Home
last modified time | relevance | path

Searched refs:passlen (Results 1 – 11 of 11) sorted by relevance

/titanic_44/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dpbkdf2.c64 CK_ULONG outlen, passlen; in krb5int_pbkdf2_hmac_sha1() local
111 passlen = (CK_ULONG)pass->length; in krb5int_pbkdf2_hmac_sha1()
112 params.ulPasswordLen = &passlen; in krb5int_pbkdf2_hmac_sha1()
/titanic_44/usr/src/lib/nsswitch/compat/common/
H A Dgetspent.c110 size_t passlen = strlen(fields[1]) + 1; local
113 if (namelen + passlen > argp->buf.buflen) {
122 fields[1], passlen);
/titanic_44/usr/src/lib/libsasl/include/
H A Dsasl.h638 unsigned passlen,
654 unsigned passlen,
1120 const char *pass, unsigned passlen);
1165 const char *pass, unsigned passlen,
H A Dsaslplug.h120 const char *pass, unsigned passlen);
503 int (*transition)(sasl_conn_t *conn, const char *pass, unsigned passlen);
657 const char *pass, unsigned passlen,
/titanic_44/usr/src/lib/libsasl/lib/
H A Dcheckpw.c114 const char *passwd, size_t passlen, in _sasl_make_plain_secret() argument
118 const char *passwd, size_t passlen, in _sasl_make_plain_secret()
139 _sasl_MD5Update(&ctx, passwd, passlen); in _sasl_make_plain_secret()
H A Dserver.c118 const char *pass, unsigned passlen);
150 const char *pass, unsigned passlen, in sasl_setpass() argument
175 if ((!(flags & SASL_SET_DISABLE) && passlen == 0) in sasl_setpass()
183 tmpresult = setpass_cb(conn, context, user, pass, passlen, in sasl_setpass()
211 passlen, in sasl_setpass()
1198 unsigned passlen) argument
1224 passlen,
2195 unsigned passlen __attribute__((unused))) argument
2278 unsigned passlen) argument
2347 result = _sasl_transition(conn, pass, passlen);
/titanic_44/usr/src/lib/libldap5/sources/ldap/common/
H A Ddigest_md5.c212 const char *pass, int passlen, int use8859_1, in digest_hash_pass() argument
232 if (passlen == 0) passlen = strlen(pass); in digest_hash_pass()
233 MD5Update(&ctx, (CONST_UCHAR *) pass, passlen); in digest_hash_pass()
/titanic_44/usr/src/cmd/lofiadm/
H A Dmain.c843 size_t passlen = 0; in getkeyfromuser() local
869 if (pkcs11_get_pass(NULL, &pass, &passlen, MIN_PASSLEN, B_TRUE) < 0) { in getkeyfromuser()
879 saltlen = passlen; in getkeyfromuser()
882 rv = pkcs11_PasswdToKey(sess, pass, passlen, salt, saltlen, ktype, in getkeyfromuser()
1009 size_t passlen = 0; in getkeyfromtoken() local
1026 if (pkcs11_get_pass(token->name, &pass, &passlen, 0, B_FALSE) < 0) in getkeyfromtoken()
1030 if (pass != NULL && passlen > 0) { in getkeyfromtoken()
1031 rv = C_Login(sess, CKU_USER, (CK_UTF8CHAR_PTR)pass, passlen); in getkeyfromtoken()
/titanic_44/usr/src/lib/libpkg/common/
H A Dpkgweb.c3133 int passlen; in pkg_passphrase_cb() local
3165 if (((passlen = snprintf(prompt_copy, in pkg_passphrase_cb()
3169 (passlen >= (MAX_PHRASELEN + 1))) { in pkg_passphrase_cb()
3202 if (((passlen = BIO_gets(pwdbio, buf, size)) < 1) || in pkg_passphrase_cb()
3203 (passlen > size)) { in pkg_passphrase_cb()
3211 if (passlen == size) { in pkg_passphrase_cb()
/titanic_44/usr/src/cmd/krb5/ldap_util/
H A Dkdb5_ldap_services.c1478 static int generate_random_password(krb5_context ctxt, char **randpwd, unsigned int *passlen) in generate_random_password() argument
1515 *passlen = data.length; in generate_random_password()
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c3798 openssl_parse_bag(PKCS12_SAFEBAG *bag, char *pass, int passlen, in openssl_parse_bag() argument
3824 p8 = M_PKCS12_decrypt_skey(bag, pass, passlen); in openssl_parse_bag()