/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | hmac-md5.h | 40 const unsigned char *key, int key_len, 46 const unsigned char *key, int key_len); 51 const unsigned char *key, int key_len);
|
/illumos-gate/usr/src/lib/libldap5/include/ldap/ |
H A D | sec.h | 10 int key_len, unsigned char *digest);
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 20 int key_len, unsigned char *digest) 28 if (key_len > 64){ 32 (void) MD5Update(&tctx, key, key_len); 35 key_len = 16; 40 bcopy(key, k_ipad, key_len); 41 bcopy(key, k_opad, key_len); 19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_ht.c | 188 int key_len = handle->ht_key_size; local 190 while (key_len--) { 232 size_t h_index, key_len; local 240 key_len = handle->ht_key_size; 242 key_len = strlen(key); 244 if (key_len > handle->ht_key_size) 248 ++key_len; 251 msize = key_len + sizeof (HT_ITEM); 257 (void) memcpy(item->hi_key, key, key_len); 312 int key_len; local 376 int key_len; local [all...] |
H A D | smb_crypt.c | 81 int key_len, 99 key, key_len, &hKey); 78 smb_auth_hmac_md5(unsigned char *data, int data_len, unsigned char *key, int key_len, unsigned char *digest) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_enc.c | 134 hmac_sha1(unsigned char *key, unsigned int key_len, argument 138 (void) HMAC(EVP_sha1(), key, key_len, data, data_len, mac, &mac_len); local 143 hmac_sha1_vector(unsigned char *key, unsigned int key_len, size_t num_elem, argument 161 hmac_sha1(key, key_len, buf, buf_len, mac); 168 sha1_prf(unsigned char *key, unsigned int key_len, argument 193 hmac_sha1_vector(key, key_len, 4, addr, len, &buf[pos]); 196 hmac_sha1_vector(key, key_len, 4, addr, len, hash); 232 rc4(uint8_t *buf, size_t len, uint8_t *key, size_t key_len) argument 236 RC4_set_key(&k, key_len, key); 241 hmac_md5_vector(uint8_t *key, size_t key_len, size_ argument 265 hmac_md5(uint8_t *key, size_t key_len, uint8_t *data, size_t data_len, uint8_t *mac) argument 269 (void) HMAC(EVP_md5(), key, key_len, data, data_len, mac, &mac_len); local [all...] |
H A D | driver_wifi.c | 175 * @key_len: length of the key buffer in octets (WEP: 5 or 13, 193 uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len) 224 " set_tx=%d seq_len=%d seq=%d key_len=%d", 226 seq_len, *(uint64_t *)(uintptr_t)seq, key_len); 236 *(uint64_t *)(uintptr_t)seq, key_idx, key, key_len); 191 wpa_driver_wifi_set_key(dladm_handle_t handle, datalink_id_t linkid, wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx, uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len) argument
|
/illumos-gate/usr/src/uts/common/ipp/ipgpc/ |
H A D | trie.c | 73 * t_split(c_node, pos, key_len) 82 * (note: we assume a key_len = n (where in the real world n = 16 | 32), 83 * and a "key" in this example is actaully some value of key_len n that 85 * For example: key = 1011 with key_len = 8, would actaully be the key:mask 121 t_split(node_t **c_node, uint8_t pos, uint8_t key_len) argument 141 bit = EXTRACTBIT(nodep->val, pos, key_len); 162 (nodep->zero->pos - i), key_len), 163 key_len); 165 (nodep->zero->pos - i), 1, key_len); 188 (nodep->one->pos - i), key_len), 221 uint8_t key_len = (uint8_t)tid->key_len; local [all...] |
/illumos-gate/usr/src/cmd/lp/cmd/lpadmin/ |
H A D | pick_opts.c | 52 int key_len; local 84 key_len = strcspn(*new_opts, "="); 90 if ((strncmp(old_opt, *new_opts, key_len + 1)) == 0) {
|
/illumos-gate/usr/src/cmd/isns/isnsd/ |
H A D | isns_func.h | 44 size_t key_len; member in struct:conn_arg::__anon666
|
H A D | func.c | 143 size_t key_len; local 145 key = pdu_get_key(pdu, &key_len); 148 conn->in_packet.key_len = key_len; 310 * key_len - the length of the key attributes. 320 uint16_t key_len 357 NEXT_TLV(key, key_len); 358 if (key_len <= 8 || 381 NEXT_TLV(key, key_len); 382 if (key_len < 479 size_t key_len = conn->in_packet.key_len; local 623 uint16_t key_len = conn->in_packet.key_len; local 840 uint16_t key_len = conn->in_packet.key_len; local 1011 uint16_t key_len = conn->in_packet.key_len; local 1269 uint16_t key_len = conn->in_packet.key_len; local 1327 uint16_t key_len = conn->in_packet.key_len; local 1437 uint16_t key_len = conn->in_packet.key_len; local 1675 uint16_t key_len = conn->in_packet.key_len; local 1876 uint16_t key_len = conn->in_packet.key_len; local 1995 uint16_t key_len = conn->in_packet.key_len; local [all...] |
H A D | pdu.c | 519 size_t *key_len 527 *key_len = 0; 551 *key_len += (8 + tlv->attr_len); 557 if (*key_len >= 8) {
|
/illumos-gate/usr/src/cmd/fs.d/autofs/ |
H A D | ns_ldap.c | 626 int key_len, contents_len; local 651 key_len = 0; 688 key_len = strlen(key); 692 " key_len=[ %d ]\n", 693 key, key_len); 698 if (key_len >= LINESZ || contents_len >= LINESZ) 700 if (key_len < 2 || contents_len < 2) 710 (void) strncpy(dir, key, key_len); 711 dir[key_len] = '\0'; 785 int key_len; local 900 int key_len; local [all...] |
