/titanic_52/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 21 krb5_arcfour_encrypt_length(enc, hash, inputlen, length) in krb5_arcfour_encrypt_length() argument 25 size_t *length; 33 *length = hashsize + krb5_roundup(8 + inputlen, blocksize); 99 d1.length=keybytes; 100 d1.data=MALLOC(d1.length); 104 k1.length=d1.length; 114 d2.length=keybytes; 115 d2.data=MALLOC(d2.length); 117 FREE(d1.data, d1.length); [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 67 unsigned int length, sum = 0; in asn1_encode_key() local 76 &length); checkerr; in asn1_encode_key() 77 key_len += length; in asn1_encode_key() 78 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 1, length, &length); checkerr; in asn1_encode_key() 79 key_len += length; in asn1_encode_key() 81 ret = asn1_encode_integer (buf, key_data.key_data_type[0], &length); in asn1_encode_key() 83 key_len += length; in asn1_encode_key() 84 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 0, length, &length); checker in asn1_encode_key() 142 unsigned int length, sum = 0; asn1_encode_sequence_of_keys() local 314 unsigned int length; asn1_decode_key() local 404 unsigned int length; asn1_decode_sequence_of_keys() local [all...] |
H A D | asn1_encode.c | 37 unsigned int length = 0; in asn1_encode_boolean() local 46 length = partlen; in asn1_encode_boolean() 47 retval = asn1_make_tag(buf, UNIVERSAL, PRIMITIVE, ASN1_BOOLEAN, length, &partlen); in asn1_encode_boolean() 49 length += partlen; in asn1_encode_boolean() 51 *retlen = length; in asn1_encode_boolean() 60 unsigned int length = 0; in asn1_encode_integer_internal() local 69 length++; in asn1_encode_integer_internal() 76 length++; in asn1_encode_integer_internal() 80 length++; in asn1_encode_integer_internal() 84 *retlen = length; in asn1_encode_integer_internal() 92 unsigned int length = 0; asn1_encode_integer() local 131 unsigned int length = 0; asn1_encode_unsigned_integer() local 165 unsigned int length; encode_bytestring_with_tag() local 289 unsigned int length; asn1_encode_bitstring() local 363 int length = get_nullterm_sequence_len(val, type); encode_nullterm_sequence_of() local 404 unsigned int length, sum = 0; krb5int_asn1_encode_a_thing() local 444 unsigned int length; encode_a_field() local 456 unsigned int length; encode_a_field() local 499 unsigned int length; encode_a_field() local 517 unsigned int length; encode_a_field() local 567 unsigned int length; encode_a_field() local 589 unsigned int length; encode_fields() local 627 unsigned int length; just_encode_sequence() local 633 unsigned int length; just_encode_sequence() local 653 unsigned int length; encode_sequence_of() local 663 unsigned int length; encode_sequence_of() local 676 unsigned int length; krb5int_asn1_do_full_encode() local [all...] |
H A D | krb5_encode.c | 40 length: length of the most-recently produced encoding 41 sum: cumulative length of the entire encoding */ 44 unsigned int length, sum = 0;\ 69 retval = asn1_encode_pa_pk_as_req(buf,rep,&length); in encode_krb5_pa_pk_as_req() 71 sum += length; in encode_krb5_pa_pk_as_req() 78 retval = asn1_encode_pa_pk_as_req_draft9(buf,rep,&length); in encode_krb5_pa_pk_as_req_draft9() 80 sum += length; in encode_krb5_pa_pk_as_req_draft9() 87 retval = asn1_encode_pa_pk_as_rep(buf,rep,&length); in encode_krb5_pa_pk_as_rep() 89 sum += length; in encode_krb5_pa_pk_as_rep() [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | chpw.c | 36 clearpw.length = strlen(passwd); in krb5int_mk_chpw_req() 43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req() 44 packet->data = (char *) malloc(packet->length); in krb5int_mk_chpw_req() 52 /* length */ in krb5int_mk_chpw_req() 54 *ptr++ = (packet->length>> 8) & 0xff; in krb5int_mk_chpw_req() 55 *ptr++ = packet->length & 0xff; in krb5int_mk_chpw_req() 62 /* ap_req length, big-endian */ in krb5int_mk_chpw_req() 64 *ptr++ = (ap_req->length>> in krb5int_mk_chpw_req() [all...] |
