/osnet-11/usr/src/lib/libast/common/sfio/ |
H A D | sfmove.c | 47 Sfoff_t n_move, sk, cur; local 98 { sk = n > 0 ? SFSEEK(fr, n, SEEK_CUR) : SFSEEK(fr, 0, SEEK_END); 99 if(sk > cur) /* safe to skip over data in current stream */ 100 { n_move += sk - cur; 102 n -= sk - cur;
|
/osnet-11/usr/src/lib/libast/common/disc/ |
H A D | sfdcseekable.c | 63 Seek_t* sk; local 68 sk = (Seek_t*)disc; 69 sf = sk->shadow; 70 if(sk->eof) 75 if(addr+n <= sk->extent) 78 if((r = (ssize_t)(sk->extent-addr)) > 0) 87 { sk->eof = 1; 93 sk->eof = 1; 95 sk->extent += p; 111 Seek_t* sk; local 173 Seek_t* sk; local 201 reg Seek_t* sk; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 111 MINT *sk = mp_itom(0); /* Initial private key */ local 143 mp_mult(sk, base, sk); 145 mp_madd(sk, tmp, sk); 153 mp_mdiv(sk, modulus, tmp, sk); 156 /* The public key is root^sk % modulus */ 157 mp_pow(root, sk, modulus, pk); 159 xkey = mp_mtox(sk); 249 MINT *sk = mp_xtom(skey); local [all...] |
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 123 MINT *sk = mp_itom(0); local 141 mp_mult(sk, base, sk); 142 mp_madd(sk, tmp, sk); 146 mp_mdiv(sk, modulus, tmp, sk); 148 mp_pow(root, sk, modulus, pk); 149 xkey = mp_mtox(sk); 153 mp_mfree(sk); [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | elgamal.c | 50 static int test_keys (ELG_secret_key *sk, unsigned int nbits, int nodie); 52 static void generate (ELG_secret_key *sk, unsigned nbits, gcry_mpi_t **factors); 53 static int check_secret_key (ELG_secret_key *sk); 128 test_keys ( ELG_secret_key *sk, unsigned int nbits, int nodie ) argument 137 pk.p = sk->p; 138 pk.g = sk->g; 139 pk.y = sk->y; 144 decrypt ( out2, out1_a, out1_b, sk ); 148 sign ( out1_a, out1_b, test, sk ); 259 generate ( ELG_secret_key *sk, unsigne argument 361 generate_using_x(ELG_secret_key *sk, unsigned int nbits, gcry_mpi_t x, gcry_mpi_t **ret_factors ) argument 622 ELG_secret_key sk; local 664 ELG_secret_key sk; local 683 ELG_secret_key sk; local 734 ELG_secret_key sk; local 759 ELG_secret_key sk; local [all...] |
H A D | twofish.c | 515 ctx->s[2][i] = mds[2][q1[q0[q0[(a) ^ sc] ^ sg] ^ sk] ^ so]; \ 582 byte si = 0, sj = 0, sk = 0, sl = 0, sm = 0, sn = 0, so = 0, sp = 0; 630 CALC_S (si, sj, sk, sl, 16, 0x00, 0x2D, 0x01, 0x2D); /* 01 A4 02 A4 */ 631 CALC_S (si, sj, sk, sl, 17, 0x2D, 0xA4, 0x44, 0x8A); /* A4 56 A1 55 */ 632 CALC_S (si, sj, sk, sl, 18, 0x8A, 0xD5, 0xBF, 0xD1); /* 55 82 FC 87 */ 633 CALC_S (si, sj, sk, sl, 19, 0xD1, 0x7F, 0x3D, 0x99); /* 87 F3 C1 5A */ 634 CALC_S (si, sj, sk, sl, 20, 0x99, 0x46, 0x66, 0x96); /* 5A 1E 47 58 */ 635 CALC_S (si, sj, sk, sl, 21, 0x96, 0x3C, 0x5B, 0xED); /* 58 C6 AE DB */ 636 CALC_S (si, sj, sk, sl, 22, 0xED, 0x37, 0x4F, 0xE0); /* DB 68 3D 9E */ 637 CALC_S (si, sj, sk, s 577 byte si = 0, sj = 0, sk = 0, sl = 0, sm = 0, sn = 0, so = 0, sp = 0; local [all...] |
