/illumos-gate/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 376 size_t keylen = 0; /* key length */ local 422 (char **)&pkeydata, &keylen, 427 (void **)&pkeydata, &keylen); 431 (char **)&pkeydata, &keylen, 435 if (status != 0 || keylen == 0 || pkeydata == NULL) { 644 template[nattr].ulValueLen = keylen; 658 pkeydata, keylen, &key); 680 (char *)pkeydata, (size_t)keylen, (void *)salt, 790 (void) memset(pkeydata, 0, keylen);
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | chkey.c | 165 if (!xencrypt_g(slist[mcount], CURMECH->keylen, 240 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; 246 if (!getpublickey_g(netname, CURMECH->keylen, 303 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; 316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, 499 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; 508 if (!getsecretkey_g(netname, CURMECH->keylen, 530 CURMECH->keylen, 656 keylogin(keylen_t keylen, algtype_t algtype) argument 662 if (keylen 733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument 1132 keylen_t keylen = CURMECH->keylen; local [all...] |
H A D | keyserv_cache.c | 44 keylen_t keylen; member in struct:cachekey 75 #define SKCK_LEN(keylen) ALIGN8(sizeof (struct skck) + KEYLEN(keylen)) 77 #define CACHEKEY_RECLEN(keylen) ALIGN8(sizeof (struct cachekey_disklist) - 1 + \ 78 KEYLEN(keylen) + SKCK_LEN(keylen)) 87 keylen_t keylen; /* in bits */ member in struct:cachekey_header 104 static struct cachekey_header *create_cache_file_ch(keylen_t keylen, 126 static struct cachekey *get_cache_header(keylen_t keylen, 201 create_cache_file_ch(keylen_t keylen, algtype_ argument 649 print_cache(keylen_t keylen, algtype_t algtype) argument 1121 get_cache_header(keylen_t keylen, algtype_t algtype) argument 1181 create_cache_file(keylen_t keylen, algtype_t algtype, int sizespec) argument 1203 cache_insert( keylen_t keylen, algtype_t algtype, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument 1233 cache_retrieve( keylen_t keylen, algtype_t algtype, uid_t uid, keybuf3 *public, des_block key) argument 1259 cache_remove(keylen_t keylen, algtype_t algtype, uid_t uid, keybuf3 *public) argument [all...] |
H A D | setkey.c | 143 * we don't need to worry about locking for the keylen + algtype 156 keylen_t keylen; member in struct:keylenlist 175 *kpp != NULL && (*kpp)->keylen != k; 194 kp->keylen = k; 241 /* don't mind duplicate (keylen,algtype) paris for now. */ 539 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) { 587 ("storeotherrootkeys key %d", kp->keylen)); 591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { 597 kp->keylen, ap->algtype, 613 skey.keylen 928 keylen_t keylen = bytelen*4; local 1381 getdeskey3( keylen_t keylen, algtype_t algtype, int desarylen, keybuf3 *public, keybuf3 *secret, uid_t uid ) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_callprov.c | 116 size_t keylen = 0; local 126 keylen = CRYPTO_BITS2BYTES(key->ck_length); 128 keylen = key->ck_length; 138 keylen = CRYPTO_BYTES2BITS(attr_len); 140 keylen = attr_len; 147 keylen = CRYPTO_BYTES2BITS(attr_len); 149 keylen = attr_len; 157 if (keylen == 0) 171 size_t, keylen, 175 if ((keylen > mech_inf [all...] |
/illumos-gate/usr/src/uts/common/sys/ |
H A D | cryptmod.h | 157 crkeylen_t keylen; member in struct:cr_info_t 191 crkeylen_t keylen; member in struct:cipher_data_t
