Searched defs:key (Results 301 - 325 of 889) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/lib/libc/port/locale/
H A Dcollatefile.h104 int32_t key; member in struct:collate_subst
/illumos-gate/usr/src/common/crypto/skein/
H A Dskein.c91 const uint8_t *key, size_t keyBytes)
99 Skein_Assert(keyBytes == 0 || key != NULL, SKEIN_FAIL);
101 /* compute the initial chaining values ctx->X[], based on key */
102 if (keyBytes == 0) { /* is there a key? */
103 /* no key: use all zeroes as key for config block */
105 } else { /* here to pre-process a key */
115 /* hash the key */
116 (void) Skein_256_Update(ctx, key, keyBytes);
124 /* convert key byte
90 Skein_256_InitExt(Skein_256_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument
327 Skein_512_InitExt(Skein_512_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument
560 Skein1024_InitExt(Skein1024_Ctxt_t *ctx, size_t hashBitLen, uint64_t treeInfo, const uint8_t *key, size_t keyBytes) argument
[all...]
/illumos-gate/usr/src/cmd/mandoc/
H A Dlibroff.h57 char *key; member in struct:eqn_def
/illumos-gate/usr/src/lib/lvm/libmeta/common/
H A Dmeta_init.c212 * Returns: > 0 success and return 'key'
240 * and return the key
372 mdkey_t key = MD_KEYWILD; local
412 if ((key = meta_init_make_device(spp, uname,
427 if (key == MD_KEYWILD) {
428 if ((key = meta_init_make_device(spp, uname,
453 key, NULL, &mnum, NULL, ep) != NULL) &&
461 (void) del_self_name(*spp, key, &t_e);
H A Dmeta_namespace.c44 * (by key)
50 mdkey_t key,
63 nm.key = key;
87 * (by key)
173 * (by key)
179 mdkey_t key,
189 nm.key = key;
203 * (by key)
47 meta_getnmentbykey( set_t setno, side_t sideno, mdkey_t key, char **drvnm, minor_t *mnum, md_dev64_t *dev, md_error_t *ep ) argument
176 meta_getdidminorbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument
206 meta_getdidbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument
258 meta_setdid( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument
318 meta_getnmbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument
335 meta_getnmentbydev( set_t setno, side_t sideno, md_dev64_t dev, char **drvnm, minor_t *mnum, mdkey_t *key, md_error_t *ep ) argument
398 add_name( mdsetname_t *sp, side_t sideno, mdkey_t key, char *dname, minor_t mnum, char *bname, char *minorname, ddi_devid_t devid, md_error_t *ep ) argument
437 del_name( mdsetname_t *sp, side_t sideno, mdkey_t key, md_error_t *ep ) argument
537 mdkey_t key = MD_KEYWILD; local
734 mdkey_t key; local
833 del_self_name( mdsetname_t *sp, mdkey_t key, md_error_t *ep ) argument
[all...]
/illumos-gate/usr/src/lib/nsswitch/nis/common/
H A Dgetexecattr.c59 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp);
90 * and call it to match exec_attr data in strbuf and argp->key.attrp
134 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp);
181 * be called again for further key-value pairs, or returns non-zero to stop the
182 * flow of key-value pairs. If it returns a non-zero value, it is not called
200 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp);
205 * keep yp_status from previous key/value pair
264 _priv_execattr *_priv_exec = (_priv_execattr *)(argp->key.attrp);
270 char key[MAX_INPUT]; local
273 * Try using policy as part of search key
[all...]
/illumos-gate/usr/src/lib/passwdutil/
H A Dnis_attr.c349 char *key = &nisbuf->pwd->pw_passwd[2]; local
353 keylen = strlen(key);
356 key, keylen, &(nisbuf->c2scratch),
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaKeys.c44 meta_object_t *key = NULL; local
54 rv = meta_object_alloc(session, &key);
58 rv = meta_generate_keys(session, pMechanism, pTemplate, ulCount, key,
63 meta_object_activate(key);
65 *phKey = (CK_OBJECT_HANDLE) key;
69 if (key)
70 (void) meta_object_dealloc(session, key, B_TRUE);
271 * for the derived key handle at phKey. Two (related) mechanisms
336 /* Get the key the application is providing */
357 /* Get the key th
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDSA.c80 * Make a copy of the signature or verification key, and save it
83 * on this original key while doing signing/verification.