H A D | chk_trans.c | 54 (int) n1->length, n1->data, (int) n2->length, n2->data)); in process_intermediates() 56 len1 = n1->length; in process_intermediates() 57 len2 = n2->length; in process_intermediates() 73 Tprintf (("equal length but different strings in path: '%.*s' '%.*s'\n", in process_intermediates() 74 (int) n1->length, n1->data, (int) n2->length, n2->data)); in process_intermediates() 104 d.length = i; in process_intermediates() 128 d.length = len2 - i; in process_intermediates() 142 if (buf->length in maybe_join() [all...] |
/titanic_52/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_token.c | 55 (constructed, definite-length) 56 <length> possible multiple bytes, need to parse/generate 70 the sequence tag and length octets, the mech OID DER encoding, and the 76 static unsigned int der_length_size(length) in der_length_size() argument 77 int length; in der_length_size() 79 if (length < (1<<7)) 81 else if (length < (1<<8)) 87 else if (length < (1<<16)) 89 else if (length < (1<<24)) 96 static void der_write_length(buf, length) in der_write_length() argument [all...] |
H A D | k5sealv3.c | 150 if (SIZE_MAX - 300 < message->length) in gss_krb5int_make_seal_token_v3() 152 ec_max = SIZE_MAX - message->length - 300; in gss_krb5int_make_seal_token_v3() 163 plain.length = message->length + 16 + ec; in gss_krb5int_make_seal_token_v3() 164 plain.data = MALLOC(plain.length); in gss_krb5int_make_seal_token_v3() 170 ctx->enc->enctype, plain.length, &tlen))) { in gss_krb5int_make_seal_token_v3() 171 FREE(plain.data, plain.length); in gss_krb5int_make_seal_token_v3() 179 FREE(plain.data, plain.length); in gss_krb5int_make_seal_token_v3() 197 (void) memcpy(plain.data, message->value, message->length); in gss_krb5int_make_seal_token_v3() 198 (void) memset(plain.data + message->length, ' in gss_krb5int_make_seal_token_v3() [all...] |
H A D | util_crypt.c | 100 lrandom.length = blocksize; 121 kg_encrypt(context, key, usage, iv, in, out, length) in kg_encrypt() argument 128 unsigned int length; 142 ivd.length = blocksize; 143 ivd.data = MALLOC(ivd.length); 146 (void) memcpy(ivd.data, iv, ivd.length); 152 inputd.length = length; 155 outputd.ciphertext.length = length; 169 kg_decrypt(context,key,usage,iv,in,out,length) kg_decrypt() argument [all...] |
H A D | k5unseal.c | 98 message_buffer->length = 0; 269 token.length = tmsglen; 274 * pad length, so we know it can not be more than the blocksize. 289 token.length = tmsglen - conflen - plain[tmsglen-1]; 292 if (token.length) { 293 if ((token.value = (void *) xmalloc(token.length)) == NULL) { 300 (void) memcpy(token.value, plain+conflen, token.length); 308 plainlen = token.length; 311 token.length = 0; 314 plainlen = token.length; [all...] |
/titanic_52/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 36 clearpw.length = strlen(passwd); in krb5int_mk_chpw_req() 43 packet->length = 6 + ap_req->length + cipherpw.length; in krb5int_mk_chpw_req() 44 packet->data = (char *) malloc(packet->length); in krb5int_mk_chpw_req() 52 /* length */ in krb5int_mk_chpw_req() 54 *ptr++ = (packet->length>> 8) & 0xff; in krb5int_mk_chpw_req() 55 *ptr++ = packet->length & 0xff; in krb5int_mk_chpw_req() 65 /* ap_req length, big-endian */ in krb5int_mk_chpw_req() 67 *ptr++ = (ap_req->length>> in krb5int_mk_chpw_req() [all...] |
/titanic_52/usr/src/lib/libbc/libc/gen/common/ |
H A D | iso.multibyte.c | 93 int length = 0; in _mbtowc_iso() local 120 if (++length > n) return (-1); /* too long */ in _mbtowc_iso() 126 if (++length > n) return (-1); /* too long */ in _mbtowc_iso() 131 if (++length > n) return (-1); /* too long */ in _mbtowc_iso() 141 if (++length > n) return (-1); /* too long */ in _mbtowc_iso() 172 if (++length > n) return (-1); /* too long */ in _mbtowc_iso() 223 if (++length > n) return (-1); /* too long */ in _mbtowc_iso() 289 * current state and length. If the length is two, you need to in _mbtowc_iso() 298 if (++length > in _mbtowc_iso() 419 int length = 0; _wctomb_iso() local [all...] |
