/illumos-gate/usr/src/uts/common/io/qede/579xx/drivers/ecore/ |
H A D | ecore_phy.c | 219 u32 port_mode, port, max_ports, core_cfg, length = 0; in ecore_phy_info() local 229 length += OSAL_SPRINTF(&p_phy_result_buf[length], in ecore_phy_info() 232 length += OSAL_SPRINTF(&p_phy_result_buf[length], in ecore_phy_info() 241 length += OSAL_SPRINTF(&p_phy_result_buf[length], "1x100G\n"); in ecore_phy_info() 245 length += OSAL_SPRINTF(&p_phy_result_buf[length], "1x40G\n"); in ecore_phy_info() 249 length += OSAL_SPRINTF(&p_phy_result_buf[length], "1x25G\n"); in ecore_phy_info() 253 length += OSAL_SPRINTF(&p_phy_result_buf[length], "2x40G\n"); in ecore_phy_info() 257 length += OSAL_SPRINTF(&p_phy_result_buf[length], "2x50G\n"); in ecore_phy_info() 261 length += OSAL_SPRINTF(&p_phy_result_buf[length], "2x25G\n"); in ecore_phy_info() 265 length += OSAL_SPRINTF(&p_phy_result_buf[length], "2x10G\n"); in ecore_phy_info() [all …]
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 21 krb5_arcfour_encrypt_length(enc, hash, inputlen, length) in krb5_arcfour_encrypt_length() argument 25 size_t *length; 33 *length = hashsize + krb5_roundup(8 + inputlen, blocksize); 99 d1.length=keybytes; 100 d1.data=MALLOC(d1.length); 104 k1.length=d1.length; 114 d2.length=keybytes; 115 d2.data=MALLOC(d2.length); 117 FREE(d1.data, d1.length); 121 k2.length=d2.length; [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 65 unsigned int length, sum = 0; in asn1_encode_key() local 74 &length); checkerr; in asn1_encode_key() 75 key_len += length; in asn1_encode_key() 76 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 1, length, &length); checkerr; in asn1_encode_key() 77 key_len += length; in asn1_encode_key() 79 ret = asn1_encode_integer (buf, key_data.key_data_type[0], &length); in asn1_encode_key() 81 key_len += length; in asn1_encode_key() 82 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 0, length, &length); checkerr; in asn1_encode_key() 83 key_len += length; in asn1_encode_key() 85 ret = asn1_make_sequence(buf, key_len, &length); checkerr; in asn1_encode_key() [all …]
|
H A D | asn1_encode.c | 37 unsigned int length = 0; in asn1_encode_boolean() local 46 length = partlen; in asn1_encode_boolean() 47 retval = asn1_make_tag(buf, UNIVERSAL, PRIMITIVE, ASN1_BOOLEAN, length, &partlen); in asn1_encode_boolean() 49 length += partlen; in asn1_encode_boolean() 51 *retlen = length; in asn1_encode_boolean() 60 unsigned int length = 0; in asn1_encode_integer_internal() local 69 length++; in asn1_encode_integer_internal() 76 length++; in asn1_encode_integer_internal() 80 length++; in asn1_encode_integer_internal() 84 *retlen = length; in asn1_encode_integer_internal() [all …]
|
H A D | krb5_encode.c | 44 unsigned int length, sum = 0;\ 69 retval = asn1_encode_pa_pk_as_req(buf,rep,&length); in encode_krb5_pa_pk_as_req() 71 sum += length; in encode_krb5_pa_pk_as_req() 78 retval = asn1_encode_pa_pk_as_req_draft9(buf,rep,&length); in encode_krb5_pa_pk_as_req_draft9() 80 sum += length; in encode_krb5_pa_pk_as_req_draft9() 87 retval = asn1_encode_pa_pk_as_rep(buf,rep,&length); in encode_krb5_pa_pk_as_rep() 89 sum += length; in encode_krb5_pa_pk_as_rep() 96 retval = asn1_encode_pa_pk_as_rep_draft9(buf,rep,&length); in encode_krb5_pa_pk_as_rep_draft9() 98 sum += length; in encode_krb5_pa_pk_as_rep_draft9() 105 retval = asn1_encode_auth_pack(buf,rep,&length); in encode_krb5_auth_pack() [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | chpw.c | 36 clearpw.length = strlen(passwd); in krb5int_mk_chpw_req() 43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req() 44 packet->data = (char *) malloc(packet->length); in krb5int_mk_chpw_req() 54 *ptr++ = (packet->length>> 8) & 0xff; in krb5int_mk_chpw_req() 55 *ptr++ = packet->length & 0xff; in krb5int_mk_chpw_req() 64 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_chpw_req() 65 *ptr++ = ap_req->length & 0xff; in krb5int_mk_chpw_req() 69 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req() 70 ptr += ap_req->length; in krb5int_mk_chpw_req() 74 memcpy(ptr, cipherpw.data, cipherpw.length); in krb5int_mk_chpw_req() [all …]
