/titanic_41/usr/src/common/net/wanboot/crypt/ |
H A D | hmac_test.c | 47 int keylen; member 63 td[0].keylen = 20; in hmactest() 65 td[0].keylen); in hmactest() 70 td[1].keylen = 4; in hmactest() 76 td[2].keylen = 20; in hmactest() 78 td[2].keylen); in hmactest() 84 td[3].keylen = 25; in hmactest() 86 "1819", td[3].keylen); in hmactest() 93 td[4].keylen = 20; in hmactest() 95 td[4].keylen); in hmactest() [all …]
|
/titanic_41/usr/src/lib/libnsl/yp/ |
H A D | yp_match.c | 66 int keylen; member 96 makenode(char *domain, char *map, int keylen, int vallen) in makenode() argument 108 ((n->key = malloc(keylen)) == 0) || in makenode() 122 in_cache(char *domain, char *map, char *key, int keylen, char **val, in in_cache() argument 138 if ((c->keylen == keylen) && in in_cache() 139 (memcmp(key, c->key, (size_t)keylen) == 0) && in in_cache() 176 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, in __yp_match_cflookup() argument 199 (key == NULL) || (keylen == 0)) in __yp_match_cflookup() 203 found_it = in_cache(domain, map, key, keylen, &my_val, &my_vallen); in __yp_match_cflookup() 227 reason = domatch(domain, map, key, keylen, pdomb, in __yp_match_cflookup() [all …]
|
/titanic_41/usr/src/cmd/keyserv/ |
H A D | keyserv_cache.h | 52 #define KEYLEN(keylen) (((keylen)+7)/8) argument 55 #define DHKEYALLOC(keylen) ALIGN4(sizeof (struct dhkey) + KEYLEN(keylen)) argument 68 #define CACHEKEY3_LIST_SIZE(keylen) (sizeof (struct cachekey3_list) + \ argument 70 2*(ALIGN4(2*KEYLEN(keylen)+1)) + \ 73 int create_cache_file(keylen_t keylen, algtype_t algtype, 76 int cache_insert(keylen_t keylen, algtype_t algtype, 82 struct cachekey3_list *cache_retrieve(keylen_t keylen, algtype_t algtype, 86 int cache_remove(keylen_t keylen, algtype_t algtype, 90 void print_cache(keylen_t keylen, algtype_t algtype);
|
H A D | keyserv_cache.c | 44 keylen_t keylen; member 75 #define SKCK_LEN(keylen) ALIGN8(sizeof (struct skck) + KEYLEN(keylen)) argument 77 #define CACHEKEY_RECLEN(keylen) ALIGN8(sizeof (struct cachekey_disklist) - 1 + \ argument 78 KEYLEN(keylen) + SKCK_LEN(keylen)) 87 keylen_t keylen; /* in bits */ member 104 static struct cachekey_header *create_cache_file_ch(keylen_t keylen, 126 static struct cachekey *get_cache_header(keylen_t keylen, 201 create_cache_file_ch(keylen_t keylen, algtype_t algtype, int sizespec) in create_cache_file_ch() argument 214 keylen, algtype) > sizeof (filename)) { in create_cache_file_ch() 216 "error constructing file name for mech %d-%d", keylen, algtype); in create_cache_file_ch() [all …]
|
H A D | chkey.c | 165 if (!xencrypt_g(slist[mcount], CURMECH->keylen, in encryptkeys() 240 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getpublics() 246 if (!getpublickey_g(netname, CURMECH->keylen, in getpublics() 303 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in makenewkeys() 316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys() 499 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getsecrets() 508 if (!getsecretkey_g(netname, CURMECH->keylen, in getsecrets() 530 CURMECH->keylen, in getsecrets() 656 keylogin(keylen_t keylen, algtype_t algtype) in keylogin() argument 662 if (keylen == CURMECH->keylen && in keylogin() [all …]
|
H A D | keylogin.c | 114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument 159 hexkeybytes = ((keylen + 7) / 8) * 2; in write_rootkey() 174 if (keylen == 192) { in write_rootkey() 201 if (keylen == 192) in write_rootkey() 213 if (keylen == 192) in write_rootkey() 369 if (getsecretkey_g(fullname, mechlist[i]->keylen, in main() 371 (((mechlist[i]->keylen / 7) + in main() 389 mechlist[i]->keylen, NULL, 0, in main() 401 mechlist[i]->keylen, in main()
|
