/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | cbc.h | 39 uint32_t keylen; member in struct:cbc_handle_s
|
H A D | hmac_test.c | 47 int keylen; member in struct:test_data 63 td[0].keylen = 20; 65 td[0].keylen); 70 td[1].keylen = 4; 76 td[2].keylen = 20; 78 td[2].keylen); 84 td[3].keylen = 25; 86 "1819", td[3].keylen); 93 td[4].keylen = 20; 95 td[4].keylen); [all...] |
/illumos-gate/usr/src/cmd/ypcmd/ |
H A D | udpublickey.c | 57 unsigned keylen; local 85 if (! scanf("%u\n", &keylen)) { 88 if (! fread(key, keylen, 1, stdin)) { 91 key[keylen] = 0;
|
H A D | ypcat.c | 254 int keylen; local 262 keylen = 0; 286 keylen = outkeylen; 288 if (err = yp_next(domain, map, key, keylen, &outkey, &outkeylen,
|
/illumos-gate/usr/src/psm/promif/ieee1275/common/ |
H A D | prom_key.c | 123 prom_get_security_key(char *keyname, caddr_t buf, int buflen, int *keylen, argument 191 *keylen = result; 194 *keylen = 0;
|
/illumos-gate/usr/src/lib/libnsl/yp/ |
H A D | yp_update.c | 64 yp_update(char *domain, char *map, unsigned op, char *key, int keylen, argument 124 args.key.yp_buf_len = keylen;
|
H A D | yp_enum.c | 68 int *keylen, /* return: bytes in key */ 96 key, keylen, val, vallen); 121 int *keylen, /* return: bytes in key */ 126 return (__yp_first_cflookup(domain, map, key, keylen, val, vallen, 1)); 134 dofirst(domain, map, pdomb, timeout, key, keylen, val, vallen) 140 int *keylen; 199 *keylen = (int)resp.keydat.dsize; 64 __yp_first_cflookup( char *domain, char *map, char **key, int *keylen, char **val, int *vallen, int hardlookup) argument 117 yp_first( char *domain, char *map, char **key, int *keylen, char **val, int *vallen) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, argument 52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, argument 61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument 80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_template.c | 98 dh_getpublickey(const char *remote, keylen_t keylen, algtype_t algtype, argument 124 return (__getpublickey_cached_g(remote, keylen, algtype, 134 return (getpublickey_g(remote, keylen, algtype, pk, pklen));
|
H A D | generic_key.c | 77 adjust(char *keyout, char *keyin, int keylen) argument 81 int hexkeybytes = (keylen+3)/4; 102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ argument 128 * that we have at least keylen bits. 130 len = ((keylen + BASEBITS - 1) / BASEBITS); 161 (void) adjust(secret, xkey, keylen); 167 (void) adjust(public, xkey, keylen); 183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument 203 for (i = 0; i < ((keylen - len)/2)/8; i++) 221 if (keylen 240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument [all...] |
/illumos-gate/usr/src/uts/common/io/ |
H A D | suntpi.c | 148 size_t keylen; local 157 key = tpi_makekey(WR(q), &keylen); 159 if (keylen == 0) { 170 if ((*tpp)->tpi_keylen == keylen && 171 bcmp((*tpp)->tpi_key, key, keylen) == 0) { 181 (*tpp)->tpi_key = kmem_alloc(keylen, KM_SLEEP); 182 bcopy(key, (*tpp)->tpi_key, keylen); 183 (*tpp)->tpi_keylen = keylen;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.c | 210 mDNSexport mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument 229 return (func->Verify(ctx, key, keylen, signature, siglen));
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 210 uint32_t keylen; local 225 /* keylen may be 0 if CKA_VALUE_LEN did not specify */ 226 keylen = OBJ_SEC_VALUE_LEN(secretkey); 227 if (keylen > sizeof (key)) { /* check for overflow */ 239 /* keylen may be modified if it was 0 or conflicts with key type */ 240 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen, 0); 246 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { 251 OBJ_SEC_VALUE_LEN(secretkey) = keylen; 252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); local
|
H A D | softEC.c | 223 uint32_t keylen; local 256 keylen = DES_KEYSIZE; 259 keylen = DES2_KEYSIZE; 262 keylen = DES3_KEYSIZE; 269 keylen = (uint32_t)OBJ_SEC_VALUE_LEN(secretkey); 271 keylen = OBJ_SEC_VALUE_LEN(secretkey); 302 if (keylen == 0) 303 keylen = secret_item.len; 305 if (keylen > secret_item.len) { 309 buf = malloc(keylen); [all...] |
/illumos-gate/usr/src/lib/libnsl/include/rpcsvc/ |
