Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 93) sorted by relevance

1234

/titanic_41/usr/src/common/net/wanboot/crypt/
H A Dhmac_test.c47 int keylen; member
63 td[0].keylen = 20; in hmactest()
65 td[0].keylen); in hmactest()
70 td[1].keylen = 4; in hmactest()
76 td[2].keylen = 20; in hmactest()
78 td[2].keylen); in hmactest()
84 td[3].keylen = 25; in hmactest()
86 "1819", td[3].keylen); in hmactest()
93 td[4].keylen = 20; in hmactest()
95 td[4].keylen); in hmactest()
[all …]
/titanic_41/usr/src/lib/libnsl/yp/
H A Dyp_match.c66 int keylen; member
96 makenode(char *domain, char *map, int keylen, int vallen) in makenode() argument
108 ((n->key = malloc(keylen)) == 0) || in makenode()
122 in_cache(char *domain, char *map, char *key, int keylen, char **val, in in_cache() argument
138 if ((c->keylen == keylen) && in in_cache()
139 (memcmp(key, c->key, (size_t)keylen) == 0) && in in_cache()
176 __yp_match_cflookup(char *domain, char *map, char *key, int keylen, char **val, in __yp_match_cflookup() argument
199 (key == NULL) || (keylen == 0)) in __yp_match_cflookup()
203 found_it = in_cache(domain, map, key, keylen, &my_val, &my_vallen); in __yp_match_cflookup()
227 reason = domatch(domain, map, key, keylen, pdomb, in __yp_match_cflookup()
[all …]
/titanic_41/usr/src/cmd/keyserv/
H A Dkeyserv_cache.h52 #define KEYLEN(keylen) (((keylen)+7)/8) argument
55 #define DHKEYALLOC(keylen) ALIGN4(sizeof (struct dhkey) + KEYLEN(keylen)) argument
68 #define CACHEKEY3_LIST_SIZE(keylen) (sizeof (struct cachekey3_list) + \ argument
70 2*(ALIGN4(2*KEYLEN(keylen)+1)) + \
73 int create_cache_file(keylen_t keylen, algtype_t algtype,
76 int cache_insert(keylen_t keylen, algtype_t algtype,
82 struct cachekey3_list *cache_retrieve(keylen_t keylen, algtype_t algtype,
86 int cache_remove(keylen_t keylen, algtype_t algtype,
90 void print_cache(keylen_t keylen, algtype_t algtype);
H A Dkeyserv_cache.c44 keylen_t keylen; member
75 #define SKCK_LEN(keylen) ALIGN8(sizeof (struct skck) + KEYLEN(keylen)) argument
77 #define CACHEKEY_RECLEN(keylen) ALIGN8(sizeof (struct cachekey_disklist) - 1 + \ argument
78 KEYLEN(keylen) + SKCK_LEN(keylen))
87 keylen_t keylen; /* in bits */ member
104 static struct cachekey_header *create_cache_file_ch(keylen_t keylen,
126 static struct cachekey *get_cache_header(keylen_t keylen,
201 create_cache_file_ch(keylen_t keylen, algtype_t algtype, int sizespec) in create_cache_file_ch() argument
214 keylen, algtype) > sizeof (filename)) { in create_cache_file_ch()
216 "error constructing file name for mech %d-%d", keylen, algtype); in create_cache_file_ch()
[all …]
H A Dchkey.c165 if (!xencrypt_g(slist[mcount], CURMECH->keylen, in encryptkeys()
240 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getpublics()
246 if (!getpublickey_g(netname, CURMECH->keylen, in getpublics()
303 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in makenewkeys()
316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys()
499 hexkeylen = ((CURMECH->keylen / 8) * 2) + 1; in getsecrets()
508 if (!getsecretkey_g(netname, CURMECH->keylen, in getsecrets()
530 CURMECH->keylen, in getsecrets()
656 keylogin(keylen_t keylen, algtype_t algtype) in keylogin() argument
662 if (keylen == CURMECH->keylen && in keylogin()
[all …]
H A Dkeylogin.c114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument
159 hexkeybytes = ((keylen + 7) / 8) * 2; in write_rootkey()
174 if (keylen == 192) { in write_rootkey()
201 if (keylen == 192) in write_rootkey()
213 if (keylen == 192) in write_rootkey()
369 if (getsecretkey_g(fullname, mechlist[i]->keylen, in main()
371 (((mechlist[i]->keylen / 7) + in main()
389 mechlist[i]->keylen, NULL, 0, in main()
401 mechlist[i]->keylen, in main()
H A Dsetkey.c156 keylen_t keylen; member