H A D | dsa.c | 99 static int test_keys (DSA_secret_key *sk, unsigned int qbits); 100 static int check_secret_key (DSA_secret_key *sk); 101 static gpg_err_code_t generate (DSA_secret_key *sk, 199 test_keys (DSA_secret_key *sk, unsigned int qbits) 208 pk.p = sk->p; 209 pk.q = sk->q; 210 pk.g = sk->g; 211 pk.y = sk->y; 217 sign (sig_a, sig_b, data, sk); 248 generate (DSA_secret_key *sk, unsigne 198 test_keys(DSA_secret_key *sk, unsigned int qbits) argument 247 generate(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, int transient_key, dsa_domain_t *domain, gcry_mpi_t **ret_factors ) argument 397 generate_fips186(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, gcry_sexp_t deriveparms, int use_fips186_2, dsa_domain_t *domain, int *r_counter, void **r_seed, size_t *r_seedlen, gcry_mpi_t *r_h) argument 685 DSA_secret_key sk; local 941 DSA_secret_key sk; local 966 DSA_secret_key sk; local [all...] |
H A D | ecc.c | 298 static void test_keys (ECC_secret_key * sk, unsigned int nbits); 299 static int check_secret_key (ECC_secret_key * sk); 510 generate_key (ECC_secret_key *sk, unsigned int nbits, const char *name, 545 sk->E.p = mpi_copy (E.p); 546 sk->E.a = mpi_copy (E.a); 547 sk->E.b = mpi_copy (E.b); 548 point_init (&sk->E.G); 549 point_set (&sk->E.G, &E.G); 550 sk->E.n = mpi_copy (E.n); 551 point_init (&sk 506 generate_key(ECC_secret_key *sk, unsigned int nbits, const char *name, gcry_mpi_t g_x, gcry_mpi_t g_y, gcry_mpi_t q_x, gcry_mpi_t q_y) argument 582 test_keys(ECC_secret_key *sk, unsigned int nbits) argument 630 check_secret_key(ECC_secret_key * sk) argument 961 ECC_secret_key sk; local 1064 ECC_secret_key sk; local 1110 ECC_secret_key sk; local [all...] |
H A D | rsa.c | 88 static int test_keys (RSA_secret_key *sk, unsigned nbits); 89 static int check_secret_key (RSA_secret_key *sk); 96 test_keys (RSA_secret_key *sk, unsigned int nbits) 106 pk.n = sk->n; 107 pk.e = sk->e; 120 secret (decr_plaintext, ciphertext, sk); 130 secret (signature, plaintext, sk); 182 generate_std (RSA_secret_key *sk, unsigned int nbits, unsigned long use_e, 308 sk->n = n; 309 sk 95 test_keys(RSA_secret_key *sk, unsigned int nbits) argument 181 generate_std(RSA_secret_key *sk, unsigned int nbits, unsigned long use_e, int transient_key) argument 376 generate_x931(RSA_secret_key *sk, unsigned int nbits, unsigned long e_value, gcry_sexp_t deriveparms, int *swapped) argument 781 RSA_secret_key sk; local 864 RSA_secret_key sk; local 907 RSA_secret_key sk; local 988 RSA_secret_key sk; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | elgamal.c | 50 static int test_keys (ELG_secret_key *sk, unsigned int nbits, int nodie); 52 static void generate (ELG_secret_key *sk, unsigned