/illumos-gate/usr/src/lib/libnsl/yp/ |
H A D | yp_match.c | 65 int keylen; member 107 ((n->key = malloc(keylen)) == 0) || in makenode() 137 if ((c->keylen == keylen) && in in_cache() 198 (key == NULL) || (keylen == 0)) in __yp_match_cflookup() 275 c->keylen = keylen; in __yp_match_cflookup() 306 int keylen, in yp_match() argument 357 int keylen, in __yp_match_rsvdport_cflookup() argument 382 (key == NULL) || (keylen == 0)) in __yp_match_rsvdport_cflookup() 470 c->keylen = keylen; in __yp_match_rsvdport_cflookup() 491 int keylen, in yp_match_rsvdport() argument [all …]
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keyserv_cache.h | 50 #define KEYLEN(keylen) (((keylen)+7)/8) argument 53 #define DHKEYALLOC(keylen) ALIGN4(sizeof (struct dhkey) + KEYLEN(keylen)) argument 66 #define CACHEKEY3_LIST_SIZE(keylen) (sizeof (struct cachekey3_list) + \ argument 68 2*(ALIGN4(2*KEYLEN(keylen)+1)) + \ 71 int create_cache_file(keylen_t keylen, algtype_t algtype, 74 int cache_insert(keylen_t keylen, algtype_t algtype, 80 struct cachekey3_list *cache_retrieve(keylen_t keylen, algtype_t algtype, 84 int cache_remove(keylen_t keylen, algtype_t algtype, 88 void print_cache(keylen_t keylen, algtype_t algtype);
|
H A D | keyserv_cache.c | 42 keylen_t keylen; member 73 #define SKCK_LEN(keylen) ALIGN8(sizeof (struct skck) + KEYLEN(keylen)) argument 76 KEYLEN(keylen) + SKCK_LEN(keylen)) 221 keylen, algtype); in create_cache_file_ch() 228 keylen, algtype); in create_cache_file_ch() 292 ch->keylen != keylen || in create_cache_file_ch() 333 ch->keylen = keylen; in create_cache_file_ch() 1126 if (c->keylen == keylen && c->algtype == algtype) { in get_cache_header() 1144 c->keylen = keylen; in get_cache_header() 1202 keylen_t keylen, in cache_insert() argument [all …]
|
H A D | chkey.c | 530 CURMECH->keylen, in getsecrets() 662 if (keylen == CURMECH->keylen && in keylogin() 665 CURMECH->keylen, in keylogin() 677 if (keylen == 192 && algtype == 0) in keylogin() 793 if (keylen == 192) { in write_rootkey() 820 if (keylen == 192) in write_rootkey() 1012 realmechlist[i]->keylen; in addmechtolist() 1132 keylen_t keylen = CURMECH->keylen; in main() local 1143 keylen, algtype); in main() 1231 CURMECH->keylen, in main() [all …]
|
H A D | setkey.c | 154 keylen_t keylen; member 192 kp->keylen = k; in appendkeylist() 595 kp->keylen, ap->algtype, in storeotherrootkeys() 611 skey.keylen = kp->keylen; in storeotherrootkeys() 926 keylen_t keylen = bytelen*4; in addmasterkey() local 949 tmp.keylen = keylen; in addmasterkey() 1106 if (net->keylen == 0) { in fetch_netname3() 1380 keylen_t keylen, in getdeskey3() argument 1464 keylen, algtype, in getdeskey3() 1512 arg->keylen, arg->algtype, in pk_get_conv_key3() [all …]
|
H A D | keylogin.c | 112 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument 157 hexkeybytes = ((keylen + 7) / 8) * 2; in write_rootkey() 172 if (keylen == 192) { in write_rootkey() 199 if (keylen == 192) in write_rootkey() 211 if (keylen == 192) in write_rootkey() 367 if (getsecretkey_g(fullname, mechlist[i]->keylen, in main() 369 (((mechlist[i]->keylen / 7) + in main() 387 mechlist[i]->keylen, NULL, 0, in main() 399 mechlist[i]->keylen, in main()
|
/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 152 int keylen, err, r = 0; in getkeys_nis() local 350 keylen_t keylen, /* in */ in extract_secret_g() argument 357 !VALID_KEYALG(keylen, algtype)) { in extract_secret_g() 429 keylen_t keylen, /* in */ in getkeys_ldap_g() argument 458 dh_caps_str, keylen, algtype); in getkeys_ldap_g() 506 keylen_t keylen, in netname2hashname() argument 548 keylen_t keylen, /* in */ in __getpublickey_cached_g() argument 573 keylen, algtype); in __getpublickey_cached_g() 616 int keylen, /* in */ in getpublickey_g() argument 631 keylen_t keylen, /* in */ in getsecretkey_g() argument [all …]