|
H A D | chk_trans.c | 54 (int) n1->length, n1->data, (int) n2->length, n2->data)); in process_intermediates() 56 len1 = n1->length; in process_intermediates() 57 len2 = n2->length; in process_intermediates() 74 (int) n1->length, n1->data, (int) n2->length, n2->data)); in process_intermediates() 104 d.length = i; in process_intermediates() 128 d.length = len2 - i; in process_intermediates() 142 if (buf->length == 0) in maybe_join() 145 if (last->length + buf->length > bufsiz) { in maybe_join() 146 Tprintf (("too big: last=%d cur=%d max=%d\n", last->length, buf->length, bufsiz)); in maybe_join() 149 memmove (buf->data+last->length, buf->data, buf->length); in maybe_join() [all …]
|
H A D | walk_rtree.c | 167 if ((cap_client = (char *)malloc(client->length + 1)) == NULL) in krb5_walk_realm_tree() 169 strncpy(cap_client, client->data, client->length); in krb5_walk_realm_tree() 170 cap_client[client->length] = '\0'; in krb5_walk_realm_tree() 171 if ((cap_server = (char *)malloc(server->length + 1)) == NULL) { in krb5_walk_realm_tree() 175 strncpy(cap_server, server->data, server->length); in krb5_walk_realm_tree() 176 cap_server[server->length] = '\0'; in krb5_walk_realm_tree() 202 clen = client->length; in krb5_walk_realm_tree() 203 slen = server->length; in krb5_walk_realm_tree() 274 if(com_cdot == client->data + client->length -1) in krb5_walk_realm_tree() 276 if(com_sdot == server->data + server->length -1) in krb5_walk_realm_tree() [all …]
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_token.c | 74 static unsigned int der_length_size(length) in der_length_size() argument 75 int length; in der_length_size() 77 if (length < (1<<7)) 79 else if (length < (1<<8)) 85 else if (length < (1<<16)) 87 else if (length < (1<<24)) 94 static void der_write_length(buf, length) in der_write_length() argument 96 int length; 98 if (length < (1<<7)) { 99 *(*buf)++ = (unsigned char) length; [all …]
|
H A D | k5sealv3.c | 150 if (SIZE_MAX - 300 < message->length) in gss_krb5int_make_seal_token_v3() 152 ec_max = SIZE_MAX - message->length - 300; in gss_krb5int_make_seal_token_v3() 163 plain.length = message->length + 16 + ec; in gss_krb5int_make_seal_token_v3() 164 plain.data = MALLOC(plain.length); in gss_krb5int_make_seal_token_v3() 170 ctx->enc->enctype, plain.length, &tlen))) { in gss_krb5int_make_seal_token_v3() 171 FREE(plain.data, plain.length); in gss_krb5int_make_seal_token_v3() 179 FREE(plain.data, plain.length); in gss_krb5int_make_seal_token_v3() 197 (void) memcpy(plain.data, message->value, message->length); in gss_krb5int_make_seal_token_v3() 198 (void) memset(plain.data + message->length, 'x', ec); in gss_krb5int_make_seal_token_v3() 199 (void) memcpy(plain.data + message->length + ec, outbuf, 16); in gss_krb5int_make_seal_token_v3() [all …]
|
H A D | util_crypt.c | 100 lrandom.length = blocksize; 121 kg_encrypt(context, key, usage, iv, in, out, length) in kg_encrypt() argument 128 unsigned int length; 142 ivd.length = blocksize; 143 ivd.data = MALLOC(ivd.length); 146 (void) memcpy(ivd.data, iv, ivd.length); 152 inputd.length = length; 155 outputd.ciphertext.length = length; 169 kg_decrypt(context, key, usage, iv, in, out, length) in kg_decrypt() argument 176 unsigned int length; [all …]
|
H A D | k5unseal.c | 98 message_buffer->length = 0; 269 token.length = tmsglen; 289 token.length = tmsglen - conflen - plain[tmsglen-1]; 292 if (token.length) { 293 if ((token.value = (void *) xmalloc(token.length)) == NULL) { 300 (void) memcpy(token.value, plain+conflen, token.length); 308 plainlen = token.length; 311 token.length = 0; 314 plainlen = token.length; 350 md5cksum.length = (size_t)sumlen; [all …]
|
