Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 22 of 22) sorted by relevance

/titanic_41/usr/src/common/net/wanboot/crypt/
H A Daes_test.c49 uint32_t keysize; member
87 (void) printf("Test #%d [AES%d] ", i, td[i].keysize * 8); in aestest()
88 getxdata(key, td[i].key, td[i].keysize); in aestest()
89 aes_key(ah, key, td[i].keysize); in aestest()
H A Dcbc.c127 cbc_makehandle(cbc_handle_t *ch, void *cookie, uint32_t keysize, in cbc_makehandle() argument
133 ch->keylen = keysize; in cbc_makehandle()
H A Dcbc.h51 extern void cbc_makehandle(cbc_handle_t *ch, void *cookie, uint32_t keysize,
H A Daes.c1166 aes_keycheck(const uint8_t *key, uint32_t keysize) in aes_keycheck() argument
1174 switch (keysize) { in aes_keycheck()
1191 aes_key(void *cookie, const uint8_t *key, uint32_t keysize) in aes_key() argument
1202 keybits = keysize * 8; in aes_key()
/titanic_41/usr/src/common/crypto/des/
H A Ddes_impl.c719 uint8_t keysize = DES3_KEYSIZE; in des23_keycheck() local
727 keysize = DES2_KEYSIZE; in des23_keycheck()
732 bcopy(key, aligned_key, keysize); in des23_keycheck()
770 bcopy(currentkey, corrected_key, keysize); in des23_keycheck()
852 uint_t keysize, i, j; in des_init_keysched() local
856 keysize = DES_KEYSIZE; in des_init_keysched()
861 keysize = DES2_KEYSIZE; in des_init_keysched()
866 keysize = DES3_KEYSIZE; in des_init_keysched()
878 for (i = 0, j = 0; j < keysize; i++, j += 8) { in des_init_keysched()
885 for (i = 0, j = 0; j < keysize; i++, j += 8) { in des_init_keysched()
[all …]
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/wanboot/ickey/
H A Dickey.c59 const int keysize; /* size of hex string representation */ member
198 assert((k->keysize % 2) == 0); in installkey()
199 wkio.wk_keysize = k->keysize / 2; in installkey()
258 if (len != k->keysize) { in getkey()
261 k->keysize, len); in getkey()
/titanic_41/usr/src/lib/libdns_sd/common/
H A Ddnssd_clientlib.c236 unsigned long keysize, keyvalsize; in TXTRecordSetValue() local
239 keysize = (unsigned long)(k - key); in TXTRecordSetValue()
240 keyvalsize = 1 + keysize + (value ? (1 + valueSize) : 0); in TXTRecordSetValue()
241 if (keysize < 1 || keyvalsize > 255) return(kDNSServiceErr_Invalid); in TXTRecordSetValue()
258 memcpy(p, key, keysize); in TXTRecordSetValue()
259 p += keysize; in TXTRecordSetValue()
/titanic_41/usr/src/lib/libresolv2/common/dst/
H A Dsupport.c98 dst_s_id_calc(const u_char *key, const int keysize) in dst_s_id_calc() argument
102 int size = keysize; in dst_s_id_calc()
104 if (!key || (keysize <= 0)) in dst_s_id_calc()
/titanic_41/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c429 CK_ULONG keysize = 0; in execute_cmd() local
483 (char **)&pkeydata, (size_t *)&keysize, 0, B_FALSE); in execute_cmd()
487 (size_t *)&keysize); in execute_cmd()
491 (size_t *)&keysize, 0, in execute_cmd()
495 if (status != 0 || keysize == 0L) { in execute_cmd()
809 keysize, &key); in execute_cmd()
862 template[nattr].ulValueLen = keysize; in execute_cmd()
883 (size_t)keysize, (void *)salt, sizeof (salt), iterations, in execute_cmd()
957 bzero(pkeydata, keysize); in execute_cmd()
/titanic_41/usr/src/cmd/fs.d/nfs/nfslog/
H A Ddbtab.c95 static int store_record(struct db_list *dbp, void *keyaddr, int keysize,
97 static void *fetch_record(struct db_list *dbp, void *keyaddr, int keysize,
99 static int delete_record(struct db_list *dbp, void *keyaddr, int keysize,
