/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | hmac.c | 64 dd.cd_length = input->length; in krb5_hmac() 66 dd.cd_raw.iov_len = input->length; in krb5_hmac() 70 mac.cd_length = output->length; in krb5_hmac() 142 if (key->length > blocksize) in krb5_hmac() 144 if (output->length < hashsize) in krb5_hmac() 170 for (i=0; i<key->length; i++) in krb5_hmac() 176 hashin[0].length = blocksize; in krb5_hmac() 181 hashout.length = hashsize; in krb5_hmac() 193 for (i=0; i<key->length; i++) in krb5_hmac() 198 hashin[0].length = blocksize; in krb5_hmac() [all …]
|
/illumos-gate/usr/src/cmd/format/ |
H A D | menu_cache.c | 128 int length; in ca_write_enable() local 154 length = MODESENSE_PAGE_LEN(page8); in ca_write_enable() 164 header.mode_header.length = 0; in ca_write_enable() 190 int length; in ca_write_disable() local 216 length = MODESENSE_PAGE_LEN(page8); in ca_write_disable() 226 header.mode_header.length = 0; in ca_write_disable() 281 int length; in ca_read_enable() local 307 length = MODESENSE_PAGE_LEN(page8); in ca_read_enable() 317 header.mode_header.length = 0; in ca_read_enable() 343 int length; in ca_read_disable() local [all …]
|
/illumos-gate/usr/src/boot/libsa/string/ |
H A D | memset.c | 54 bzero(void *dst0, size_t length) in bzero() argument 63 memset(void *dst0, int c0, size_t length) in bzero() 86 if (length < 3 * wsize) { in bzero() 87 while (length != 0) { in bzero() 89 --length; in bzero() 108 length -= t; in bzero() 115 t = length / wsize; in bzero() 122 t = length & wmask; in bzero()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | f_cbc.c | 33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt) in mit_des_cbc_encrypt() argument 37 long length; 85 (CK_ULONG)length, (CK_BYTE_PTR)out, 86 (CK_ULONG_PTR)&length); 89 (CK_ULONG)length, (CK_BYTE_PTR)out, 90 (CK_ULONG_PTR)&length); 102 (void) memset(out, 0, length); 134 long length, krb5_keyblock *key, in mit_des_cbc_encrypt() argument 144 ivdata.length = sizeof(mit_des_cblock); in mit_des_cbc_encrypt() 147 (char *)out, length, key, &ivdata, encrypt); in mit_des_cbc_encrypt()
|
H A D | d3_cbc.c | 36 unsigned long length, krb5_keyblock *key, in mit_des3_cbc_encrypt() argument 82 (CK_ULONG)length, (CK_BYTE_PTR)out, in mit_des3_cbc_encrypt() 83 (CK_ULONG_PTR)&length); in mit_des3_cbc_encrypt() 86 (CK_ULONG)length, (CK_BYTE_PTR)out, in mit_des3_cbc_encrypt() 87 (CK_ULONG_PTR)&length); in mit_des3_cbc_encrypt() 99 (void) memset(out, 0, length); in mit_des3_cbc_encrypt() 113 unsigned long length, krb5_keyblock *key, in mit_des3_cbc_encrypt() argument 122 ivdata.length = sizeof(mit_des_cblock); in mit_des3_cbc_encrypt() 125 length, key, &ivdata, encrypt); in mit_des3_cbc_encrypt()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | des.c | 47 if (key->length != 8) in k5_des_docrypt() 49 if ((input->length%8) != 0) in k5_des_docrypt() 51 if (ivec && (ivec->length != 8)) in k5_des_docrypt() 53 if (input->length != output->length) in k5_des_docrypt() 57 (krb5_pointer) output->data, input->length, in k5_des_docrypt() 87 if (key->length != 8) in k5_des_make_key() 89 if (randombits->length != 7) in k5_des_make_key() 93 key->length = 8; in k5_des_make_key() 99 (void) memcpy(key->contents, randombits->data, randombits->length); in k5_des_make_key()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 103 (mdatap->length != datap->length) || in authdata_match() 124 if (data1->length != data2->length) in data_match() 333 in_creds->keyblock.length == in_compare_creds->keyblock.length && in krb5_creds_compare() 334 (!in_creds->keyblock.length || in krb5_creds_compare() 371 equal = (in_creds->ticket.length == in_compare_creds->ticket.length && in krb5_creds_compare() 372 (!in_creds->ticket.length || in krb5_creds_compare() 374 in_creds->ticket.length))); in krb5_creds_compare() 378 equal = (in_creds->second_ticket.length == in_compare_creds->second_ticket.length && in krb5_creds_compare() 379 (!in_creds->second_ticket.length || in krb5_creds_compare() 392 authdata[i]->length == compare_authdata[i]->length && in krb5_creds_compare() [all …]
