Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 107) sorted by relevance

12345

/illumos-gate/usr/src/lib/libnsl/yp/
H A Dyp_match.c65 int keylen; member
95 makenode(char *domain, char *map, int keylen, int vallen) in makenode() argument
107 ((n->key = malloc(keylen)) == 0) || in makenode()
121 in_cache(char *domain, char *map, char *key, int keylen, char **val, in in_cache() argument
137 if ((c->keylen == keylen) && in in_cache()
138 (memcmp(key, c->key, (size_t)keylen) == 0) && in in_cache()
175 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, in __yp_match_cflookup() argument
198 (key == NULL) || (keylen == 0)) in __yp_match_cflookup()
202 found_it = in_cache(domain, map, key, keylen, &my_val, &my_vallen); in __yp_match_cflookup()
226 reason = domatch(domain, map, key, keylen, pdomb, in __yp_match_cflookup()
[all …]
/illumos-gate/usr/src/cmd/keyserv/
H A Dkeyserv_cache.h50 #define KEYLEN(keylen) (((keylen)+7)/8) argument
53 #define DHKEYALLOC(keylen) ALIGN4(sizeof (struct dhkey) + KEYLEN(keylen)) argument
66 #define CACHEKEY3_LIST_SIZE(keylen) (sizeof (struct cachekey3_list) + \ argument
68 2*(ALIGN4(2*KEYLEN(keylen)+1)) + \
71 int create_cache_file(keylen_t keylen, algtype_t algtype,
74 int cache_insert(keylen_t keylen, algtype_t algtype,
80 struct cachekey3_list *cache_retrieve(keylen_t keylen, algtype_t algtype,
84 int cache_remove(keylen_t keylen, algtype_t algtype,
88 void print_cache(keylen_t keylen, algtype_t algtype);
H A Dkeyserv_cache.c42 keylen_t keylen; member
73 #define SKCK_LEN(keylen) ALIGN8(sizeof (struct skck) + KEYLEN(keylen)) argument
75 #define CACHEKEY_RECLEN(keylen) ALIGN8(sizeof (struct cachekey_disklist) - 1 + \ argument
76 KEYLEN(keylen) + SKCK_LEN(keylen))
85 keylen_t keylen; /* in bits */ member
102 static struct cachekey_header *create_cache_file_ch(keylen_t keylen,
124 static struct cachekey *get_cache_header(keylen_t keylen,
199 create_cache_file_ch(keylen_t keylen, algtype_t algtype, int sizespec) in create_cache_file_ch() argument
212 keylen, algtype) > sizeof (filename)) { in create_cache_file_ch()
214 "error constructing file name for mech %d-%d", keylen, algtype); in create_cache_file_ch()
[all …]
H A Dchkey.c165 if (!xencrypt_g(slist[mcount], CURMECH->keylen, in encryptkeys()
240 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getpublics()
246 if (!getpublickey_g(netname, CURMECH->keylen, in getpublics()
303 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in makenewkeys()
316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys()
499 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getsecrets()
508 if (!getsecretkey_g(netname, CURMECH->keylen, in getsecrets()
530 CURMECH->keylen, in getsecrets()
656 keylogin(keylen_t keylen, algtype_t algtype) in keylogin() argument
662 if (keylen == CURMECH->keylen && in keylogin()
[all …]
H A Dsetkey.c154 keylen_t keylen; member
173 *kpp != NULL && (*kpp)->keylen != k; in getkeylen()
192 kp->keylen = k; in appendkeylist()
537 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) { in storesecretkey3()
585 ("storeotherrootkeys key %d", kp->keylen)); in storeotherrootkeys()
589 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys()
595 kp->keylen, ap->algtype, in storeotherrootkeys()
611 skey.keylen = kp->keylen; in storeotherrootkeys()
613 if (CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys()
620 if (!CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys()
[all …]
H A Dkeylogin.c112 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument
157 hexkeybytes = ((keylen + 7) / 8) * 2; in write_rootkey()
172 if (keylen == 192) { in write_rootkey()
199 if (keylen == 192) in write_rootkey()
211 if (keylen == 192) in write_rootkey()
367 if (getsecretkey_g(fullname, mechlist[i]->keylen, in main()
369 (((mechlist[i]->keylen / 7) + in main()
