/illumos-gate/usr/src/lib/libnsl/yp/ |
H A D | yp_match.c | 65 int keylen; member 95 makenode(char *domain, char *map, int keylen, int vallen) in makenode() argument 107 ((n->key = malloc(keylen)) == 0) || in makenode() 121 in_cache(char *domain, char *map, char *key, int keylen, char **val, in in_cache() argument 137 if ((c->keylen == keylen) && in in_cache() 138 (memcmp(key, c->key, (size_t)keylen) == 0) && in in_cache() 175 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, in __yp_match_cflookup() argument 198 (key == NULL) || (keylen == 0)) in __yp_match_cflookup() 202 found_it = in_cache(domain, map, key, keylen, &my_val, &my_vallen); in __yp_match_cflookup() 226 reason = domatch(domain, map, key, keylen, pdomb, in __yp_match_cflookup() [all …]
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keyserv_cache.h | 50 #define KEYLEN(keylen) (((keylen)+7)/8) argument 53 #define DHKEYALLOC(keylen) ALIGN4(sizeof (struct dhkey) + KEYLEN(keylen)) argument 66 #define CACHEKEY3_LIST_SIZE(keylen) (sizeof (struct cachekey3_list) + \ argument 68 2*(ALIGN4(2*KEYLEN(keylen)+1)) + \ 71 int create_cache_file(keylen_t keylen, algtype_t algtype, 74 int cache_insert(keylen_t keylen, algtype_t algtype, 80 struct cachekey3_list *cache_retrieve(keylen_t keylen, algtype_t algtype, 84 int cache_remove(keylen_t keylen, algtype_t algtype, 88 void print_cache(keylen_t keylen, algtype_t algtype);
|
H A D | keyserv_cache.c | 42 keylen_t keylen; member 73 #define SKCK_LEN(keylen) ALIGN8(sizeof (struct skck) + KEYLEN(keylen)) argument 75 #define CACHEKEY_RECLEN(keylen) ALIGN8(sizeof (struct cachekey_disklist) - 1 + \ argument 76 KEYLEN(keylen) + SKCK_LEN(keylen)) 85 keylen_t keylen; /* in bits */ member 102 static struct cachekey_header *create_cache_file_ch(keylen_t keylen, 124 static struct cachekey *get_cache_header(keylen_t keylen, 199 create_cache_file_ch(keylen_t keylen, algtype_t algtype, int sizespec) in create_cache_file_ch() argument 212 keylen, algtype) > sizeof (filename)) { in create_cache_file_ch() 214 "error constructing file name for mech %d-%d", keylen, algtype); in create_cache_file_ch() [all …]
|
H A D | chkey.c | 165 if (!xencrypt_g(slist[mcount], CURMECH->keylen, in encryptkeys() 240 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getpublics() 246 if (!getpublickey_g(netname, CURMECH->keylen, in getpublics() 303 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in makenewkeys() 316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys() 499 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getsecrets() 508 if (!getsecretkey_g(netname, CURMECH->keylen, in getsecrets() 530 CURMECH->keylen, in getsecrets() 656 keylogin(keylen_t keylen, algtype_t algtype) in keylogin() argument 662 if (keylen == CURMECH->keylen && in keylogin() [all …]
|
H A D | setkey.c | 154 keylen_t keylen; member 173 *kpp != NULL && (*kpp)->keylen != k; in getkeylen() 192 kp->keylen = k; in appendkeylist() 537 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) { in storesecretkey3() 585 ("storeotherrootkeys key %d", kp->keylen)); in storeotherrootkeys() 589 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys() 595 kp->keylen, ap->algtype, in storeotherrootkeys() 611 skey.keylen = kp->keylen; in storeotherrootkeys() 613 if (CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys() 620 if (!CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys() [all …]
|
H A D | keylogin.c | 112 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument 157 hexkeybytes = ((keylen + 7) / 8) * 2; in write_rootkey() 172 if (keylen == 192) { in write_rootkey() 199 if (keylen == 192) in write_rootkey() 211 if (keylen == 192) in write_rootkey() 367 if (getsecretkey_g(fullname, mechlist[i]->keylen, in main() 369 (((mechlist[i]->keylen / 7) + in main() 387 mechlist[i]->keylen, NULL, 0, in main() 399 mechlist[i]->keylen, in main()
