/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_common.h | 45 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, 48 __generic_common_dhkeys(char *pkey, char *skey, int keylen,
|
H A D | generic_key.c | 77 adjust(char *keyout, char *keyin, int keylen) argument 81 int hexkeybytes = (keylen+3)/4; 102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ argument 128 * that we have at least keylen bits. 130 len = ((keylen + BASEBITS - 1) / BASEBITS); 161 (void) adjust(secret, xkey, keylen); 167 (void) adjust(public, xkey, keylen); 183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument 203 for (i = 0; i < ((keylen - len)/2)/8; i++) 221 if (keylen 240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument [all...] |
H A D | dh_template.c | 92 dh_getpublickey(const char *remote, keylen_t keylen, algtype_t algtype, argument 118 return (__getpublickey_cached_g(remote, keylen, algtype, 128 return (getpublickey_g(remote, keylen, algtype, pk, pklen));
|
/osnet-11/usr/src/lib/libnsl/yp/ |
H A D | yp_match.c | 62 int keylen; member in struct:cache 92 makenode(char *domain, char *map, int keylen, int vallen) argument 104 ((n->key = malloc(keylen)) == 0) || 118 in_cache(char *domain, char *map, char *key, int keylen, char **val, argument 134 if ((c->keylen == keylen) && 135 (memcmp(key, c->key, (size_t)keylen) == 0) && 172 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, argument 195 (key == NULL) || (keylen == 0)) 199 found_it = in_cache(domain, map, key, keylen, 299 yp_match( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument 350 __yp_match_rsvdport_cflookup( char *domain, char *map, char *key, int keylen, char **val, int *vallen, int hardlookup) argument 484 yp_match_rsvdport( char *domain, char *map, char *key, int keylen, char **val, int *vallen) argument 502 domatch(char *domain, char *map, char *key, int keylen, struct dom_binding *pdomb, struct timeval *timeoutp, char **val, int *vallen) argument [all...] |
H A D | yp_enum.c | 64 int *keylen, /* return: bytes in key */ 92 key, keylen, val, vallen); 117 int *keylen, /* return: bytes in key */ 122 return (__yp_first_cflookup(domain, map, key, keylen, val, vallen, 1)); 130 dofirst(domain, map, pdomb, timeout, key, keylen, val, vallen) 136 int *keylen; 195 *keylen = (int)resp.keydat.dsize; 60 __yp_first_cflookup( char *domain, char *map, char **key, int *keylen, char **val, int *vallen, int hardlookup) argument 113 yp_first( char *domain, char *map, char **key, int *keylen, char **val, int *vallen) argument
|
H A D | yp_update.c | 60 yp_update(char *domain, char *map, unsigned op, char *key, int keylen, argument 120 args.key.yp_buf_len = keylen;
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, argument 52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, argument 61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument 80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, argument
|
/osnet-11/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_clientlib.c | 115 unsigned long *keylen 120 *keylen = (unsigned long) strlen(key); 125 if (p <= e && *keylen <= x[0] && !strncmp(key, (char*)x+1, *keylen)) 126 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); 277 unsigned long keylen, itemlen, remainder; local 278 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); 304 unsigned long keylen; local 305 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) 316 unsigned long keylen; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/fs/zfs/ |
H A D | zfscrypt.c | 67 grub_size_t keylen; member in struct:grub_zfs_wrap_key 76 grub_size_t keylen, 80 if (!passphrase && keylen > 32) 81 keylen = 32; 82 key = grub_malloc (sizeof (*key) + keylen); 86 key->keylen = keylen; 87 grub_memcpy (key->key, key_in, keylen); 308 unsigned keylen; local 320 keylen 75 grub_zfs_add_key(grub_uint8_t *key_in, grub_size_t keylen, int passphrase) argument [all...] |
