Searched refs:keylen (Results 1 - 25 of 86) sorted by relevance

1234

/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_common.h45 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot,
48 __generic_common_dhkeys(char *pkey, char *skey, int keylen,
H A Dgeneric_key.c77 adjust(char *keyout, char *keyin, int keylen) argument
81 int hexkeybytes = (keylen+3)/4;
102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ argument
128 * that we have at least keylen bits.
130 len = ((keylen + BASEBITS - 1) / BASEBITS);
161 (void) adjust(secret, xkey, keylen);
167 (void) adjust(public, xkey, keylen);
183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument
203 for (i = 0; i < ((keylen - len)/2)/8; i++)
221 if (keylen
240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
[all...]
H A Ddh_template.c92 dh_getpublickey(const char *remote, keylen_t keylen, algtype_t algtype, argument
118 return (__getpublickey_cached_g(remote, keylen, algtype,
128 return (getpublickey_g(remote, keylen, algtype, pk, pklen));
/osnet-11/usr/src/lib/libnsl/yp/
H A Dyp_match.c62 int keylen; member in struct:cache
92 makenode(char *domain, char *map, int keylen, int vallen) argument
104 ((n->key = malloc(keylen)) == 0) ||
118 in_cache(char *domain, char *map, char *key, int keylen, char **val, argument
134 if ((c->keylen == keylen) &&
135 (memcmp(key, c->key, (size_t)keylen) == 0) &&
172 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, argument
195 (key == NULL) || (keylen == 0))
199 found_it = in_cache(domain, map, key, keylen,
299 yp_match( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument
350 __yp_match_rsvdport_cflookup( char *domain, char *map, char *key, int keylen, char **val, int *vallen, int hardlookup) argument
484 yp_match_rsvdport( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument
502 domatch(char *domain, char *map, char *key, int keylen, struct dom_binding *pdomb, struct timeval *timeoutp, char **val, int *vallen) argument
[all...]
H A Dyp_enum.c64 int *keylen, /* return: bytes in key */
92 key, keylen, val, vallen);
117 int *keylen, /* return: bytes in key */
122 return (__yp_first_cflookup(domain, map, key, keylen, val, vallen, 1));
130 dofirst(domain, map, pdomb, timeout, key, keylen, val, vallen)
136 int *keylen;
195 *keylen = (int)resp.keydat.dsize;
60 __yp_first_cflookup( char *domain, char *map, char **key, int *keylen, char **val, int *vallen, int hardlookup) argument
113 yp_first( char *domain, char *map, char **key, int *keylen, char **val, int *vallen) argument
H A Dyp_update.c60 yp_update(char *domain, char *map, unsigned op, char *key, int keylen, argument
120 args.key.yp_buf_len = keylen;
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, argument
52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, argument
61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
/osnet-11/usr/src/lib/libdns_sd/common/
H A Ddnssd_clientlib.c115 unsigned long *keylen
120 *keylen = (unsigned long) strlen(key);
125 if (p <= e && *keylen <= x[0] && !strncmp(key, (char*)x+1, *keylen))
126 if (*keylen == x[0] || x[1+*keylen] == '=') return(x);
277 unsigned long keylen, itemlen, remainder; local
278 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen);
304 unsigned long keylen; local
305 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen)
316 unsigned long keylen; local
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/fs/zfs/
H A Dzfscrypt.c67 grub_size_t keylen; member in struct:grub_zfs_wrap_key
76 grub_size_t keylen,
80 if (!passphrase && keylen > 32)
81 keylen = 32;
82 key = grub_malloc (sizeof (*key) + keylen);
86 key->keylen = keylen;
87 grub_memcpy (key->key, key_in, keylen);
308 unsigned keylen; local
320 keylen
75 grub_zfs_add_key(grub_uint8_t *key_in, grub_size_t keylen, int passphrase) argument
[all...]
/osnet-11/usr/src/lib/libnsl/key/
H A Dpublickey.c149 int keylen, err, r = 0; local
168 strlen(netname), &keyval, &keylen, 0);
347 keylen_t keylen, /* in */
355 !VALID_KEYALG(keylen, algtype)) {
372 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) {
427 keylen_t keylen, /* in */
434 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype);
456 dh_caps_str, keylen, algtype);
495 * new longer sizes!") DHEXT, add a ":keylen-algtype" suffix to hash on.