98 dsa_ctx->key = tmp_key;
117 local_dsa_sign(soft_object_t *key, CK_BYTE_PTR in, CK_ULONG inlen, argument
131 rv = soft_get_private_value(key, CKA_PRIME, p, &plen);
136 rv = soft_get_private_value(key, CKA_SUBPRIME, q, &qlen);
141 rv = soft_get_private_value(key, CKA_BASE, g, &glen);
146 rv = soft_get_private_value(key, CKA_VALUE, x, &xlen);
168 local_dsa_verify(soft_object_t *key, CK_BYTE_PTR data, CK_BYTE_PTR sig) argument
181 rv = soft_get_public_value(key, CKA_PRIM
228 soft_object_t *key = dsa_ctx->key; local
282 soft_object_t *key = dsa_ctx->key; local
331 soft_object_t *key = dsa_ctx->key; local
373 soft_object_t *key = dsa_ctx->key; local
405 soft_genDSAkey_set_attribute(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *value, uint32_t value_len, boolean_t public) argument
[all...]
H A DsoftEC.c61 if (ecc_ctx->key != NULL) {
62 soft_cleanup_object(ecc_ctx->key);
63 free(ecc_ctx->key);
72 soft_free_ecprivkey(ECPrivateKey *key) argument
74 soft_free_ecparams(&key->ecParams, B_FALSE);
79 SECITEM_FreeItem(&key->version, B_FALSE);
80 free(key);
126 * into the corresponding key object.
129 soft_genECkey_set_attribute(soft_object_t *key, biginteger_t *bi, argument
136 dst = OBJ_PRI_EC_VALUE(key);
470 soft_object_t *key = ecc_ctx->key; local
535 soft_object_t *key = ecc_ctx->key; local
[all...]
H A DsoftEncryptUtil.c91 * key_p: pointer to key soft_object_t struct
102 * CKR_KEY_TYPE_INCONSISTENT: incorrect type of key to use
810 ARCFour_key *key = (ARCFour_key *)session_p->encrypt.context; local
815 bzero(key, sizeof (*key));
928 ARCFour_key *key = (ARCFour_key *)active_op->context; local
930 if (key != NULL)
931 bzero(key, sizeof (*key));
942 if (rsa_ctx->key !
[all...]
H A DsoftMAC.c187 mac_init_ctx(soft_session_t *session_p, soft_object_t *key, argument
198 if (OBJ_SEC(key)->sk_value_len > MD5_SSL_PAD_AND_KEY_SIZE) {
205 /* SSL MAC is HASH(key + opad + HASH(key + ipad + data)) */
206 (void) memcpy(md5_ipad, OBJ_SEC(key)->sk_value,
207 OBJ_SEC(key)->sk_value_len);
208 (void) memcpy(&md5_ipad[OBJ_SEC(key)->sk_value_len],
210 (void) memcpy(md5_opad, OBJ_SEC(key)->sk_value,
211 OBJ_SEC(key)->sk_value_len);
212 (void) memcpy(&md5_opad[OBJ_SEC(key)
[all...]
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/
H A Dnss.c262 char *key = NULL; local
279 } else if (key != NULL) {
281 PAPI_ATTR_APPEND, key, buf);
282 free(key);
286 key = NULL;
289 if (key == NULL) {
290 key = strdup(buf);
314 if (key != NULL) {
315 papiAttributeListAddString(&list, PAPI_ATTR_APPEND, key, buf);
316 free(key);
[all...]
/illumos-gate/usr/src/lib/print/libpapi-lpd/common/
H A Dlpd-job.c517 char key; local
542 key = 'A' + i;
544 key = 'a' + (i - 26);
546 key = '0' + (i - 52);
553 snprintf(name, sizeof (name), "df%cXXX%s", key, host);
/illumos-gate/usr/src/lib/print/libprint/common/
H A Dns_bsd_addr.c176 value_to_string(const char *key, void *value) argument
180 if ((key != NULL) && (value != NULL)) {
181 if (strcmp(key, NS_KEY_BSDADDR) == 0) {
183 } else if ((strcmp(key, NS_KEY_ALL) == 0) ||
184 (strcmp(key, NS_KEY_GROUP) == 0)) {
186 } else if (strcmp(key, NS_KEY_LIST) == 0) {
198 string_to_value(const char *key, char *string) argument
202 if ((key != NULL) && (string != NULL) && (string[0] != NULL)) {
203 if (strcmp(key, NS_KEY_BSDADDR) == 0) {
205 } else if ((strcmp(key, NS_KEY_AL
[all...]
/illumos-gate/usr/src/lib/scsi/libses/common/
H A Dses_subr.c296 uint64_t asc = 0, ascq = 0, key = 0; local
303 if (libscsi_action_parse_sense(ap, &key, &asc, &ascq, NULL) != 0)
309 keystr = libscsi_sense_key_name(key);
311 return (ses_error(ESES_LIBSCSI, "%s: SCSI status %d sense key %llu "
313 libscsi_action_get_status(ap), key, keystr ? keystr : "<unknown>",
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_ht.c54 static size_t ht_default_hash(HT_HANDLE *handle, const char *key);
76 * must be a power of two. The key size must be a positive integer.
