793 if (ciphertext != plaintext) in aes_decrypt_update() [all …]
|
H A D | rsa.c | 532 RSA_ARG_INPLACE(plaintext, ciphertext); in rsaprov_encrypt() 541 ciphertext); in rsaprov_encrypt() 560 RSA_ARG_INPLACE(plaintext, ciphertext); in rsa_encrypt_atomic() 563 ciphertext)); in rsa_encrypt_atomic() 618 if (ciphertext->cd_length < modulus_len) { in rsa_encrypt_common() 619 ciphertext->cd_length = modulus_len; in rsa_encrypt_common() 646 ciphertext->cd_length = modulus_len; in rsa_encrypt_common() 704 RSA_ARG_INPLACE(ciphertext, plaintext); in rsaprov_decrypt() 708 ciphertext, plaintext); in rsaprov_decrypt() 727 RSA_ARG_INPLACE(ciphertext, plaintext); in rsa_decrypt_atomic() [all …]
|
/illumos-gate/usr/src/uts/common/des/ |
H A D | des_crypt.c | 631 ciphertext->cd_length = out_len; in des_encrypt_update() 662 if (plaintext != ciphertext) in des_encrypt_update() 663 ciphertext->cd_length = in des_encrypt_update() 688 out_len += ciphertext->cd_length; in des_decrypt_update() 703 switch (ciphertext->cd_format) { in des_decrypt_update() 724 if (ciphertext != plaintext) in des_decrypt_update() 754 ciphertext->cd_length = 0; in des_encrypt_final() 874 if (plaintext != ciphertext) in des_encrypt_atomic() 875 ciphertext->cd_length = in des_encrypt_atomic() 953 switch (ciphertext->cd_format) { in des_decrypt_atomic() [all …]
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_cipher.c | 340 plaintext, ciphertext, tmpl); in crypto_encrypt_prov() 406 mech, key, plaintext, ciphertext, spi_ctx_tmpl); in crypto_encrypt() 474 crypto_data_t *ciphertext, crypto_call_req_t *cr) in crypto_encrypt_update() argument 493 ciphertext, NULL); in crypto_encrypt_update() 621 ciphertext, plaintext, tmpl); in crypto_decrypt_prov() 688 mech, key, ciphertext, plaintext, spi_ctx_tmpl); in crypto_decrypt() 853 crypto_data_t *ciphertext, crypto_call_req_t *cr) in crypto_encrypt_single() argument 870 ciphertext, NULL); in crypto_encrypt_single() 874 NULL, NULL, plaintext, ciphertext, NULL); in crypto_encrypt_single() 904 error = KCF_PROV_DECRYPT(pd, ctx, ciphertext, in crypto_decrypt_single() [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 39 cipher->ciphertext.length = enclen; in krb5_encrypt_helper() 42 if ((cipher->ciphertext.data = (char *) malloc(enclen)) == NULL) { in krb5_encrypt_helper() 43 cipher->ciphertext.length = 0; in krb5_encrypt_helper() 48 free(cipher->ciphertext.data); in krb5_encrypt_helper() 49 cipher->ciphertext.data = NULL; in krb5_encrypt_helper()
|
H A D | encode_kdc.c | 102 (void) memset(dec_rep->enc_part.ciphertext.data, 0, \ in krb5_encode_kdc_rep() 103 dec_rep->enc_part.ciphertext.length); \ in krb5_encode_kdc_rep() 104 free(dec_rep->enc_part.ciphertext.data); \ in krb5_encode_kdc_rep() 105 dec_rep->enc_part.ciphertext.length = 0; \ in krb5_encode_kdc_rep() 106 dec_rep->enc_part.ciphertext.data = 0;} in krb5_encode_kdc_rep()
|
H A D | mk_rep.c | 86 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); in krb5_mk_rep() 87 free(reply.enc_part.ciphertext.data); in krb5_mk_rep() 88 reply.enc_part.ciphertext.length = 0; in krb5_mk_rep() 89 reply.enc_part.ciphertext.data = 0; in krb5_mk_rep()
|
H A D | mk_priv.c | 71 privmsg.enc_part.ciphertext.length = enclen; in krb5_mk_priv_basic() 72 if (!(privmsg.enc_part.ciphertext.data = in krb5_mk_priv_basic() 73 malloc(privmsg.enc_part.ciphertext.length))) { in krb5_mk_priv_basic() 102 memset(privmsg.enc_part.ciphertext.data, 0, in krb5_mk_priv_basic() 103 privmsg.enc_part.ciphertext.length); in krb5_mk_priv_basic() 104 free(privmsg.enc_part.ciphertext.data); in krb5_mk_priv_basic() 105 privmsg.enc_part.ciphertext.length = 0; in krb5_mk_priv_basic() 106 privmsg.enc_part.ciphertext.data = 0; in krb5_mk_priv_basic()