504 keylen_t keylen,
341 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument
419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument
500 netname2hashname( const char *netname, char *hashname, int bufsiz, keylen_t keylen, algtype_t algtype) argument
533 __getpublickey_flush_g(const char *netname, keylen_t keylen, algtype_t algtype) argument
543 __getpublickey_cached_g(const char netname[], keylen_t keylen, algtype_t algtype, char *pkey, size_t pkeylen, int *from_cache) argument
609 getpublickey_g( const char *netname, int keylen, int algtype, char *pkey, size_t pkeylen) argument
624 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument
[all...]
H A Dgen_dhkeys.c170 keylen_t keylen, /* in */
174 const int classic_des = keylen == 192 && algtype == 0;
185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen,
258 keylen_t keylen, /* in */
263 const int classic_des = keylen == 192 && algtype == 0;
284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen,
168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument
256 __gen_common_dhkeys_g(char *xpublic, char *xsecret, keylen_t keylen, algtype_t algtype, des_block deskeys[], keynum_t keynum) argument
/osnet-11/usr/src/lib/libnsl/include/rpcsvc/
H A Dnis_dhext.h58 ushort_t keylen; member in struct:extdhkey
78 keylen_t keylen; member in struct:__anon2017
88 * The value a keylen or algtype mechanism_t element will be set
91 * then the keylen is set to 192 and the algtype to 0.
106 /* valid keylen and algtype check */
113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\
138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype,
141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Darcfour.c74 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument
92 if( keylen < 40/8 ) /* we want at least 40 bits */
99 karr[i] = key[i%keylen];
114 arcfour_setkey ( void *context, const byte *key, unsigned int keylen )
117 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
H A Dcamellia-glue.c76 camellia_setkey(void *c, const byte *key, unsigned keylen) argument
82 if(keylen!=16 && keylen!=24 && keylen!=32)
96 ctx->keybitlength=keylen*8;
H A Drfc2268.c192 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument
200 int bits = keylen * 8;
212 if (keylen < 40 / 8) /* We want at least 40 bits. */
217 for (i = 0; i < keylen; i++)
220 for (i = keylen; i < 128; i++)
221 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255];
250 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument
252 return setkey_core (context, key, keylen, 1);
/osnet-11/usr/src/lib/libnsl/nis/gen/
H A Dnis_sec_mechs.c347 * in the keylen or algtype fields like so:
348 * keylen = 192
429 m->keylen = 192;
434 m->keylen = NIS_SEC_CF_NA_KA;
440 m->keylen = atoi(*(flds + kl_offset));
460 * mechname/alias/keylen/algotype combo. Else return FALSE.
466 if (mp->keylen != tp->keylen)
502 tp->keylen = mp->keylen;
656 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) argument
839 __nis_keyalg2mechalias( keylen_t keylen, algtype_t algtype, char *alias, size_t alias_len) argument
895 __nis_keyalg2authtype( keylen_t keylen, algtype_t algtype, char *authtype, size_t authtype_len) argument
1083 __nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, char *buffer, size_t buflen) argument
1108 __nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype, const char *symname) argument
[all...]
H A Dnis_misc_proc.c270 __nis_dhext_extract_pkey(netobj *no, keylen_t keylen, algtype_t algtype) argument
279 size_t binlen = (ntohs(keyent->keylen) + 7) / 8;
283 if (keylen == ntohs(keyent->keylen) &&
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Darcfour.c75 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument
93 if( keylen < 40/8 ) /* we want at least 40 bits */
100 karr[i] = key[i%keylen];
115 arcfour_setkey ( void *context, const byte *key, unsigned int keylen )
118 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
H A Drfc2268.c193 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument
201 int bits = keylen * 8;
213 if (keylen < 40 / 8) /* We want at least 40 bits. */
218 for (i = 0; i < keylen; i++)
221 for (i = keylen; i < 128; i++)
222 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255];
251 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument
253 return setkey_core (context, key, keylen, 1);
/osnet-11/usr/src/grub/grub-0.97/stage2/
H A Dmd5.c209 int keylen = strlen (key); local
238 md5_update (key, keylen);
240 md5_update (key, keylen);
246 md5_update (key, keylen);
248 for (i = keylen; i > 16; i -= 16)
252 for (i = keylen; i > 0; i >>= 1)
253 md5_update (key + ((i & 1) ? keylen : 0), 1);
263 md5_update (key, keylen);
271 md5_update (key, keylen);
276 md5_update (key, keylen);
[all...]