175 *kpp != NULL && (*kpp)->keylen != k; in getkeylen()
194 kp->keylen = k; in appendkeylist()
539 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) { in storesecretkey3()
587 ("storeotherrootkeys key %d", kp->keylen)); in storeotherrootkeys()
591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys()
597 kp->keylen, ap->algtype, in storeotherrootkeys()
613 skey.keylen = kp->keylen; in storeotherrootkeys()
615 if (CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys()
622 if (!CLASSIC_PK_DH(kp->keylen, ap->algtype)) { in storeotherrootkeys()
[all …]
/titanic_41/usr/src/lib/libnsl/key/
H A Dpublickey.c152 int keylen, err, r = 0; in getkeys_nis() local
171 strlen(netname), &keyval, &keylen, 0); in getkeys_nis()
350 keylen_t keylen, /* in */ in extract_secret_g() argument
358 !VALID_KEYALG(keylen, algtype)) { in extract_secret_g()
375 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { in extract_secret_g()
430 keylen_t keylen, /* in */ in getkeys_ldap_g() argument
437 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in getkeys_ldap_g()
459 dh_caps_str, keylen, algtype); in getkeys_ldap_g()
507 keylen_t keylen, in netname2hashname() argument
510 const bool_t classic_des = AUTH_DES_KEY(keylen, algtype); in netname2hashname()
[all …]
H A Dgen_dhkeys.c170 keylen_t keylen, /* in */ in __gen_dhkeys_g() argument
174 const int classic_des = keylen == 192 && algtype == 0; in __gen_dhkeys_g()
185 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_dhkeys_g()
258 keylen_t keylen, /* in */ in __gen_common_dhkeys_g() argument
263 const int classic_des = keylen == 192 && algtype == 0; in __gen_common_dhkeys_g()
284 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_common_dhkeys_g()
H A Dxcrypt.c242 keylen_t keylen, /* in */ in xencrypt_g() argument
253 const int classic_des = keylen == 192 && algtype == 0; in xencrypt_g()
254 const int hexkeybytes = BITS2NIBBLES(keylen); in xencrypt_g()
256 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 : in xencrypt_g()
257 keylen/8; in xencrypt_g()
262 if (!secret || !keylen || !passwd || !encrypted_secret) in xencrypt_g()
347 int keylen, /* in */ in xdecrypt_g() argument
358 const int classic_des = keylen == 192 && algtype == 0; in xdecrypt_g()
359 const int hexkeybytes = BITS2NIBBLES(keylen); in xdecrypt_g()
/titanic_41/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Dgeneric_key.c77 adjust(char *keyout, char *keyin, int keylen) in adjust() argument
81 int hexkeybytes = (keylen+3)/4; in adjust()
102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ in __generic_gen_dhkeys() argument
130 len = ((keylen + BASEBITS - 1) / BASEBITS); in __generic_gen_dhkeys()
161 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys()
167 (void) adjust(public, xkey, keylen); in __generic_gen_dhkeys()
183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) in extractdeskeys() argument
203 for (i = 0; i < ((keylen - len)/2)/8; i++) in extractdeskeys()
221 if (keylen == 192) /* Old broken way for compatibility */ in extractdeskeys()
242 int keylen, /* All the keys have this many bits */ in __generic_common_dhkeys() argument
[all …]
/titanic_41/usr/src/lib/libdns_sd/common/
H A Ddnssd_clientlib.c115 unsigned long *keylen in InternalTXTRecordSearch() argument
120 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch()
125 if (p <= e && *keylen <= x[0] && !strncmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch()
126 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch()
277 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local
278 uint8_t *item = InternalTXTRecordSearch(txtRec->datalen, txtRec->buffer, key, &keylen); in TXTRecordRemoveValue()
304 unsigned long keylen; in TXTRecordContainsKey() local
305 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey()