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 198 size_t key_len; local 253 key_len = (uint8_t)(strlen(key) + (minor >= 'a' ? 1 : 0)); 258 * type, so cap key_len at the actual maximum supported 261 key_len = strlen(key); 262 if (key_len > 72) 263 key_len = 72; 264 key_len++; /* include the NUL */ 270 (uint8_t *)key, key_len); 272 Blowfish_expand0state(&state, (uint8_t *)key, key_len);
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_find.c | 222 uint16_t key_len; local 251 rc = smbsr_decode_data(sr, "%Abw", sr, &pn->pn_path, &type, &key_len); 266 if ((sattr == FILE_ATTRIBUTE_VOLUME) && (key_len != 21)) { 270 if (key_len >= 21) { 288 if ((key_len != 0) && (key_len != 21)) 291 find_first = (key_len == 0); 413 uint16_t key_len; local 431 rc = smbsr_decode_data(sr, "%Abw", sr, &pn->pn_path, &type, &key_len); 435 if ((key_len ! 566 uint16_t key_len; local [all...] |
H A D | smb_sign_kcf.c | 123 uint8_t *key, size_t key_len) 131 ckey.ck_length = key_len * 8; /* in bits */ 122 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech, uint8_t *key, size_t key_len) argument
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 121 CK_KEY_TYPE key_type, CK_ULONG key_len, CK_FLAGS key_flags, 140 CK_ULONG key_len, void **rawkey, size_t *rawkey_len);
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | md5.c | 368 int key_len) 379 if (key_len > 64) { 384 _sasl_MD5Update(&tctx, key, key_len); 388 key_len = 16; 405 MD5_memcpy( k_ipad, key, key_len); 406 MD5_memcpy( k_opad, key, key_len); 438 int key_len) 443 _sasl_hmac_md5_init(&hmac, key, key_len); 476 void _sasl_hmac_md5(text, text_len, key, key_len, digest) 480 int key_len; /* lengt 366 _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, const unsigned char *key, int key_len) argument 436 _sasl_hmac_md5_precalc(HMAC_MD5_STATE *state, const unsigned char *key, int key_len) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 71 unsigned int key_len = 0; local 77 key_len += length; 79 key_len += length; 83 key_len += length; 85 key_len += length; 87 ret = asn1_make_sequence(buf, key_len, &length); checkerr; 88 key_len += length; 89 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 1, key_len, &length); checkerr; 90 key_len += length; 92 sum += key_len; [all...] |
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11SUNWExtensions.c | 379 CK_KEY_TYPE key_type, CK_ULONG key_len, CK_FLAGS key_flags, 417 if (key_len == fixed_size_secrets[i].len) { 418 key_len = 0; 420 if (key_len == 0) { 470 if (key_len != 0) { 473 template[i].pValue = &key_len; 474 template[i].ulValueLen = sizeof (key_len); 564 CK_ULONG key_len, void **rawkey, size_t *rawkey_len) 570 salt, salt_len, CK_PKCS5_PBKD2_ITERATIONS, key_type, key_len, 0, 377 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations, CK_KEY_TYPE key_type, CK_ULONG key_len, CK_FLAGS key_flags, CK_OBJECT_HANDLE_PTR obj) argument 562 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase, size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type, CK_ULONG key_len, void **rawkey, size_t *rawkey_len) argument
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 285 int len, i, key_len; local 311 key_len = i + 1; 318 len = b64_ntop(key, key_len, bp, buff_len - (bp - buff)); 353 int key_len, len; local 374 key_len = b64_pton((char *)tmp, key, HMAC_LEN+1); /*%< see above */ 377 if (dst_buffer_to_hmac_md5(dkey, key, key_len) < 0) {
|
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_sign_pkcs.c | 110 uint8_t *key, size_t key_len) 120 key, key_len, &hkey); 109 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech, uint8_t *key, size_t key_len) argument
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | ecc.c | 1179 ulong_t key_len; local 1210 key_len = DES_KEYSIZE; 1213 key_len = DES2_KEYSIZE; 1216 key_len = DES3_KEYSIZE; 1222 CKA_VALUE_LEN, &key_len)) != CRYPTO_SUCCESS) { 1227 key_len = 0; 1277 if (key_len == 0) 1278 key_len = secret_item.len; 1280 if (key_len > secret_item.len) { 1284 if (key_len > out_attr [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | ntlm.c | 317 const uchar_t *key, size_t key_len, 326 if (key_len > 64) 327 key_len = 64; 343 bcopy(key, k_ipad, key_len); 344 bcopy(key, k_opad, key_len); 316 HMACT64(uchar_t *digest, const uchar_t *key, size_t key_len, const uchar_t *data, size_t data_len) argument
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelKeys.c | 144 kernel_object_t *basekey_p, ulong_t *key_len) 162 *key_len = 8; 166 *key_len = 24; 173 get_ulong_attr_from_template(key_len, 197 *key_len = tmp.ulValueLen; 199 *key_len = EC_MAX_VALUE_LEN; 256 ulong_t key_len = 0; local 264 NULL, &key_len); 268 if ((key_buf = malloc(key_len)) == NULL) { 283 newTemplate[ulCount].ulValueLen = key_len; 142 get_key_len_from_template(CK_MECHANISM_PTR pMechanism, CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, kernel_object_t *basekey_p, ulong_t *key_len) argument 2189 ulong_t key_len = 0; local [all...] |