/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | aes_test.c | 49 uint32_t keysize; member in struct:test_data 87 (void) printf("Test #%d [AES%d] ", i, td[i].keysize * 8); 88 getxdata(key, td[i].key, td[i].keysize); 89 aes_key(ah, key, td[i].keysize);
|
H A D | cbc.h | 51 extern void cbc_makehandle(cbc_handle_t *ch, void *cookie, uint32_t keysize,
|
H A D | cbc.c | 127 cbc_makehandle(cbc_handle_t *ch, void *cookie, uint32_t keysize, argument 133 ch->keylen = keysize;
|
H A D | aes.c | 1166 aes_keycheck(const uint8_t *key, uint32_t keysize) argument 1174 switch (keysize) { 1191 aes_key(void *cookie, const uint8_t *key, uint32_t keysize) argument 1202 keybits = keysize * 8;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/ickey/ |
H A D | ickey.c | 59 const int keysize; /* size of hex string representation */ member in struct:keylist 198 assert((k->keysize % 2) == 0); 199 wkio.wk_keysize = k->keysize / 2; 258 if (len != k->keysize) { 261 k->keysize, len);
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | support.c | 98 dst_s_id_calc(const u_char *key, const int keysize) argument 102 int size = keysize; 104 if (!key || (keysize <= 0))
|
/illumos-gate/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_clientlib.c | 211 unsigned long keysize, keyvalsize; local 214 keysize = (unsigned long)(k - key); 215 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); 216 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); 233 memcpy(p, key, keysize); 234 p += keysize;
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pkcs11slot.c | 144 size_t keysize, keylength; local 158 keysize = krb5_enctypes_list[i].enc->keybytes;
|
/illumos-gate/usr/src/common/crypto/des/ |
H A D | des_impl.c | 719 uint8_t keysize = DES3_KEYSIZE; local 727 keysize = DES2_KEYSIZE; 732 bcopy(key, aligned_key, keysize); 770 bcopy(currentkey, corrected_key, keysize); 852 uint_t keysize, i, j; local 856 keysize = DES_KEYSIZE; 861 keysize = DES2_KEYSIZE; 866 keysize = DES3_KEYSIZE; 878 for (i = 0, j = 0; j < keysize; i++, j += 8) { 885 for (i = 0, j = 0; j < keysize; [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 429 CK_ULONG keysize = 0; local 483 (char **)&pkeydata, (size_t *)&keysize, 0, B_FALSE); 487 (size_t *)&keysize); 491 (size_t *)&keysize, 0, 495 if (status != 0 || keysize == 0L) { 809 keysize, &key); 862 template[nattr].ulValueLen = keysize; 883 (size_t)keysize, (void *)salt, sizeof (salt), iterations, 957 bzero(pkeydata, keysize);
|
/illumos-gate/usr/src/cmd/fs.d/nfs/nfslog/ |
H A D | dbtab.c | 95 static int store_record(struct db_list *dbp, void *keyaddr, int keysize, 97 static void *fetch_record(struct db_list *dbp, void *keyaddr, int keysize, 99 static int delete_record(struct db_list *dbp, void *keyaddr, int keysize, 101 static int db_update_fhrec(struct db_list *dbp, void *keyaddr, int keysize, 103 static int db_update_linkinfo(struct db_list *dbp, void *keyaddr, int keysize, 461 store_record(struct db_list *dbp, void *keyaddr, int keysize, void *dataaddr, argument 471 key.dsize = keysize; 514 fetch_record(struct db_list *dbp, void *keyaddr, int keysize, void *dataaddr, argument 524 key.dsize = keysize; 572 delete_record(struct db_list *dbp, void *keyaddr, int keysize, cha argument 617 db_update_fhrec(struct db_list *dbp, void *keyaddr, int keysize, fhlist_ent *fhrecp, char *str) argument 635 db_update_linkinfo(struct db_list *dbp, void *keyaddr, int keysize, linkinfo_ent *linkp, char *str) argument [all...] |
/illumos-gate/usr/src/cmd/unpack/ |
H A D | unpack.c | 496 int keysize, i, *t; local 511 for (keysize = getwdsize(); keysize--; ) {
|
/illumos-gate/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 384 CK_ULONG keysize; local 667 keysize = 0; 670 keysize = 16; /* 128 bits */ 681 sizeof (salt), iterations, keytype, keysize,
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | derive.c | 105 krb5_create_derived_keyblock(int keysize) argument 115 key->length = keysize;
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | udb.c | 857 int keysize = strlen(name); local 859 if (keysize > sizeof(keybuf) - 1) 860 keysize = sizeof(keybuf) - 1; 861 memmove(keybuf, name, keysize); 862 keybuf[keysize] = '\0';
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | nss_dbdefs.c | 876 nssuint_t off, *uptr, keysize; local 886 /* keysize is length of the key area */ 887 keysize = pbuf->data_off - pbuf->key_off; 1029 if (*uptr >= keysize) 1036 if (*uptr >= keysize)
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 631 CK_ULONG keysize = OBJ_SEC_VALUE_LEN(derived_key); local 723 c = PBE_CEIL(keysize, hashSize); 822 (void) memcpy(keybuf, A, keysize);
|
/illumos-gate/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_print.c | 618 int mode, err, keysize; local 638 keysize = ns_get16(rdata); rdata += NS_INT16SZ; 639 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
|
/illumos-gate/usr/src/common/crypto/aes/amd64/ |
H A D | aes_intel.s | 575 mov $-2, %rax / keysize is invalid 577 xor %rax, %rax / a key pointer is NULL or invalid keysize
|
/illumos-gate/usr/src/common/crypto/aes/ |
H A D | aes_impl.c | 1572 uint_t keysize, i, j; local 1595 keysize = CRYPTO_BITS2BYTES(keyBits); 1608 for (i = 0, j = 0; j < keysize; i++, j += 8) { 1613 bcopy(cipherKey, keyarr.ka32, keysize); 1617 for (i = 0, j = 0; j < keysize; i++, j += 4) {
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/dns-sd/ |
H A D | dns-sd.c | 355 static unsigned int keytag(unsigned char *key, unsigned int keysize) argument 360 for (ac = 0, i = 0; i < keysize; ++i)
|
/illumos-gate/usr/src/lib/libsqlite/src/ |
H A D | vdbe.c | 2601 int keysize; local 2602 res = sqliteBtreeKeySize(pC->pCursor,&keysize)!=0 || keysize==0;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | DNSCommon.c | 258 mDNSlocal mDNSu32 keytag(mDNSu8 *key, mDNSu32 keysize) argument 263 for (ac = 0, i = 0; i < keysize; ++i)
|