|
H A D | gen_dhkeys.c | 168 keylen_t keylen, /* in */ in __gen_dhkeys_g() argument 172 const int classic_des = keylen == 192 && algtype == 0; in __gen_dhkeys_g() 183 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_dhkeys_g() 256 keylen_t keylen, /* in */ in __gen_common_dhkeys_g() argument 261 const int classic_des = keylen == 192 && algtype == 0; in __gen_common_dhkeys_g() 282 if (dlfp = (int (*)())__nis_get_mechanism_symbol(keylen, in __gen_common_dhkeys_g()
|
H A D | xcrypt.c | 242 keylen_t keylen, /* in */ in xencrypt_g() argument 253 const int classic_des = keylen == 192 && algtype == 0; in xencrypt_g() 254 const int hexkeybytes = BITS2NIBBLES(keylen); in xencrypt_g() 256 const int binkeybytes = do_chksum ? keylen/8 + keychecksumsize/2 : in xencrypt_g() 257 keylen/8; in xencrypt_g() 262 if (!secret || !keylen || !passwd || !encrypted_secret) in xencrypt_g() 347 int keylen, /* in */ in xdecrypt_g() argument 358 const int classic_des = keylen == 192 && algtype == 0; in xdecrypt_g() 359 const int hexkeybytes = BITS2NIBBLES(keylen); in xdecrypt_g()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 75 adjust(char *keyout, char *keyin, int keylen) in adjust() argument 79 int hexkeybytes = (keylen+3)/4; in adjust() 100 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ in __generic_gen_dhkeys() argument 128 len = ((keylen + BASEBITS - 1) / BASEBITS); in __generic_gen_dhkeys() 159 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys() 165 (void) adjust(public, xkey, keylen); in __generic_gen_dhkeys() 181 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) in extractdeskeys() argument 201 for (i = 0; i < ((keylen - len)/2)/8; i++) in extractdeskeys() 219 if (keylen == 192) /* Old broken way for compatibility */ in extractdeskeys() 240 int keylen, /* All the keys have this many bits */ in __generic_common_dhkeys() argument [all …]
|
/illumos-gate/usr/src/contrib/mDNSResponder/mDNSShared/ |
H A D | dnssd_clientlib.c | 72 unsigned long *keylen in InternalTXTRecordSearch() argument 77 *keylen = (unsigned long) strlen(key); in InternalTXTRecordSearch() 82 if (p <= e && *keylen <= x[0] && !strncasecmp(key, (char*)x+1, *keylen)) in InternalTXTRecordSearch() 83 if (*keylen == x[0] || x[1+*keylen] == '=') return(x); in InternalTXTRecordSearch() 248 unsigned long keylen, itemlen, remainder; in TXTRecordRemoveValue() local 275 unsigned long keylen; in TXTRecordContainsKey() local 276 return (InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen) ? 1 : 0); in TXTRecordContainsKey() 287 unsigned long keylen; in TXTRecordGetValuePtr() local 288 uint8_t *item = InternalTXTRecordSearch(txtLen, txtRecord, key, &keylen); in TXTRecordGetValuePtr() 290 *valueLen = (uint8_t)(item[0] - (keylen + 1)); in TXTRecordGetValuePtr() [all …]
|
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 120 keylen_t keylen, in key_setsecret_g() argument 132 arg.keylen = keylen; in key_setsecret_g() 251 arg.keylen = keylen; in key_secretkey_is_set_g_ext() 335 arg.keylen = remotekeylen; in key_encryptsession_pk_g() 449 keylen_t keylen, in key_encryptsession_g() argument 462 arg.keylen = keylen; in key_encryptsession_g() 505 keylen_t keylen, in key_decryptsession_g() argument 518 arg.keylen = keylen; in key_decryptsession_g() 650 arg.keylen = pkeylen; in key_setnet_g_ext() 656 arg.keylen = skeylen; in key_setnet_g_ext() [all …]