H A D | setkey.c | 156 keylen_t keylen; member 175 *kpp != NULL && (*kpp)->keylen != k; in getkeylen() 194 kp->keylen = k; in appendkeylist() 539 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) { in storesecretkey3() 587 ("storeotherrootkeys key %d", kp->keylen)); in storeotherrootkeys() 591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys() 597 kp->keylen, ap->algtype, in storeotherrootkeys() 613 skey.keylen = kp->keylen; in storeotherrootkeys() 615 if (CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys() 622 if (!CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys() [all …]
|
/titanic_41/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 152 int keylen, err, r = 0; in getkeys_nis() local 171 strlen(netname), &keyval, &keylen, 0); in getkeys_nis() 350 keylen_t keylen, /* in */ in extract_secret_g() argument 358 !VALID_KEYALG(keylen, algtype)) { in extract_secret_g() 375 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { in extract_secret_g() 430 keylen_t keylen, /* in */ in getkeys_ldap_g() argument 437 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in getkeys_ldap_g() 459 dh_caps_str, keylen, algtype); in getkeys_ldap_g() 507 keylen_t keylen, in netname2hashname() argument 510 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in netname2hashname() [all …]
|
H A D | gen_dhkeys.c | 170 keylen_t keylen, /* in */ in __gen_dhkeys_g() argument 174 const int classic_des = keylen == 192 && algtype == 0; in __gen_dhkeys_g() 185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_dhkeys_g() 258 keylen_t keylen, /* in */ in __gen_common_dhkeys_g() argument 263 const int classic_des = keylen == 192 && algtype == 0; in __gen_common_dhkeys_g() 284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_common_dhkeys_g()
|
H A D | xcrypt.c | 242 keylen_t keylen, /* in */ in xencrypt_g() argument 253 const int classic_des = keylen == 192 && algtype == 0; in xencrypt_g() 254 const int hexkeybytes = BITS2NIBBLES(keylen); in xencrypt_g() 256 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 : in xencrypt_g() 257 keylen/8; in xencrypt_g() 262 if (!secret || !keylen || !passwd || !encrypted_secret) in xencrypt_g() 347 int keylen, /* in */ in xdecrypt_g() argument 358 const int classic_des = keylen == 192 && algtype == 0; in xdecrypt_g() 359 const int hexkeybytes = BITS2NIBBLES(keylen); in xdecrypt_g()
|
/titanic_41/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 77 adjust(char *keyout, char *keyin, int keylen) in adjust() argument 81 int hexkeybytes = (keylen+3)/4; in adjust() 102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ in __generic_gen_dhkeys() argument 130 len = ((keylen + BASEBITS - 1) / BASEBITS); in __generic_gen_dhkeys() 161 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys() 167 (void) adjust(public, xkey, keylen); in __generic_gen_dhkeys() 183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) in extractdeskeys() argument 203 for (i = 0; i < ((keylen - len)/2)/8; i++) in extractdeskeys() 221 if (keylen == 192) /* Old broken way for compatibility */ in extractdeskeys() 242 int keylen, /* All the keys have this many bits */ in __generic_common_dhkeys() argument [all …]
|
/titanic_41/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_clientlib.c | 115 unsigned long *keylen in InternalTXTRecordSearch() argument 120 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 125 if (p <= e && *keylen <= x[0] && !strncmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 126 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 277 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 278 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue() 304 unsigned long keylen; in TXTRecordContainsKey() local 305 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 316 unsigned long keylen; in TXTRecordGetValuePtr() local 317 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() [all …]