101 static int db_update_fhrec(struct db_list *dbp, void *keyaddr, int keysize,
103 static int db_update_linkinfo(struct db_list *dbp, void *keyaddr, int keysize,
461 store_record(struct db_list *dbp, void *keyaddr, int keysize, void *dataaddr, in store_record() argument
471 key.dsize = keysize; in store_record()
514 fetch_record(struct db_list *dbp, void *keyaddr, int keysize, void *dataaddr, in fetch_record() argument
524 key.dsize = keysize; in fetch_record()
572 delete_record(struct db_list *dbp, void *keyaddr, int keysize, char *str) in delete_record() argument
[all …]
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dpkcs11slot.c144 size_t keysize, keylength; in slot_supports_krb5() local
158 keysize = krb5_enctypes_list[i].enc->keybytes; in slot_supports_krb5()
/titanic_41/usr/src/cmd/unpack/
H A Dunpack.c496 int keysize, i, *t; in expand() local
511 for (keysize = getwdsize(); keysize--; ) { in expand()
/titanic_41/usr/src/common/crypto/aes/
H A Daes_impl.c1572 uint_t keysize, i, j; in aes_init_keysched() local
1595 keysize = CRYPTO_BITS2BYTES(keyBits); in aes_init_keysched()
1608 for (i = 0, j = 0; j < keysize; i++, j += 8) { in aes_init_keysched()
1613 bcopy(cipherKey, keyarr.ka32, keysize); in aes_init_keysched()
1617 for (i = 0, j = 0; j < keysize; i++, j += 4) { in aes_init_keysched()
/titanic_41/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c384 CK_ULONG keysize; in execute_cmd() local
667 keysize = 0; in execute_cmd()
670 keysize = 16; /* 128 bits */ in execute_cmd()
681 sizeof (salt), iterations, keytype, keysize, in execute_cmd()
/titanic_41/usr/src/cmd/sendmail/src/
H A Dudb.c857 int keysize = strlen(name); local
859 if (keysize > sizeof(keybuf) - 1)
860 keysize = sizeof(keybuf) - 1;
861 memmove(keybuf, name, keysize);
862 keybuf[keysize] = '\0';
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/
H A Dderive.c105 krb5_create_derived_keyblock(int keysize) in krb5_create_derived_keyblock() argument
115 key->length = keysize; in krb5_create_derived_keyblock()
/titanic_41/usr/src/lib/libc/port/gen/
H A Dnss_dbdefs.c876 nssuint_t off, *uptr, keysize; in nss_upack_key2arg() local
887 keysize = pbuf->data_off - pbuf->key_off; in nss_upack_key2arg()
1029 if (*uptr >= keysize) in nss_upack_key2arg()
1036 if (*uptr >= keysize) in nss_upack_key2arg()
/titanic_41/usr/src/common/crypto/aes/amd64/
H A Daes_intel.s575 mov $-2, %rax / keysize is invalid
577 xor %rax, %rax / a key pointer is NULL or invalid keysize
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c631 CK_ULONG keysize = OBJ_SEC_VALUE_LEN(derived_key); in soft_pkcs12_pbe() local
723 c = PBE_CEIL(keysize, hashSize); in soft_pkcs12_pbe()
822 (void) memcpy(keybuf, A, keysize); in soft_pkcs12_pbe()
/titanic_41/usr/src/lib/libresolv2/common/nameser/
H A Dns_print.c618 int mode, err, keysize; in ns_sprintrrf() local
638 keysize = ns_get16(rdata); rdata += NS_INT16SZ; in ns_sprintrrf()
639 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize)); in ns_sprintrrf()
/titanic_41/usr/src/lib/libsqlite/src/
H A Dvdbe.c2601 int keysize; in sqliteVdbeExec() local
2602 res = sqliteBtreeKeySize(pC->pCursor,&keysize)!=0 || keysize==0; in sqliteVdbeExec()
/titanic_41/usr/src/cmd/ssh/doc/
H A DChangeLog1294 - keysize warnings error() -> log()
2053 keysize warnings talk about identity files
2165 warn about keysize-mismatch with log() not error()
2359 the keysize of rsa-parameter 'n' is passed implizit,