Searched defs:keylen (Results 1 - 25 of 70) sorted by relevance

123

/osnet-11/usr/src/lib/libnsl/yp/
H A Dyp_update.c60 yp_update(char *domain, char *map, unsigned op, char *key, int keylen, argument
120 args.key.yp_buf_len = keylen;
H A Dyp_enum.c64 int *keylen, /* return: bytes in key */
92 key, keylen, val, vallen);
117 int *keylen, /* return: bytes in key */
122 return (__yp_first_cflookup(domain, map, key, keylen, val, vallen, 1));
130 dofirst(domain, map, pdomb, timeout, key, keylen, val, vallen)
136 int *keylen;
195 *keylen = (int)resp.keydat.dsize;
60 __yp_first_cflookup( char *domain, char *map, char **key, int *keylen, char **val, int *vallen, int hardlookup) argument
113 yp_first( char *domain, char *map, char **key, int *keylen, char **val, int *vallen) argument
H A Dyp_match.c62 int keylen; member in struct:cache
92 makenode(char *domain, char *map, int keylen, int vallen) argument
104 ((n->key = malloc(keylen)) == 0) ||
118 in_cache(char *domain, char *map, char *key, int keylen, char **val, argument
134 if ((c->keylen == keylen) &&
135 (memcmp(key, c->key, (size_t)keylen) == 0) &&
172 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, argument
195 (key == NULL) || (keylen == 0))
199 found_it = in_cache(domain, map, key, keylen,
299 yp_match( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument
350 __yp_match_rsvdport_cflookup( char *domain, char *map, char *key, int keylen, char **val, int *vallen, int hardlookup) argument
484 yp_match_rsvdport( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument
502 domatch(char *domain, char *map, char *key, int keylen, struct dom_binding *pdomb, struct timeval *timeoutp, char **val, int *vallen) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, argument
52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, argument
61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_template.c92 dh_getpublickey(const char *remote, keylen_t keylen, algtype_t algtype, argument
118 return (__getpublickey_cached_g(remote, keylen, algtype,
128 return (getpublickey_g(remote, keylen, algtype, pk, pklen));
H A Dgeneric_key.c77 adjust(char *keyout, char *keyin, int keylen) argument
81 int hexkeybytes = (keylen+3)/4;
102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ argument
128 * that we have at least keylen bits.
130 len = ((keylen + BASEBITS - 1) / BASEBITS);
161 (void) adjust(secret, xkey, keylen);
167 (void) adjust(public, xkey, keylen);
183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument
203 for (i = 0; i < ((keylen - len)/2)/8; i++)
221 if (keylen
240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Darcfour.c75 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument
93 if( keylen < 40/8 ) /* we want at least 40 bits */
100 karr[i] = key[i%keylen];
115 arcfour_setkey ( void *context, const byte *key, unsigned int keylen )
118 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
H A Dcamellia-glue.c75 camellia_setkey(void *c, const byte *key, unsigned keylen) argument
81 if(keylen!=16 && keylen!=24 && keylen!=32)
95 ctx->keybitlength=keylen*8;
H A Dhmac-tests.c51 const void *key, size_t keylen,
62 if (_gcry_md_setkey (hd, key, keylen))
49 check_one(int algo, const void *data, size_t datalen, const void *key, size_t keylen, const void *expect, size_t expectlen) argument
H A Dblowfish.c51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen);
497 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument
528 ((byte*)&data)[1] = key[(j+1)%keylen];
529 ((byte*)&data)[2] = key[(j+2)%keylen];
530 ((byte*)&data)[3] = key[(j+3)%keylen];
533 ((byte*)&data)[2] = key[(j+1)%keylen];
534 ((byte*)&data)[1] = key[(j+2)%keylen];
535 ((byte*)&data)[0] = key[(j+3)%keylen];
538 j = (j+4) % keylen;
591 bf_setkey (void *context, const byte *key, unsigned keylen) argument
[all...]
H A Drfc2268.c193 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument
201 int bits = keylen * 8;
213 if (keylen < 40 / 8) /* We want at least 40 bits. */
218 for (i = 0; i < keylen; i++)
221 for (i = keylen; i < 128; i++)
222 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255];
251 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument
253 return setkey_core (context, key, keylen, 1);
H A Dseed.c265 do_setkey (SEED_context *ctx, const byte *key, const unsigned keylen)
284 if (keylen != 16)
317 seed_setkey (void *context, const byte *key, const unsigned keylen)
321 int rc = do_setkey (ctx, key, keylen);
263 do_setkey(SEED_context *ctx, const byte *key, const unsigned keylen) argument
315 seed_setkey(void *context, const byte *key, const unsigned keylen) argument
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Darcfour.c74 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument
92 if( keylen < 40/8 ) /* we want at least 40 bits */
99 karr[i] = key[i%keylen];
114 arcfour_setkey ( void *context, const byte *key, unsigned int keylen )