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 36 clearpw.length = strlen(passwd); in krb5int_mk_chpw_req() 43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req() 44 packet->data = (char *) malloc(packet->length); in krb5int_mk_chpw_req() 54 *ptr++ = (packet->length>> 8) & 0xff; in krb5int_mk_chpw_req() 55 *ptr++ = packet->length & 0xff; in krb5int_mk_chpw_req() 67 *ptr++ = (ap_req->length>>8) & 0xff; in krb5int_mk_chpw_req() 68 *ptr++ = ap_req->length & 0xff; in krb5int_mk_chpw_req() 72 memcpy(ptr, ap_req->data, ap_req->length); in krb5int_mk_chpw_req() 73 ptr += ap_req->length; in krb5int_mk_chpw_req() 77 memcpy(ptr, cipherpw.data, cipherpw.length); in krb5int_mk_chpw_req() [all …]
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | aes_provider.c | 52 if (input->length < BLOCK_SIZE) in krb5int_aes_encrypt() 55 ASSERT(input->length == output->length); in krb5int_aes_encrypt() 65 if (ivec->data == NULL || ivec->length != BLOCK_SIZE) { in krb5int_aes_encrypt() 67 ASSERT(ivec->length == BLOCK_SIZE); in krb5int_aes_encrypt() 70 (void *)ivec->data, ivec->length); in krb5int_aes_encrypt() 77 nblocks = (input->length + BLOCK_SIZE - 1) / BLOCK_SIZE; in krb5int_aes_encrypt() 80 partialamount = input->length % BLOCK_SIZE; in krb5int_aes_encrypt() 93 local_iv.length = ivec->length; in krb5int_aes_encrypt() 97 local_iv.length = sizeof (local_iv_data); in krb5int_aes_encrypt() 103 input->length, (krb5_keyblock *)key, in krb5int_aes_encrypt() [all …]
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_encrypt.c | 48 size_t inputlen, size_t *length) in krb5_dk_encrypt_length() argument 54 *length = krb5_roundup(blocksize+inputlen, blocksize) + hashsize; in krb5_dk_encrypt_length() 88 plainlen = krb5_roundup(blocksize+input->length, blocksize); in krb5_dk_encrypt() 90 krb5_dk_encrypt_length(enc, hash, input->length, &enclen); in krb5_dk_encrypt() 92 if (output->length < enclen) in krb5_dk_encrypt() 100 d1.length = blocksize; in krb5_dk_encrypt() 106 (void) memcpy(plaintext+blocksize, input->data, input->length); in krb5_dk_encrypt() 108 (void) memset(plaintext+blocksize+input->length, 0, in krb5_dk_encrypt() 109 plainlen - (blocksize+input->length)); in krb5_dk_encrypt() 112 d1.length = plainlen; in krb5_dk_encrypt() [all …]
|
/illumos-gate/usr/src/uts/common/io/sfxge/common/ |
H A D | ef10_tlv_layout.h | 114 uint32_t length; member 136 uint32_t length; member 153 uint32_t length; member 172 uint32_t length; member 190 uint32_t length; member 210 uint32_t length; member 218 uint32_t length; member 235 uint32_t length; member 243 uint32_t length; member 260 uint32_t length; member [all …]
|
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_exp_sec_context.c | 51 interprocess_token->length = 0; in val_exp_sec_ctx_args() 80 OM_uint32 length; local 110 length = token.length + 4 + ctx->mech_type->length; 111 interprocess_token->length = length; 112 interprocess_token->value = malloc(length); 118 length = ctx->mech_type->length; 119 buf[3] = (unsigned char) (length & 0xFF); 120 length >>= 8; 121 buf[2] = (unsigned char) (length & 0xFF); 122 length >>= 8; [all …]
|
H A D | g_imp_sec_context.c | 79 OM_uint32 length = 0; local 104 if (interprocess_token->length >= sizeof (OM_uint32)) { 106 length = (OM_uint32)*p++; 107 length = (OM_uint32)(length << 8) + *p++; 108 length = (OM_uint32)(length << 8) + *p++; 109 length = (OM_uint32)(length << 8) + *p++; 112 if (length == 0 || 113 length > (interprocess_token->length - sizeof (OM_uint32))) { 118 ctx->mech_type->length = length; 119 ctx->mech_type->elements = malloc(length); [all …]
|
H A D | g_glue.c | 58 int length, new_length; in gssint_get_der_length() local 92 for (length = 0; octets; octets--) { in gssint_get_der_length() 93 new_length = (length << 8) + *p++; in gssint_get_der_length() 94 if (new_length < length) /* overflow */ in gssint_get_der_length() 96 length = new_length; in gssint_get_der_length() 101 return (length); in gssint_get_der_length() 130 gssint_put_der_length(unsigned int length, unsigned char **buf, unsigned int max_len) in gssint_put_der_length() argument 143 if (length < 128) { in gssint_put_der_length() 144 *s++ = length; in gssint_put_der_length() 166 v = (length >> i) & 0xff; in gssint_put_der_length() [all …]