|
/illumos-gate/usr/src/uts/common/io/ |
H A D | suntpi.c | 146 size_t keylen; in tpi_findprov() local 155 key = tpi_makekey(WR(q), &keylen); in tpi_findprov() 157 if (keylen == 0) { in tpi_findprov() 168 if ((*tpp)->tpi_keylen == keylen && in tpi_findprov() 169 bcmp((*tpp)->tpi_key, key, keylen) == 0) { in tpi_findprov() 179 (*tpp)->tpi_key = kmem_alloc(keylen, KM_SLEEP); in tpi_findprov() 180 bcopy(key, (*tpp)->tpi_key, keylen); in tpi_findprov() 181 (*tpp)->tpi_keylen = keylen; in tpi_findprov()
|
/illumos-gate/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_sec_mechs.c | 427 m->keylen = 192; in get_secfile_ent() 432 m->keylen = NIS_SEC_CF_NA_KA; in get_secfile_ent() 464 if (mp->keylen != tp->keylen) in equal_entries() 500 tp->keylen = mp->keylen; in sf_copy_mech_ent() 664 *keylen = AUTH_DES_KEYLEN; in __nis_translate_mechanism() 677 *keylen = mp->keylen; in __nis_translate_mechanism() 684 *keylen = mp->keylen; in __nis_translate_mechanism() 838 keylen_t keylen, /* in */ in __nis_keyalg2mechalias() argument 848 if (AUTH_DES_KEY(keylen, algtype)) { in __nis_keyalg2mechalias() 866 if (keylen == mp->keylen && in __nis_keyalg2mechalias() [all …]
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 63 keylength = keylen; in genkey_nss() 109 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, in genkey_pkcs11() argument 167 keylength = keylen; /* bits */ in genkey_pkcs11() 286 keylength = keylen; in genkey_file() 370 int keylen = 0; in pk_genkey() local 468 keylen = 64; /* fixed size; ignore input */ in pk_genkey() 470 keylen = 192; /* fixed size; ignore input */ in pk_genkey() 478 if (sscanf(keylenstr, "%d", &keylen) != 1) { in pk_genkey() 484 if (keylen == 0 || (keylen % 8) != 0) { in pk_genkey() 538 keylabel, keyAlg, keylen, &tokencred); in pk_genkey() [all …]
|
H A D | genkeypair.c | 61 keylength = keylen; /* bits */ in genkeypair_pkcs11() 163 keylength = keylen; /* bits */ in genkeypair_file() 228 int keylen, KMF_CREDENTIAL *tokencred, in genkeypair_nss() argument 247 keylength = keylen; /* bits */ in genkeypair_nss() 329 int keylen = PK_DEFAULT_KEYLENGTH; in pk_genkeypair() local 382 &keylen) != 1) { in pk_genkeypair() 469 keylen = 1024; in pk_genkeypair() 470 else if (keylen > 1024 || keylen < 512) { in pk_genkeypair() 501 tokenname, label, dir, prefix, keyAlg, keylen, in pk_genkeypair() 506 tokenname, label, keyAlg, keylen, in pk_genkeypair() [all …]
|
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 209 int keylen = strlen (key); in md5_password() local 238 md5_update (key, keylen); in md5_password() 240 md5_update (key, keylen); in md5_password() 246 md5_update (key, keylen); in md5_password() 248 for (i = keylen; i > 16; i -= 16) in md5_password() 252 for (i = keylen; i > 0; i >>= 1) in md5_password() 253 md5_update (key + ((i & 1) ? keylen : 0), 1); in md5_password() 263 md5_update (key, keylen); in md5_password() 271 md5_update (key, keylen); in md5_password() 276 md5_update (key, keylen); in md5_password()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | encrypt.c | 163 int keylen; member 747 kp->keylen = 0; in encrypt_keyid() 752 if (kp->keylen == 0) in encrypt_keyid() 754 kp->keylen = 0; in encrypt_keyid() 758 } else if ((len != kp->keylen) || in encrypt_keyid() 763 kp->keylen = len; in encrypt_keyid() 787 (void) memcpy(kp->keyid, keyid, keylen); in encrypt_send_keyid() 788 kp->keylen = keylen; in encrypt_send_keyid() 791 for (strp = &str_keyid[4]; keylen > 0; --keylen) { in encrypt_send_keyid() 846 for (i = 0; i < ki[KI_ENCRYPT].keylen; ++i) { in encrypt_start_output() [all …]