|
/illumos-gate/usr/src/uts/common/rpc/sec_gss/ |
H A D | rpcsec_gss_misc.c | 76 bound_len = cast_len = (uint_t)buf->length; 84 buf->length = cast_len; 158 out_buf.length = 0; 180 in_buf.length = xdr_getpos(&temp_xdrs); 211 if (in_buf.length != 0) { 221 if (out_buf.length != 0) 263 kmem_free(in_buf.value, in_buf.length); 272 in_buf.length = out_buf.length; 290 kmem_free(in_buf.value, in_buf.length); 325 kmem_free(in_buf.value, in_buf.length); [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/dk/ |
H A D | stringtokey.c | 56 concatlen = string->length+(salt?salt->length:0); in krb5int_dk_string_to_key() 72 memcpy(concat, string->data, string->length); in krb5int_dk_string_to_key() 74 memcpy(concat+string->length, salt->data, salt->length); in krb5int_dk_string_to_key() 78 indata.length = keybytes; in krb5int_dk_string_to_key() 84 foldkey.length = keylength; in krb5int_dk_string_to_key() 92 indata.length = kerberos_len; in krb5int_dk_string_to_key() 96 (void) memset(key->contents, 0, key->length); in krb5int_dk_string_to_key()
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.c | 130 retdata[i]->length); in concat_authorization_data() 145 return((realm1->length == realm2->length) && in realm_compare() 220 scratch1.length = (*tmppa)->length; in kdc_process_tgs_req() 337 if (tkt_realm->length == tgs_realm->length && in kdc_process_tgs_req() 561 s[d->length] = 0; in data2string() 997 length = (length << 8) | **astream; in asn1length() 999 if (length == 0) { in asn1length() 1018 length = **astream; in asn1length() 1021 return(length); in asn1length() 1471 salt->length = 0; in get_salt_from_key() [all …]
|
H A D | kdc_preauth.c | 1042 e_data->length = pa_e_data->length; in check_padata() 1259 scratch.length = pa->length; in verify_enc_timestamp() 1372 tmp_entry->length = salt.length; in _make_etype_info_entry() 1471 pa_data->length = scratch->length; in etype_info_helper() 1659 padata->length = salt_data.length; in return_pw_salt() 1674 padata->length = scratch->length+1; in return_pw_salt() 1684 padata->length = scratch->length; in return_pw_salt() 1736 scratch.length = in_padata->length; in return_sam_data() 1797 int length = ((encrypting_key->length < psr->sam_key.length) in return_sam_data() local 2055 pa_data->length = scratch->length; in get_sam_edata() [all …]
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_srv.c | 395 &krb5_authz.length); in pkinit_server_verify_padata() 416 &krb5_authz.length); in pkinit_server_verify_padata() 497 if (cksum.length != auth_pack->pkAuthenticator.paChecksum.length || in pkinit_server_verify_padata() 500 cksum.length)) { in pkinit_server_verify_padata() 504 req_pkt->length); in pkinit_server_verify_padata() 596 pkinit_authz_data->length = krb5_authz.length; in pkinit_server_verify_padata() 614 my_authz_data[0]->length = encoded_pkinit_authz_data->length; in pkinit_server_verify_padata() 617 krb5_authz.length); in pkinit_server_verify_padata() 732 encrypting_key->length = 0; in pkinit_server_return_padata() 973 encoded_key_pack->length, in pkinit_server_return_padata() [all …]
|
/illumos-gate/usr/src/cmd/troff/ |
