/illumos-gate/usr/src/lib/libc/port/locale/ |
H A D | collatefile.h | 104 int32_t key; member in struct:collate_subst
|
/illumos-gate/usr/src/common/crypto/skein/ |
H A D | skein.c | 91 const uint8_t *key, size_t keyBytes) 99 Skein_Assert(keyBytes == 0 || key != NULL, SKEIN_FAIL); 101 /* compute the initial chaining values ctx->X[], based on key */ 102 if (keyBytes == 0) { /* is there a key? */ 103 /* no key: use all zeroes as key for config block */ 105 } else { /* here to pre-process a key */ 115 /* hash the key */ 116 (void) Skein_256_Update(ctx, key, keyBytes); 124 /* convert key byte 90 Skein_256_InitExt(Skein_256_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument 327 Skein_512_InitExt(Skein_512_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument 560 Skein1024_InitExt(Skein1024_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument [all...] |
/illumos-gate/usr/src/cmd/mandoc/ |
H A D | libroff.h | 57 char *key; member in struct:eqn_def
|
/illumos-gate/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_init.c | 212 * Returns: > 0 success and return 'key' 240 * and return the key 372 mdkey_t key = MD_KEYWILD; local 412 if ((key = meta_init_make_device(spp, uname, 427 if (key == MD_KEYWILD) { 428 if ((key = meta_init_make_device(spp, uname, 453 key, NULL, &mnum, NULL, ep) != NULL) && 461 (void) del_self_name(*spp, key, &t_e);
|
H A D | meta_namespace.c | 44 * (by key) 50 mdkey_t key, 63 nm.key = key; 87 * (by key) 173 * (by key) 179 mdkey_t key, 189 nm.key = key; 203 * (by key) 47 meta_getnmentbykey( set_t setno, side_t sideno, mdkey_t key, char **drvnm, minor_t *mnum, md_dev64_t *dev, md_error_t *ep ) argument 176 meta_getdidminorbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 206 meta_getdidbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 258 meta_setdid( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 318 meta_getnmbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 335 meta_getnmentbydev( set_t setno, side_t sideno, md_dev64_t dev, char **drvnm, minor_t *mnum, mdkey_t *key, md_error_t *ep ) argument 398 add_name( mdsetname_t *sp, side_t sideno, mdkey_t key, char *dname, minor_t mnum, char *bname, char *minorname, ddi_devid_t devid, md_error_t *ep ) argument 437 del_name( mdsetname_t *sp, side_t sideno, mdkey_t key, md_error_t *ep ) argument 537 mdkey_t key = MD_KEYWILD; local 734 mdkey_t key; local 833 del_self_name( mdsetname_t *sp, mdkey_t key, md_error_t *ep ) argument [all...] |
/illumos-gate/usr/src/lib/nsswitch/nis/common/ |
H A D | getexecattr.c | 59 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp); 90 * and call it to match exec_attr data in strbuf and argp->key.attrp 134 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp); 181 * be called again for further key-value pairs, or returns non-zero to stop the 182 * flow of key-value pairs. If it returns a non-zero value, it is not called 200 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp); 205 * keep yp_status from previous key/value pair 264 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp); 270 char key[MAX_INPUT]; local 273 * Try using policy as part of search key [all...] |
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 349 char *key = &nisbuf->pwd->pw_passwd[2]; local 353 keylen = strlen(key); 356 key, keylen, &(nisbuf->c2scratch),
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaKeys.c | 44 meta_object_t *key = NULL; local 54 rv = meta_object_alloc(session, &key); 58 rv = meta_generate_keys(session, pMechanism, pTemplate, ulCount, key, 63 meta_object_activate(key); 65 *phKey = (CK_OBJECT_HANDLE) key; 69 if (key) 70 (void) meta_object_dealloc(session, key, B_TRUE); 271 * for the derived key handle at phKey. Two (related) mechanisms 336 /* Get the key the application is providing */ 357 /* Get the key th [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDSA.c | 80 * Make a copy of the signature or verification key, and save it 83 * on this original key while doing signing/verification. 98 dsa_ctx->key = tmp_key; 117 local_dsa_sign(soft_object_t *key, CK_BYTE_PTR in, CK_ULONG inlen, argument 131 rv = soft_get_private_value(key, CKA_PRIME, p, &plen); 136 rv = soft_get_private_value(key, CKA_SUBPRIME, q, &qlen); 141 rv = soft_get_private_value(key, CKA_BASE, g, &glen); 146 rv = soft_get_private_value(key, CKA_VALUE, x, &xlen); 168 local_dsa_verify(soft_object_t *key, CK_BYTE_PTR data, CK_BYTE_PTR sig) argument 181 rv = soft_get_public_value(key, CKA_PRIM 228 soft_object_t *key = dsa_ctx->key; local 282 soft_object_t *key = dsa_ctx->key; local 331 soft_object_t *key = dsa_ctx->key; local 373 soft_object_t *key = dsa_ctx->key; local 405 soft_genDSAkey_set_attribute(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *value, uint32_t value_len, boolean_t public) argument [all...] |