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 72 rep->length = 0; in process_chpw_request() 76 ap_rep.length = 0; in process_chpw_request() 79 clear.length = 0; in process_chpw_request() 81 cipher.length = 0; in process_chpw_request() 84 if (req->length < 4) { in process_chpw_request() 104 if (plen != req->length) in process_chpw_request() 125 ap_req.length = (*ptr++ & 0xff); in process_chpw_request() 126 ap_req.length = (ap_req.length<<8) | (*ptr++ & 0xff); in process_chpw_request() 128 if (ptr + ap_req.length >= req->data + req->length) { in process_chpw_request() 140 ptr += ap_req.length; in process_chpw_request() [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | import_name.c | 63 OM_uint32 length; local 87 (char *) xmalloc(input_name_buffer->length + 1)) == NULL) { 93 memcpy(tmp, input_name_buffer->value, input_name_buffer->length); 94 tmp[input_name_buffer->length] = 0; 110 if (input_name_buffer->length != sizeof(krb5_principal)) { 139 (char *) xmalloc(input_name_buffer->length + 1)) == NULL) { 146 memcpy(tmp, input_name_buffer->value, input_name_buffer->length); 147 tmp[input_name_buffer->length] = 0; 173 length = *cp++; 174 if (length != gss_mech_krb5->length+2) [all …]
|
H A D | export_name.c | 39 size_t length; in krb5_gss_export_name() local 52 exported_name->length = 0; in krb5_gss_export_name() 83 length = strlen(str); in krb5_gss_export_name() 84 exported_name->length = 10 + length + gss_mech_krb5->length; in krb5_gss_export_name() 85 exported_name->value = malloc(exported_name->length); in krb5_gss_export_name() 96 *cp++ = (gss_mech_krb5->length+2) >> 8; in krb5_gss_export_name() 97 *cp++ = (gss_mech_krb5->length+2) & 0xFF; in krb5_gss_export_name() 99 *cp++ = (gss_mech_krb5->length) & 0xFF; in krb5_gss_export_name() 100 memcpy(cp, gss_mech_krb5->elements, gss_mech_krb5->length); in krb5_gss_export_name() 101 cp += gss_mech_krb5->length; in krb5_gss_export_name() [all …]
|
/illumos-gate/usr/src/cmd/gss/gsscred/ |
H A D | gsscred_utils.c | 96 nameOut->length = 0; in gsscred_MakeName() 103 oidStr.length = strlen(nameOidStr); in gsscred_MakeName() 115 aName.length = strlen(name); in gsscred_MakeName() 166 mechOidDERLength = der_length_size(mechOid->length); in gsscred_MakeNameHeader() 167 outNameHdr->length = mechOidLenLen + mechOidTagLen + in gsscred_MakeNameHeader() 168 mechOidDERLength + expNameTokIdLen + mechOid->length; in gsscred_MakeNameHeader() 169 if ((outNameHdr->value = (void*)malloc(outNameHdr->length)) == NULL) { in gsscred_MakeNameHeader() 170 outNameHdr->length = 0; in gsscred_MakeNameHeader() 176 (void) memset(outNameHdr->value, '\0', outNameHdr->length); in gsscred_MakeNameHeader() 185 mechOid->length; in gsscred_MakeNameHeader() [all …]
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_decrypt.c | 58 if (input->length < blocksize + hashsize || input->length % blocksize != 0) in krb5_old_decrypt() 60 plainsize = input->length - blocksize - hashsize; in krb5_old_decrypt() 61 if (arg_output->length < plainsize) in krb5_old_decrypt() 64 if (arg_output->length < input->length) { in krb5_old_decrypt() 65 output.length = input->length; in krb5_old_decrypt() 67 if ((output.data = (char *) MALLOC(output.length)) == NULL) { in krb5_old_decrypt() 73 output.length = input->length; in krb5_old_decrypt() 83 if (ivec != NULL && ivec->length == blocksize) { in krb5_old_decrypt() 89 (void) memcpy(cn, input->data + input->length - blocksize, blocksize); in krb5_old_decrypt() 95 crcivec.length = key->length; in krb5_old_decrypt() [all …]
|
/illumos-gate/usr/src/psm/promif/ieee1275/common/ |
H A D | prom_boot.c | 35 int length; in prom_bootargs() local 46 length = prom_getproplen(node, name); in prom_bootargs() 47 if ((length == -1) || (length == 0)) in prom_bootargs() 49 if (length > OBP_MAXPATHLEN) in prom_bootargs() 50 length = OBP_MAXPATHLEN - 1; /* Null terminator */ in prom_bootargs() 51 (void) prom_bounded_getprop(node, name, bootargs, length); in prom_bootargs() 67 int length; in prom_bootpath() local 77 length = prom_getproplen(node, name); in prom_bootpath() 78 if ((length == -1) || (length == 0)) in prom_bootpath() 80 if (length > OBP_MAXPATHLEN) in prom_bootpath() [all …]
|