/titanic_50/usr/src/uts/common/ipp/ipgpc/ |
H A D | trie.c | 121 t_split(node_t **c_node, uint8_t pos, uint8_t key_len) in t_split() argument 141 bit = EXTRACTBIT(nodep->val, pos, key_len); in t_split() 162 (nodep->zero->pos - i), key_len), in t_split() 163 key_len); in t_split() 165 (nodep->zero->pos - i), 1, key_len); in t_split() 188 (nodep->one->pos - i), key_len), in t_split() 189 key_len); in t_split() 191 (nodep->one->pos - i), 1, key_len); in t_split() 199 UNSETBIT(nodep->val, i, key_len); in t_split() 200 UNSETBIT(nodep->mask, i, key_len); in t_split() [all …]
|
/titanic_50/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_ht.c | 188 int key_len = handle->ht_key_size; in ht_default_hash() local 190 while (key_len--) { in ht_default_hash() 232 size_t h_index, key_len; in ht_add_item() local 240 key_len = handle->ht_key_size; in ht_add_item() 242 key_len = strlen(key); in ht_add_item() 244 if (key_len > handle->ht_key_size) in ht_add_item() 248 ++key_len; in ht_add_item() 251 msize = key_len + sizeof (HT_ITEM); in ht_add_item() 257 (void) memcpy(item->hi_key, key, key_len); in ht_add_item() 312 int key_len; in ht_remove_item() local [all …]
|
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_enc.c | 134 hmac_sha1(unsigned char *key, unsigned int key_len, in hmac_sha1() argument 138 (void) HMAC(EVP_sha1(), key, key_len, data, data_len, mac, &mac_len); in hmac_sha1() 143 hmac_sha1_vector(unsigned char *key, unsigned int key_len, size_t num_elem, in hmac_sha1_vector() argument 161 hmac_sha1(key, key_len, buf, buf_len, mac); in hmac_sha1_vector() 168 sha1_prf(unsigned char *key, unsigned int key_len, in sha1_prf() argument 193 hmac_sha1_vector(key, key_len, 4, addr, len, &buf[pos]); in sha1_prf() 196 hmac_sha1_vector(key, key_len, 4, addr, len, hash); in sha1_prf() 232 rc4(uint8_t *buf, size_t len, uint8_t *key, size_t key_len) in rc4() argument 236 RC4_set_key(&k, key_len, key); in rc4() 241 hmac_md5_vector(uint8_t *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument [all …]
|
H A D | driver_wifi.c | 193 uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len) in wpa_driver_wifi_set_key() argument 226 seq_len, *(uint64_t *)(uintptr_t)seq, key_len); in wpa_driver_wifi_set_key() 236 *(uint64_t *)(uintptr_t)seq, key_idx, key, key_len); in wpa_driver_wifi_set_key()
|
/titanic_50/usr/src/cmd/isns/isnsd/ |
H A D | func.c | 143 size_t key_len; in packet_get_key() local 145 key = pdu_get_key(pdu, &key_len); in packet_get_key() 148 conn->in_packet.key_len = key_len; in packet_get_key() 320 uint16_t key_len in setup_key_lcp() argument 357 NEXT_TLV(key, key_len); in setup_key_lcp() 358 if (key_len <= 8 || in setup_key_lcp() 381 NEXT_TLV(key, key_len); in setup_key_lcp() 382 if (key_len <= 8 || in setup_key_lcp() 391 NEXT_TLV(key, key_len); in setup_key_lcp() 392 if (key_len <= 8 || in setup_key_lcp() [all …]
|
/titanic_50/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 20 int key_len, unsigned char *digest) in hmac_md5() argument 28 if (key_len > 64){ in hmac_md5() 32 (void) MD5Update(&tctx, key, key_len); in hmac_md5() 35 key_len = 16; in hmac_md5() 40 bcopy(key, k_ipad, key_len); in hmac_md5() 41 bcopy(key, k_opad, key_len); in hmac_md5()
|
/titanic_50/usr/src/cmd/fs.d/autofs/ |