nbits, gcry_mpi_t **factors); 53 static int check_secret_key (ELG_secret_key *sk); 128 test_keys ( ELG_secret_key *sk, unsigned int nbits, int nodie ) argument 137 pk.p = sk->p; 138 pk.g = sk->g; 139 pk.y = sk->y; 144 decrypt ( out2, out1_a, out1_b, sk ); 148 sign ( out1_a, out1_b, test, sk ); 259 generate ( ELG_secret_key *sk, unsigne argument 361 generate_using_x(ELG_secret_key *sk, unsigned int nbits, gcry_mpi_t x, gcry_mpi_t **ret_factors ) argument 622 ELG_secret_key sk; local 664 ELG_secret_key sk; local 683 ELG_secret_key sk; local 734 ELG_secret_key sk; local 759 ELG_secret_key sk; local [all...] |
H A D | twofish.c | 514 ctx->s[2][i] = mds[2][q1[q0[q0[(a) ^ sc] ^ sg] ^ sk] ^ so]; \ 581 byte si = 0, sj = 0, sk = 0, sl = 0, sm = 0, sn = 0, so = 0, sp = 0; 629 CALC_S (si, sj, sk, sl, 16, 0x00, 0x2D, 0x01, 0x2D); /* 01 A4 02 A4 */ 630 CALC_S (si, sj, sk, sl, 17, 0x2D, 0xA4, 0x44, 0x8A); /* A4 56 A1 55 */ 631 CALC_S (si, sj, sk, sl, 18, 0x8A, 0xD5, 0xBF, 0xD1); /* 55 82 FC 87 */ 632 CALC_S (si, sj, sk, sl, 19, 0xD1, 0x7F, 0x3D, 0x99); /* 87 F3 C1 5A */ 633 CALC_S (si, sj, sk, sl, 20, 0x99, 0x46, 0x66, 0x96); /* 5A 1E 47 58 */ 634 CALC_S (si, sj, sk, sl, 21, 0x96, 0x3C, 0x5B, 0xED); /* 58 C6 AE DB */ 635 CALC_S (si, sj, sk, sl, 22, 0xED, 0x37, 0x4F, 0xE0); /* DB 68 3D 9E */ 636 CALC_S (si, sj, sk, s 576 byte si = 0, sj = 0, sk = 0, sl = 0, sm = 0, sn = 0, so = 0, sp = 0; local [all...] |
H A D | dsa.c | 99 static int test_keys (DSA_secret_key *sk, unsigned int qbits); 100 static int check_secret_key (DSA_secret_key *sk); 101 static gpg_err_code_t generate (DSA_secret_key *sk, 199 test_keys (DSA_secret_key *sk, unsigned int qbits) 208 pk.p = sk->p; 209 pk.q = sk->q; 210 pk.g = sk->g; 211 pk.y = sk->y; 217 sign (sig_a, sig_b, data, sk); 248 generate (DSA_secret_key *sk, unsigne 198 test_keys(DSA_secret_key *sk, unsigned int qbits) argument 247 generate(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, int transient_key, dsa_domain_t *domain, gcry_mpi_t **ret_factors ) argument 397 generate_fips186(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, gcry_sexp_t deriveparms, int use_fips186_2, dsa_domain_t *domain, int *r_counter, void **r_seed, size_t *r_seedlen, gcry_mpi_t *r_h) argument 685 DSA_secret_key sk; local 941 DSA_secret_key sk; local 966 DSA_secret_key sk; local [all...] |
H A D | rsa.c | 87 static int test_keys (RSA_secret_key *sk, unsigned nbits); 88 static int check_secret_key (RSA_secret_key *sk); 95 test_keys (RSA_secret_key *sk, unsigned int nbits) 105 pk.n = sk->n; 106 pk.e = sk->e; 119 secret (decr_plaintext, ciphertext, sk); 129 secret (signature, plaintext, sk); 181 generate_std (RSA_secret_key *sk, unsigned int nbits, unsigned long use_e, 307 sk->n = n; 308 sk 94 test_keys(RSA_secret_key *sk, unsigned int nbits) argument 180 generate_std(RSA_secret_key *sk, unsigned int nbits, unsigned long use_e, int transient_key) argument 375 generate_x931(RSA_secret_key *sk, unsigned int nbits, unsigned long e_value, gcry_sexp_t deriveparms, int *swapped) argument 780 RSA_secret_key sk; local 863 RSA_secret_key sk; local 906 RSA_secret_key sk; local 987 RSA_secret_key sk; local [all...] |
