/titanic_41/usr/src/common/net/wanboot/crypt/ |
H A D | aes_test.c | 49 uint32_t keysize; member 87 (void) printf("Test #%d [AES%d] ", i, td[i].keysize * 8); in aestest() 88 getxdata(key, td[i].key, td[i].keysize); in aestest() 89 aes_key(ah, key, td[i].keysize); in aestest()
|
H A D | cbc.c | 127 cbc_makehandle(cbc_handle_t *ch, void *cookie, uint32_t keysize, in cbc_makehandle() argument 133 ch->keylen = keysize; in cbc_makehandle()
|
H A D | cbc.h | 51 extern void cbc_makehandle(cbc_handle_t *ch, void *cookie, uint32_t keysize,
|
H A D | aes.c | 1166 aes_keycheck(const uint8_t *key, uint32_t keysize) in aes_keycheck() argument 1174 switch (keysize) { in aes_keycheck() 1191 aes_key(void *cookie, const uint8_t *key, uint32_t keysize) in aes_key() argument 1202 keybits = keysize * 8; in aes_key()
|
/titanic_41/usr/src/common/crypto/des/ |
H A D | des_impl.c | 719 uint8_t keysize = DES3_KEYSIZE; in des23_keycheck() local 727 keysize = DES2_KEYSIZE; in des23_keycheck() 732 bcopy(key, aligned_key, keysize); in des23_keycheck() 770 bcopy(currentkey, corrected_key, keysize); in des23_keycheck() 852 uint_t keysize, i, j; in des_init_keysched() local 856 keysize = DES_KEYSIZE; in des_init_keysched() 861 keysize = DES2_KEYSIZE; in des_init_keysched() 866 keysize = DES3_KEYSIZE; in des_init_keysched() 878 for (i = 0, j = 0; j < keysize; i++, j += 8) { in des_init_keysched() 885 for (i = 0, j = 0; j < keysize; i++, j += 8) { in des_init_keysched() [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/wanboot/ickey/ |
H A D | ickey.c | 59 const int keysize; /* size of hex string representation */ member 198 assert((k->keysize % 2) == 0); in installkey() 199 wkio.wk_keysize = k->keysize / 2; in installkey() 258 if (len != k->keysize) { in getkey() 261 k->keysize, len); in getkey()
|
/titanic_41/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_clientlib.c | 236 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local 239 keysize = (unsigned long)(k - key); in TXTRecordSetValue() 240 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue() 241 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue() 258 memcpy(p, key, keysize); in TXTRecordSetValue() 259 p += keysize; in TXTRecordSetValue()
|
/titanic_41/usr/src/lib/libresolv2/common/dst/ |
H A D | support.c | 98 dst_s_id_calc(const u_char *key, const int keysize) in dst_s_id_calc() argument 102 int size = keysize; in dst_s_id_calc() 104 if (!key || (keysize <= 0)) in dst_s_id_calc()
|
/titanic_41/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 429 CK_ULONG keysize = 0; in execute_cmd() local 483 (char **)&pkeydata, (size_t *)&keysize, 0, B_FALSE); in execute_cmd() 487 (size_t *)&keysize); in execute_cmd() 491 (size_t *)&keysize, 0, in execute_cmd() 495 if (status != 0 || keysize == 0L) { in execute_cmd() 809 keysize, &key); in execute_cmd() 862 template[nattr].ulValueLen = keysize; in execute_cmd() 883 (size_t)keysize, (void *)salt, sizeof (salt), iterations, in execute_cmd() 957 bzero(pkeydata, keysize); in execute_cmd()
|
/titanic_41/usr/src/cmd/fs.d/nfs/nfslog/ |
