Searched defs:keylen (Results 51 - 75 of 76) sorted by relevance

1234

/illumos-gate/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c376 size_t keylen = 0; /* key length */ local
422 (char **)&pkeydata, &keylen,
427 (void **)&pkeydata, &keylen);
431 (char **)&pkeydata, &keylen,
435 if (status != 0 || keylen == 0 || pkeydata == NULL) {
644 template[nattr].ulValueLen = keylen;
658 pkeydata, keylen, &key);
680 (char *)pkeydata, (size_t)keylen, (void *)salt,
790 (void) memset(pkeydata, 0, keylen);
/illumos-gate/usr/src/cmd/keyserv/
H A Dchkey.c165 if (!xencrypt_g(slist[mcount], CURMECH->keylen,
240 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1;
246 if (!getpublickey_g(netname, CURMECH->keylen,
303 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1;
316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen,
499 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1;
508 if (!getsecretkey_g(netname, CURMECH->keylen,
530 CURMECH->keylen,
656 keylogin(keylen_t keylen, algtype_t algtype) argument
662 if (keylen
733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument
1132 keylen_t keylen = CURMECH->keylen; local
[all...]
H A Dkeyserv_cache.c44 keylen_t keylen; member in struct:cachekey
75 #define SKCK_LEN(keylen) ALIGN8(sizeof (struct skck) + KEYLEN(keylen))
77 #define CACHEKEY_RECLEN(keylen) ALIGN8(sizeof (struct cachekey_disklist) - 1 + \
78 KEYLEN(keylen) + SKCK_LEN(keylen))
87 keylen_t keylen; /* in bits */ member in struct:cachekey_header
104 static struct cachekey_header *create_cache_file_ch(keylen_t keylen,
126 static struct cachekey *get_cache_header(keylen_t keylen,
201 create_cache_file_ch(keylen_t keylen, algtype_ argument
649 print_cache(keylen_t keylen, algtype_t algtype) argument
1121 get_cache_header(keylen_t keylen, algtype_t algtype) argument
1181 create_cache_file(keylen_t keylen, algtype_t algtype, int sizespec) argument
1203 cache_insert( keylen_t keylen, algtype_t algtype, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument
1233 cache_retrieve( keylen_t keylen, algtype_t algtype, uid_t uid, keybuf3 *public, des_block key) argument
1259 cache_remove(keylen_t keylen, algtype_t algtype, uid_t uid, keybuf3 *public) argument
[all...]
H A Dsetkey.c143 * we don't need to worry about locking for the keylen + algtype
156 keylen_t keylen; member in struct:keylenlist
175 *kpp != NULL && (*kpp)->keylen != k;
194 kp->keylen = k;
241 /* don't mind duplicate (keylen,algtype) paris for now. */
539 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) {
587 ("storeotherrootkeys key %d", kp->keylen));
591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) {
597 kp->keylen, ap->algtype,
613 skey.keylen
928 keylen_t keylen = bytelen*4; local
1381 getdeskey3( keylen_t keylen, algtype_t algtype, int desarylen, keybuf3 *public, keybuf3 *secret, uid_t uid ) argument
[all...]
/illumos-gate/usr/src/uts/common/crypto/core/
H A Dkcf_callprov.c116 size_t keylen = 0; local
126 keylen = CRYPTO_BITS2BYTES(key->ck_length);
128 keylen = key->ck_length;
138 keylen = CRYPTO_BYTES2BITS(attr_len);
140 keylen = attr_len;
147 keylen = CRYPTO_BYTES2BITS(attr_len);
149 keylen = attr_len;
157 if (keylen == 0)
171 size_t, keylen,
175 if ((keylen > mech_inf
[all...]
/illumos-gate/usr/src/uts/common/sys/
H A Dcryptmod.h157 crkeylen_t keylen; member in struct:cr_info_t
191 crkeylen_t keylen; member in struct:cipher_data_t
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c64 CK_OBJECT_CLASS class, CK_KEY_TYPE key_type, CK_ULONG keylen, CK_ULONG mode,
83 keylen, mode);
160 CK_ULONG keylen = 0; local
199 keylen = 48;
233 keylen = *((CK_ULONG*)pTemplate[i].pValue);
243 if (keylen != 0 && keylen != 16)
261 CKO_SECRET_KEY, key_type, keylen, SOFT_GEN_KEY, B_FALSE);
276 keylen = OBJ_SEC_VALUE_LEN(secret_key) = DES_KEYSIZE;
285 keylen
62 soft_gen_keyobject(CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_ULONG *objecthandle_p, soft_session_t *sp, CK_OBJECT_CLASS class, CK_KEY_TYPE key_type, CK_ULONG keylen, CK_ULONG mode, boolean_t internal) argument
[all...]