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dkey_call.c122 keylen_t keylen,
129 if (CLASSIC_PK_DH(keylen, algtype))
131 arg.key.keybuf3_len = keylen/4 + 1;
134 arg.keylen = keylen;
238 key_secretkey_is_set_g_ext(keylen_t keylen, algtype_t algtype, int use_ruid) argument
244 * key_secretkey_is_set_g_ext is tricky because keylen == 0
247 * routine if keylen == 0 and try the newer stuff only if that fails
249 if ((keylen == 0) && key_secretkey_is_set_ext(use_ruid))
251 if (CLASSIC_PK_DH(keylen, algtyp
120 key_setsecret_g( char *secretkey, keylen_t keylen, algtype_t algtype, des_block userkey) argument
273 key_secretkey_is_set_g(keylen_t keylen, algtype_t algtype) argument
282 key_secretkey_is_set_g_ruid(keylen_t keylen, algtype_t algtype) argument
449 key_encryptsession_g( const char *remotename, keylen_t keylen, algtype_t algtype, des_block deskey[], keynum_t keynum ) argument
505 key_decryptsession_g( const char *remotename, keylen_t keylen, algtype_t algtype, des_block deskey[], keynum_t keynum ) argument
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDH.c211 uint32_t keylen; local
226 /* keylen may be 0 if CKA_VALUE_LEN did not specify */
227 keylen = OBJ_SEC_VALUE_LEN(secretkey);
228 if (keylen > sizeof (key)) { /* check for overflow */
241 /* keylen may be modified if it was 0 or conflicts with key type */
242 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen);
248 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) {
253 OBJ_SEC_VALUE_LEN(secretkey) = keylen;
254 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); local
H A DsoftEC.c227 uint32_t keylen; local
260 keylen = DES_KEYSIZE;
263 keylen = DES2_KEYSIZE;
266 keylen = DES3_KEYSIZE;
273 keylen = (uint32_t)OBJ_SEC_VALUE_LEN(secretkey);
275 keylen = OBJ_SEC_VALUE_LEN(secretkey);
312 if (keylen == 0)
313 keylen = secret_item.len;
315 if (keylen > secret_item.len) {
319 buf = malloc(keylen);
[all...]
/osnet-11/usr/src/cmd/sendmail/src/
H A Dudb.c139 int keylen; local
178 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop");
181 if (keylen >= sizeof(keybuf))
217 key.size = keylen;
220 keybuf, keylen);
243 keybuf, keylen);
259 while (i == 0 && key.size == keylen &&
260 memcmp(key.data, keybuf, keylen) == 0)
359 keylen = strlen(keybuf);
361 key.size = keylen;
600 int keylen; local
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/
H A Dcrypto.c167 unsigned keylen)
169 return cipher->cipher->setkey (cipher->ctx, key, keylen);
257 const void *key, grub_size_t keylen)
272 if ( keylen > md->blocksize )
277 grub_crypto_hash (md, helpkey, key, keylen);
280 keylen = md->mdlen;
291 grub_memcpy ( ipad, key, keylen );
292 grub_memcpy ( opad, key, keylen );
369 const void *key, grub_size_t keylen,
374 hnd = grub_crypto_hmac_init (md, key, keylen);
165 grub_crypto_cipher_set_key(grub_crypto_cipher_handle_t cipher, const unsigned char *key, unsigned keylen) argument
256 grub_crypto_hmac_init(const struct gcry_md_spec *md, const void *key, grub_size_t keylen) argument
368 grub_crypto_hmac_buffer(const struct gcry_md_spec *md, const void *key, grub_size_t keylen, const void *data, grub_size_t datalen, void *out) argument
[all...]

Completed in 62 milliseconds

1234