OpenBSD-4.6/usr.bin/sup/src/crypt.diffs
118,$c
void encode (in,out,count)
char *in,*out;
int count;
{
decode (in,out,count);
}
.
109,113c
nr2 = n2;
.
103c
*outp++ = i;
.
95,101c
while(count -- > 0) {
i = *inp++;
nr1 = n1;
.
93a
inp = in;
outp = out;
.
86,90c
return (SCMOK);
}
void decode (in,out,count)
char *in,*out;
register int count;
{
register i, n1, n2, nr1, nr2;
char *inp, *outp;
.
81,84c
if (cryptflag == 0) {
if (cryptsize > 0) free (cryptbuf);
cryptsize = 0;
} else if (x > cryptsize) {
if (cryptsize > 0) free (cryptbuf);
cryptbuf = malloc ((unsigned)x+1);
if (cryptbuf == NULL)
return (scmerr (-1,"Can't allocate encryption buffer"));
cryptsize = x;
.
78,79c
static int cryptsize = 0; /* size of current cryptbuf */
.
75,76c
int getcryptbuf (x)
int x;
.
72a
return (SCMOK);
.
54d
42,48c
cryptflag = 1;
for (i=0; i<ROTORSZ; i++) t1[i] = t2[i] = t3[i] = 0;
(void) strncpy(buf, pw, 8);
(void) strncpy(buf, crypt(buf, buf), 13);
.
27,40c
if (pw == NULL) {
cryptflag = 0;
(void) getcryptbuf (0);
return (SCMOK);
.
23d
19c
netcrypt(pw)
.
12,17c
static char t1[ROTORSZ];
static char t2[ROTORSZ];
static char t3[ROTORSZ];
static char buf[13];
int cryptflag = 0; /* whether to encrypt/decrypt data */
char *cryptbuf; /* buffer for data encryption/decryption */
.
9a
#include "sup.h"
extern char *malloc();
.
w netcrypt.c