387 mechlist[i]->keylen, NULL, 0, in main()
399 mechlist[i]->keylen, in main()
/illumos-gate/usr/src/lib/libnsl/key/
H A Dpublickey.c152 int keylen, err, r = 0; in getkeys_nis() local
171 strlen(netname), &keyval, &keylen, 0); in getkeys_nis()
350 keylen_t keylen, /* in */ in extract_secret_g() argument
357 !VALID_KEYALG(keylen, algtype)) { in extract_secret_g()
374 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { in extract_secret_g()
429 keylen_t keylen, /* in */ in getkeys_ldap_g() argument
436 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in getkeys_ldap_g()
458 dh_caps_str, keylen, algtype); in getkeys_ldap_g()
506 keylen_t keylen, in netname2hashname() argument
509 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in netname2hashname()
[all …]
H A Dgen_dhkeys.c168 keylen_t keylen, /* in */ in __gen_dhkeys_g() argument
172 const int classic_des = keylen == 192 && algtype == 0; in __gen_dhkeys_g()
183 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_dhkeys_g()
256 keylen_t keylen, /* in */ in __gen_common_dhkeys_g() argument
261 const int classic_des = keylen == 192 && algtype == 0; in __gen_common_dhkeys_g()
282 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_common_dhkeys_g()
H A Dxcrypt.c242 keylen_t keylen, /* in */ in xencrypt_g() argument
253 const int classic_des = keylen == 192 && algtype == 0; in xencrypt_g()
254 const int hexkeybytes = BITS2NIBBLES(keylen); in xencrypt_g()
256 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 : in xencrypt_g()
257 keylen/8; in xencrypt_g()
262 if (!secret || !keylen || !passwd || !encrypted_secret) in xencrypt_g()
347 int keylen, /* in */ in xdecrypt_g() argument
358 const int classic_des = keylen == 192 && algtype == 0; in xdecrypt_g()
359 const int hexkeybytes = BITS2NIBBLES(keylen); in xdecrypt_g()
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Dgeneric_key.c75 adjust(char *keyout, char *keyin, int keylen) in adjust() argument
79 int hexkeybytes = (keylen+3)/4; in adjust()
100 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ in __generic_gen_dhkeys() argument
128 len = ((keylen + BASEBITS - 1) / BASEBITS); in __generic_gen_dhkeys()
159 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys()
165 (void) adjust(public, xkey, keylen); in __generic_gen_dhkeys()
181 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) in extractdeskeys() argument
201 for (i = 0; i < ((keylen - len)/2)/8; i++) in extractdeskeys()
219 if (keylen == 192) /* Old broken way for compatibility */ in extractdeskeys()
240 int keylen, /* All the keys have this many bits */ in __generic_common_dhkeys() argument
[all …]
/illumos-gate/usr/src/contrib/mDNSResponder/mDNSShared/
H A Ddnssd_clientlib.c72 unsigned long *keylen in InternalTXTRecordSearch() argument
77 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch()
82 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch()
83 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch()
248 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local
249 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue()
275 unsigned long keylen; in TXTRecordContainsKey() local
276 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey()
287 unsigned long keylen; in TXTRecordGetValuePtr() local
288 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr()
[all …]
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Dkey_call.c120 keylen_t keylen, in key_setsecret_g() argument
127 if (CLASSIC_PK_DH(keylen, algtype)) in key_setsecret_g()
129 arg.key.keybuf3_len = keylen/4 + 1; in key_setsecret_g()
132 arg.keylen = keylen; in key_setsecret_g()
236 key_secretkey_is_set_g_ext(keylen_t keylen, algtype_t algtype, int use_ruid) in key_secretkey_is_set_g_ext() argument
247 if ((keylen == 0) && key_secretkey_is_set_ext(use_ruid)) in key_secretkey_is_set_g_ext()
