Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 25 of 53) sorted by relevance

123

/titanic_50/usr/src/uts/common/ipp/ipgpc/
H A Dtrie.c121 t_split(node_t **c_node, uint8_t pos, uint8_t key_len) in t_split() argument
141 bit = EXTRACTBIT(nodep->val, pos, key_len); in t_split()
162 (nodep->zero->pos - i), key_len), in t_split()
163 key_len); in t_split()
165 (nodep->zero->pos - i), 1, key_len); in t_split()
188 (nodep->one->pos - i), key_len), in t_split()
189 key_len); in t_split()
191 (nodep->one->pos - i), 1, key_len); in t_split()
199 UNSETBIT(nodep->val, i, key_len); in t_split()
200 UNSETBIT(nodep->mask, i, key_len); in t_split()
[all …]
/titanic_50/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_ht.c188 int key_len = handle->ht_key_size; in ht_default_hash() local
190 while (key_len--) { in ht_default_hash()
232 size_t h_index, key_len; in ht_add_item() local
240 key_len = handle->ht_key_size; in ht_add_item()
242 key_len = strlen(key); in ht_add_item()
244 if (key_len > handle->ht_key_size) in ht_add_item()
248 ++key_len; in ht_add_item()
251 msize = key_len + sizeof (HT_ITEM); in ht_add_item()
257 (void) memcpy(item->hi_key, key, key_len); in ht_add_item()
312 int key_len; in ht_remove_item() local
[all …]
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa_enc.c134 hmac_sha1(unsigned char *key, unsigned int key_len, in hmac_sha1() argument
138 (void) HMAC(EVP_sha1(), key, key_len, data, data_len, mac, &mac_len); in hmac_sha1()
143 hmac_sha1_vector(unsigned char *key, unsigned int key_len, size_t num_elem, in hmac_sha1_vector() argument
161 hmac_sha1(key, key_len, buf, buf_len, mac); in hmac_sha1_vector()
168 sha1_prf(unsigned char *key, unsigned int key_len, in sha1_prf() argument
193 hmac_sha1_vector(key, key_len, 4, addr, len, &buf[pos]); in sha1_prf()
196 hmac_sha1_vector(key, key_len, 4, addr, len, hash); in sha1_prf()
232 rc4(uint8_t *buf, size_t len, uint8_t *key, size_t key_len) in rc4() argument
236 RC4_set_key(&k, key_len, key); in rc4()
241 hmac_md5_vector(uint8_t *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument
[all …]
H A Ddriver_wifi.c193 uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len) in wpa_driver_wifi_set_key() argument
226 seq_len, *(uint64_t *)(uintptr_t)seq, key_len); in wpa_driver_wifi_set_key()
236 *(uint64_t *)(uintptr_t)seq, key_idx, key, key_len); in wpa_driver_wifi_set_key()
/titanic_50/usr/src/cmd/isns/isnsd/
H A Dfunc.c143 size_t key_len; in packet_get_key() local
145 key = pdu_get_key(pdu, &key_len); in packet_get_key()
148 conn->in_packet.key_len = key_len; in packet_get_key()
320 uint16_t key_len in setup_key_lcp() argument
357 NEXT_TLV(key, key_len); in setup_key_lcp()
358 if (key_len <= 8 || in setup_key_lcp()
381 NEXT_TLV(key, key_len); in setup_key_lcp()
382 if (key_len <= 8 || in setup_key_lcp()
391 NEXT_TLV(key, key_len); in setup_key_lcp()
392 if (key_len <= 8 || in setup_key_lcp()
[all …]
/titanic_50/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c20 int key_len, unsigned char *digest) in hmac_md5() argument
28 if (key_len > 64){ in hmac_md5()
32 (void) MD5Update(&tctx, key, key_len); in hmac_md5()
35 key_len = 16; in hmac_md5()
40 bcopy(key, k_ipad, key_len); in hmac_md5()
41 bcopy(key, k_opad, key_len); in hmac_md5()
/titanic_50/usr/src/cmd/fs.d/autofs/
H A Dns_ldap.c626 int key_len, contents_len; in mastermap_callback_ldap() local
651 key_len = 0; in mastermap_callback_ldap()
688 key_len = strlen(key); in mastermap_callback_ldap()