H A D | ecc.c | 298 static void test_keys (ECC_secret_key * sk, unsigned int nbits); 299 static int check_secret_key (ECC_secret_key * sk); 510 generate_key (ECC_secret_key *sk, unsigned int nbits, const char *name, 545 sk->E.p = mpi_copy (E.p); 546 sk->E.a = mpi_copy (E.a); 547 sk->E.b = mpi_copy (E.b); 548 point_init (&sk->E.G); 549 point_set (&sk->E.G, &E.G); 550 sk->E.n = mpi_copy (E.n); 551 point_init (&sk 506 generate_key(ECC_secret_key *sk, unsigned int nbits, const char *name, gcry_mpi_t g_x, gcry_mpi_t g_y, gcry_mpi_t q_x, gcry_mpi_t q_y) argument 582 test_keys(ECC_secret_key *sk, unsigned int nbits) argument 630 check_secret_key(ECC_secret_key * sk) argument 961 ECC_secret_key sk; local 1064 ECC_secret_key sk; local 1110 ECC_secret_key sk; local [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsAttributeUtil.c | 1424 secret_key_obj_t *sk; local 1426 sk = malloc(sizeof (secret_key_obj_t)); 1427 if (sk == NULL) { 1430 (void) memcpy(sk, old_secret_key_obj_p, sizeof (secret_key_obj_t)); 1433 sk->sk_value = malloc((sizeof (CK_BYTE) * sk->sk_value_len)); 1434 if (sk->sk_value == NULL) { 1435 free(sk); 1438 (void) memcpy(sk->sk_value, old_secret_key_obj_p->sk_value, 1439 (sizeof (CK_BYTE) * sk [all...] |
/osnet-11/usr/src/lib/fm/libdiskstatus/common/ |
H A D | ds_scsi.c | 538 uint_t sk, asc, ascq; local 551 PC_CUMULATIVE, (caddr_t)sp, buflen, &sk, &asc, &ascq)) == 0) { 605 "(KEY=0x%x ASC=0x%x ASCq=0x%x)\n", sk, asc, ascq);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelAttributeUtil.c | 3598 secret_key_obj_t *sk; local 3600 sk = malloc(sizeof (secret_key_obj_t)); 3601 if (sk == NULL) { 3604 (void) memcpy(sk, old_secret_key_obj_p, sizeof (secret_key_obj_t)); 3607 sk->sk_value = malloc((sizeof (CK_BYTE) * sk->sk_value_len)); 3608 if (sk->sk_value == NULL) { 3609 free(sk); 3612 (void) memcpy(sk->sk_value, old_secret_key_obj_p->sk_value, 3613 (sizeof (CK_BYTE) * sk [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softAttributeUtil.c | 6378 secret_key_obj_t *sk; local 6380 sk = malloc(sizeof (secret_key_obj_t)); 6381 if (sk == NULL) { 6384 (void) memcpy(sk, old_secret_key_obj_p, sizeof (secret_key_obj_t)); 6387 sk->sk_value = malloc((sizeof (CK_BYTE) * sk->sk_value_len)); 6388 if (sk->sk_value == NULL) { 6389 free(sk); 6392 (void) memcpy(sk->sk_value, old_secret_key_obj_p->sk_value, 6393 (sizeof (CK_BYTE) * sk [all...] |