|
/titanic_41/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 122 keylen_t keylen, in key_setsecret_g() argument 129 if (CLASSIC_PK_DH(keylen, algtype)) in key_setsecret_g() 131 arg.key.keybuf3_len = keylen/4 + 1; in key_setsecret_g() 134 arg.keylen = keylen; in key_setsecret_g() 238 key_secretkey_is_set_g_ext(keylen_t keylen, algtype_t algtype, int use_ruid) in key_secretkey_is_set_g_ext() argument 249 if ((keylen == 0) && key_secretkey_is_set_ext(use_ruid)) in key_secretkey_is_set_g_ext() 251 if (CLASSIC_PK_DH(keylen, algtype)) in key_secretkey_is_set_g_ext() 253 arg.keylen = keylen; in key_secretkey_is_set_g_ext() 273 key_secretkey_is_set_g(keylen_t keylen, algtype_t algtype) in key_secretkey_is_set_g() argument 275 return (key_secretkey_is_set_g_ext(keylen, algtype, 0)); in key_secretkey_is_set_g() [all …]
|
/titanic_41/usr/src/uts/common/io/ |
H A D | suntpi.c | 148 size_t keylen; in tpi_findprov() local 157 key = tpi_makekey(WR(q), &keylen); in tpi_findprov() 159 if (keylen == 0) { in tpi_findprov() 170 if ((*tpp)->tpi_keylen == keylen && in tpi_findprov() 171 bcmp((*tpp)->tpi_key, key, keylen) == 0) { in tpi_findprov() 181 (*tpp)->tpi_key = kmem_alloc(keylen, KM_SLEEP); in tpi_findprov() 182 bcopy(key, (*tpp)->tpi_key, keylen); in tpi_findprov() 183 (*tpp)->tpi_keylen = keylen; in tpi_findprov()
|
/titanic_41/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_sec_mechs.c | 429 m->keylen = 192; in get_secfile_ent() 434 m->keylen = NIS_SEC_CF_NA_KA; in get_secfile_ent() 440 m->keylen = atoi(*(flds + kl_offset)); in get_secfile_ent() 466 if (mp->keylen != tp->keylen) in equal_entries() 502 tp->keylen = mp->keylen; in sf_copy_mech_ent() 656 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) in __nis_translate_mechanism() argument 661 if (!mechname || !keylen || !algtype) in __nis_translate_mechanism() 666 *keylen = AUTH_DES_KEYLEN; in __nis_translate_mechanism() 679 *keylen = mp->keylen; in __nis_translate_mechanism() 686 *keylen = mp->keylen; in __nis_translate_mechanism() [all …]
|
/titanic_41/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkeypair.c | 50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, in genkeypair_pkcs11() argument 61 keylength = keylen; /* bits */ in genkeypair_pkcs11() 133 KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, in genkeypair_file() argument 163 keylength = keylen; /* bits */ in genkeypair_file() 228 int keylen, KMF_CREDENTIAL *tokencred, in genkeypair_nss() argument 247 keylength = keylen; /* bits */ in genkeypair_nss() 329 int keylen = PK_DEFAULT_KEYLENGTH; in pk_genkeypair() local 382 &keylen) != 1) { in pk_genkeypair() 469 keylen = 1024; in pk_genkeypair() 470 else if (keylen > 1024 || keylen < 512) { in pk_genkeypair() [all …]
|
H A D | genkey.c | 40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) in genkey_nss() argument 63 keylength = keylen; in genkey_nss() 109 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, in genkey_pkcs11() argument 167 keylength = keylen; /* bits */ in genkey_pkcs11() 255 genkey_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, char *dir, in genkey_file() argument 286 keylength = keylen; in genkey_file() 370 int keylen = 0; in pk_genkey() local 468 keylen = 64; /* fixed size; ignore input */ in pk_genkey() 470 keylen = 192; /* fixed size; ignore input */ in pk_genkey() 478 if (sscanf(keylenstr, "%d", &keylen) != 1) { in pk_genkey() [all …]
|