H A D | dbtab.c | 95 static int store_record(struct db_list *dbp, void *keyaddr, int keysize, 97 static void *fetch_record(struct db_list *dbp, void *keyaddr, int keysize, 99 static int delete_record(struct db_list *dbp, void *keyaddr, int keysize, 101 static int db_update_fhrec(struct db_list *dbp, void *keyaddr, int keysize, 103 static int db_update_linkinfo(struct db_list *dbp, void *keyaddr, int keysize, 461 store_record(struct db_list *dbp, void *keyaddr, int keysize, void *dataaddr, in store_record() argument 471 key.dsize = keysize; in store_record() 514 fetch_record(struct db_list *dbp, void *keyaddr, int keysize, void *dataaddr, in fetch_record() argument 524 key.dsize = keysize; in fetch_record() 572 delete_record(struct db_list *dbp, void *keyaddr, int keysize, char *str) in delete_record() argument [all …]
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pkcs11slot.c | 144 size_t keysize, keylength; in slot_supports_krb5() local 158 keysize = krb5_enctypes_list[i].enc->keybytes; in slot_supports_krb5()
|
/titanic_41/usr/src/cmd/unpack/ |
H A D | unpack.c | 496 int keysize, i, *t; in expand() local 511 for (keysize = getwdsize(); keysize--; ) { in expand()
|
/titanic_41/usr/src/common/crypto/aes/ |
H A D | aes_impl.c | 1572 uint_t keysize, i, j; in aes_init_keysched() local 1595 keysize = CRYPTO_BITS2BYTES(keyBits); in aes_init_keysched() 1608 for (i = 0, j = 0; j < keysize; i++, j += 8) { in aes_init_keysched() 1613 bcopy(cipherKey, keyarr.ka32, keysize); in aes_init_keysched() 1617 for (i = 0, j = 0; j < keysize; i++, j += 4) { in aes_init_keysched()
|
/titanic_41/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 384 CK_ULONG keysize; in execute_cmd() local 667 keysize = 0; in execute_cmd() 670 keysize = 16; /* 128 bits */ in execute_cmd() 681 sizeof (salt), iterations, keytype, keysize, in execute_cmd()
|
/titanic_41/usr/src/cmd/sendmail/src/ |
H A D | udb.c | 857 int keysize = strlen(name); local 859 if (keysize > sizeof(keybuf) - 1) 860 keysize = sizeof(keybuf) - 1; 861 memmove(keybuf, name, keysize); 862 keybuf[keysize] = '\0';
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | derive.c | 105 krb5_create_derived_keyblock(int keysize) in krb5_create_derived_keyblock() argument 115 key->length = keysize; in krb5_create_derived_keyblock()
|
/titanic_41/usr/src/lib/libc/port/gen/ |
H A D | nss_dbdefs.c | 876 nssuint_t off, *uptr, keysize; in nss_upack_key2arg() local 887 keysize = pbuf->data_off - pbuf->key_off; in nss_upack_key2arg() 1029 if (*uptr >= keysize) in nss_upack_key2arg() 1036 if (*uptr >= keysize) in nss_upack_key2arg()
|
/titanic_41/usr/src/common/crypto/aes/amd64/ |
H A D | aes_intel.s | 575 mov $-2, %rax / keysize is invalid 577 xor %rax, %rax / a key pointer is NULL or invalid keysize
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 631 CK_ULONG keysize = OBJ_SEC_VALUE_LEN(derived_key); in soft_pkcs12_pbe() local 723 c = PBE_CEIL(keysize, hashSize); in soft_pkcs12_pbe() 822 (void) memcpy(keybuf, A, keysize); in soft_pkcs12_pbe()
|
/titanic_41/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_print.c | 618 int mode, err, keysize; in ns_sprintrrf() local 638 keysize = ns_get16(rdata); rdata += NS_INT16SZ; in ns_sprintrrf() 639 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize)); in ns_sprintrrf()
|
/titanic_41/usr/src/lib/libsqlite/src/ |
H A D | vdbe.c | 2601 int keysize; in sqliteVdbeExec() local 2602 res = sqliteBtreeKeySize(pC->pCursor,&keysize)!=0 || keysize==0; in sqliteVdbeExec()
|
/titanic_41/usr/src/cmd/ssh/doc/ |
H A D | ChangeLog | 1294 - keysize warnings error() -> log() 2053 keysize warnings talk about identity files 2165 warn about keysize-mismatch with log() not error() 2359 the keysize of rsa-parameter 'n' is passed implizit,
|