77 * For null terminated keys, the key size does not need to include the
78 * null terminating character. The type of key is indicated by the
170 * on the specified key. This will identify the location for the
171 * corresponding item in the hash table. The handle and key pointers
177 ht_default_hash(HT_HANDLE *handle, const char *key) argument
183 while (*key) {
184 hash_ndx += *key;
185 ++key;
230 ht_add_item(HT_HANDLE *handle, const char *key, const void *data) argument
287 ht_replace_item(HT_HANDLE *handle, const char *key, const void *data) argument
308 ht_remove_item(HT_HANDLE *handle, const char *key) argument
372 ht_find_item(HT_HANDLE *handle, const char *key) argument
[all...]
/illumos-gate/usr/src/lib/fm/libdiagcode/common/
H A Ddiagcode_test.c197 const char *key[MAXKEY]; local
213 /* convert key into array */
217 key[nel++] = beginp;
224 key[nel] = NULL;
231 if (fm_dc_key2code(Dhp, key, code, MAXCODE) < 0)
252 char *key[MAXKEY]; local
270 if (fm_dc_code2key(Dhp, argv[2], key, fm_dc_maxkey(Dhp)) < 0)
284 /* convert key into string */
286 for (nel = 0; key[nel]; nel++) {
289 (void) strcat(keystr, key[ne
[all...]
/illumos-gate/usr/src/lib/fm/libfmd_snmp/common/
H A Dmodule.c93 static sunFmModule_data_t key; local
95 key.d_index = index;
97 (void) strlcpy(key.d_ami_name, name, sizeof (key.d_ami_name));
99 key.d_ami_name[0] = '\0';
101 return (&key);
113 sunFmModule_data_t *key; local
115 key = key_build(name, 0);
116 return (uu_avl_find(mod_name_avl, key, NULL, NULL));
128 sunFmModule_data_t *key; local
144 sunFmModule_data_t *key, *data; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c91 krb5_octet *key = keyblock->contents; local
118 strncpy((char *) key,
122 key[i] <<= 1;
123 /* now fix up key parity again */
124 mit_des_fixup_key_parity(key);
132 result as the new key. */
168 key, i, &usekey, ikey);
170 /* now fix up key parity again */
171 mit_des_fixup_key_parity(key);
249 * Permuted-choice 1 from the key bit
435 krb5_afs_crypt_setkey(char *key, char *E, char (*KS)[48]) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dold_api_glue.c51 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize)))
64 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size,
71 return(krb5_c_encrypt(context, eblock->key, 0, ivec?&ivecd:0,
86 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize)))
94 inputd.enctype = eblock->key->enctype;
105 return(krb5_c_decrypt(context, eblock->key, 0, ivec?&ivecd:0,
111 const krb5_keyblock *key)
113 eblock->key = (krb5_keyblock *) key;
156 krb5_keyblock *key; local
110 krb5_process_key(krb5_context context, krb5_encrypt_block *eblock, const krb5_keyblock *key) argument
214 krb5_keyblock key; local
252 krb5_keyblock key; local
285 krb5_encrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_data *data, krb5_enc_data *enc_data) argument
318 krb5_decrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_enc_data *enc_data, krb5_data *data) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dldap_key_seq.c5 /* Novell key-format scheme:
18 key [1] EncryptionKey,
69 /* Encode the key type and value. */
72 /* key value */
80 /* key type */
137 krb5_int32 mkvno, /* Master key version number */
311 static asn1_error_code asn1_decode_key(asn1buf *buf, krb5_key_data *key) argument
319 key->key_data_contents[0] = NULL;
320 key->key_data_contents[1] = NULL;
334 key
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_solaris.c75 krb5_keyblock key; local
79 memset(&key, 0, sizeof (krb5_keyblock));
88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
91 entry.key = key;
100 krb5_free_keyblock_contents(ctx, &key);
116 * constructing the salt in the string-to-key function.
117 * where kvno is the key version number of the set of service principal
119 * where flags is the set of conditions that affects the key table entries
126 * where password is the password that will be used to derive the key fo
274 kt_remove_by_key(krb5_context ctx, char *key, uint_t type) argument
[all...]
H A Dkt_srvtab.c211 best_entry.key.contents = 0;
213 ent.key.enctype = enctype;
448 unsigned char key[8]; local
466 if (fread(key, 1, sizeof(key), fp) != sizeof(key))
480 ret_entry->key.enctype = ENCTYPE_DES_CBC_CRC;
481 ret_entry->key.magic = KV5M_KEYBLOCK;
482 ret_entry->key.length = sizeof(key);
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/support/
H A Dthreads.c102 Thread termination concurrent with key deletion can cause two
107 Other cases, like looking up data while the library owning the key
176 static pthread_key_t key; variable
239 t = pthread_getspecific(key);
288 t = pthread_getspecific(key);
298 err = pthread_setspecific(key, t);
446 err = pthread_key_create(&key, thread_termination);
488 pthread_key_delete(key);

Completed in 163 milliseconds

<<11121314151617181920>>