117 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
H A Dcamellia-glue.c76 camellia_setkey(void *c, const byte *key, unsigned keylen) argument
82 if(keylen!=16 && keylen!=24 && keylen!=32)
96 ctx->keybitlength=keylen*8;
H A Drfc2268.c192 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument
200 int bits = keylen * 8;
212 if (keylen < 40 / 8) /* We want at least 40 bits. */
217 for (i = 0; i < keylen; i++)
220 for (i = keylen; i < 128; i++)
221 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255];
250 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument
252 return setkey_core (context, key, keylen, 1);
H A Dblowfish.c51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen);
469 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument
500 ((byte*)&data)[1] = key[(j+1)%keylen];
501 ((byte*)&data)[2] = key[(j+2)%keylen];
502 ((byte*)&data)[3] = key[(j+3)%keylen];
505 ((byte*)&data)[2] = key[(j+1)%keylen];
506 ((byte*)&data)[1] = key[(j+2)%keylen];
507 ((byte*)&data)[0] = key[(j+3)%keylen];
510 j = (j+4) % keylen;
563 bf_setkey (void *context, const byte *key, unsigned keylen) argument
[all...]
/osnet-11/usr/src/lib/libnsl/include/rpcsvc/
H A Dnis_dhext.h58 ushort_t keylen; member in struct:extdhkey
78 keylen_t keylen; member in struct:__anon2017
88 * The value a keylen or algtype mechanism_t element will be set
91 * then the keylen is set to 192 and the algtype to 0.
106 /* valid keylen and algtype check */
113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\
138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype,
141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
/osnet-11/usr/src/grub/grub2/grub-core/commands/i386/pc/
H A Dsendkey.c35 static int keylen = 0; variable
240 *((char *) 0x41c) = keylen + 0x1e;
337 keylen = 0;
339 for (i = 0; i < argc && keylen < 0x20; i++)
346 sendkey[keylen++] = find_ascii_code (args[i]);
347 sendkey[keylen++] = key_code;
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDH.c211 uint32_t keylen; local
226 /* keylen may be 0 if CKA_VALUE_LEN did not specify */
227 keylen = OBJ_SEC_VALUE_LEN(secretkey);
228 if (keylen > sizeof (key)) { /* check for overflow */
241 /* keylen may be modified if it was 0 or conflicts with key type */
242 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen);
248 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) {
253 OBJ_SEC_VALUE_LEN(secretkey) = keylen;
254 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); local
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Dhmac_link.c220 * keylen the length of the key
226 dst_buffer_to_hmac_md5(DST_KEY *dkey, const u_char *key, const int keylen) argument
231 int local_keylen = keylen;
234 if (dkey == NULL || key == NULL || keylen < 0)
244 if (keylen > HMAC_LEN) {
246 MD5Update(&ctx, key, keylen);
/osnet-11/usr/src/lib/libnsl/key/
H A Dgen_dhkeys.c170 keylen_t keylen, /* in */
174 const int classic_des = keylen == 192 && algtype == 0;
185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen,
258 keylen_t keylen, /* in */
263 const int classic_des = keylen == 192 && algtype == 0;
284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen,
168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument
256 __gen_common_dhkeys_g(char *xpublic, char *xsecret, keylen_t keylen, algtype_t algtype, des_block deskeys[], keynum_t keynum) argument
H A Dxcrypt.c256 keylen_t keylen, /* in */
268 const int classic_des = keylen == 192 && algtype == 0;
269 const int hexkeybytes = BITS2NIBBLES(keylen);
271 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 :
272 keylen/8;
277 if (!secret || !keylen || !passwd || !encrypted_secret)
361 * If keylen is 192 and algtype is 0, then decrypt the same way
369 int keylen, /* in */
381 const int classic_des = keylen == 192 && algtype == 0;
382 const int hexkeybytes = BITS2NIBBLES(keylen);
254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
/osnet-11/usr/src/lib/libnsl/nis/gen/
H A Dnis_misc_proc.c270 __nis_dhext_extract_pkey(netobj *no, keylen_t keylen, algtype_t algtype) argument
279 size_t binlen = (ntohs(keyent->keylen) + 7) / 8;
283 if (keylen == ntohs(keyent->keylen) &&
/osnet-11/usr/src/lib/libdns_sd/common/
H A Ddnssd_clientlib.c115 unsigned long *keylen
120 *keylen = (unsigned long) strlen(key);
125 if (p <= e && *keylen <= x[0] && !strncmp(key, (char*)x+1, *keylen))
126 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
277 unsigned long keylen, itemlen, remainder; local
278 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
304 unsigned long keylen; local
305 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen)
316 unsigned long keylen; local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dldap_key_seq.c241 unsigned int keylen; local
253 ret = decode_tagged_octetstring (&slt, 1, &keylen,
257 keylen = 0;
259 key->key_data_length[1] = keylen; /* XXX range check?? */

Completed in 86 milliseconds

123