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 64 CK_OBJECT_CLASS class, CK_KEY_TYPE key_type, CK_ULONG keylen, CK_ULONG mode, 83 keylen, mode); 160 CK_ULONG keylen = 0; local 199 keylen = 48; 233 keylen = *((CK_ULONG*)pTemplate[i].pValue); 243 if (keylen != 0 && keylen != 16) 261 CKO_SECRET_KEY, key_type, keylen, SOFT_GEN_KEY, B_FALSE); 276 keylen = OBJ_SEC_VALUE_LEN(secret_key) = DES_KEYSIZE; 285 keylen 62 soft_gen_keyobject(CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_ULONG *objecthandle_p, soft_session_t *sp, CK_OBJECT_CLASS class, CK_KEY_TYPE key_type, CK_ULONG keylen, CK_ULONG mode, boolean_t internal) argument [all...] |
/illumos-gate/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_sec_mechs.c | 347 * in the keylen or algtype fields like so: 348 * keylen = 192 429 m->keylen = 192; 434 m->keylen = NIS_SEC_CF_NA_KA; 440 m->keylen = atoi(*(flds + kl_offset)); 460 * mechname/alias/keylen/algotype combo. Else return FALSE. 466 if (mp->keylen != tp->keylen) 502 tp->keylen = mp->keylen; 656 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) argument 839 __nis_keyalg2mechalias( keylen_t keylen, algtype_t algtype, char *alias, size_t alias_len) argument 895 __nis_keyalg2authtype( keylen_t keylen, algtype_t algtype, char *authtype, size_t authtype_len) argument 1083 __nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, char *buffer, size_t buflen) argument 1108 __nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype, const char *symname) argument [all...] |
/illumos-gate/usr/src/cmd/ypcmd/ |
H A D | yppush.c | 435 int keylen; local 451 keylen = strlen(host); 453 if (yp_match(domain_alias, ypservers, host, keylen, 459 add_server(host, keylen); 471 int keylen; local 509 keylen = outkeylen; 511 if (err = yp_next(domain_alias, ypservers, key, keylen,
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa.c | 1112 int key_info, ie_len = 0, keylen, gtk_len = 0; local 1184 keylen = BE_16(key->key_length); 1187 if (keylen != 16) { 1190 keylen, MAC2STR(src_addr)); 1195 if (keylen != 32) { 1198 keylen, MAC2STR(src_addr)); 1249 int alg, keylen, rsclen; local 1254 keylen = 16; 1259 keylen = 32; 1280 (uint8_t *)&wpa_s->ptk.tk1, keylen) < 1305 int key_info, keylen, keydatalen, maxkeylen, keyidx, key_rsc_len = 0; local [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 446 CK_ULONG keylen; local 873 keylen = 0; 875 keylen = 16; 884 keytype, keylen, cmd->flags, &key);
|
/illumos-gate/usr/src/psm/stand/boot/sparc/common/ |
H A D | wbcli.c | 839 int keylen; local 847 WANBOOT_MAXKEYLEN, &keylen, &status); 848 if ((ret == 0) && (status == 0) && (keylen == AES_128_KEY_SIZE)) { 859 WANBOOT_MAXKEYLEN, &keylen, &status); 860 if ((ret == 0) && (status == 0) && (keylen == DES3_KEY_SIZE)) { 876 int keylen; local 884 WANBOOT_HMAC_KEY_SIZE, &keylen, &status); 885 if ((ret == 0) && (status == 0) && (keylen == WANBOOT_HMAC_KEY_SIZE)) {
|
/illumos-gate/usr/src/uts/common/io/idm/ |
H A D | idm_text.c | 171 char **key, int *keylen, char **value); 255 int tblen, keylen; local 262 &key, &keylen, &value)) != 0) { 268 key, keylen, value)) != 0) { 301 char **key, int *keylen, char **value) 329 *keylen = idm_strcspn(*tb_scan, "="); 331 if (*keylen == total_len) { 336 *tb_scan += *keylen + 1; /* Skip the '=' */ 337 *tb_len -= *keylen + 1; 343 valuelen = total_len - (*keylen 300 idm_keyvalue_get_next(char **tb_scan, int *tb_len, char **key, int *keylen, char **value) argument 352 idm_lookup_kv_xlate(const char *key, int keylen) argument 1265 idm_nvlist_add_keyvalue(nvlist_t *nvl, char *key, int keylen, char *value) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_util.c | 309 size_t keylen) 322 j += (sbox[i] + key[i % keylen]); 305 rand_hash( unsigned char *data, size_t datalen, unsigned char *key, size_t keylen) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | DNSDigest.c | 1315 mDNSs32 keylen = DNSDigest_Base64ToBin(b64key, keybuf, sizeof(keybuf)); local 1316 if (keylen < 0) return(keylen); 1317 DNSDigest_ConstructHMACKey(info, keybuf, (mDNSu32)keylen); 1318 return(keylen);