|
/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 152 int keylen, err, r = 0; in getkeys_nis() local 171 strlen(netname), &keyval, &keylen, 0); in getkeys_nis() 350 keylen_t keylen, /* in */ in extract_secret_g() argument 357 !VALID_KEYALG(keylen, algtype)) { in extract_secret_g() 374 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { in extract_secret_g() 429 keylen_t keylen, /* in */ in getkeys_ldap_g() argument 436 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in getkeys_ldap_g() 458 dh_caps_str, keylen, algtype); in getkeys_ldap_g() 506 keylen_t keylen, in netname2hashname() argument 509 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in netname2hashname() [all …]
|
H A D | gen_dhkeys.c | 168 keylen_t keylen, /* in */ in __gen_dhkeys_g() argument 172 const int classic_des = keylen == 192 && algtype == 0; in __gen_dhkeys_g() 183 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_dhkeys_g() 256 keylen_t keylen, /* in */ in __gen_common_dhkeys_g() argument 261 const int classic_des = keylen == 192 && algtype == 0; in __gen_common_dhkeys_g() 282 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_common_dhkeys_g()
|
H A D | xcrypt.c | 242 keylen_t keylen, /* in */ in xencrypt_g() argument 253 const int classic_des = keylen == 192 && algtype == 0; in xencrypt_g() 254 const int hexkeybytes = BITS2NIBBLES(keylen); in xencrypt_g() 256 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 : in xencrypt_g() 257 keylen/8; in xencrypt_g() 262 if (!secret || !keylen || !passwd || !encrypted_secret) in xencrypt_g() 347 int keylen, /* in */ in xdecrypt_g() argument 358 const int classic_des = keylen == 192 && algtype == 0; in xdecrypt_g() 359 const int hexkeybytes = BITS2NIBBLES(keylen); in xdecrypt_g()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 75 adjust(char *keyout, char *keyin, int keylen) in adjust() argument 79 int hexkeybytes = (keylen+3)/4; in adjust() 100 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ in __generic_gen_dhkeys() argument 128 len = ((keylen + BASEBITS - 1) / BASEBITS); in __generic_gen_dhkeys() 159 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys() 165 (void) adjust(public, xkey, keylen); in __generic_gen_dhkeys() 181 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) in extractdeskeys() argument 201 for (i = 0; i < ((keylen - len)/2)/8; i++) in extractdeskeys() 219 if (keylen == 192) /* Old broken way for compatibility */ in extractdeskeys() 240 int keylen, /* All the keys have this many bits */ in __generic_common_dhkeys() argument [all …]
|
/illumos-gate/usr/src/contrib/mDNSResponder/mDNSShared/ |
H A D | dnssd_clientlib.c | 72 unsigned long *keylen in InternalTXTRecordSearch() argument 77 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 82 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 83 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 248 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 249 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue() 275 unsigned long keylen; in TXTRecordContainsKey() local 276 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 287 unsigned long keylen; in TXTRecordGetValuePtr() local 288 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() [all …]
|
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 120 keylen_t keylen, in key_setsecret_g() argument 127 if (CLASSIC_PK_DH(keylen, algtype)) in key_setsecret_g() 129 arg.key.keybuf3_len = keylen/4 + 1; in key_setsecret_g() 132 arg.keylen = keylen; in key_setsecret_g() 236 key_secretkey_is_set_g_ext(keylen_t keylen, algtype_t algtype, int use_ruid) in key_secretkey_is_set_g_ext() argument 247 if ((keylen == 0) && key_secretkey_is_set_ext(use_ruid)) in key_secretkey_is_set_g_ext() 249 if (CLASSIC_PK_DH(keylen, algtype)) in key_secretkey_is_set_g_ext() 251 arg.keylen = keylen; in key_secretkey_is_set_g_ext() 271 key_secretkey_is_set_g(keylen_t keylen, algtype_t algtype) in key_secretkey_is_set_g() argument 273 return (key_secretkey_is_set_g_ext(keylen, algtype, 0)); in key_secretkey_is_set_g() [all …]