H A D | n9.c | 87 int length; in setline() local 98 if (!length) { in setline() 110 if (length < 0) { in setline() 111 *i++ = makem(length); in setline() 112 length = -length; in setline() 506 length %= j; in setfield() 508 if (length) in setfield() 509 jj = length | MOT; in setfield() 528 length -= ws; in setfield() 536 length %= j; in setfield() [all …]
|
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | SLPTokenizer.java | 83 if (str.length() < 1) { in countTokens() 94 for (int j = 0; j < str.length(); j++) in countTokens() 126 if (str.length() < 1) { in hasMoreElements() 130 if (index >= str.length()) { in hasMoreElements() 137 for (int i = index; i < str.length(); i++) { in hasMoreElements() 176 if (index >= str.length()) throw new NoSuchElementException(); in nextToken() 193 while (index < str.length()) { in nextToken() 215 while (index < str.length()) { in nextToken() 219 if (sb.length() != 0) { in nextToken() 233 if (sb.length() == 0) { in nextToken()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | unparse.c | 93 int length = src->length; in component_length_quoted() local 95 int size = length; in component_length_quoted() 101 for (j = 0; j < length; j++,cp++) in component_length_quoted() 118 int length = src->length; in copy_component_quoting() local 121 (void) memcpy(dest, src->data, src->length); in copy_component_quoting() 122 return src->length; in copy_component_quoting() 125 for (j=0; j < length; j++,cp++) { in copy_component_quoting() 180 int length; in k5_unparse_name() 204 krb5_princ_realm(context, &p)->length = strlen(default_realm); in k5_unparse_name() 261 length = krb5_princ_component(context, principal, i)->length; in k5_unparse_name()
|
H A D | copy_princ.c | 63 unsigned int len = krb5_princ_component(context, inprinc, i)->length; in krb5_copy_principal() 64 krb5_princ_component(context, tempprinc, i)->length = len; in krb5_copy_principal() 75 krb5_princ_component(context, inprinc, i)->length + 1); in krb5_copy_principal() 87 tempprinc->realm.length = inprinc->realm.length; in krb5_copy_principal() 94 tempprinc->realm.data = MALLOC(tempprinc->realm.length + 1); in krb5_copy_principal() 98 krb5_princ_component(context, inprinc, i)->length + 1); in krb5_copy_principal() 104 inprinc->realm.length); in krb5_copy_principal() 105 tempprinc->realm.data[tempprinc->realm.length] = 0; in krb5_copy_principal()
|
/illumos-gate/usr/src/uts/common/gssapi/ |
H A D | gss_import_name.c | 89 union_name->external_name->length = input_name_buffer->length; in gss_import_name() 91 (void *) MALLOC(input_name_buffer->length); in gss_import_name() 99 input_name_buffer->value, input_name_buffer->length); in gss_import_name() 113 MALLOC(input_name_type->length); in gss_import_name() 121 input_name_type->elements, input_name_type->length); in gss_import_name() 122 union_name->name_type->length = input_name_type->length; in gss_import_name() 134 union_name->external_name->length); in gss_import_name()
|
/illumos-gate/usr/src/cmd/amdzen/ |
H A D | usmn.c | 54 usmn_op(boolean_t do_write, int fd, const char *addr, uint32_t length, in usmn_op() argument 60 usr.usr_size = length; in usmn_op() 83 uint32_t length = 4; in main() local 91 if (!usmn_parse_uint32(optarg, &length)) { in main() 94 if (length != 1 && length != 2 && length != 4) { in main() 96 length); in main() 135 if (!usmn_op(do_write, fd, argv[i], length, wval)) { in main()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | name.c | 109 output->length = 0; in __dh_gss_display_name() 340 OM_uint32 len = input->length; in do_exported_netname() 372 if (mechoidlen != ctx->mech->length) in do_exported_netname() 464 if (input->length != sizeof (uid_t)) in __dh_gss_import_name() 479 name = malloc(input->length+1); in __dh_gss_import_name() 485 name[input->length] = '\0'; in __dh_gss_import_name() 659 exported_name->length = 0; in __dh_gss_export_name() 677 exported_name->length = len; in __dh_gss_export_name() 704 p += dc->mech->length; in __dh_gss_export_name() 723 __DH_GSS_C_NT_NETNAME->length); in __dh_gss_export_name() [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/aes/ |
