/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.h | 42 soft_object_t *key; member in struct:soft_rsa_ctx
|
H A D | softDSA.h | 43 soft_object_t *key; member in struct:soft_dsa_ctx
|
H A D | softEC.h | 42 soft_object_t *key; member in struct:soft_ecc_ctx
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gen_subkey.c | 27 * Routine to automatically generate a subsession key based on an input key. 34 krb5_generate_subkey(krb5_context context, const krb5_keyblock *key, krb5_keyblock **subkey) argument 46 seed.length = key->length; 47 seed.data = key->contents; 58 if ((retval = krb5_c_make_random_key(context, key->enctype, *subkey))) {
|
H A D | gen_seqnum.c | 33 * We do this by getting a random key and encrypting something with it, 44 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, krb5_ui_4 *seqno) argument 55 seed.length = key->length; 56 seed.data = key->contents;
|
H A D | decode_kdc.c | 34 *key, putting result in *rep. 46 krb5_decode_kdc_rep(krb5_context context, krb5_data *enc_rep, const krb5_keyblock *key, krb5_kdc_rep **dec_rep) argument 70 if ((retval = krb5_kdc_rep_decrypt_proc(context, key, &usage,
|
H A D | enc_helper.c | 30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument 35 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length, 46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
|
H A D | kdc_rep_dc.c | 33 * Decrypt the encrypted portion of the KDC_REP message, using the key 40 krb5_kdc_rep_decrypt_proc(krb5_context context, const krb5_keyblock *key, krb5_const_pointer decryptarg, krb5_kdc_rep *dec_rep) argument 62 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part,
|
/illumos-gate/usr/src/cmd/makekey/ |
H A D | makekey.c | 45 char key[8]; local 48 (void) read(0, key, 8); 50 (void) write(1, crypt(key, salt), 13);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | weak_key.c | 69 * mit_des_is_weak_key: returns true iff key is a [semi-]weak des key. 71 * Requires: key has correct odd parity. 74 mit_des_is_weak_key(mit_des_cblock key) argument 80 if (!memcmp(weak_p++,key,sizeof(mit_des_cblock)))
|
H A D | f_parity.c | 24 mit_des_fixup_key_parity(mit_des_cblock key) argument 29 key[i] &= 0xfe; 30 key[i] |= 1^parity_char(key[i]); 37 * des_check_key_parity: returns true iff key has the correct des parity. 42 mit_des_check_key_parity(mit_des_cblock key) argument 48 if((key[i] & 1) == parity_char(0xfe&key[i]))
|
/illumos-gate/usr/src/lib/libnsctl/common/ |
H A D | nsc_hash.h | 35 char *key; member in struct:hash_node_s
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | default_state.c | 42 (krb5_context context, const krb5_keyblock *key, 50 /* We need to copy in the key for des-cbc-cr--ick, but that's how it works*/ 51 if (key->enctype == ENCTYPE_DES_CBC_CRC) { 53 (void) memcpy (new_state->data, key->contents, new_state->length); 41 krb5int_des_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, krb5_data *new_state ) argument
|
H A D | decrypt.c | 37 krb5_c_decrypt(krb5_context context, const krb5_keyblock *key, argument 45 if (krb5_enctypes_list[i].etype == key->enctype) 60 if (key->kef_key.ck_data == NULL) 61 ret = init_key_kef(context->kef_cipher_mt, (krb5_keyblock *)key); 66 if ((ret = init_key_uef(krb_ctx_hSession(context), (krb5_keyblock *)key))) 74 key, usage, ivec, &input->ciphertext, output));
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_status_tbl.c | 46 const smb_status_table_t *key = vkey; local 49 if (key->value == row->value) 51 if (key->value < row->value) 68 smb_status_table_t key; local 71 key.value = ntstatus; 72 key.name = NULL; 73 tep = bsearch(&key, ntx_table, ntx_rows,
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/old/ |
H A D | des_stringtokey.c | 44 krb5_keyblock *key) 56 return(mit_des_string_to_key_int(context, key, string, salt)); 59 return mit_afs_string_to_key(context, key, string, salt); 40 krb5int_des_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parm, krb5_keyblock *key) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | state.c | 44 krb5_c_init_state (krb5_context context, const krb5_keyblock *key, argument 50 if (krb5_enctypes_list[i].etype == key->enctype) 59 (context, key, keyusage, new_state); 63 krb5_c_free_state (krb5_context context, const krb5_keyblock *key, argument 69 if (krb5_enctypes_list[i].etype == key->enctype)
|
/illumos-gate/usr/src/lib/libwrap/ |
H A D | update.c | 46 int key; local 49 while ((key = va_arg(ap, int)) > 0) { 50 switch (key) { 52 tcpd_warn("request_fill: invalid key: %d", key);
|
/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | tfind.c | 37 typedef struct node { POINTER key; struct node *llink, *rlink; } NODE; member in struct:node 44 tfind(key, rootp, compar) 45 POINTER key; /* Key to be located */ 52 int r = (*compar)(key, (*rootp)->key); /* T2: */
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | lfind.c | 59 char *key = (char *)ky; local 64 if ((*compar)(key, base) == 0)
|
H A D | lsearch.c | 58 char *key = (char *)ky; local 64 if ((*compar)(key, base) == 0) 67 res = memcpy(base, key, width); /* base now == next */
|
/illumos-gate/usr/src/cmd/ypcmd/revnetgroup/ |
H A D | table.h | 42 char *key; member in struct:tablenode
|
/illumos-gate/usr/src/cmd/sasinfo/ |
H A D | printAttrs.h | 41 int key; member in struct:state_string 64 extern char *getStateString(HBA_UINT32 key, SAS_STATE *stat_string);
|
/illumos-gate/usr/src/cmd/sendmail/db/hsearch/ |
H A D | hsearch.c | 87 DBT key, val; local 93 memset(&key, 0, sizeof(key)); 95 key.data = item.key; 96 key.size = strlen(item.key) + 1; 104 * Try and add the key to the database. If we fail because 105 * the key already exists, return the existing key [all...] |
/illumos-gate/usr/src/cmd/getent/ |
H A D | dogetnetmask.c | 42 putnetmask(const struct in_addr key, const struct in_addr netmask, FILE *fp) argument 48 net.s_addr = ntohl(key.s_addr);
|