693 key, key_len); in mastermap_callback_ldap()
698 if (key_len >= LINESZ || contents_len >= LINESZ) in mastermap_callback_ldap()
700 if (key_len < 2 || contents_len < 2) in mastermap_callback_ldap()
710 (void) strncpy(dir, key, key_len); in mastermap_callback_ldap()
711 dir[key_len] = '\0'; in mastermap_callback_ldap()
785 int key_len; in directmap_callback() local
797 key_len = 0; in directmap_callback()
[all …]
/titanic_50/usr/src/uts/common/fs/smbsrv/
H A Dsmb_find.c222 uint16_t key_len; in smb_com_search() local
251 rc = smbsr_decode_data(sr, "%Abw", sr, &pn->pn_path, &type, &key_len); in smb_com_search()
266 if ((sattr == FILE_ATTRIBUTE_VOLUME) && (key_len != 21)) { in smb_com_search()
270 if (key_len >= 21) { in smb_com_search()
288 if ((key_len != 0) && (key_len != 21)) in smb_com_search()
291 find_first = (key_len == 0); in smb_com_search()
413 uint16_t key_len; in smb_com_find() local
431 rc = smbsr_decode_data(sr, "%Abw", sr, &pn->pn_path, &type, &key_len); in smb_com_find()
435 if ((key_len != 0) && (key_len != 21)) in smb_com_find()
448 find_first = (key_len == 0); in smb_com_find()
[all …]
H A Dsmb_sign_kcf.c123 uint8_t *key, size_t key_len) in smb2_hmac_init() argument
131 ckey.ck_length = key_len * 8; /* in bits */ in smb2_hmac_init()
/titanic_50/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c198 size_t key_len; local
253 key_len = (uint8_t)(strlen(key) + (minor >= 'a' ? 1 : 0));
261 key_len = strlen(key);
262 if (key_len > 72)
263 key_len = 72;
264 key_len++; /* include the NUL */
270 (uint8_t *)key, key_len);
272 Blowfish_expand0state(&state, (uint8_t *)key, key_len);
/titanic_50/usr/src/lib/libsasl/lib/
H A Dmd5.c368 int key_len) in _sasl_hmac_md5_init() argument
379 if (key_len > 64) { in _sasl_hmac_md5_init()
384 _sasl_MD5Update(&tctx, key, key_len); in _sasl_hmac_md5_init()
388 key_len = 16; in _sasl_hmac_md5_init()
405 MD5_memcpy( k_ipad, key, key_len); in _sasl_hmac_md5_init()
406 MD5_memcpy( k_opad, key, key_len); in _sasl_hmac_md5_init()
438 int key_len) in _sasl_hmac_md5_precalc() argument
443 _sasl_hmac_md5_init(&hmac, key, key_len); in _sasl_hmac_md5_precalc()
476 void _sasl_hmac_md5(text, text_len, key, key_len, digest) in _sasl_hmac_md5() argument
480 int key_len; /* length of authentication key */
[all …]
/titanic_50/usr/src/lib/libsasl/include/
H A Dhmac-md5.h40 const unsigned char *key, int key_len,
46 const unsigned char *key, int key_len);
51 const unsigned char *key, int key_len);
/titanic_50/usr/src/cmd/lp/cmd/lpadmin/
H A Dpick_opts.c52 int key_len; in pick_opts() local
84 key_len = strcspn(*new_opts, "="); in pick_opts()
90 if ((strncmp(old_opt, *new_opts, key_len + 1)) == 0) { in pick_opts()
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dldap_key_seq.c71 unsigned int key_len = 0; in asn1_encode_key() local
77 key_len += length; in asn1_encode_key()
79 key_len += length; in asn1_encode_key()
83 key_len += length; in asn1_encode_key()
85 key_len += length; in asn1_encode_key()
87 ret = asn1_make_sequence(buf, key_len, &length); checkerr; in asn1_encode_key()
88 key_len += length; in asn1_encode_key()
89 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 1, key_len, &length); checkerr; in asn1_encode_key()
90 key_len += length; in asn1_encode_key()
92 sum += key_len; in asn1_encode_key()
/titanic_50/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11SUNWExtensions.c379 CK_KEY_TYPE key_type, CK_ULONG key_len, CK_FLAGS key_flags, in pkcs11_PasswdToPBKD2Object() argument