H A D | aes_s2k.c | 60 if (params->length != 4) in krb5int_aes_string_to_key() 89 if (key->length != 16 && key->length != 32) in krb5int_aes_string_to_key() 92 out.length = key->length; in krb5int_aes_string_to_key() 97 memset(out.data, 0, out.length); in krb5int_aes_string_to_key() 113 memset(out.data, 0, out.length); in krb5int_aes_string_to_key() 119 memset(out.data, 0, out.length); in krb5int_aes_string_to_key()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | dk_decrypt.c | 115 if (input->length < blocksize + hmacsize) in krb5_dk_decrypt_maybe_trunc_hmac() 117 if (output->length < input->length - blocksize - hmacsize) in krb5_dk_decrypt_maybe_trunc_hmac() 120 enclen = input->length - hmacsize; in krb5_dk_decrypt_maybe_trunc_hmac() 129 d1.length = enclen; in krb5_dk_decrypt_maybe_trunc_hmac() 132 d2.length = enclen; in krb5_dk_decrypt_maybe_trunc_hmac() 139 if (ivec != NULL && ivec->length == blocksize) { in krb5_dk_decrypt_maybe_trunc_hmac() 140 cn = (unsigned char *) d1.data + d1.length - blocksize; in krb5_dk_decrypt_maybe_trunc_hmac() 151 d1.length = hashsize; in krb5_dk_decrypt_maybe_trunc_hmac() 174 if (output->length < plainlen) { in krb5_dk_decrypt_maybe_trunc_hmac() 179 output->length = plainlen; in krb5_dk_decrypt_maybe_trunc_hmac() [all …]
|
/illumos-gate/usr/src/cmd/bhyve/ |
H A D | pci_lpc.h | 54 uint32_t length; member 57 #define LPC_SYSRES(type, base, length) \ argument 61 (length) \ 65 #define SYSRES_IO(base, length) LPC_SYSRES(LPC_SYSRES_IO, base, length) argument 66 #define SYSRES_MEM(base, length) LPC_SYSRES(LPC_SYSRES_MEM, base, length) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_ef_generic.c | 18 CK_ULONG outlen = output->length; in k5_ef_hash() 30 (CK_ULONG)input[i].length)) != CKR_OK) { in k5_ef_hash() 45 output->length = outlen; in k5_ef_hash() 75 inlen = K5ROUNDUP(input->length, 8); in k5_ef_mac() 78 if (inlen != input->length) { in k5_ef_mac() 91 if (inlen != input->length) { in k5_ef_mac() 93 (void) memcpy(inbuf, input->data, input->length); in k5_ef_mac() 103 output->length = 8; in k5_ef_mac() 106 if (inlen != input->length && inbuf != NULL) in k5_ef_mac()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | util_cksum.c | 55 cksum->length = sumlen; 60 if ((cksum->contents = (krb5_octet *) xmalloc(cksum->length)) == NULL) { 63 memset(cksum->contents, '\0', cksum->length); 70 cb->initiator_address.length+ 71 cb->acceptor_address.length+ 72 cb->application_data.length); 90 plaind.length = len; 107 if ((temp = xmalloc(cksum->length)) == NULL) { 113 memcpy(temp, cksum->contents, cksum->length);
|
/illumos-gate/usr/src/cmd/make/bin/ |
H A D | macro.cc | 60 int length; in setvar_append() local 80 (int) val->hash.length); in setvar_append() 89 (int) value->hash.length); in setvar_append() 115 int length; in setvar_envvar() local 128 if ((length = wcslen(value.buffer.start)) >= MAXPATHLEN) { in setvar_envvar() 129 mbs = tmp_mbs_buffer = getmem((length + 1) * MB_LEN_MAX); in setvar_envvar() 132 (length + 1) * MB_LEN_MAX); in setvar_envvar() 137 length = 2 + strlen(p->name->string_mb) + strlen(mbs); in setvar_envvar() 138 if (!p->already_put || length > (MAXPATHLEN * MB_LEN_MAX)) { in setvar_envvar() 139 env = tmp_mbs_buffer2 = getmem(length); in setvar_envvar()
|