/titanic_41/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 209 int keylen = strlen (key); in md5_password() local 238 md5_update (key, keylen); in md5_password() 240 md5_update (key, keylen); in md5_password() 246 md5_update (key, keylen); in md5_password() 248 for (i = keylen; i > 16; i -= 16) in md5_password() 252 for (i = keylen; i > 0; i >>= 1) in md5_password() 253 md5_update (key + ((i & 1) ? keylen : 0), 1); in md5_password() 263 md5_update (key, keylen); in md5_password() 271 md5_update (key, keylen); in md5_password() 276 md5_update (key, keylen); in md5_password()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | encrypt.c | 165 int keylen; member 749 kp->keylen = 0; in encrypt_keyid() 754 if (kp->keylen == 0) in encrypt_keyid() 756 kp->keylen = 0; in encrypt_keyid() 758 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 760 } else if ((len != kp->keylen) || in encrypt_keyid() 765 kp->keylen = len; in encrypt_keyid() 768 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 771 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid() 777 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0); in encrypt_keyid() [all …]
|
/titanic_41/usr/src/cmd/sendmail/src/ |
H A D | udb.c | 141 int keylen; local 180 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop"); 183 if (keylen >= sizeof(keybuf)) 219 key.size = keylen; 222 keybuf, keylen); 245 keybuf, keylen); 261 while (i == 0 && key.size == keylen && 262 memcmp(key.data, keybuf, keylen) == 0) 361 keylen = strlen(keybuf); 363 key.size = keylen; [all …]
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 210 uint32_t keylen; in soft_dh_key_derive() local 226 keylen = OBJ_SEC_VALUE_LEN(secretkey); in soft_dh_key_derive() 227 if (keylen > sizeof (key)) { /* check for overflow */ in soft_dh_key_derive() 240 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen, 0); in soft_dh_key_derive() 246 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { in soft_dh_key_derive() 251 OBJ_SEC_VALUE_LEN(secretkey) = keylen; in soft_dh_key_derive() 252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); in soft_dh_key_derive()
|
H A D | softEC.c | 223 uint32_t keylen; in soft_ec_key_derive() local 256 keylen = DES_KEYSIZE; in soft_ec_key_derive() 259 keylen = DES2_KEYSIZE; in soft_ec_key_derive() 262 keylen = DES3_KEYSIZE; in soft_ec_key_derive() 269 keylen = (uint32_t)OBJ_SEC_VALUE_LEN(secretkey); in soft_ec_key_derive() 271 keylen = OBJ_SEC_VALUE_LEN(secretkey); in soft_ec_key_derive() 302 if (keylen == 0) in soft_ec_key_derive() 303 keylen = secret_item.len; in soft_ec_key_derive() 305 if (keylen > secret_item.len) { in soft_ec_key_derive() 309 buf = malloc(keylen); in soft_ec_key_derive() [all …]
|
/titanic_41/usr/src/lib/libnsl/include/rpcsvc/ |
H A D | nis_dhext.h | 58 ushort_t keylen; member 78 keylen_t keylen; member 113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\ 138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, 141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
|
/titanic_41/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 99 keylen_t keylen, /* in */ in get_and_set_seckey() argument 114 skeylen = BITS2NIBBLES(keylen) + 1; in get_and_set_seckey() 120 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { in get_and_set_seckey() 126 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, in get_and_set_seckey() 134 "%d-%d", keylen, algtype); in get_and_set_seckey() 143 "for '%s'."), keylen, algtype, netname); in get_and_set_seckey() 152 keylen, algtype); in get_and_set_seckey() 276 "key type = %d-%d", mp->keylen, in establish_key() 279 if (!get_and_set_seckey(pamh, netname, mp->keylen, in establish_key()
|
/titanic_41/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, in __getpublickey_cached_g() argument 52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, in getpublickey_g() argument 61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_encryptsession_pk_g() argument 80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_decryptsession_pk_g() argument
|