Searched defs:key (Results 1 - 25 of 889) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftRSA.h42 soft_object_t *key; member in struct:soft_rsa_ctx
H A DsoftDSA.h43 soft_object_t *key; member in struct:soft_dsa_ctx
H A DsoftEC.h42 soft_object_t *key; member in struct:soft_ecc_ctx
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgen_subkey.c27 * Routine to automatically generate a subsession key based on an input key.
34 krb5_generate_subkey(krb5_context context, const krb5_keyblock *key, krb5_keyblock **subkey) argument
46 seed.length = key->length;
47 seed.data = key->contents;
58 if ((retval = krb5_c_make_random_key(context, key->enctype, *subkey))) {
H A Dgen_seqnum.c33 * We do this by getting a random key and encrypting something with it,
44 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, krb5_ui_4 *seqno) argument
55 seed.length = key->length;
56 seed.data = key->contents;
H A Ddecode_kdc.c34 *key, putting result in *rep.
46 krb5_decode_kdc_rep(krb5_context context, krb5_data *enc_rep, const krb5_keyblock *key, krb5_kdc_rep **dec_rep) argument
70 if ((retval = krb5_kdc_rep_decrypt_proc(context, key, &usage,
H A Denc_helper.c30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
35 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length,
46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
H A Dkdc_rep_dc.c33 * Decrypt the encrypted portion of the KDC_REP message, using the key
40 krb5_kdc_rep_decrypt_proc(krb5_context context, const krb5_keyblock *key, krb5_const_pointer decryptarg, krb5_kdc_rep *dec_rep) argument
62 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part,
/illumos-gate/usr/src/cmd/makekey/
H A Dmakekey.c45 char key[8]; local
48 (void) read(0, key, 8);
50 (void) write(1, crypt(key, salt), 13);
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/
H A Dweak_key.c69 * mit_des_is_weak_key: returns true iff key is a [semi-]weak des key.
71 * Requires: key has correct odd parity.
74 mit_des_is_weak_key(mit_des_cblock key) argument
80 if (!memcmp(weak_p++,key,sizeof(mit_des_cblock)))
H A Df_parity.c24 mit_des_fixup_key_parity(mit_des_cblock key) argument
29 key[i] &= 0xfe;
30 key[i] |= 1^parity_char(key[i]);
37 * des_check_key_parity: returns true iff key has the correct des parity.
42 mit_des_check_key_parity(mit_des_cblock key) argument
48 if((key[i] & 1) == parity_char(0xfe&key[i]))
/illumos-gate/usr/src/lib/libnsctl/common/
H A Dnsc_hash.h35 char *key; member in struct:hash_node_s
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/
H A Ddefault_state.c42 (krb5_context context, const krb5_keyblock *key,
50 /* We need to copy in the key for des-cbc-cr--ick, but that's how it works*/
51 if (key->enctype == ENCTYPE_DES_CBC_CRC) {
53 (void) memcpy (new_state->data, key->contents, new_state->length);
41 krb5int_des_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, krb5_data *new_state ) argument
H A Ddecrypt.c37 krb5_c_decrypt(krb5_context context, const krb5_keyblock *key, argument
45 if (krb5_enctypes_list[i].etype == key->enctype)
60 if (key->kef_key.ck_data == NULL)
61 ret = init_key_kef(context->kef_cipher_mt, (krb5_keyblock *)key);
66 if ((ret = init_key_uef(krb_ctx_hSession(context), (krb5_keyblock *)key)))
74 key, usage, ivec, &input->ciphertext, output));
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_status_tbl.c46 const smb_status_table_t *key = vkey; local
49 if (key->value == row->value)
51 if (key->value < row->value)
68 smb_status_table_t key; local
71 key.value = ntstatus;
72 key.name = NULL;
73 tep = bsearch(&key, ntx_table, ntx_rows,
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/old/
H A Ddes_stringtokey.c44 krb5_keyblock *key)
56 return(mit_des_string_to_key_int(context, key, string, salt));
59 return mit_afs_string_to_key(context, key, string, salt);
40 krb5int_des_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parm, krb5_keyblock *key) argument
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dstate.c44 krb5_c_init_state (krb5_context context, const krb5_keyblock *key, argument
50 if (krb5_enctypes_list[i].etype == key->enctype)
59 (context, key, keyusage, new_state);
63 krb5_c_free_state (krb5_context context, const krb5_keyblock *key, argument
69 if (krb5_enctypes_list[i].etype == key->enctype)
/illumos-gate/usr/src/lib/libwrap/
H A Dupdate.c46 int key; local
49 while ((key = va_arg(ap, int)) > 0) {
50 switch (key) {
52 tcpd_warn("request_fill: invalid key: %d", key);
/illumos-gate/usr/src/lib/libbc/libc/gen/common/
H A Dtfind.c37 typedef struct node { POINTER key; struct node *llink, *rlink; } NODE; member in struct:node
44 tfind(key, rootp, compar)
45 POINTER key; /* Key to be located */
52 int r = (*compar)(key, (*rootp)->key); /* T2: */
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dlfind.c59 char *key = (char *)ky; local
64 if ((*compar)(key, base) == 0)
H A Dlsearch.c58 char *key = (char *)ky; local
64 if ((*compar)(key, base) == 0)
67 res = memcpy(base, key, width); /* base now == next */
/illumos-gate/usr/src/cmd/ypcmd/revnetgroup/
H A Dtable.h42 char *key; member in struct:tablenode
/illumos-gate/usr/src/cmd/sasinfo/
H A DprintAttrs.h41 int key; member in struct:state_string
64 extern char *getStateString(HBA_UINT32 key, SAS_STATE *stat_string);
/illumos-gate/usr/src/cmd/sendmail/db/hsearch/
H A Dhsearch.c87 DBT key, val; local
93 memset(&key, 0, sizeof(key));
95 key.data = item.key;
96 key.size = strlen(item.key) + 1;
104 * Try and add the key to the database. If we fail because
105 * the key already exists, return the existing key
[all...]
/illumos-gate/usr/src/cmd/getent/
H A Ddogetnetmask.c42 putnetmask(const struct in_addr key, const struct in_addr netmask, FILE *fp) argument
48 net.s_addr = ntohl(key.s_addr);

Completed in 94 milliseconds

1234567891011>>