/titanic_52/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | aes_provider.c | 52 if (input->length < BLOCK_SIZE) in krb5int_aes_encrypt() 55 ASSERT(input->length == output->length); in krb5int_aes_encrypt() 63 * it better have a data pointer and a proper length. in krb5int_aes_encrypt() 65 if (ivec->data == NULL || ivec->length != BLOCK_SIZE) { in krb5int_aes_encrypt() 67 ASSERT(ivec->length == BLOCK_SIZE); in krb5int_aes_encrypt() 69 "ivec->data = %p ivec->length = %d", in krb5int_aes_encrypt() 70 (void *)ivec->data, ivec->length); in krb5int_aes_encrypt() 77 nblocks = (input->length + BLOCK_SIZE - 1) / BLOCK_SIZE; in krb5int_aes_encrypt() 80 partialamount = input->length in krb5int_aes_encrypt() 595 long length; krb5int_aes_decrypt() local 855 CK_ULONG length; krb5int_aes_decrypt() local [all...] |
/titanic_52/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_encrypt.c | 48 size_t inputlen, size_t *length) in krb5_dk_encrypt_length() argument 54 *length = krb5_roundup(blocksize+inputlen, blocksize) + hashsize; in krb5_dk_encrypt_length() 88 plainlen = krb5_roundup(blocksize+input->length, blocksize); in krb5_dk_encrypt() 90 krb5_dk_encrypt_length(enc, hash, input->length, &enclen); in krb5_dk_encrypt() 92 if (output->length < enclen) in krb5_dk_encrypt() 100 d1.length = blocksize; in krb5_dk_encrypt() 106 (void) memcpy(plaintext+blocksize, input->data, input->length); in krb5_dk_encrypt() 108 (void) memset(plaintext+blocksize+input->length, 0, in krb5_dk_encrypt() 109 plainlen - (blocksize+input->length)); in krb5_dk_encrypt() 112 d1.length in krb5_dk_encrypt() 167 krb5int_aes_encrypt_length(enc,hash,inputlen,length) krb5int_aes_encrypt_length() argument [all...] |
/titanic_52/usr/src/lib/libgss/ |
H A D | g_exp_sec_context.c | 51 interprocess_token->length = 0; in val_exp_sec_ctx_args() 80 OM_uint32 length; local 110 length = token.length + 4 + ctx->mech_type->length; 111 interprocess_token->length = length; 112 interprocess_token->value = malloc(length); 118 length = ctx->mech_type->length; [all...] |
H A D | g_imp_sec_context.c | 79 OM_uint32 length = 0; local 104 if (interprocess_token->length >= sizeof (OM_uint32)) { 106 length = (OM_uint32)*p++; 107 length = (OM_uint32)(length << 8) + *p++; 108 length = (OM_uint32)(length << 8) + *p++; 109 length = (OM_uint32)(length << 8) + *p++; 112 if (length [all...] |
H A D | g_glue.c | 48 * length, decode the length updating the buffer to point to the character 50 * bytes that made up the DER encoding of the length originally pointed to 58 int length, new_length; in gssint_get_der_length() local 68 * If the High order bit is not set then the length is just the value in gssint_get_der_length() 73 return (*p); /* return the length */ in gssint_get_der_length() 78 * the number of bytes that contain the DER encoding of the length. in gssint_get_der_length() 84 /* See if the supplied buffer contains enough bytes for the length. */ in gssint_get_der_length() 89 * Calculate a multibyte length. The length i in gssint_get_der_length() 130 gssint_put_der_length(unsigned int length,unsigned char ** buf,unsigned int max_len) gssint_put_der_length() argument 197 int length; global() local [all...] |
/titanic_52/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 72 rep->length = 0; in process_chpw_request() 76 ap_rep.length = 0; in process_chpw_request() 79 clear.length = 0; in process_chpw_request() 81 cipher.length = 0; in process_chpw_request() 84 if (req->length < 4) { in process_chpw_request() 99 * Verify length in process_chpw_request() 104 if (plen != req->length) in process_chpw_request() 123 * Read, check ap-req length in process_chpw_request() 125 ap_req.length = (*ptr++ & 0xff); in process_chpw_request() 126 ap_req.length in process_chpw_request() [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | import_name.c | 63 OM_uint32 length; local 87 (char *) xmalloc(input_name_buffer->length + 1)) == NULL) { 93 memcpy(tmp, input_name_buffer->value, input_name_buffer->length); 94 tmp[input_name_buffer->length] = 0; 110 if (input_name_buffer->length != sizeof(krb5_principal)) { 139 (char *) xmalloc(input_name_buffer->length + 1)) == NULL) { 146 memcpy(tmp, input_name_buffer->value, input_name_buffer->length); 147 tmp[input_name_buffer->length] = 0; 173 length = *cp++; 174 if (length ! [all...] |
