/titanic_44/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | pbkdf2.c | 64 CK_ULONG outlen, passlen; in krb5int_pbkdf2_hmac_sha1() local 111 passlen = (CK_ULONG)pass->length; in krb5int_pbkdf2_hmac_sha1() 112 params.ulPasswordLen = &passlen; in krb5int_pbkdf2_hmac_sha1()
|
/titanic_44/usr/src/lib/nsswitch/compat/common/ |
H A D | getspent.c | 110 size_t passlen = strlen(fields[1]) + 1; local 113 if (namelen + passlen > argp->buf.buflen) { 122 fields[1], passlen);
|
/titanic_44/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 638 unsigned passlen, 654 unsigned passlen, 1120 const char *pass, unsigned passlen); 1165 const char *pass, unsigned passlen,
|
H A D | saslplug.h | 120 const char *pass, unsigned passlen); 503 int (*transition)(sasl_conn_t *conn, const char *pass, unsigned passlen); 657 const char *pass, unsigned passlen,
|
/titanic_44/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 114 const char *passwd, size_t passlen, in _sasl_make_plain_secret() argument 118 const char *passwd, size_t passlen, in _sasl_make_plain_secret() 139 _sasl_MD5Update(&ctx, passwd, passlen); in _sasl_make_plain_secret()
|
H A D | server.c | 118 const char *pass, unsigned passlen); 150 const char *pass, unsigned passlen, in sasl_setpass() argument 175 if ((!(flags & SASL_SET_DISABLE) && passlen == 0) in sasl_setpass() 183 tmpresult = setpass_cb(conn, context, user, pass, passlen, in sasl_setpass() 211 passlen, in sasl_setpass() 1198 unsigned passlen) argument 1224 passlen, 2195 unsigned passlen __attribute__((unused))) argument 2278 unsigned passlen) argument 2347 result = _sasl_transition(conn, pass, passlen);
|
/titanic_44/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 212 const char *pass, int passlen, int use8859_1, in digest_hash_pass() argument 232 if (passlen == 0) passlen = strlen(pass); in digest_hash_pass() 233 MD5Update(&ctx, (CONST_UCHAR *) pass, passlen); in digest_hash_pass()
|
/titanic_44/usr/src/cmd/lofiadm/ |
H A D | main.c | 843 size_t passlen = 0; in getkeyfromuser() local 869 if (pkcs11_get_pass(NULL, &pass, &passlen, MIN_PASSLEN, B_TRUE) < 0) { in getkeyfromuser() 879 saltlen = passlen; in getkeyfromuser() 882 rv = pkcs11_PasswdToKey(sess, pass, passlen, salt, saltlen, ktype, in getkeyfromuser() 1009 size_t passlen = 0; in getkeyfromtoken() local 1026 if (pkcs11_get_pass(token->name, &pass, &passlen, 0, B_FALSE) < 0) in getkeyfromtoken() 1030 if (pass != NULL && passlen > 0) { in getkeyfromtoken() 1031 rv = C_Login(sess, CKU_USER, (CK_UTF8CHAR_PTR)pass, passlen); in getkeyfromtoken()
|
/titanic_44/usr/src/lib/libpkg/common/ |
H A D | pkgweb.c | 3133 int passlen; in pkg_passphrase_cb() local 3165 if (((passlen = snprintf(prompt_copy, in pkg_passphrase_cb() 3169 (passlen >= (MAX_PHRASELEN + 1))) { in pkg_passphrase_cb() 3202 if (((passlen = BIO_gets(pwdbio, buf, size)) < 1) || in pkg_passphrase_cb() 3203 (passlen > size)) { in pkg_passphrase_cb() 3211 if (passlen == size) { in pkg_passphrase_cb()
|
/titanic_44/usr/src/cmd/krb5/ldap_util/ |
H A D | kdb5_ldap_services.c | 1478 static int generate_random_password(krb5_context ctxt, char **randpwd, unsigned int *passlen) in generate_random_password() argument 1515 *passlen = data.length; in generate_random_password()
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 3798 openssl_parse_bag(PKCS12_SAFEBAG *bag, char *pass, int passlen, in openssl_parse_bag() argument 3824 p8 = M_PKCS12_decrypt_skey(bag, pass, passlen); in openssl_parse_bag()
|