|
H A D | send_tgs.c | 94 request.authenticator.ciphertext.data = 0; in krb5_send_tgs_basic() 117 memset(request.authenticator.ciphertext.data, 0, in krb5_send_tgs_basic() 118 request.authenticator.ciphertext.length); in krb5_send_tgs_basic() 119 free(request.authenticator.ciphertext.data); in krb5_send_tgs_basic() 214 krb5_xfree(tgsreq.authorization_data.ciphertext.data); in krb5_send_tgs2() 339 if (tgsreq.authorization_data.ciphertext.data) { in krb5_send_tgs2() 340 memset(tgsreq.authorization_data.ciphertext.data, 0, in krb5_send_tgs2() 341 tgsreq.authorization_data.ciphertext.length); in krb5_send_tgs2() 342 krb5_xfree(tgsreq.authorization_data.ciphertext.data); in krb5_send_tgs2()
|
H A D | mk_cred.c | 45 pencdata->ciphertext.data = scratch->data; in encrypt_credencpart() 46 pencdata->ciphertext.length = scratch->length; in encrypt_credencpart() 57 memset(pencdata->ciphertext.data, 0, pencdata->ciphertext.length); in encrypt_credencpart() 58 free(pencdata->ciphertext.data); in encrypt_credencpart() 59 pencdata->ciphertext.length = 0; in encrypt_credencpart() 60 pencdata->ciphertext.data = 0; in encrypt_credencpart()
|
H A D | mk_req_ext.c | 144 request.authenticator.ciphertext.data = 0; in krb5_mk_req_extended() 266 if (request.authenticator.ciphertext.data) { in krb5_mk_req_extended() 267 (void) memset(request.authenticator.ciphertext.data, 0, in krb5_mk_req_extended() 268 request.authenticator.ciphertext.length); in krb5_mk_req_extended() 269 free(request.authenticator.ciphertext.data); in krb5_mk_req_extended()
|
H A D | copy_tick.c | 109 retval = krb5_copy_data(context, &from->enc_part.ciphertext, &scratch); in krb5_copy_ticket() 115 tempto->enc_part.ciphertext = *scratch; in krb5_copy_ticket() 119 krb5_xfree(tempto->enc_part.ciphertext.data); in krb5_copy_ticket()
|
H A D | decrypt_tk.c | 52 scratch.length = ticket->enc_part.ciphertext.length; in krb5_decrypt_tkt_part() 53 if (!(scratch.data = malloc(ticket->enc_part.ciphertext.length))) in krb5_decrypt_tkt_part()
|
H A D | kdc_rep_dc.c | 55 scratch.length = dec_rep->enc_part.ciphertext.length; in krb5_kdc_rep_decrypt_proc() 56 if (!(scratch.data = malloc(dec_rep->enc_part.ciphertext.length))) { in krb5_kdc_rep_decrypt_proc()
|
H A D | preauth2.c | 673 0xff & enc_data.ciphertext.data[0], in pa_enc_timestamp() 674 0xff & enc_data.ciphertext.data[1]); in pa_enc_timestamp() 680 krb5_xfree(enc_data.ciphertext.data); in pa_enc_timestamp() 686 krb5_xfree(enc_data.ciphertext.data); in pa_enc_timestamp() 989 enc_data->ciphertext.length = enclen; in pa_sam() 992 enc_data->ciphertext.length = 0; in pa_sam() 999 FREE(enc_data->ciphertext.data, enclen); in pa_sam() 1000 enc_data->ciphertext.data = NULL; in pa_sam() 1001 enc_data->ciphertext.length = 0; in pa_sam() 1010 sam_response.sam_enc_key.ciphertext.length = 0; in pa_sam() [all …]
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 64 if (val->enc_part.ciphertext.data) { in krb5_free_ap_rep() 65 krb5_xfree(val->enc_part.ciphertext.data); in krb5_free_ap_rep() 66 val->enc_part.ciphertext.data = 0; in krb5_free_ap_rep() 80 val->authenticator.ciphertext.data = 0; in krb5_free_ap_req() 165 if (val->enc_part.ciphertext.data) { in krb5_free_cred() 167 val->enc_part.ciphertext.data = 0; in krb5_free_cred() 353 if (val->enc_part.ciphertext.data) { in krb5_free_kdc_rep() 355 val->enc_part.ciphertext.data = 0; in krb5_free_kdc_rep() 530 if (val->enc_part.ciphertext.data) { in krb5_free_priv() 532 val->enc_part.ciphertext.data = 0; in krb5_free_priv() [all …]
|