H A D | nis_dhext.h | 58 ushort_t keylen; member in struct:extdhkey 78 keylen_t keylen; member in struct:__anon3663 88 * The value a keylen or algtype mechanism_t element will be set 91 * then the keylen is set to 192 and the algtype to 0. 106 /* valid keylen and algtype check */ 113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\ 138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, 141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) 63 keylength = keylen; 109 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, 167 keylength = keylen; /* bits */ 255 genkey_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, char *dir, argument 286 keylength = keylen; 370 int keylen = 0; local 383 "t:(keytype)y:(keylen)K:(outkey)P:(print)" 462 * - For DES and 3DES, the key size are fixed. Ingore the keylen 464 * - For AES and ARCFOUR, if keylen i 39 genkey_nss(KMF_HANDLE_T kmfhandle, char *token, char *dir, char *prefix, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) argument 108 genkey_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, char *senstr, char *extstr, boolean_t print_hex, KMF_CREDENTIAL *tokencred) argument [all...] |
H A D | genkeypair.c | 50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, 61 keylength = keylen; /* bits */ 133 KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, 163 keylength = keylen; /* bits */ 228 int keylen, KMF_CREDENTIAL *tokencred, 247 keylength = keylen; /* bits */ 329 int keylen = PK_DEFAULT_KEYLENGTH; local 343 "T:(token)d:(dir)p:(prefix)t:(keytype)y:(keylen)" 382 &keylen) != 1) { 469 keylen 48 genkeypair_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument 132 genkeypair_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, char *outkey, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument 224 genkeypair_nss(KMF_HANDLE_T kmfhandle, char *token, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument [all...] |
/illumos-gate/usr/src/cmd/smbsrv/smbd/ |
H A D | smbd_krb5ssp.c | 310 size_t keylen; local 331 if ((keylen = data_set->elements[0].length) < SMBAUTH_HASH_SZ) { 337 ctx->ctx_token->tkn_ssnkey.val = malloc(keylen); 342 ctx->ctx_token->tkn_ssnkey.len = keylen; 344 ctx->ctx_token->tkn_ssnkey.val, keylen);
|
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 99 keylen_t keylen, /* in */ 114 skeylen = BITS2NIBBLES(keylen) + 1; 120 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { 126 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, 134 "%d-%d", keylen, algtype); 143 "for '%s'."), keylen, algtype, netname); 152 keylen, algtype); 276 "key type = %d-%d", mp->keylen, 279 if (!get_and_set_seckey(pamh, netname, mp->keylen, 96 get_and_set_seckey( pam_handle_t *pamh, const char *netname, keylen_t keylen, algtype_t algtype, const char *pw, uid_t uid, gid_t gid, int *get_seckey_cnt, int *good_pw_cnt, int *set_seckey_cnt, int flags, int debug) argument
|
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 350 int keylen; local 353 keylen = strlen(key); 356 key, keylen, &(nisbuf->c2scratch),
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | key_mgr.c | 34 CK_ULONG keylen, 42 rc = ber_decode_PrivateKeyInfo(keydata, keylen, &alg, 32 key_mgr_get_private_key_type( CK_BYTE *keydata, CK_ULONG keylen, CK_KEY_TYPE *keytype) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 332 unsigned int keylen; local 344 ret = decode_tagged_octetstring (&slt, 1, &keylen, 348 key->key_data_length[1] = keylen; /* XXX range check?? */
|
/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 170 keylen_t keylen, /* in */ 174 const int classic_des = keylen == 192 && algtype == 0; 185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, 258 keylen_t keylen, /* in */ 263 const int classic_des = keylen == 192 && algtype == 0; 284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, 168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument 256 __gen_common_dhkeys_g(char *xpublic, char *xsecret, keylen_t keylen, algtype_t algtype, des_block deskeys[], keynum_t keynum) argument
|
H A D | xcrypt.c | 242 keylen_t keylen, /* in */ 253 const int classic_des = keylen == 192 && algtype == 0; 254 const int hexkeybytes = BITS2NIBBLES(keylen); 256 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 : 257 keylen/8; 262 if (!secret || !keylen || !passwd || !encrypted_secret) 339 * If keylen is 192 and algtype is 0, then decrypt the same way 347 int keylen, /* in */ 358 const int classic_des = keylen == 192 && algtype == 0; 359 const int hexkeybytes = BITS2NIBBLES(keylen); 240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
/illumos-gate/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_misc_proc.c | 270 __nis_dhext_extract_pkey(netobj *no, keylen_t keylen, algtype_t algtype) argument 279 size_t binlen = (ntohs(keyent->keylen) + 7) / 8; 283 if (keylen == ntohs(keyent->keylen) &&
|