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | udb.c | 139 int keylen; local 217 key.size = keylen; 220 keybuf, keylen); 243 keybuf, keylen); 361 key.size = keylen; 391 key.size = keylen; 394 keybuf, keylen); 493 key.size = keylen; 600 int keylen; local 649 key.size = keylen; [all …]
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 210 uint32_t keylen; in soft_dh_key_derive() local 226 keylen = OBJ_SEC_VALUE_LEN(secretkey); in soft_dh_key_derive() 227 if (keylen > sizeof (key)) { /* check for overflow */ in soft_dh_key_derive() 240 rv = dh_key_derive(&k, secretkey->key_type, key, &keylen, 0); in soft_dh_key_derive() 246 if ((OBJ_SEC_VALUE(secretkey) = malloc(keylen)) == NULL) { in soft_dh_key_derive() 251 OBJ_SEC_VALUE_LEN(secretkey) = keylen; in soft_dh_key_derive() 252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); in soft_dh_key_derive()
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb3_encrypt.c | 317 uint_t keylen; in smb3_decrypt_sr() local 329 keylen = AES128_KEY_LENGTH; in smb3_decrypt_sr() 334 keylen = AES128_KEY_LENGTH; in smb3_decrypt_sr() 339 keylen = AES256_KEY_LENGTH; in smb3_decrypt_sr() 344 keylen = AES256_KEY_LENGTH; in smb3_decrypt_sr() 386 if (dec_key->len != keylen) { in smb3_decrypt_sr() 499 uint_t keylen; in smb3_encrypt_sr() local 510 keylen = AES128_KEY_LENGTH; in smb3_encrypt_sr() 515 keylen = AES128_KEY_LENGTH; in smb3_encrypt_sr() 520 keylen = AES256_KEY_LENGTH; in smb3_encrypt_sr() [all …]
|
/illumos-gate/usr/src/uts/common/io/sfxge/common/ |
H A D | efx_vpd.c | 503 uint8_t keylen; in efx_vpd_hunk_verify() local 531 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_verify() 657 uint8_t keylen; in efx_vpd_hunk_next() local 686 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_next() 691 paylen = keylen; in efx_vpd_hunk_next() 734 uint8_t keylen; in efx_vpd_hunk_get() local 761 *paylenp = keylen; in efx_vpd_hunk_get() 798 uint8_t keylen; in efx_vpd_hunk_set() local 868 taglen, pos, &keyword, &keylen)) != 0) in efx_vpd_hunk_set() 874 source = offset + pos + 3 + keylen; in efx_vpd_hunk_set() [all …]
|
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 99 keylen_t keylen, /* in */ in get_and_set_seckey() argument 114 skeylen = BITS2NIBBLES(keylen) + 1; in get_and_set_seckey() 120 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { in get_and_set_seckey() 126 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, in get_and_set_seckey() 134 "%d-%d", keylen, algtype); in get_and_set_seckey() 143 "for '%s'."), keylen, algtype, netname); in get_and_set_seckey() 152 keylen, algtype); in get_and_set_seckey() 277 "key type = %d-%d", mp->keylen, in establish_key() 280 if (!get_and_set_seckey(pamh, netname, mp->keylen, in establish_key()
|
/illumos-gate/usr/src/lib/libnsl/include/rpcsvc/ |
H A D | nis_dhext.h | 56 ushort_t keylen; member 76 keylen_t keylen; member 111 VALID_KEYALG((mp)->keylen, (mp)->algtype) &&\ 136 char *__nis_get_mechanism_library(keylen_t keylen, algtype_t algtype, 139 void *__nis_get_mechanism_symbol(keylen_t keylen, algtype_t algtype,
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 41 __getpublickey_cached_g(const char remotename[], int keylen, in __getpublickey_cached_g() argument 50 getpublickey_g(const char remotename[], int keylen, in getpublickey_g() argument 59 key_encryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_encryptsession_pk_g() argument 78 key_decryptsession_pk_g(const char *remotename, const char *pk, int keylen, in key_decryptsession_pk_g() argument
|