417 if (key_len == fixed_size_secrets[i].len) { in pkcs11_PasswdToPBKD2Object()
418 key_len = 0; in pkcs11_PasswdToPBKD2Object()
420 if (key_len == 0) { in pkcs11_PasswdToPBKD2Object()
470 if (key_len != 0) { in pkcs11_PasswdToPBKD2Object()
473 template[i].pValue = &key_len; in pkcs11_PasswdToPBKD2Object()
474 template[i].ulValueLen = sizeof (key_len); in pkcs11_PasswdToPBKD2Object()
564 CK_ULONG key_len, void **rawkey, size_t *rawkey_len) in pkcs11_PasswdToKey() argument
570 salt, salt_len, CK_PKCS5_PBKD2_ITERATIONS, key_type, key_len, 0, in pkcs11_PasswdToKey()
/titanic_50/usr/src/lib/libresolv2/common/dst/
H A Dhmac_link.c285 int len, i, key_len; in dst_hmac_md5_key_to_file_format() local
311 key_len = i + 1; in dst_hmac_md5_key_to_file_format()
318 len = b64_ntop(key, key_len, bp, buff_len - (bp - buff)); in dst_hmac_md5_key_to_file_format()
353 int key_len, len; in dst_hmac_md5_key_from_file_format() local
374 key_len = b64_pton((char *)tmp, key, HMAC_LEN+1); /*%< see above */ in dst_hmac_md5_key_from_file_format()
377 if (dst_buffer_to_hmac_md5(dkey, key, key_len) < 0) { in dst_hmac_md5_key_from_file_format()
/titanic_50/usr/src/cmd/ssh/libssh/common/
H A Dcipher-ctr.c127 evp_aes_ctr(const char *nid, int key_len, EVP_CIPHER *aes_ctr) in evp_aes_ctr() argument
141 aes_ctr->key_len = key_len; in evp_aes_ctr()
H A Dmac.c45 int key_len; /* will be used if we have UMAC */ member
67 mac->key_len = mac->mac_len = (u_int)evp_len; in mac_setup_by_id()
100 HMAC_Init(&mac->evp_ctx, mac->key, mac->key_len, mac->evp_md); in mac_init()
H A Dkex.c368 enc->key_len = cipher_keylen(enc->cipher); in choose_enc()
383 mac->key_len = 16; in choose_mac()
511 if (need < newkeys->enc.key_len) in kex_choose_conf()
512 need = newkeys->enc.key_len; in kex_choose_conf()
515 if (need < newkeys->mac.key_len) in kex_choose_conf()
516 need = newkeys->mac.key_len; in kex_choose_conf()
H A Dcipher.c68 u_int key_len; member
104 return (c->key_len); in cipher_keylen()
215 if (keylen < cipher->key_len) in cipher_init()
393 ssh1_3des.key_len = 16; in evp_ssh1_3des()
446 ssh1_bf.key_len = 32; in evp_ssh1_bf()
/titanic_50/usr/src/uts/common/crypto/io/
H A Decc.c1179 ulong_t key_len; in ecc_nostore_key_derive() local
1210 key_len = DES_KEYSIZE; in ecc_nostore_key_derive()
1213 key_len = DES2_KEYSIZE; in ecc_nostore_key_derive()
1216 key_len = DES3_KEYSIZE; in ecc_nostore_key_derive()
1222 CKA_VALUE_LEN, &key_len)) != CRYPTO_SUCCESS) { in ecc_nostore_key_derive()
1227 key_len = 0; in ecc_nostore_key_derive()
1277 if (key_len == 0) in ecc_nostore_key_derive()
1278 key_len = secret_item.len; in ecc_nostore_key_derive()
1280 if (key_len > secret_item.len) { in ecc_nostore_key_derive()
1284 if (key_len > out_attrs[out_value_idx].oa_value_len) { in ecc_nostore_key_derive()
[all …]
/titanic_50/usr/src/lib/pkcs11/include/
H A Dcryptoki.h121 CK_KEY_TYPE key_type, CK_ULONG key_len, CK_FLAGS key_flags,
140 CK_ULONG key_len, void **rawkey, size_t *rawkey_len);
/titanic_50/usr/src/lib/libsmbfs/smb/
H A Dntlm.c317 const uchar_t *key, size_t key_len, in HMACT64() argument
326 if (key_len > 64) in HMACT64()
327 key_len = 64; in HMACT64()
343 bcopy(key, k_ipad, key_len); in HMACT64()
344 bcopy(key, k_opad, key_len); in HMACT64()
/titanic_50/usr/src/lib/smbsrv/libfksmbsrv/common/
H A Dfksmb_sign_pkcs.c110 uint8_t *key, size_t key_len) in smb2_hmac_init() argument
120 key, key_len, &hkey); in smb2_hmac_init()
/titanic_50/usr/src/cmd/ssh/include/
H A Dkex.h104 u_int key_len; member
114 u_int key_len; member

123