Searched defs:key (Results 1 - 25 of 453) sorted by relevance

1234567891011>>

/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftRSA.h42 soft_object_t *key; member in struct:soft_rsa_ctx
54 CK_RV soft_rsa_encrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len,
57 CK_RV soft_rsa_decrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len,
H A DsoftDSA.h43 soft_object_t *key; member in struct:soft_dsa_ctx
H A DsoftEC.h41 soft_object_t *key; member in struct:soft_ecc_ctx
/osnet-11/usr/src/lib/libnsctl/common/
H A Dnsc_hash.h35 char *key; member in struct:hash_node_s
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_status_tbl.c46 const smb_status_table_t *key = vkey; local
49 if (key->value == row->value)
51 if (key->value < row->value)
68 smb_status_table_t key; local
71 key.value = ntstatus;
72 key.name = NULL;
73 tep = bsearch(&key, ntx_table, ntx_rows,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/old/
H A Ddes_stringtokey.c44 krb5_keyblock *key)
56 return(mit_des_string_to_key_int(context, key, string, salt));
59 return mit_afs_string_to_key(context, key, string, salt);
40 krb5int_des_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parm, krb5_keyblock *key) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dstate.c44 krb5_c_init_state (krb5_context context, const krb5_keyblock *key, argument
50 if (krb5_enctypes_list[i].etype == key->enctype)
59 (context, key, keyusage, new_state);
63 krb5_c_free_state (krb5_context context, const krb5_keyblock *key, argument
69 if (krb5_enctypes_list[i].etype == key->enctype)
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Ddecode_kdc.c42 *key, putting result in *rep.
54 krb5int_decode_tgs_rep(krb5_context context, krb5_data *enc_rep, const krb5_keyblock *key, argument
74 if ((retval = krb5_kdc_rep_decrypt_proc(context, key, &usage,
H A Denc_helper.c37 const krb5_keyblock *key, krb5_keyusage usage,
43 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length,
50 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
36 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
H A Denc_keyhelper.c36 krb5_encrypt_keyhelper(krb5_context context, krb5_key key, krb5_keyusage usage, argument
43 enctype = krb5_k_key_enctype(context, key);
52 ret = krb5_k_encrypt(context, key, usage, 0, plain, cipher);
H A Dgen_seqnum.c29 * We do this by getting a random key and encrypting something with it,
54 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, krb5_ui_4 *seqno) argument
64 seed = key2data(*key);
H A Dkdc_rep_dc.c34 * Decrypt the encrypted portion of the KDC_REP message, using the key
41 krb5_kdc_rep_decrypt_proc(krb5_context context, const krb5_keyblock *key, krb5_const_pointer decryptarg, krb5_kdc_rep *dec_rep) argument
63 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part,
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/
H A Dhsearch.c73 DBT key, val; local
78 key.data = (u_char *)item.key;
79 key.size = strlen(item.key) + 1;
84 status = (dbp->put)(dbp, &key, &val, R_NOOVERWRITE);
89 status = (dbp->get)(dbp, &key, &val, 0);
95 retval.key = item.key;
H A Dsearch.h41 char *key; member in struct:entry
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_fetch_mkey.c36 * get the master key from the database specific context
40 krb5_ldap_get_mkey(krb5_context context, krb5_keyblock **key) argument
54 *key = &ldap_context->lrparams->mkey;
60 * set the master key into the database specific context
64 krb5_ldap_set_mkey(krb5_context context, char *pwd, krb5_keyblock *key) argument
86 r_params->mkey.magic = key->magic;
87 r_params->mkey.enctype = key->enctype;
88 r_params->mkey.length = key->length;
89 r_params->mkey.contents = malloc(key->length);
93 memcpy(r_params->mkey.contents, key
[all...]
/osnet-11/usr/src/cmd/sendmail/db/hsearch/
H A Dhsearch.c87 DBT key, val; local
93 memset(&key, 0, sizeof(key));
95 key.data = item.key;
96 key.size = strlen(item.key) + 1;
104 * Try and add the key to the database. If we fail because
105 * the key already exists, return the existing key
[all...]
/osnet-11/usr/src/lib/libast/common/cdt/
H A Ddtrenew.c38 reg Void_t* key; local
72 key = _DTKEY(obj,disc->key,disc->size);
73 e->hash = _DTHSH(dt,key,disc,disc->size);
/osnet-11/usr/src/lib/libc/port/gen/
H A Dlfind.c59 char *key = (char *)ky; local
64 if ((*compar)(key, base) == 0)
H A Dlsearch.c58 char *key = (char *)ky; local
64 if ((*compar)(key, base) == 0)
67 res = memcpy(base, key, width); /* base now == next */
/osnet-11/usr/src/lib/libwrap/
H A Dupdate.c46 int key; local
49 while ((key = va_arg(ap, int)) > 0) {
50 switch (key) {
52 tcpd_warn("request_fill: invalid key: %d", key);
/osnet-11/usr/src/lib/libresolv2/common/resolv/
H A Dmtctxres.c20 static pthread_key_t key; variable
35 * Initialize the TSD key. By doing this at library load time, we're
43 pthread_keycreate_ret = pthread_key_create(&key, __res_destroy_ctx);
72 if (pthread_getspecific(key) != 0) {
84 if ((ret = pthread_setspecific(key, mt)) != 0) {
127 if (((mt = pthread_getspecific(key)) != 0) ||
129 (mt = pthread_getspecific(key)) != 0)) {
/osnet-11/usr/src/lib/libldap4/sec/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
19 void hmac_md5(unsigned char *text, int text_len, unsigned char *key, argument
32 (void) MD5Update(&tctx, key, key_len);
34 key = tk;
40 bcopy(key, k_ipad, key_len);
41 bcopy(key, k_opad, key_len);
/osnet-11/usr/src/lib/libnisdb/yptol/
H A Dupdate.c73 * Pointer to the entry key
82 update_entry_if_required(map_ctrl *map, datum *key) argument
96 if (0 == strncmp(key->dptr, yp_last_modified, yp_last_modified_sz)) {
103 if (is_special_key(key))
106 if (!has_entry_expired(map, key))
111 return (update_from_dit(map, key));
120 * Entry key
128 update_from_dit(map_ctrl *map, datum *key) argument
144 ret = read_from_dit(map->map_name, map->domain, key, &dat);
171 dbm_delete(map->entries, *key);
372 is_special_key(datum *key) argument
[all...]
/osnet-11/usr/src/lib/libnwam/common/
H A Dlibnwam_wlan.c32 * and key setting).
68 * Create/update security key for WLAN <essid, bssid>.
72 uint32_t secmode, uint_t keyslot, const char *key)
75 linkname, essid, bssid, secmode, keyslot, key, B_FALSE));
71 nwam_wlan_set_key(const char *linkname, const char *essid, const char *bssid, uint32_t secmode, uint_t keyslot, const char *key) argument
/osnet-11/usr/src/lib/libcmd/common/
H A Dpids.c59 key(void* handle, Sffmt_t* fp, const char* arg, char** ps, Sflong_t* pn) function
117 sfkeyprintf(sfstdout, format, format, key, NiL);

Completed in 101 milliseconds

1234567891011>>