/illumos-gate/usr/src/lib/libnsl/nis/gen/
H A Dnis_sec_mechs.c347 * in the keylen or algtype fields like so:
348 * keylen = 192
429 m->keylen = 192;
434 m->keylen = NIS_SEC_CF_NA_KA;
440 m->keylen = atoi(*(flds + kl_offset));
460 * mechname/alias/keylen/algotype combo. Else return FALSE.
466 if (mp->keylen != tp->keylen)
502 tp->keylen = mp->keylen;
656 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) argument
839 __nis_keyalg2mechalias( keylen_t keylen, algtype_t algtype, char *alias, size_t alias_len) argument
895 __nis_keyalg2authtype( keylen_t keylen, algtype_t algtype, char *authtype, size_t authtype_len) argument
1083 __nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, char *buffer, size_t buflen) argument
1108 __nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype, const char *symname) argument
[all...]
/illumos-gate/usr/src/cmd/ypcmd/
H A Dyppush.c435 int keylen; local
451 keylen = strlen(host);
453 if (yp_match(domain_alias, ypservers, host, keylen,
459 add_server(host, keylen);
471 int keylen; local
509 keylen = outkeylen;
511 if (err = yp_next(domain_alias, ypservers, key, keylen,
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa.c1112 int key_info, ie_len = 0, keylen, gtk_len = 0; local
1184 keylen = BE_16(key->key_length);
1187 if (keylen != 16) {
1190 keylen, MAC2STR(src_addr));
1195 if (keylen != 32) {
1198 keylen, MAC2STR(src_addr));
1249 int alg, keylen, rsclen; local
1254 keylen = 16;
1259 keylen = 32;
1280 (uint8_t *)&wpa_s->ptk.tk1, keylen) <
1305 int key_info, keylen, keydatalen, maxkeylen, keyidx, key_rsc_len = 0; local
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c446 CK_ULONG keylen; local
873 keylen = 0;
875 keylen = 16;
884 keytype, keylen, cmd->flags, &key);
/illumos-gate/usr/src/psm/stand/boot/sparc/common/
H A Dwbcli.c839 int keylen; local
847 WANBOOT_MAXKEYLEN, &keylen, &status);
848 if ((ret == 0) && (status == 0) && (keylen == AES_128_KEY_SIZE)) {
859 WANBOOT_MAXKEYLEN, &keylen, &status);
860 if ((ret == 0) && (status == 0) && (keylen == DES3_KEY_SIZE)) {
876 int keylen; local
884 WANBOOT_HMAC_KEY_SIZE, &keylen, &status);
885 if ((ret == 0) && (status == 0) && (keylen == WANBOOT_HMAC_KEY_SIZE)) {
/illumos-gate/usr/src/uts/common/io/idm/
H A Didm_text.c171 char **key, int *keylen, char **value);
255 int tblen, keylen; local
262 &key, &keylen, &value)) != 0) {
268 key, keylen, value)) != 0) {
301 char **key, int *keylen, char **value)
329 *keylen = idm_strcspn(*tb_scan, "=");
331 if (*keylen == total_len) {
336 *tb_scan += *keylen + 1; /* Skip the '=' */
337 *tb_len -= *keylen + 1;
343 valuelen = total_len - (*keylen
300 idm_keyvalue_get_next(char **tb_scan, int *tb_len, char **key, int *keylen, char **value) argument
352 idm_lookup_kv_xlate(const char *key, int keylen) argument
1265 idm_nvlist_add_keyvalue(nvlist_t *nvl, char *key, int keylen, char *value) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_util.c309 size_t keylen)
322 j += (sbox[i] + key[i % keylen]);
305 rand_hash( unsigned char *data, size_t datalen, unsigned char *key, size_t keylen) argument
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DDNSDigest.c1315 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local
1316 if (keylen < 0) return(keylen);
1317 DNSDigest_ConstructHMACKey(info, keybuf, (mDNSu32)keylen);
1318 return(keylen);
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c822 uint32_t keylen = 1024, len; local
856 &keylen, &keylen_size);
858 /* Default keylen = 1024 */
891 rsaparams.keySizeInBits = keylen;
915 ks = PQG_PBITS_TO_INDEX(keylen);
1913 uint32_t keylen; local
1931 rv = kmf_get_attr(KMF_KEYLENGTH_ATTR, attrlist, numattr, &keylen,
1947 keySize = keylen;
1953 keySize = keylen;
1967 keySize = keylen;
[all...]