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 822 uint32_t keylen = 1024, len; local 856 &keylen, &keylen_size); 858 /* Default keylen = 1024 */ 891 rsaparams.keySizeInBits = keylen; 915 ks = PQG_PBITS_TO_INDEX(keylen); 1913 uint32_t keylen; local 1931 rv = kmf_get_attr(KMF_KEYLENGTH_ATTR, attrlist, numattr, &keylen, 1947 keySize = keylen; 1953 keySize = keylen; 1967 keySize = keylen; [all...] |
/illumos-gate/usr/src/cmd/ldap/ns_ldap/ |
H A D | ldapaddent.c | 2200 keylen_t keylen; local 2329 keylen = (strlen(t) / 2) * 8; 2353 if (AUTH_DES_KEY(keylen, algtype)) 2362 else if (!(__nis_keyalg2authtype(keylen, algtype, auth_type,
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 1528 size_t keylen; local 1535 keylen = strlen(keyname); 1537 fname = malloc(keylen + rlen + strlen(REALM_SEP_STRING) + 1);
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 3476 uint32_t keylen = 0; local 3552 keylen = attrkeylen * 8; /* bytes to bits */ 3559 &keylen, &keylen_size); 3568 if ((keylen % 8) != 0) { 3571 secKeyLen = keylen / 8; /* in bytes for RC4/AES */ 3845 uint32_t keylen = 0, attrkeylen = 0; local 3884 &keylen, NULL); 3891 if ((keylen % 8) != 0) { 3894 secKeyLen = keylen/8; /* in bytes */
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ |
H A D | ikeadm.c | 1036 uint_t c = 0, locidlen, remidlen, keylen, keybits; local 1097 keyp = parse_key(argv[c++], &keylen, &keybits); 1129 *len += keylen; 1204 psp->ps_key_len = keylen; 1206 (void) memcpy((uint8_t *)((int)psp + psp->ps_key_off), keyp, keylen);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/routeadm/ |
H A D | routeadm.c | 473 ssize_t keylen; local 670 if ((keylen = keyend - nk) != 673 if (strncmp(key, nk, keylen) == 0) {
|
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 1001 unsigned keylen) 1013 j = (j + text->sbox[i] + key[i % keylen]) % 256; 1664 HASH key, int keylen, 1670 utils->MD5Update(&Md5Ctx, key, keylen); 1681 utils->MD5Update(&Md5Ctx, key, keylen); 999 rc4_init(rc4_context_t *text, const unsigned char *key, unsigned keylen) argument 1662 create_layer_keys(context_t *text, const sasl_utils_t *utils, HASH key, int keylen, char enckey[16], char deckey[16]) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 1417 cki.keylen = 0; 1420 cki.keylen = DES_BLOCKSIZE; 1508 cki.keylen = 0; 1623 cki.keylen = DES_BLOCKSIZE; 1627 cki.keylen = 0; 1784 encrypt_send_keyid(int dir, uchar_t *keyid, int keylen, boolean_t saveit) argument 1799 keylen, 1804 (void) memcpy(encr_data.encrypt.keyid, keyid, keylen); 1805 encr_data.encrypt.keyidlen = keylen; 1807 (void) memcpy(encr_data.decrypt.keyid, keyid, keylen); [all...] |
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | map.c | 2803 int keylen; local 2821 keylen = strlen(nbuf); 2830 yperr = yp_match(yp_domain, "hosts.byname", nbuf, keylen, 2838 keylen++; 2839 yperr = yp_match(yp_domain, "hosts.byname", nbuf, keylen,
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 1488 uint32_t keylen = 1024; local 1549 &keylen, &keylen_size); 1551 /* keylen is optional, default is 1024 */ 1558 sslPrivKey = RSA_generate_key(keylen, eValue, NULL, NULL); 4600 uint32_t keylen; local 4601 uint32_t keylen_size = sizeof (keylen); 4624 &keylen, &keylen_size); 4676 if (keylen % 8 != 0) { 4682 if (keylen != 128 && 4683 keylen ! [all...] |