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | impl.h | 688 ciphertext, req) : \ 889 ciphertext, req) ( \ argument 905 ciphertext, req) ( \ argument 937 ctx, plaintext, ciphertext, mac, req) : \ 944 ctx, plaintext, ciphertext, req) : \ 951 ctx, ciphertext, mac, req) : \ 955 mac_mech, mac_key, plaintext, ciphertext, mac, \ argument 961 mac_mech, mac_key, plaintext, ciphertext, mac, \ 978 ctx, ciphertext, mac, plaintext, req) : \ 985 ctx, ciphertext, plaintext, req) : \ [all …]
|
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 200 uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local 279 cdata[i] = Blowfish_stream2word(ciphertext, 287 ciphertext[4 * i + 3] = cdata[i] & 0xff; 289 ciphertext[4 * i + 2] = cdata[i] & 0xff; 291 ciphertext[4 * i + 1] = cdata[i] & 0xff; 293 ciphertext[4 * i + 0] = cdata[i] & 0xff; 307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext,
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 68 outputd.ciphertext.length = outlen; in krb5_encrypt() 69 outputd.ciphertext.data = outptr; in krb5_encrypt() 95 inputd.ciphertext.length = size; in krb5_decrypt() 97 inputd.ciphertext.data = (char*)inptr; in krb5_decrypt() 308 enc_data->ciphertext.length = enclen; in krb5_encrypt_data() 309 if ((enc_data->ciphertext.data = malloc(enclen)) == NULL) in krb5_encrypt_data() 313 free(enc_data->ciphertext.data); in krb5_encrypt_data() 334 data->length = enc_data->ciphertext.length; in krb5_decrypt_data()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local 173 ciphertext.length=krb5_roundup(input->length+CONFOUNDERLENGTH,blocksize); 174 ciphertext.data=output->data+hashsize; 248 ret = (*(enc->encrypt))(context, &k3, ivec, &plaintext, &ciphertext); 280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; local 354 ciphertext.length=input->length-hashsize; 355 ciphertext.data=input->data+hashsize; 357 plaintext.length=ciphertext.length; 412 ret=(*(enc->decrypt))(context, &k3, ivec, &ciphertext, &plaintext);
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_tgs_req.c | 437 if (request->authorization_data.ciphertext.data) { in process_tgs_req() 684 if (ticket_reply.enc_part.ciphertext.data) { in process_tgs_req() 685 memset(ticket_reply.enc_part.ciphertext.data, 0, in process_tgs_req() 686 ticket_reply.enc_part.ciphertext.length); in process_tgs_req() 687 free(ticket_reply.enc_part.ciphertext.data); in process_tgs_req() 688 ticket_reply.enc_part.ciphertext.data = NULL; in process_tgs_req() 692 if (reply.enc_part.ciphertext.data) { in process_tgs_req() 693 memset(reply.enc_part.ciphertext.data, 0, in process_tgs_req() 694 reply.enc_part.ciphertext.length); in process_tgs_req() 695 free(reply.enc_part.ciphertext.data); in process_tgs_req() [all …]
|
H A D | do_as_req.c | 92 ticket_reply.enc_part.ciphertext.data = 0; in process_as_req() 448 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); in process_as_req() 449 free(reply.enc_part.ciphertext.data); in process_as_req() 547 if (ticket_reply.enc_part.ciphertext.data) { in process_as_req() 548 memset(ticket_reply.enc_part.ciphertext.data , 0, in process_as_req() 549 ticket_reply.enc_part.ciphertext.length); in process_as_req() 550 free(ticket_reply.enc_part.ciphertext.data); in process_as_req()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_crypt.c | 155 outputd.ciphertext.length = length; 156 outputd.ciphertext.data = out; 200 inputd.ciphertext.length = length; 201 inputd.ciphertext.data = (char *)in; /* Solaris Kerberos */
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | encrypt_key.c | 116 cipher.ciphertext.length = len; in krb5_dbekd_encrypt_key_data() 117 cipher.ciphertext.data = (char *)ptr; /* SUNWresync121 XXX */ in krb5_dbekd_encrypt_key_data()
|