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 149 int keylen, err, r = 0; local 168 strlen(netname), &keyval, &keylen, 0); 347 keylen_t keylen, /* in */ 355 !VALID_KEYALG(keylen, algtype)) { 372 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { 427 keylen_t keylen, /* in */ 434 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); 456 dh_caps_str, keylen, algtype); 495 * new longer sizes!") DHEXT, add a ":keylen-algtype" suffix to hash on. 504 keylen_t keylen, 341 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument 419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 500 netname2hashname( const char *netname, char *hashname, int bufsiz, keylen_t keylen, algtype_t algtype) argument 533 __getpublickey_flush_g(const char *netname, keylen_t keylen, algtype_t algtype) argument 543 __getpublickey_cached_g(const char netname[], keylen_t keylen, algtype_t algtype, char *pkey, size_t pkeylen, int *from_cache) argument 609 getpublickey_g( const char *netname, int keylen, int algtype, char *pkey, size_t pkeylen) argument 624 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument [all...] |
H A D | gen_dhkeys.c | 170 keylen_t keylen, /* in */ 174 const int classic_des = keylen == 192 && algtype == 0; 185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, 258 keylen_t keylen, /* in */ 263 const int classic_des = keylen == 192 && algtype == 0; 284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, 168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument 256 __gen_common_dhkeys_g(char *xpublic, char *xsecret, keylen_t keylen, algtype_t algtype, des_block deskeys[], keynum_t keynum) argument
|
/osnet-11/usr/src/lib/libnsl/include/rpcsvc/ |
H A D | nis_dhext.h | 58 ushort_t keylen; member in struct:extdhkey 78 keylen_t keylen; member in struct:__anon2017 88 * The value a keylen or algtype mechanism_t element will be set 91 * then the keylen is set to 192 and the algtype to 0. 106 /* valid keylen and algtype check */ 113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\ 138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, 141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | arcfour.c | 74 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument 92 if( keylen < 40/8 ) /* we want at least 40 bits */ 99 karr[i] = key[i%keylen]; 114 arcfour_setkey ( void *context, const byte *key, unsigned int keylen ) 117 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
|
H A D | camellia-glue.c | 76 camellia_setkey(void *c, const byte *key, unsigned keylen) argument 82 if(keylen!=16 && keylen!=24 && keylen!=32) 96 ctx->keybitlength=keylen*8;
|
H A D | rfc2268.c | 192 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument 200 int bits = keylen * 8; 212 if (keylen < 40 / 8) /* We want at least 40 bits. */ 217 for (i = 0; i < keylen; i++) 220 for (i = keylen; i < 128; i++) 221 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255]; 250 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument 252 return setkey_core (context, key, keylen, 1);
|
/osnet-11/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_sec_mechs.c | 347 * in the keylen or algtype fields like so: 348 * keylen = 192 429 m->keylen = 192; 434 m->keylen = NIS_SEC_CF_NA_KA; 440 m->keylen = atoi(*(flds + kl_offset)); 460 * mechname/alias/keylen/algotype combo. Else return FALSE. 466 if (mp->keylen != tp->keylen) 502 tp->keylen = mp->keylen; 656 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) argument 839 __nis_keyalg2mechalias( keylen_t keylen, algtype_t algtype, char *alias, size_t alias_len) argument 895 __nis_keyalg2authtype( keylen_t keylen, algtype_t algtype, char *authtype, size_t authtype_len) argument 1083 __nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, char *buffer, size_t buflen) argument 1108 __nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype, const char *symname) argument [all...] |
H A D | nis_misc_proc.c | 270 __nis_dhext_extract_pkey(netobj *no, keylen_t keylen, algtype_t algtype) argument 279 size_t binlen = (ntohs(keyent->keylen) + 7) / 8; 283 if (keylen == ntohs(keyent->keylen) &&
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | arcfour.c | 75 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument 93 if( keylen < 40/8 ) /* we want at least 40 bits */ 100 karr[i] = key[i%keylen]; 115 arcfour_setkey ( void *context, const byte *key, unsigned int keylen ) 118 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