249 if (CLASSIC_PK_DH(keylen, algtype)) in key_secretkey_is_set_g_ext()
251 arg.keylen = keylen; in key_secretkey_is_set_g_ext()
271 key_secretkey_is_set_g(keylen_t keylen, algtype_t algtype) in key_secretkey_is_set_g() argument
273 return (key_secretkey_is_set_g_ext(keylen, algtype, 0)); in key_secretkey_is_set_g()
[all …]
/illumos-gate/usr/src/uts/common/io/
H A Dsuntpi.c146 size_t keylen; in tpi_findprov() local
155 key = tpi_makekey(WR(q), &keylen); in tpi_findprov()
157 if (keylen == 0) { in tpi_findprov()
168 if ((*tpp)->tpi_keylen == keylen && in tpi_findprov()
169 bcmp((*tpp)->tpi_key, key, keylen) == 0) { in tpi_findprov()
179 (*tpp)->tpi_key = kmem_alloc(keylen, KM_SLEEP); in tpi_findprov()
180 bcopy(key, (*tpp)->tpi_key, keylen); in tpi_findprov()
181 (*tpp)->tpi_keylen = keylen; in tpi_findprov()
/illumos-gate/usr/src/lib/libnsl/nis/gen/
H A Dnis_sec_mechs.c427 m->keylen = 192; in get_secfile_ent()
432 m->keylen = NIS_SEC_CF_NA_KA; in get_secfile_ent()
438 m->keylen = atoi(*(flds + kl_offset)); in get_secfile_ent()
464 if (mp->keylen != tp->keylen) in equal_entries()
500 tp->keylen = mp->keylen; in sf_copy_mech_ent()
654 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) in __nis_translate_mechanism() argument
659 if (!mechname || !keylen || !algtype) in __nis_translate_mechanism()
664 *keylen = AUTH_DES_KEYLEN; in __nis_translate_mechanism()
677 *keylen = mp->keylen; in __nis_translate_mechanism()
684 *keylen = mp->keylen; in __nis_translate_mechanism()
[all …]
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkey.c40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) in genkey_nss() argument
63 keylength = keylen; in genkey_nss()
109 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, in genkey_pkcs11() argument
167 keylength = keylen; /* bits */ in genkey_pkcs11()
255 genkey_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, char *dir, in genkey_file() argument
286 keylength = keylen; in genkey_file()
370 int keylen = 0; in pk_genkey() local
468 keylen = 64; /* fixed size; ignore input */ in pk_genkey()
470 keylen = 192; /* fixed size; ignore input */ in pk_genkey()
478 if (sscanf(keylenstr, "%d", &keylen) != 1) { in pk_genkey()
[all …]
H A Dgenkeypair.c50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, in genkeypair_pkcs11() argument
61 keylength = keylen; /* bits */ in genkeypair_pkcs11()
133 KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, in genkeypair_file() argument
163 keylength = keylen; /* bits */ in genkeypair_file()
228 int keylen, KMF_CREDENTIAL *tokencred, in genkeypair_nss() argument
247 keylength = keylen; /* bits */ in genkeypair_nss()
329 int keylen = PK_DEFAULT_KEYLENGTH; in pk_genkeypair() local
382 &keylen) != 1) { in pk_genkeypair()
469 keylen = 1024; in pk_genkeypair()
470 else if (keylen > 1024 || keylen < 512) { in pk_genkeypair()
[all …]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dencrypt.c163 int keylen; member
747 kp->keylen = 0; in encrypt_keyid()
752 if (kp->keylen == 0) in encrypt_keyid()
754 kp->keylen = 0; in encrypt_keyid()
756 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
758 } else if ((len != kp->keylen) || in encrypt_keyid()
763 kp->keylen = len; in encrypt_keyid()
766 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
769 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
775 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0); in encrypt_keyid()
[all …]
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dmd5.c209 int keylen = strlen (key); in md5_password() local
238 md5_update (key, keylen); in md5_password()
240 md5_update (key, keylen); in md5_password()
246 md5_update (key, keylen); in md5_password()
248 for (i = keylen; i > 16; i -= 16) in md5_password()