|
/illumos-gate/usr/src/uts/common/io/ |
H A D | suntpi.c | 146 size_t keylen; in tpi_findprov() local 155 key = tpi_makekey(WR(q), &keylen); in tpi_findprov() 157 if (keylen == 0) { in tpi_findprov() 168 if ((*tpp)->tpi_keylen == keylen && in tpi_findprov() 169 bcmp((*tpp)->tpi_key, key, keylen) == 0) { in tpi_findprov() 179 (*tpp)->tpi_key = kmem_alloc(keylen, KM_SLEEP); in tpi_findprov() 180 bcopy(key, (*tpp)->tpi_key, keylen); in tpi_findprov() 181 (*tpp)->tpi_keylen = keylen; in tpi_findprov()
|
/illumos-gate/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_sec_mechs.c | 427 m->keylen = 192; in get_secfile_ent() 432 m->keylen = NIS_SEC_CF_NA_KA; in get_secfile_ent() 438 m->keylen = atoi(*(flds + kl_offset)); in get_secfile_ent() 464 if (mp->keylen != tp->keylen) in equal_entries() 500 tp->keylen = mp->keylen; in sf_copy_mech_ent() 654 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) in __nis_translate_mechanism() argument 659 if (!mechname || !keylen || !algtype) in __nis_translate_mechanism() 664 *keylen = AUTH_DES_KEYLEN; in __nis_translate_mechanism() 677 *keylen = mp->keylen; in __nis_translate_mechanism() 684 *keylen = mp->keylen; in __nis_translate_mechanism() [all …]
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) in genkey_nss() argument 63 keylength = keylen; in genkey_nss() 109 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, in genkey_pkcs11() argument 167 keylength = keylen; /* bits */ in genkey_pkcs11() 255 genkey_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, char *dir, in genkey_file() argument 286 keylength = keylen; in genkey_file() 370 int keylen = 0; in pk_genkey() local 468 keylen = 64; /* fixed size; ignore input */ in pk_genkey() 470 keylen = 192; /* fixed size; ignore input */ in pk_genkey() 478 if (sscanf(keylenstr, "%d", &keylen) != 1) { in pk_genkey() [all …]
|
H A D | genkeypair.c | 50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, in genkeypair_pkcs11() argument 61 keylength = keylen; /* bits */ in genkeypair_pkcs11() 133 KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, in genkeypair_file() argument 163 keylength = keylen; /* bits */ in genkeypair_file() 228 int keylen, KMF_CREDENTIAL *tokencred, in genkeypair_nss() argument 247 keylength = keylen; /* bits */ in genkeypair_nss() 329 int keylen = PK_DEFAULT_KEYLENGTH; in pk_genkeypair() local 382 &keylen) != 1) { in pk_genkeypair() 469 keylen = 1024; in pk_genkeypair() 470 else if (keylen > 1024 || keylen < 512) { in pk_genkeypair() [all …]
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | encrypt.c | 163 int keylen; member 747 kp->keylen = 0; in encrypt_keyid() 752 if (kp->keylen == 0) in encrypt_keyid() 754 kp->keylen = 0; in encrypt_keyid() 756 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 758 } else if ((len != kp->keylen) || in encrypt_keyid() 763 kp->keylen = len; in encrypt_keyid() 766 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 769 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 775 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0); in encrypt_keyid() [all …]
|
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 209 int keylen = strlen (key); in md5_password() local 238 md5_update (key, keylen); in md5_password() 240 md5_update (key, keylen); in md5_password() 246 md5_update (key, keylen); in md5_password() 248 for (i = keylen; i > 16; i -= 16) in md5_password() 252 for (i = keylen; i > 0; i >>= 1) in md5_password() 253 md5_update (key + ((i & 1) ? keylen : 0), 1); in md5_password() 263 md5_update (key, keylen); in md5_password() 271 md5_update (key, keylen); in md5_password() 276 md5_update (key, keylen); in md5_password()