316 unsigned long keylen; in TXTRecordGetValuePtr() local
317 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr()
[all …]
/titanic_41/usr/src/lib/libnsl/rpc/
H A Dkey_call.c122 keylen_t keylen, in key_setsecret_g() argument
129 if (CLASSIC_PK_DH(keylen, algtype)) in key_setsecret_g()
131 arg.key.keybuf3_len = keylen/4 + 1; in key_setsecret_g()
134 arg.keylen = keylen; in key_setsecret_g()
238 key_secretkey_is_set_g_ext(keylen_t keylen, algtype_t algtype, int use_ruid) in key_secretkey_is_set_g_ext() argument
249 if ((keylen == 0) && key_secretkey_is_set_ext(use_ruid)) in key_secretkey_is_set_g_ext()
251 if (CLASSIC_PK_DH(keylen, algtype)) in key_secretkey_is_set_g_ext()
253 arg.keylen = keylen; in key_secretkey_is_set_g_ext()
273 key_secretkey_is_set_g(keylen_t keylen, algtype_t algtype) in key_secretkey_is_set_g() argument
275 return (key_secretkey_is_set_g_ext(keylen, algtype, 0)); in key_secretkey_is_set_g()
[all …]
/titanic_41/usr/src/uts/common/io/
H A Dsuntpi.c148 size_t keylen; in tpi_findprov() local
157 key = tpi_makekey(WR(q), &keylen); in tpi_findprov()
159 if (keylen == 0) { in tpi_findprov()
170 if ((*tpp)->tpi_keylen == keylen && in tpi_findprov()
171 bcmp((*tpp)->tpi_key, key, keylen) == 0) { in tpi_findprov()
181 (*tpp)->tpi_key = kmem_alloc(keylen, KM_SLEEP); in tpi_findprov()
182 bcopy(key, (*tpp)->tpi_key, keylen); in tpi_findprov()
183 (*tpp)->tpi_keylen = keylen; in tpi_findprov()
/titanic_41/usr/src/lib/libnsl/nis/gen/
H A Dnis_sec_mechs.c429 m->keylen = 192; in get_secfile_ent()
434 m->keylen = NIS_SEC_CF_NA_KA; in get_secfile_ent()
440 m->keylen = atoi(*(flds + kl_offset)); in get_secfile_ent()
466 if (mp->keylen != tp->keylen) in equal_entries()
502 tp->keylen = mp->keylen; in sf_copy_mech_ent()
656 __nis_translate_mechanism(const char *mechname, int *keylen, int *algtype) in __nis_translate_mechanism() argument
661 if (!mechname || !keylen || !algtype) in __nis_translate_mechanism()
666 *keylen = AUTH_DES_KEYLEN; in __nis_translate_mechanism()
679 *keylen = mp->keylen; in __nis_translate_mechanism()
686 *keylen = mp->keylen; in __nis_translate_mechanism()
[all …]
/titanic_41/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkeypair.c50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, in genkeypair_pkcs11() argument
61 keylength = keylen; /* bits */ in genkeypair_pkcs11()
133 KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, in genkeypair_file() argument
163 keylength = keylen; /* bits */ in genkeypair_file()
228 int keylen, KMF_CREDENTIAL *tokencred, in genkeypair_nss() argument
247 keylength = keylen; /* bits */ in genkeypair_nss()
329 int keylen = PK_DEFAULT_KEYLENGTH; in pk_genkeypair() local
382 &keylen) != 1) { in pk_genkeypair()
469 keylen = 1024; in pk_genkeypair()
470 else if (keylen > 1024 || keylen < 512) { in pk_genkeypair()
[all …]
H A Dgenkey.c40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) in genkey_nss() argument
63 keylength = keylen; in genkey_nss()
109 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, in genkey_pkcs11() argument
167 keylength = keylen; /* bits */ in genkey_pkcs11()
255 genkey_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, char *dir, in genkey_file() argument
286 keylength = keylen; in genkey_file()
370 int keylen = 0; in pk_genkey() local
468 keylen = 64; /* fixed size; ignore input */ in pk_genkey()
470 keylen = 192; /* fixed size; ignore input */ in pk_genkey()
478 if (sscanf(keylenstr, "%d", &keylen) != 1) { in pk_genkey()
[all …]
/titanic_41/usr/src/grub/grub-0.97/stage2/
H A Dmd5.c209 int keylen = strlen (key); in md5_password() local
238 md5_update (key, keylen); in md5_password()
240 md5_update (key, keylen); in md5_password()
246 md5_update (key, keylen); in md5_password()