252 for (i = keylen; i > 0; i >>= 1) in md5_password()
253 md5_update (key + ((i & 1) ? keylen : 0), 1); in md5_password()
263 md5_update (key, keylen); in md5_password()
271 md5_update (key, keylen); in md5_password()
276 md5_update (key, keylen); in md5_password()
/illumos-gate/usr/src/cmd/sendmail/src/
H A Dudb.c139 int keylen; local
178 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop");
181 if (keylen >= sizeof(keybuf))
217 key.size = keylen;
220 keybuf, keylen);
243 keybuf, keylen);
259 while (i == 0 && key.size == keylen &&
260 memcmp(key.data, keybuf, keylen) == 0)
359 keylen = strlen(keybuf);
361 key.size = keylen;
[all …]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDH.c210 uint32_t keylen; in soft_dh_key_derive() local
226 keylen = OBJ_SEC_VALUE_LEN(secretkey); in soft_dh_key_derive()
227 if (keylen > sizeof (key)) { /* check for overflow */ in soft_dh_key_derive()
240 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen, 0); in soft_dh_key_derive()
246 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { in soft_dh_key_derive()
251 OBJ_SEC_VALUE_LEN(secretkey) = keylen; in soft_dh_key_derive()
252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); in soft_dh_key_derive()
/illumos-gate/usr/src/uts/common/io/sfxge/common/
H A Defx_vpd.c503 uint8_t keylen; in efx_vpd_hunk_verify() local
523 for (pos = 0; pos != taglen; pos += 3 + keylen) { in efx_vpd_hunk_verify()
531 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_verify()
657 uint8_t keylen; in efx_vpd_hunk_next() local
684 for (pos = 0; pos != taglen; pos += 3 + keylen) { in efx_vpd_hunk_next()
686 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_next()
691 paylen = keylen; in efx_vpd_hunk_next()
734 uint8_t keylen; in efx_vpd_hunk_get() local
755 for (pos = 0; pos != taglen; pos += 3 + keylen) { in efx_vpd_hunk_get()
757 taglen, pos, &ikeyword, &keylen)) != 0) in efx_vpd_hunk_get()
[all …]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb3_encrypt.c317 uint_t keylen; in smb3_decrypt_sr() local
329 keylen = AES128_KEY_LENGTH; in smb3_decrypt_sr()
334 keylen = AES128_KEY_LENGTH; in smb3_decrypt_sr()
339 keylen = AES256_KEY_LENGTH; in smb3_decrypt_sr()
344 keylen = AES256_KEY_LENGTH; in smb3_decrypt_sr()
386 if (dec_key->len != keylen) { in smb3_decrypt_sr()
499 uint_t keylen; in smb3_encrypt_sr() local
510 keylen = AES128_KEY_LENGTH; in smb3_encrypt_sr()
515 keylen = AES128_KEY_LENGTH; in smb3_encrypt_sr()
520 keylen = AES256_KEY_LENGTH; in smb3_encrypt_sr()
[all …]
/illumos-gate/usr/src/lib/pam_modules/dhkeys/
H A Ddhkeys.c101 keylen_t keylen, /* in */ in get_and_set_seckey() argument
116 skeylen = BITS2NIBBLES(keylen) + 1; in get_and_set_seckey()
122 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { in get_and_set_seckey()
128 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, in get_and_set_seckey()
136 "%d-%d", keylen, algtype); in get_and_set_seckey()
145 "for '%s'."), keylen, algtype, netname); in get_and_set_seckey()
154 keylen, algtype); in get_and_set_seckey()
279 "key type = %d-%d", mp->keylen, in establish_key()
282 if (!get_and_set_seckey(pamh, netname, mp->keylen, in establish_key()
/illumos-gate/usr/src/lib/libnsl/include/rpcsvc/
H A Dnis_dhext.h56 ushort_t keylen; member
76 keylen_t keylen; member
111 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\
136 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype,
139 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c41 __getpublickey_cached_g(const char remotename[], int keylen, in __getpublickey_cached_g() argument
50 getpublickey_g(const char remotename[], int keylen, in getpublickey_g() argument
59 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_encryptsession_pk_g() argument
78 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_decryptsession_pk_g() argument

12345