H A D | ns_ldap.c | 626 int key_len, contents_len; in mastermap_callback_ldap() local 651 key_len = 0; in mastermap_callback_ldap() 688 key_len = strlen(key); in mastermap_callback_ldap() 693 key, key_len); in mastermap_callback_ldap() 698 if (key_len >= LINESZ || contents_len >= LINESZ) in mastermap_callback_ldap() 700 if (key_len < 2 || contents_len < 2) in mastermap_callback_ldap() 710 (void) strncpy(dir, key, key_len); in mastermap_callback_ldap() 711 dir[key_len] = '\0'; in mastermap_callback_ldap() 785 int key_len; in directmap_callback() local 797 key_len = 0; in directmap_callback() [all …]
|
/titanic_50/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_find.c | 222 uint16_t key_len; in smb_com_search() local 251 rc = smbsr_decode_data(sr, "%Abw", sr, &pn->pn_path, &type, &key_len); in smb_com_search() 266 if ((sattr == FILE_ATTRIBUTE_VOLUME) && (key_len != 21)) { in smb_com_search() 270 if (key_len >= 21) { in smb_com_search() 288 if ((key_len != 0) && (key_len != 21)) in smb_com_search() 291 find_first = (key_len == 0); in smb_com_search() 413 uint16_t key_len; in smb_com_find() local 431 rc = smbsr_decode_data(sr, "%Abw", sr, &pn->pn_path, &type, &key_len); in smb_com_find() 435 if ((key_len != 0) && (key_len != 21)) in smb_com_find() 448 find_first = (key_len == 0); in smb_com_find() [all …]
|
H A D | smb_sign_kcf.c | 123 uint8_t *key, size_t key_len) in smb2_hmac_init() argument 131 ckey.ck_length = key_len * 8; /* in bits */ in smb2_hmac_init()
|
/titanic_50/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 198 size_t key_len; local 253 key_len = (uint8_t)(strlen(key) + (minor >= 'a' ? 1 : 0)); 261 key_len = strlen(key); 262 if (key_len > 72) 263 key_len = 72; 264 key_len++; /* include the NUL */ 270 (uint8_t *)key, key_len); 272 Blowfish_expand0state(&state, (uint8_t *)key, key_len);
|
/titanic_50/usr/src/lib/libsasl/lib/ |
H A D | md5.c | 368 int key_len) in _sasl_hmac_md5_init() argument 379 if (key_len > 64) { in _sasl_hmac_md5_init() 384 _sasl_MD5Update(&tctx, key, key_len); in _sasl_hmac_md5_init() 388 key_len = 16; in _sasl_hmac_md5_init() 405 MD5_memcpy( k_ipad, key, key_len); in _sasl_hmac_md5_init() 406 MD5_memcpy( k_opad, key, key_len); in _sasl_hmac_md5_init() 438 int key_len) in _sasl_hmac_md5_precalc() argument 443 _sasl_hmac_md5_init(&hmac, key, key_len); in _sasl_hmac_md5_precalc() 476 void _sasl_hmac_md5(text, text_len, key, key_len, digest) in _sasl_hmac_md5() argument 480 int key_len; /* length of authentication key */ [all …]
|
/titanic_50/usr/src/lib/libsasl/include/ |
H A D | hmac-md5.h | 40 const unsigned char *key, int key_len, 46 const unsigned char *key, int key_len); 51 const unsigned char *key, int key_len);
|
/titanic_50/usr/src/cmd/lp/cmd/lpadmin/ |
H A D | pick_opts.c | 52 int key_len; in pick_opts() local 84 key_len = strcspn(*new_opts, "="); in pick_opts() 90 if ((strncmp(old_opt, *new_opts, key_len + 1)) == 0) { in pick_opts()
|
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 71 unsigned int key_len = 0; in asn1_encode_key() local 77 key_len += length; in asn1_encode_key() 79 key_len += length; in asn1_encode_key() 83 key_len += length; in asn1_encode_key() 85 key_len += length; in asn1_encode_key() 87 ret = asn1_make_sequence(buf, key_len, &length); checkerr; in asn1_encode_key() 88 key_len += length; in asn1_encode_key() 89 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 1, key_len, &length); checkerr; in asn1_encode_key() 90 key_len += length; in asn1_encode_key() 92 sum += key_len; in asn1_encode_key()
|