H A D | softEC.c | 61 if (ecc_ctx->key != NULL) { 62 soft_cleanup_object(ecc_ctx->key); 63 free(ecc_ctx->key); 72 soft_free_ecprivkey(ECPrivateKey *key) argument 74 soft_free_ecparams(&key->ecParams, B_FALSE); 79 SECITEM_FreeItem(&key->version, B_FALSE); 80 free(key); 126 * into the corresponding key object. 129 soft_genECkey_set_attribute(soft_object_t *key, biginteger_t *bi, argument 136 dst = OBJ_PRI_EC_VALUE(key); 470 soft_object_t *key = ecc_ctx->key; local 535 soft_object_t *key = ecc_ctx->key; local [all...] |
H A D | softEncryptUtil.c | 91 * key_p: pointer to key soft_object_t struct 102 * CKR_KEY_TYPE_INCONSISTENT: incorrect type of key to use 810 ARCFour_key *key = (ARCFour_key *)session_p->encrypt.context; local 815 bzero(key, sizeof (*key)); 928 ARCFour_key *key = (ARCFour_key *)active_op->context; local 930 if (key != NULL) 931 bzero(key, sizeof (*key)); 942 if (rsa_ctx->key ! [all...] |
H A D | softMAC.c | 187 mac_init_ctx(soft_session_t *session_p, soft_object_t *key, argument 198 if (OBJ_SEC(key)->sk_value_len > MD5_SSL_PAD_AND_KEY_SIZE) { 205 /* SSL MAC is HASH(key + opad + HASH(key + ipad + data)) */ 206 (void) memcpy(md5_ipad, OBJ_SEC(key)->sk_value, 207 OBJ_SEC(key)->sk_value_len); 208 (void) memcpy(&md5_ipad[OBJ_SEC(key)->sk_value_len], 210 (void) memcpy(md5_opad, OBJ_SEC(key)->sk_value, 211 OBJ_SEC(key)->sk_value_len); 212 (void) memcpy(&md5_opad[OBJ_SEC(key) [all...] |
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | nss.c | 262 char *key = NULL; local 279 } else if (key != NULL) { 281 PAPI_ATTR_APPEND, key, buf); 282 free(key); 286 key = NULL; 289 if (key == NULL) { 290 key = strdup(buf); 314 if (key != NULL) { 315 papiAttributeListAddString(&list, PAPI_ATTR_APPEND, key, buf); 316 free(key); [all...] |
/illumos-gate/usr/src/lib/print/libpapi-lpd/common/ |
H A D | lpd-job.c | 517 char key; local 542 key = 'A' + i; 544 key = 'a' + (i - 26); 546 key = '0' + (i - 52); 553 snprintf(name, sizeof (name), "df%cXXX%s", key, host);
|
/illumos-gate/usr/src/lib/print/libprint/common/ |
H A D | ns_bsd_addr.c | 176 value_to_string(const char *key, void *value) argument 180 if ((key != NULL) && (value != NULL)) { 181 if (strcmp(key, NS_KEY_BSDADDR) == 0) { 183 } else if ((strcmp(key, NS_KEY_ALL) == 0) || 184 (strcmp(key, NS_KEY_GROUP) == 0)) { 186 } else if (strcmp(key, NS_KEY_LIST) == 0) { 198 string_to_value(const char *key, char *string) argument 202 if ((key != NULL) && (string != NULL) && (string[0] != NULL)) { 203 if (strcmp(key, NS_KEY_BSDADDR) == 0) { 205 } else if ((strcmp(key, NS_KEY_AL [all...] |
/illumos-gate/usr/src/lib/scsi/libses/common/ |
H A D | ses_subr.c | 296 uint64_t asc = 0, ascq = 0, key = 0; local 303 if (libscsi_action_parse_sense(ap, &key, &asc, &ascq, NULL) != 0) 309 keystr = libscsi_sense_key_name(key); 311 return (ses_error(ESES_LIBSCSI, "%s: SCSI status %d sense key %llu " 313 libscsi_action_get_status(ap), key, keystr ? keystr : "<unknown>",
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_ht.c | 54 static size_t ht_default_hash(HT_HANDLE *handle, const char *key); 76 * must be a power of two. The key size must be a positive integer. 77 * For null terminated keys, the key size does not need to include the 78 * null terminating character. The type of key is indicated by the 170 * on the specified key. This will identify the location for the 171 * corresponding item in the hash table. The handle and key pointers 177 ht_default_hash(HT_HANDLE *handle, const char *key) argument 183 while (*key) { 184 hash_ndx += *key; 185 ++key; 230 ht_add_item(HT_HANDLE *handle, const char *key, const void *data) argument 287 ht_replace_item(HT_HANDLE *handle, const char *key, const void *data) argument 308 ht_remove_item(HT_HANDLE *handle, const char *key) argument 372 ht_find_item(HT_HANDLE *handle, const char *key) argument [all...] |