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | udb.c | 139 int keylen; local 178 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop"); 181 if (keylen >= sizeof(keybuf)) 217 key.size = keylen; 220 keybuf, keylen); 243 keybuf, keylen); 259 while (i == 0 && key.size == keylen && 260 memcmp(key.data, keybuf, keylen) == 0) 359 keylen = strlen(keybuf); 361 key.size = keylen; [all …]
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 210 uint32_t keylen; in soft_dh_key_derive() local 226 keylen = OBJ_SEC_VALUE_LEN(secretkey); in soft_dh_key_derive() 227 if (keylen > sizeof (key)) { /* check for overflow */ in soft_dh_key_derive() 240 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen, 0); in soft_dh_key_derive() 246 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { in soft_dh_key_derive() 251 OBJ_SEC_VALUE_LEN(secretkey) = keylen; in soft_dh_key_derive() 252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); in soft_dh_key_derive()
|
/illumos-gate/usr/src/uts/common/io/sfxge/common/ |
H A D | efx_vpd.c | 503 uint8_t keylen; in efx_vpd_hunk_verify() local 523 for (pos = 0; pos != taglen; pos += 3 + keylen) { in efx_vpd_hunk_verify() 531 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_verify() 657 uint8_t keylen; in efx_vpd_hunk_next() local 684 for (pos = 0; pos != taglen; pos += 3 + keylen) { in efx_vpd_hunk_next() 686 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_next() 691 paylen = keylen; in efx_vpd_hunk_next() 734 uint8_t keylen; in efx_vpd_hunk_get() local 755 for (pos = 0; pos != taglen; pos += 3 + keylen) { in efx_vpd_hunk_get() 757 taglen, pos, &ikeyword, &keylen)) != 0) in efx_vpd_hunk_get() [all …]
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb3_encrypt.c | 317 uint_t keylen; in smb3_decrypt_sr() local 329 keylen = AES128_KEY_LENGTH; in smb3_decrypt_sr() 334 keylen = AES128_KEY_LENGTH; in smb3_decrypt_sr() 339 keylen = AES256_KEY_LENGTH; in smb3_decrypt_sr() 344 keylen = AES256_KEY_LENGTH; in smb3_decrypt_sr() 386 if (dec_key->len != keylen) { in smb3_decrypt_sr() 499 uint_t keylen; in smb3_encrypt_sr() local 510 keylen = AES128_KEY_LENGTH; in smb3_encrypt_sr() 515 keylen = AES128_KEY_LENGTH; in smb3_encrypt_sr() 520 keylen = AES256_KEY_LENGTH; in smb3_encrypt_sr() [all …]
|
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 101 keylen_t keylen, /* in */ in get_and_set_seckey() argument 116 skeylen = BITS2NIBBLES(keylen) + 1; in get_and_set_seckey() 122 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { in get_and_set_seckey() 128 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, in get_and_set_seckey() 136 "%d-%d", keylen, algtype); in get_and_set_seckey() 145 "for '%s'."), keylen, algtype, netname); in get_and_set_seckey() 154 keylen, algtype); in get_and_set_seckey() 279 "key type = %d-%d", mp->keylen, in establish_key() 282 if (!get_and_set_seckey(pamh, netname, mp->keylen, in establish_key()
|
/illumos-gate/usr/src/lib/libnsl/include/rpcsvc/ |
H A D | nis_dhext.h | 56 ushort_t keylen; member 76 keylen_t keylen; member 111 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\ 136 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, 139 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 41 __getpublickey_cached_g(const char remotename[], int keylen, in __getpublickey_cached_g() argument 50 getpublickey_g(const char remotename[], int keylen, in getpublickey_g() argument 59 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_encryptsession_pk_g() argument 78 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_decryptsession_pk_g() argument
|