|
H A D | rfc2268.c | 193 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument 201 int bits = keylen * 8; 213 if (keylen < 40 / 8) /* We want at least 40 bits. */ 218 for (i = 0; i < keylen; i++) 221 for (i = keylen; i < 128; i++) 222 S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255]; 251 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument 253 return setkey_core (context, key, keylen, 1);
|
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 209 int keylen = strlen (key); local 238 md5_update (key, keylen); 240 md5_update (key, keylen); 246 md5_update (key, keylen); 248 for (i = keylen; i > 16; i -= 16) 252 for (i = keylen; i > 0; i >>= 1) 253 md5_update (key + ((i & 1) ? keylen : 0), 1); 263 md5_update (key, keylen); 271 md5_update (key, keylen); 276 md5_update (key, keylen); [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 122 keylen_t keylen, 129 if (CLASSIC_PK_DH(keylen, algtype)) 131 arg.key.keybuf3_len = keylen/4 + 1; 134 arg.keylen = keylen; 238 key_secretkey_is_set_g_ext(keylen_t keylen, algtype_t algtype, int use_ruid) argument 244 * key_secretkey_is_set_g_ext is tricky because keylen == 0 247 * routine if keylen == 0 and try the newer stuff only if that fails 249 if ((keylen == 0) && key_secretkey_is_set_ext(use_ruid)) 251 if (CLASSIC_PK_DH(keylen, algtyp 120 key_setsecret_g( char *secretkey, keylen_t keylen, algtype_t algtype, des_block userkey) argument 273 key_secretkey_is_set_g(keylen_t keylen, algtype_t algtype) argument 282 key_secretkey_is_set_g_ruid(keylen_t keylen, algtype_t algtype) argument 449 key_encryptsession_g( const char *remotename, keylen_t keylen, algtype_t algtype, des_block deskey[], keynum_t keynum ) argument 505 key_decryptsession_g( const char *remotename, keylen_t keylen, algtype_t algtype, des_block deskey[], keynum_t keynum ) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 211 uint32_t keylen; local 226 /* keylen may be 0 if CKA_VALUE_LEN did not specify */ 227 keylen = OBJ_SEC_VALUE_LEN(secretkey); 228 if (keylen > sizeof (key)) { /* check for overflow */ 241 /* keylen may be modified if it was 0 or conflicts with key type */ 242 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen); 248 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { 253 OBJ_SEC_VALUE_LEN(secretkey) = keylen; 254 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); local
|
H A D | softEC.c | 227 uint32_t keylen; local 260 keylen = DES_KEYSIZE; 263 keylen = DES2_KEYSIZE; 266 keylen = DES3_KEYSIZE; 273 keylen = (uint32_t)OBJ_SEC_VALUE_LEN(secretkey); 275 keylen = OBJ_SEC_VALUE_LEN(secretkey); 312 if (keylen == 0) 313 keylen = secret_item.len; 315 if (keylen > secret_item.len) { 319 buf = malloc(keylen); [all...] |
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | udb.c | 139 int keylen; local 178 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop"); 181 if (keylen >= sizeof(keybuf)) 217 key.size = keylen; 220 keybuf, keylen); 243 keybuf, keylen); 259 while (i == 0 && key.size == keylen && 260 memcmp(key.data, keybuf, keylen) == 0) 359 keylen = strlen(keybuf); 361 key.size = keylen; 600 int keylen; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/ |
H A D | crypto.c | 167 unsigned keylen) 169 return cipher->cipher->setkey (cipher->ctx, key, keylen); 257 const void *key, grub_size_t keylen) 272 if ( keylen > md->blocksize ) 277 grub_crypto_hash (md, helpkey, key, keylen); 280 keylen = md->mdlen; 291 grub_memcpy ( ipad, key, keylen ); 292 grub_memcpy ( opad, key, keylen ); 369 const void *key, grub_size_t keylen, 374 hnd = grub_crypto_hmac_init (md, key, keylen); 165 grub_crypto_cipher_set_key(grub_crypto_cipher_handle_t cipher, const unsigned char *key, unsigned keylen) argument 256 grub_crypto_hmac_init(const struct gcry_md_spec *md, const void *key, grub_size_t keylen) argument 368 grub_crypto_hmac_buffer(const struct gcry_md_spec *md, const void *key, grub_size_t keylen, const void *data, grub_size_t datalen, void *out) argument [all...] |