/illumos-gate/usr/src/lib/fm/libdiagcode/common/ |
H A D | diagcode_test.c | 197 const char *key[MAXKEY]; local 213 /* convert key into array */ 217 key[nel++] = beginp; 224 key[nel] = NULL; 231 if (fm_dc_key2code(Dhp, key, code, MAXCODE) < 0) 252 char *key[MAXKEY]; local 270 if (fm_dc_code2key(Dhp, argv[2], key, fm_dc_maxkey(Dhp)) < 0) 284 /* convert key into string */ 286 for (nel = 0; key[nel]; nel++) { 289 (void) strcat(keystr, key[ne [all...] |
/illumos-gate/usr/src/lib/fm/libfmd_snmp/common/ |
H A D | module.c | 93 static sunFmModule_data_t key; local 95 key.d_index = index; 97 (void) strlcpy(key.d_ami_name, name, sizeof (key.d_ami_name)); 99 key.d_ami_name[0] = '\0'; 101 return (&key); 113 sunFmModule_data_t *key; local 115 key = key_build(name, 0); 116 return (uu_avl_find(mod_name_avl, key, NULL, NULL)); 128 sunFmModule_data_t *key; local 144 sunFmModule_data_t *key, *data; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 91 krb5_octet *key = keyblock->contents; local 118 strncpy((char *) key, 122 key[i] <<= 1; 123 /* now fix up key parity again */ 124 mit_des_fixup_key_parity(key); 132 result as the new key. */ 168 key, i, &usekey, ikey); 170 /* now fix up key parity again */ 171 mit_des_fixup_key_parity(key); 249 * Permuted-choice 1 from the key bit 435 krb5_afs_crypt_setkey(char *key, char *E, char (*KS)[48]) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 51 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 64 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size, 71 return(krb5_c_encrypt(context, eblock->key, 0, ivec?&ivecd:0, 86 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 94 inputd.enctype = eblock->key->enctype; 105 return(krb5_c_decrypt(context, eblock->key, 0, ivec?&ivecd:0, 111 const krb5_keyblock *key) 113 eblock->key = (krb5_keyblock *) key; 156 krb5_keyblock *key; local 110 krb5_process_key(krb5_context context, krb5_encrypt_block *eblock, const krb5_keyblock *key) argument 214 krb5_keyblock key; local 252 krb5_keyblock key; local 285 krb5_encrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_data *data, krb5_enc_data *enc_data) argument 318 krb5_decrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_enc_data *enc_data, krb5_data *data) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 5 /* Novell key-format scheme: 18 key [1] EncryptionKey, 69 /* Encode the key type and value. */ 72 /* key value */ 80 /* key type */ 137 krb5_int32 mkvno, /* Master key version number */ 311 static asn1_error_code asn1_decode_key(asn1buf *buf, krb5_key_data *key) argument 319 key->key_data_contents[0] = NULL; 320 key->key_data_contents[1] = NULL; 334 key [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 75 krb5_keyblock key; local 79 memset(&key, 0, sizeof (krb5_keyblock)); 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 91 entry.key = key; 100 krb5_free_keyblock_contents(ctx, &key); 116 * constructing the salt in the string-to-key function. 117 * where kvno is the key version number of the set of service principal 119 * where flags is the set of conditions that affects the key table entries 126 * where password is the password that will be used to derive the key fo 274 kt_remove_by_key(krb5_context ctx, char *key, uint_t type) argument [all...] |
H A D | kt_srvtab.c | 211 best_entry.key.contents = 0; 213 ent.key.enctype = enctype; 448 unsigned char key[8]; local 466 if (fread(key, 1, sizeof(key), fp) != sizeof(key)) 480 ret_entry->key.enctype = ENCTYPE_DES_CBC_CRC; 481 ret_entry->key.magic = KV5M_KEYBLOCK; 482 ret_entry->key.length = sizeof(key); [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/support/ |
H A D | threads.c | 102 Thread termination concurrent with key deletion can cause two 107 Other cases, like looking up data while the library owning the key 176 static pthread_key_t key; variable 239 t = pthread_getspecific(key); 288 t = pthread_getspecific(key); 298 err = pthread_setspecific(key, t); 446 err = pthread_key_create(&key, thread_termination); 488 pthread_key_delete(key);
|