Searched defs:keylen (Results 1 - 25 of 76) sorted by relevance

1234

/illumos-gate/usr/src/common/net/wanboot/crypt/
H A Dcbc.h39 uint32_t keylen; member in struct:cbc_handle_s
H A Dhmac_test.c47 int keylen; member in struct:test_data
63 td[0].keylen = 20;
65 td[0].keylen);
70 td[1].keylen = 4;
76 td[2].keylen = 20;
78 td[2].keylen);
84 td[3].keylen = 25;
86 "1819", td[3].keylen);
93 td[4].keylen = 20;
95 td[4].keylen);
[all...]
/illumos-gate/usr/src/cmd/ypcmd/
H A Dudpublickey.c57 unsigned keylen; local
85 if (! scanf("%u\n", &keylen)) {
88 if (! fread(key, keylen, 1, stdin)) {
91 key[keylen] = 0;
H A Dypcat.c254 int keylen; local
262 keylen = 0;
286 keylen = outkeylen;
288 if (err = yp_next(domain, map, key, keylen, &outkey, &outkeylen,
/illumos-gate/usr/src/psm/promif/ieee1275/common/
H A Dprom_key.c123 prom_get_security_key(char *keyname, caddr_t buf, int buflen, int *keylen, argument
191 *keylen = result;
194 *keylen = 0;
/illumos-gate/usr/src/lib/libnsl/yp/
H A Dyp_update.c64 yp_update(char *domain, char *map, unsigned op, char *key, int keylen, argument
124 args.key.yp_buf_len = keylen;
H A Dyp_enum.c68 int *keylen, /* return: bytes in key */
96 key, keylen, val, vallen);
121 int *keylen, /* return: bytes in key */
126 return (__yp_first_cflookup(domain, map, key, keylen, val, vallen, 1));
134 dofirst(domain, map, pdomb, timeout, key, keylen, val, vallen)
140 int *keylen;
199 *keylen = (int)resp.keydat.dsize;
64 __yp_first_cflookup( char *domain, char *map, char **key, int *keylen, char **val, int *vallen, int hardlookup) argument
117 yp_first( char *domain, char *map, char **key, int *keylen, char **val, int *vallen) argument
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, argument
52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, argument
61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_template.c98 dh_getpublickey(const char *remote, keylen_t keylen, algtype_t algtype, argument
124 return (__getpublickey_cached_g(remote, keylen, algtype,
134 return (getpublickey_g(remote, keylen, algtype, pk, pklen));
H A Dgeneric_key.c77 adjust(char *keyout, char *keyin, int keylen) argument
81 int hexkeybytes = (keylen+3)/4;
102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ argument
128 * that we have at least keylen bits.
130 len = ((keylen + BASEBITS - 1) / BASEBITS);
161 (void) adjust(secret, xkey, keylen);
167 (void) adjust(public, xkey, keylen);
183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument
203 for (i = 0; i < ((keylen - len)/2)/8; i++)
221 if (keylen
240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
[all...]
/illumos-gate/usr/src/uts/common/io/
H A Dsuntpi.c148 size_t keylen; local
157 key = tpi_makekey(WR(q), &keylen);
159 if (keylen == 0) {
170 if ((*tpp)->tpi_keylen == keylen &&
171 bcmp((*tpp)->tpi_key, key, keylen) == 0) {
181 (*tpp)->tpi_key = kmem_alloc(keylen, KM_SLEEP);
182 bcopy(key, (*tpp)->tpi_key, keylen);
183 (*tpp)->tpi_keylen = keylen;
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DCryptoAlg.c210 mDNSexport mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument
229 return (func->Verify(ctx, key, keylen, signature, siglen));
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDH.c210 uint32_t keylen; local
225 /* keylen may be 0 if CKA_VALUE_LEN did not specify */
226 keylen = OBJ_SEC_VALUE_LEN(secretkey);
227 if (keylen > sizeof (key)) { /* check for overflow */
239 /* keylen may be modified if it was 0 or conflicts with key type */
240 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen, 0);
246 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) {
251 OBJ_SEC_VALUE_LEN(secretkey) = keylen;
252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); local
H A DsoftEC.c223 uint32_t keylen; local
256 keylen = DES_KEYSIZE;
259 keylen = DES2_KEYSIZE;
262 keylen = DES3_KEYSIZE;
269 keylen = (uint32_t)OBJ_SEC_VALUE_LEN(secretkey);
271 keylen = OBJ_SEC_VALUE_LEN(secretkey);
302 if (keylen == 0)
303 keylen = secret_item.len;
305 if (keylen > secret_item.len) {
309 buf = malloc(keylen);
[all...]
/illumos-gate/usr/src/lib/libnsl/include/rpcsvc/
H A Dnis_dhext.h58 ushort_t keylen; member in struct:extdhkey
78 keylen_t keylen; member in struct:__anon3663
88 * The value a keylen or algtype mechanism_t element will be set
91 * then the keylen is set to 192 and the algtype to 0.
106 /* valid keylen and algtype check */
113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\
138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype,
