/osnet-11/usr/src/lib/libnsl/yp/ |
H A D | yp_update.c | 60 yp_update(char *domain, char *map, unsigned op, char *key, int keylen, argument 120 args.key.yp_buf_len = keylen;
|
H A D | yp_enum.c | 64 int *keylen, /* return: bytes in key */ 92 key, keylen, val, vallen); 117 int *keylen, /* return: bytes in key */ 122 return (__yp_first_cflookup(domain, map, key, keylen, val, vallen, 1)); 130 dofirst(domain, map, pdomb, timeout, key, keylen, val, vallen) 136 int *keylen; 195 *keylen = (int)resp.keydat.dsize; 60 __yp_first_cflookup( char *domain, char *map, char **key, int *keylen, char **val, int *vallen, int hardlookup) argument 113 yp_first( char *domain, char *map, char **key, int *keylen, char **val, int *vallen) argument
|
H A D | yp_match.c | 62 int keylen; member in struct:cache 92 makenode(char *domain, char *map, int keylen, int vallen) argument 104 ((n->key = malloc(keylen)) == 0) || 118 in_cache(char *domain, char *map, char *key, int keylen, char **val, argument 134 if ((c->keylen == keylen) && 135 (memcmp(key, c->key, (size_t)keylen) == 0) && 172 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, argument 195 (key == NULL) || (keylen == 0)) 199 found_it = in_cache(domain, map, key, keylen, 299 yp_match( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument 350 __yp_match_rsvdport_cflookup( char *domain, char *map, char *key, int keylen, char **val, int *vallen, int hardlookup) argument 484 yp_match_rsvdport( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument 502 domatch(char *domain, char *map, char *key, int keylen, struct dom_binding *pdomb, struct timeval *timeoutp, char **val, int *vallen) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, argument 52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, argument 61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument 80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_template.c | 92 dh_getpublickey(const char *remote, keylen_t keylen, algtype_t algtype, argument 118 return (__getpublickey_cached_g(remote, keylen, algtype, 128 return (getpublickey_g(remote, keylen, algtype, pk, pklen));
|
H A D | generic_key.c | 77 adjust(char *keyout, char *keyin, int keylen) argument 81 int hexkeybytes = (keylen+3)/4; 102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ argument 128 * that we have at least keylen bits. 130 len = ((keylen + BASEBITS - 1) / BASEBITS); 161 (void) adjust(secret, xkey, keylen); 167 (void) adjust(public, xkey, keylen); 183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument 203 for (i = 0; i < ((keylen - len)/2)/8; i++) 221 if (keylen 240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | arcfour.c | 75 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument 93 if( keylen < 40/8 ) /* we want at least 40 bits */ 100 karr[i] = key[i%keylen]; 115 arcfour_setkey ( void *context, const byte *key, unsigned int keylen ) 118 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
|
H A D | camellia-glue.c | 75 camellia_setkey(void *c, const byte *key, unsigned keylen) argument 81 if(keylen!=16 && keylen!=24 && keylen!=32) 95 ctx->keybitlength=keylen*8;
|
H A D | hmac-tests.c | 51 const void *key, size_t keylen, 62 if (_gcry_md_setkey (hd, key, keylen)) 49 check_one(int algo, const void *data, size_t datalen, const void *key, size_t keylen, const void *expect, size_t expectlen) argument
|
H A D | blowfish.c | 51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen); 497 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument 528 ((byte*)&data)[1] = key[(j+1)%keylen]; 529 ((byte*)&data)[2] = key[(j+2)%keylen]; 530 ((byte*)&data)[3] = key[(j+3)%keylen]; 533 ((byte*)&data)[2] = key[(j+1)%keylen]; 534 ((byte*)&data)[1] = key[(j+2)%keylen]; 535 ((byte*)&data)[0] = key[(j+3)%keylen]; 538 j = (j+4) % keylen; 591 bf_setkey (void *context, const byte *key, unsigned keylen) argument [all...] |
H A D | rfc2268.c | 193 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument 201 int bits = keylen * 8; 213 if (keylen < 40 / 8) /* We want at least 40 bits. */ 218 for (i = 0; i < keylen; i++) 221 for (i = keylen; i < 128; i++) 222 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255]; 251 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument 253 return setkey_core (context, key, keylen, 1);
|
H A D | seed.c | 265 do_setkey (SEED_context *ctx, const byte *key, const unsigned keylen) 284 if (keylen != 16) 317 seed_setkey (void *context, const byte *key, const unsigned keylen) 321 int rc = do_setkey (ctx, key, keylen); 263 do_setkey(SEED_context *ctx, const byte *key, const unsigned keylen) argument 315 seed_setkey(void *context, const byte *key, const unsigned keylen) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | arcfour.c | 74 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument 92 if( keylen < 40/8 ) /* we want at least 40 bits */ 99 karr[i] = key[i%keylen]; 114 arcfour_setkey ( void *context, const byte *key, unsigned int keylen ) 117 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