/illumos-gate/usr/src/cmd/ldap/ns_ldap/
H A Dldapaddent.c2200 keylen_t keylen; local
2329 keylen = (strlen(t) / 2) * 8;
2353 if (AUTH_DES_KEY(keylen, algtype))
2362 else if (!(__nis_keyalg2authtype(keylen, algtype, auth_type,
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb5.c1528 size_t keylen; local
1535 keylen = strlen(keyname);
1537 fname = malloc(keylen + rlen + strlen(REALM_SEP_STRING) + 1);
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c3476 uint32_t keylen = 0; local
3552 keylen = attrkeylen * 8; /* bytes to bits */
3559 &keylen, &keylen_size);
3568 if ((keylen % 8) != 0) {
3571 secKeyLen = keylen / 8; /* in bytes for RC4/AES */
3845 uint32_t keylen = 0, attrkeylen = 0; local
3884 &keylen, NULL);
3891 if ((keylen % 8) != 0) {
3894 secKeyLen = keylen/8; /* in bytes */
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/
H A Dikeadm.c1036 uint_t c = 0, locidlen, remidlen, keylen, keybits; local
1097 keyp = parse_key(argv[c++], &keylen, &keybits);
1129 *len += keylen;
1204 psp->ps_key_len = keylen;
1206 (void) memcpy((uint8_t *)((int)psp + psp->ps_key_off), keyp, keylen);
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/routeadm/
H A Drouteadm.c473 ssize_t keylen; local
670 if ((keylen = keyend - nk) !=
673 if (strncmp(key, nk, keylen) == 0) {
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c1001 unsigned keylen)
1013 j = (j + text->sbox[i] + key[i % keylen]) % 256;
1664 HASH key, int keylen,
1670 utils->MD5Update(&Md5Ctx, key, keylen);
1681 utils->MD5Update(&Md5Ctx, key, keylen);
999 rc4_init(rc4_context_t *text, const unsigned char *key, unsigned keylen) argument
1662 create_layer_keys(context_t *text, const sasl_utils_t *utils, HASH key, int keylen, char enckey[16], char deckey[16]) argument
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.telnetd.c1417 cki.keylen = 0;
1420 cki.keylen = DES_BLOCKSIZE;
1508 cki.keylen = 0;
1623 cki.keylen = DES_BLOCKSIZE;
1627 cki.keylen = 0;
1784 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, boolean_t saveit) argument
1799 keylen,
1804 (void) memcpy(encr_data.encrypt.keyid, keyid, keylen);
1805 encr_data.encrypt.keyidlen = keylen;
1807 (void) memcpy(encr_data.decrypt.keyid, keyid, keylen);
[all...]
/illumos-gate/usr/src/cmd/sendmail/src/
H A Dmap.c2803 int keylen; local
2821 keylen = strlen(nbuf);
2830 yperr = yp_match(yp_domain, "hosts.byname", nbuf, keylen,
2838 keylen++;
2839 yperr = yp_match(yp_domain, "hosts.byname", nbuf, keylen,
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c1488 uint32_t keylen = 1024; local
1549 &keylen, &keylen_size);
1551 /* keylen is optional, default is 1024 */
1558 sslPrivKey = RSA_generate_key(keylen, eValue, NULL, NULL);
4600 uint32_t keylen; local
4601 uint32_t keylen_size = sizeof (keylen);
4624 &keylen, &keylen_size);
4676 if (keylen % 8 != 0) {
4682 if (keylen != 128 &&
4683 keylen !
[all...]

Completed in 215 milliseconds

1234