141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkey.c40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred)
63 keylength = keylen;
109 char *keylabel, KMF_KEY_ALG keyAlg, int keylen,
167 keylength = keylen; /* bits */
255 genkey_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, char *dir, argument
286 keylength = keylen;
370 int keylen = 0; local
383 "t:(keytype)y:(keylen)K:(outkey)P:(print)"
462 * - For DES and 3DES, the key size are fixed. Ingore the keylen
464 * - For AES and ARCFOUR, if keylen i
39 genkey_nss(KMF_HANDLE_T kmfhandle, char *token, char *dir, char *prefix, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) argument
108 genkey_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, char *senstr, char *extstr, boolean_t print_hex, KMF_CREDENTIAL *tokencred) argument
[all...]
H A Dgenkeypair.c50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid,
61 keylength = keylen; /* bits */
133 KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt,
163 keylength = keylen; /* bits */
228 int keylen, KMF_CREDENTIAL *tokencred,
247 keylength = keylen; /* bits */
329 int keylen = PK_DEFAULT_KEYLENGTH; local
343 "T:(token)d:(dir)p:(prefix)t:(keytype)y:(keylen)"
382 &keylen) != 1) {
469 keylen
48 genkeypair_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument
132 genkeypair_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, char *outkey, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument
224 genkeypair_nss(KMF_HANDLE_T kmfhandle, char *token, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument
[all...]
/illumos-gate/usr/src/cmd/smbsrv/smbd/
H A Dsmbd_krb5ssp.c310 size_t keylen; local
331 if ((keylen = data_set->elements[0].length) < SMBAUTH_HASH_SZ) {
337 ctx->ctx_token->tkn_ssnkey.val = malloc(keylen);
342 ctx->ctx_token->tkn_ssnkey.len = keylen;
344 ctx->ctx_token->tkn_ssnkey.val, keylen);
/illumos-gate/usr/src/lib/pam_modules/dhkeys/
H A Ddhkeys.c99 keylen_t keylen, /* in */
114 skeylen = BITS2NIBBLES(keylen) + 1;
120 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) {
126 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0,
134 "%d-%d", keylen, algtype);
143 "for '%s'."), keylen, algtype, netname);
152 keylen, algtype);
276 "key type = %d-%d", mp->keylen,
279 if (!get_and_set_seckey(pamh, netname, mp->keylen,
96 get_and_set_seckey( pam_handle_t *pamh, const char *netname, keylen_t keylen, algtype_t algtype, const char *pw, uid_t uid, gid_t gid, int *get_seckey_cnt, int *good_pw_cnt, int *set_seckey_cnt, int flags, int debug) argument
/illumos-gate/usr/src/lib/passwdutil/
H A Dnis_attr.c350 int keylen; local
353 keylen = strlen(key);
356 key, keylen, &(nisbuf->c2scratch),
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dkey_mgr.c34 CK_ULONG keylen,
42 rc = ber_decode_PrivateKeyInfo(keydata, keylen, &alg,
32 key_mgr_get_private_key_type( CK_BYTE *keydata, CK_ULONG keylen, CK_KEY_TYPE *keytype) argument
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dldap_key_seq.c332 unsigned int keylen; local
344 ret = decode_tagged_octetstring (&slt, 1, &keylen,
348 key->key_data_length[1] = keylen; /* XXX range check?? */
/illumos-gate/usr/src/lib/libnsl/key/
H A Dgen_dhkeys.c170 keylen_t keylen, /* in */
174 const int classic_des = keylen == 192 && algtype == 0;
185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen,
258 keylen_t keylen, /* in */
263 const int classic_des = keylen == 192 && algtype == 0;
284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen,
168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument
256 __gen_common_dhkeys_g(char *xpublic, char *xsecret, keylen_t keylen, algtype_t algtype, des_block deskeys[], keynum_t keynum) argument
H A Dxcrypt.c242 keylen_t keylen, /* in */
253 const int classic_des = keylen == 192 && algtype == 0;
254 const int hexkeybytes = BITS2NIBBLES(keylen);
256 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 :
257 keylen/8;
262 if (!secret || !keylen || !passwd || !encrypted_secret)
339 * If keylen is 192 and algtype is 0, then decrypt the same way
347 int keylen, /* in */
358 const int classic_des = keylen == 192 && algtype == 0;
359 const int hexkeybytes = BITS2NIBBLES(keylen);
240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
/illumos-gate/usr/src/lib/libnsl/nis/gen/
H A Dnis_misc_proc.c270 __nis_dhext_extract_pkey(netobj *no, keylen_t keylen, algtype_t algtype) argument
279 size_t binlen = (ntohs(keyent->keylen) + 7) / 8;
283 if (keylen == ntohs(keyent->keylen) &&

Completed in 70 milliseconds

1234