|
H A D | camellia-glue.c | 76 camellia_setkey(void *c, const byte *key, unsigned keylen) argument 82 if(keylen!=16 && keylen!=24 && keylen!=32) 96 ctx->keybitlength=keylen*8;
|
H A D | rfc2268.c | 192 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument 200 int bits = keylen * 8; 212 if (keylen < 40 / 8) /* We want at least 40 bits. */ 217 for (i = 0; i < keylen; i++) 220 for (i = keylen; i < 128; i++) 221 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255]; 250 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument 252 return setkey_core (context, key, keylen, 1);
|
H A D | blowfish.c | 51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen); 469 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument 500 ((byte*)&data)[1] = key[(j+1)%keylen]; 501 ((byte*)&data)[2] = key[(j+2)%keylen]; 502 ((byte*)&data)[3] = key[(j+3)%keylen]; 505 ((byte*)&data)[2] = key[(j+1)%keylen]; 506 ((byte*)&data)[1] = key[(j+2)%keylen]; 507 ((byte*)&data)[0] = key[(j+3)%keylen]; 510 j = (j+4) % keylen; 563 bf_setkey (void *context, const byte *key, unsigned keylen) argument [all...] |
/osnet-11/usr/src/lib/libnsl/include/rpcsvc/ |
H A D | nis_dhext.h | 58 ushort_t keylen; member in struct:extdhkey 78 keylen_t keylen; member in struct:__anon2017 88 * The value a keylen or algtype mechanism_t element will be set 91 * then the keylen is set to 192 and the algtype to 0. 106 /* valid keylen and algtype check */ 113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\ 138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, 141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/i386/pc/ |
H A D | sendkey.c | 35 static int keylen = 0; variable 240 *((char *) 0x41c) = keylen + 0x1e; 337 keylen = 0; 339 for (i = 0; i < argc && keylen < 0x20; i++) 346 sendkey[keylen++] = find_ascii_code (args[i]); 347 sendkey[keylen++] = key_code;
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 211 uint32_t keylen; local 226 /* keylen may be 0 if CKA_VALUE_LEN did not specify */ 227 keylen = OBJ_SEC_VALUE_LEN(secretkey); 228 if (keylen > sizeof (key)) { /* check for overflow */ 241 /* keylen may be modified if it was 0 or conflicts with key type */ 242 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen); 248 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { 253 OBJ_SEC_VALUE_LEN(secretkey) = keylen; 254 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); local
|
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 220 * keylen the length of the key 226 dst_buffer_to_hmac_md5(DST_KEY *dkey, const u_char *key, const int keylen) argument 231 int local_keylen = keylen; 234 if (dkey == NULL || key == NULL || keylen < 0) 244 if (keylen > HMAC_LEN) { 246 MD5Update(&ctx, key, keylen);
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 170 keylen_t keylen, /* in */ 174 const int classic_des = keylen == 192 && algtype == 0; 185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, 258 keylen_t keylen, /* in */ 263 const int classic_des = keylen == 192 && algtype == 0; 284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, 168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument 256 __gen_common_dhkeys_g(char *xpublic, char *xsecret, keylen_t keylen, algtype_t algtype, des_block deskeys[], keynum_t keynum) argument
|
H A D | xcrypt.c | 256 keylen_t keylen, /* in */ 268 const int classic_des = keylen == 192 && algtype == 0; 269 const int hexkeybytes = BITS2NIBBLES(keylen); 271 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 : 272 keylen/8; 277 if (!secret || !keylen || !passwd || !encrypted_secret) 361 * If keylen is 192 and algtype is 0, then decrypt the same way 369 int keylen, /* in */ 381 const int classic_des = keylen == 192 && algtype == 0; 382 const int hexkeybytes = BITS2NIBBLES(keylen); 254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
/osnet-11/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_misc_proc.c | 270 __nis_dhext_extract_pkey(netobj *no, keylen_t keylen, algtype_t algtype) argument 279 size_t binlen = (ntohs(keyent->keylen) + 7) / 8; 283 if (keylen == ntohs(keyent->keylen) &&
|
/osnet-11/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_clientlib.c | 115 unsigned long *keylen 120 *keylen = (unsigned long) strlen(key); 125 if (p <= e && *keylen <= x[0] && !strncmp(key, (char*)x+1, *keylen)) 126 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 277 unsigned long keylen, itemlen, remainder; local 278 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 304 unsigned long keylen; local 305 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) 316 unsigned long keylen; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 241 unsigned int keylen; local 253 ret = decode_tagged_octetstring (&slt, 1, &keylen, 257 keylen = 0; 259 key->key_data_length[1] = keylen; /* XXX range check?? */
|