248 for (i = keylen; i > 16; i -= 16) in md5_password()
252 for (i = keylen; i > 0; i >>= 1) in md5_password()
253 md5_update (key + ((i & 1) ? keylen : 0), 1); in md5_password()
263 md5_update (key, keylen); in md5_password()
271 md5_update (key, keylen); in md5_password()
276 md5_update (key, keylen); in md5_password()
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dencrypt.c165 int keylen; member
749 kp->keylen = 0; in encrypt_keyid()
754 if (kp->keylen == 0) in encrypt_keyid()
756 kp->keylen = 0; in encrypt_keyid()
758 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
760 } else if ((len != kp->keylen) || in encrypt_keyid()
765 kp->keylen = len; in encrypt_keyid()
768 (void) (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
771 ret = (*ep->keyid)(dir, kp->keyid, &kp->keylen); in encrypt_keyid()
777 encrypt_send_keyid(dir, kp->keyid, kp->keylen, 0); in encrypt_keyid()
[all …]
/titanic_41/usr/src/cmd/sendmail/src/
H A Dudb.c141 int keylen; local
180 keylen = sm_strlcpyn(keybuf, sizeof(keybuf), 2, user, ":maildrop");
183 if (keylen >= sizeof(keybuf))
219 key.size = keylen;
222 keybuf, keylen);
245 keybuf, keylen);
261 while (i == 0 && key.size == keylen &&
262 memcmp(key.data, keybuf, keylen) == 0)
361 keylen = strlen(keybuf);
363 key.size = keylen;
[all …]
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDH.c210 uint32_t keylen; in soft_dh_key_derive() local
226 keylen = OBJ_SEC_VALUE_LEN(secretkey); in soft_dh_key_derive()
227 if (keylen > sizeof (key)) { /* check for overflow */ in soft_dh_key_derive()
240 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen, 0); in soft_dh_key_derive()
246 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { in soft_dh_key_derive()
251 OBJ_SEC_VALUE_LEN(secretkey) = keylen; in soft_dh_key_derive()
252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); in soft_dh_key_derive()
H A DsoftEC.c223 uint32_t keylen; in soft_ec_key_derive() local
256 keylen = DES_KEYSIZE; in soft_ec_key_derive()
259 keylen = DES2_KEYSIZE; in soft_ec_key_derive()
262 keylen = DES3_KEYSIZE; in soft_ec_key_derive()
269 keylen = (uint32_t)OBJ_SEC_VALUE_LEN(secretkey); in soft_ec_key_derive()
271 keylen = OBJ_SEC_VALUE_LEN(secretkey); in soft_ec_key_derive()
302 if (keylen == 0) in soft_ec_key_derive()
303 keylen = secret_item.len; in soft_ec_key_derive()
305 if (keylen > secret_item.len) { in soft_ec_key_derive()
309 buf = malloc(keylen); in soft_ec_key_derive()
[all …]
/titanic_41/usr/src/lib/libnsl/include/rpcsvc/
H A Dnis_dhext.h58 ushort_t keylen; member
78 keylen_t keylen; member
113 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\
138 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype,
141 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
/titanic_41/usr/src/lib/pam_modules/dhkeys/
H A Ddhkeys.c99 keylen_t keylen, /* in */ in get_and_set_seckey() argument
114 skeylen = BITS2NIBBLES(keylen) + 1; in get_and_set_seckey()
120 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { in get_and_set_seckey()
126 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, in get_and_set_seckey()
134 "%d-%d", keylen, algtype); in get_and_set_seckey()
143 "for '%s'."), keylen, algtype, netname); in get_and_set_seckey()
152 keylen, algtype); in get_and_set_seckey()
276 "key type = %d-%d", mp->keylen, in establish_key()
279 if (!get_and_set_seckey(pamh, netname, mp->keylen, in establish_key()
/titanic_41/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, in __getpublickey_cached_g() argument
52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, in getpublickey_g() argument
61 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_encryptsession_pk_g() argument
80 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_decryptsession_pk_g() argument

1234