/titanic_50/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11SUNWExtensions.c | 379 CK_KEY_TYPE key_type, CK_ULONG key_len, CK_FLAGS key_flags, in pkcs11_PasswdToPBKD2Object() argument 417 if (key_len == fixed_size_secrets[i].len) { in pkcs11_PasswdToPBKD2Object() 418 key_len = 0; in pkcs11_PasswdToPBKD2Object() 420 if (key_len == 0) { in pkcs11_PasswdToPBKD2Object() 470 if (key_len != 0) { in pkcs11_PasswdToPBKD2Object() 473 template[i].pValue = &key_len; in pkcs11_PasswdToPBKD2Object() 474 template[i].ulValueLen = sizeof (key_len); in pkcs11_PasswdToPBKD2Object() 564 CK_ULONG key_len, void **rawkey, size_t *rawkey_len) in pkcs11_PasswdToKey() argument 570 salt, salt_len, CK_PKCS5_PBKD2_ITERATIONS, key_type, key_len, 0, in pkcs11_PasswdToKey()
|
/titanic_50/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 285 int len, i, key_len; in dst_hmac_md5_key_to_file_format() local 311 key_len = i + 1; in dst_hmac_md5_key_to_file_format() 318 len = b64_ntop(key, key_len, bp, buff_len - (bp - buff)); in dst_hmac_md5_key_to_file_format() 353 int key_len, len; in dst_hmac_md5_key_from_file_format() local 374 key_len = b64_pton((char *)tmp, key, HMAC_LEN+1); /*%< see above */ in dst_hmac_md5_key_from_file_format() 377 if (dst_buffer_to_hmac_md5(dkey, key, key_len) < 0) { in dst_hmac_md5_key_from_file_format()
|
/titanic_50/usr/src/cmd/ssh/libssh/common/ |
H A D | cipher-ctr.c | 127 evp_aes_ctr(const char *nid, int key_len, EVP_CIPHER *aes_ctr) in evp_aes_ctr() argument 141 aes_ctr->key_len = key_len; in evp_aes_ctr()
|
H A D | mac.c | 45 int key_len; /* will be used if we have UMAC */ member 67 mac->key_len = mac->mac_len = (u_int)evp_len; in mac_setup_by_id() 100 HMAC_Init(&mac->evp_ctx, mac->key, mac->key_len, mac->evp_md); in mac_init()
|
H A D | kex.c | 368 enc->key_len = cipher_keylen(enc->cipher); in choose_enc() 383 mac->key_len = 16; in choose_mac() 511 if (need < newkeys->enc.key_len) in kex_choose_conf() 512 need = newkeys->enc.key_len; in kex_choose_conf() 515 if (need < newkeys->mac.key_len) in kex_choose_conf() 516 need = newkeys->mac.key_len; in kex_choose_conf()
|
H A D | cipher.c | 68 u_int key_len; member 104 return (c->key_len); in cipher_keylen() 215 if (keylen < cipher->key_len) in cipher_init() 393 ssh1_3des.key_len = 16; in evp_ssh1_3des() 446 ssh1_bf.key_len = 32; in evp_ssh1_bf()
|
/titanic_50/usr/src/uts/common/crypto/io/ |
H A D | ecc.c | 1179 ulong_t key_len; in ecc_nostore_key_derive() local 1210 key_len = DES_KEYSIZE; in ecc_nostore_key_derive() 1213 key_len = DES2_KEYSIZE; in ecc_nostore_key_derive() 1216 key_len = DES3_KEYSIZE; in ecc_nostore_key_derive() 1222 CKA_VALUE_LEN, &key_len)) != CRYPTO_SUCCESS) { in ecc_nostore_key_derive() 1227 key_len = 0; in ecc_nostore_key_derive() 1277 if (key_len == 0) in ecc_nostore_key_derive() 1278 key_len = secret_item.len; in ecc_nostore_key_derive() 1280 if (key_len > secret_item.len) { in ecc_nostore_key_derive() 1284 if (key_len > out_attrs[out_value_idx].oa_value_len) { in ecc_nostore_key_derive() [all …]
|
/titanic_50/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 121 CK_KEY_TYPE key_type, CK_ULONG key_len, CK_FLAGS key_flags, 140 CK_ULONG key_len, void **rawkey, size_t *rawkey_len);
|
/titanic_50/usr/src/lib/libsmbfs/smb/ |
H A D | ntlm.c | 317 const uchar_t *key, size_t key_len, in HMACT64() argument 326 if (key_len > 64) in HMACT64() 327 key_len = 64; in HMACT64() 343 bcopy(key, k_ipad, key_len); in HMACT64() 344 bcopy(key, k_opad, key_len); in HMACT64()
|
/titanic_50/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_sign_pkcs.c | 110 uint8_t *key, size_t key_len) in smb2_hmac_init() argument 120 key, key_len, &hkey); in smb2_hmac_init()
|
/titanic_50/usr/src/cmd/ssh/include/ |
H A D | kex.h | 104 u_int key_len; member 114 u_int key_len; member
|