H A D | export_name.c | 39 size_t length; in krb5_gss_export_name() local 52 exported_name->length = 0; in krb5_gss_export_name() 83 length = strlen(str); in krb5_gss_export_name() 84 exported_name->length = 10 + length + gss_mech_krb5->length; in krb5_gss_export_name() 85 exported_name->value = malloc(exported_name->length); in krb5_gss_export_name() 96 *cp++ = (gss_mech_krb5->length+2) >> 8; in krb5_gss_export_name() 97 *cp++ = (gss_mech_krb5->length+2) & 0xFF; in krb5_gss_export_name() 99 *cp++ = (gss_mech_krb5->length) in krb5_gss_export_name() [all...] |
/titanic_52/usr/src/cmd/gss/gsscred/ |
H A D | gsscred_utils.c | 98 nameOut->length = 0; in gsscred_MakeName() 105 oidStr.length = strlen(nameOidStr); in gsscred_MakeName() 117 aName.length = strlen(name); in gsscred_MakeName() 167 /* determine the length of buffer needed */ in gsscred_MakeNameHeader() 168 mechOidDERLength = der_length_size(mechOid->length); in gsscred_MakeNameHeader() 169 outNameHdr->length = mechOidLenLen + mechOidTagLen + in gsscred_MakeNameHeader() 170 mechOidDERLength + expNameTokIdLen + mechOid->length; in gsscred_MakeNameHeader() 171 if ((outNameHdr->value = (void*)malloc(outNameHdr->length)) == NULL) { in gsscred_MakeNameHeader() 172 outNameHdr->length = 0; in gsscred_MakeNameHeader() 178 (void) memset(outNameHdr->value, '\0', outNameHdr->length); in gsscred_MakeNameHeader() [all...] |
/titanic_52/usr/src/psm/promif/ieee1275/common/ |
H A D | prom_boot.c | 35 int length; in prom_bootargs() local 46 length = prom_getproplen(node, name); in prom_bootargs() 47 if ((length == -1) || (length == 0)) in prom_bootargs() 49 if (length > OBP_MAXPATHLEN) in prom_bootargs() 50 length = OBP_MAXPATHLEN - 1; /* Null terminator */ in prom_bootargs() 51 (void) prom_bounded_getprop(node, name, bootargs, length); in prom_bootargs() 67 int length; in prom_bootpath() local 77 length = prom_getproplen(node, name); in prom_bootpath() 78 if ((length in prom_bootpath() [all...] |
/titanic_52/usr/src/uts/common/gssapi/mechs/krb5/crypto/old/ |
H A D | old_decrypt.c | 58 if (input->length < blocksize + hashsize || input->length % blocksize != 0) in krb5_old_decrypt() 60 plainsize = input->length - blocksize - hashsize; in krb5_old_decrypt() 61 if (arg_output->length < plainsize) in krb5_old_decrypt() 64 if (arg_output->length < input->length) { in krb5_old_decrypt() 65 output.length = input->length; in krb5_old_decrypt() 67 if ((output.data = (char *) MALLOC(output.length)) == NULL) { in krb5_old_decrypt() 73 output.length in krb5_old_decrypt() [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | string2key.c | 60 register long length; in mit_des_string_to_key_int() local 71 keyblock->length = sizeof(mit_des_cblock); in mit_des_string_to_key_int() 75 && (salt->length == SALT_TYPE_AFS_LENGTH in mit_des_string_to_key_int() 77 || salt->length == (unsigned) -1)) { in mit_des_string_to_key_int() 85 afssalt.length = at - afssalt.data; in mit_des_string_to_key_int() 87 afssalt.length = strlen(afssalt.data); in mit_des_string_to_key_int() 91 length = data->length + (salt ? salt->length : 0); in mit_des_string_to_key_int() 93 copystr = malloc((size_t) length); in mit_des_string_to_key_int() [all...] |
/titanic_52/usr/src/cmd/prstat/ |
H A D | prutil.c | 135 Format_size(char *str, size_t size, int length) in Format_size() argument 146 (void) snprintf(str, length, "%4d%c", (int)size, tag); in Format_size() 150 Format_time(char *str, ulong_t time, int length) in Format_time() argument 152 (void) snprintf(str, length, gettext("%3d:%2.2d:%2.2d"), /* hr:mm:ss */ in Format_time() 157 Format_pct(char *str, float val, int length) in Format_pct() argument 165 (void) snprintf(str, length, "%1.1f", val); in Format_pct() 167 (void) snprintf(str, length, "%.0f", val); in Format_pct() 171 Format_num(char *str, int num, int length) in Format_num() argument 174 (void) snprintf(str, length, ".%1dM", num/100000); in Format_num() 177 (void) snprintf(str, length, " in Format_num() 184 Format_state(char * str,char state,processorid_t pr_id,int length) Format_state() argument 332 int length; stripfname() local [all...] |