/illumos-gate/usr/src/lib/libcmd/common/ |
H A D | chgrp.c | 234 Key_t keys[3]; local 356 keys[1].gid = keys[2].uid = NOID; 397 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid; 398 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid; 402 if (m = (Map_t*)dtmatch(map, &keys[i])) 415 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID));
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | delete.c | 46 KMF_KEY_HANDLE *keys = NULL; local 117 keys = kmf_get_attr_ptr(KMF_KEY_HANDLE_ATTR, attrlist, numattr); 118 if (keys == NULL) 125 KMF_KEY_HANDLE_ATTR, &keys[i], sizeof (KMF_KEY_HANDLE)); 151 KMF_KEY_HANDLE *keys = NULL; local 165 keys = (KMF_KEY_HANDLE *)malloc(numkeys * 167 if (keys == NULL) 169 (void) memset(keys, 0, numkeys * 173 KMF_KEY_HANDLE_ATTR, keys, sizeof (KMF_KEY_HANDLE)); 181 free(keys); [all...] |
H A D | list.c | 159 pk_show_keys(void *handle, KMF_KEY_HANDLE *keys, int numkeys) argument 165 i+1, describeKey(&keys[i]), 166 keys[i].keylabel ? keys[i].keylabel : 169 if (keys[i].keyclass == KMF_SYMMETRIC) { 174 rv = kmf_get_sym_key_value(handle, &keys[i], 180 } else if (keys[i].kstype == KMF_KEYSTORE_PK11TOKEN) { 259 KMF_KEY_HANDLE *keys; local 275 (void) printf(gettext("Found %d %s keys.\n"), 277 keys [all...] |
H A D | import.c | 64 KMF_RAW_KEY_DATA *keys = NULL; local 73 &certs, &ncerts, &keys, &nkeys); 153 /* The order of certificates and keys should match */ 180 KMF_RAW_KEY_ATTR, &keys[i], 197 if (keys) { 199 kmf_free_raw_key(&keys[i]); 200 free(keys); 217 KMF_RAW_KEY_DATA *keys = NULL; local 230 &certs, &ncerts, &keys, &nkeys); 266 /* The order of certificates and keys shoul 495 KMF_RAW_KEY_DATA *keys = NULL; local [all...] |
H A D | signcsr.c | 373 int keys = 1; local 446 &keys, sizeof (keys));
|
/illumos-gate/usr/src/cmd/krb5/kadmin/cli/ |
H A D | keytab.c | 267 krb5_keyblock *keys; local 275 keys = NULL; 309 * keys stored in the keytab, use the default "normal" 310 * salt for all keys 330 &keys, &nkeys); 340 code = kadm5_randkey_principal_old(handle, princ, &keys, &nkeys); 385 new_entry.key = keys[i]; 400 etype_string(keys[i].enctype), keytab_str); 412 krb5_free_keyblock_contents(context, &keys[i]); 413 free(keys); [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 86 * of keys is odd 89 * If we have an even number of keys and additional encryption will be 100 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument 120 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 134 * If we have an even number of keys then do an extra round of 138 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 152 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 159 if (keys->dh_key_set_len < 1) 173 stat = __desN_crypt(keys->dh_key_set_val, keys 186 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 218 MD5_verifier(gss_buffer_t tok, gss_buffer_t msg, cipher_proc signer, dh_key_set_t keys, dh_signature_t signature ) argument 354 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument 393 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument 494 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument 547 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument [all...] |
/illumos-gate/usr/src/cmd/oamuser/user/ |
H A D | funcs.c | 82 static ua_key_t keys[] = { variable 99 #define NKEYS (sizeof (keys)/sizeof (ua_key_t)) 126 if (strcmp(key, keys[i].key) == 0) { 127 if (keys[i].newvalue != NULL) { 133 if (keys[i].check != NULL && 134 (res = keys[i].check(value)) != NULL) { 135 errmsg(M_INVALID, res, keys[i].errstr); 138 keys[i].newvalue = value; 148 * Add the keys to the argument vector. 156 const char *key = keys[ [all...] |
/illumos-gate/usr/src/cmd/print/bsd-sysv-commands/ |
H A D | in.lpd.c | 557 char *keys[] = { "printer-is-accepting-jobs", NULL }; local 559 status = papiPrinterQuery(svc, printer, keys, NULL, &p);
|
H A D | common.c | 533 char *keys[] = { "printer-name", NULL }; local 536 status = papiPrintersList(svc, keys, NULL, &printers);
|
H A D | lpstat.c | 141 char *keys[] = { "device-uri", NULL }; local 144 status = papiPrinterQuery(svc, name, keys, NULL, &p); 729 char **keys = NULL; local 737 keys = report_device_keys; 739 keys = report_class_keys; 741 keys = report_accepting_keys; 743 keys = report_printer_keys; 745 status = papiPrinterQuery(svc, name, keys,
|
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | admin_cmds.c | 423 TSS_KM_KEYINFO2 *keys; local 435 TSS_PS_TYPE_USER, NULL, &num_keys, &keys); 442 parent = hash_insert(keys[i].parentKeyUUID, NULL); 443 child = hash_insert(keys[i].keyUUID, &keys[i]); 445 if (memcmp(&(keys[i].keyUUID), &srk_uuid, 452 ret = Tspi_Context_FreeMemory(hContext, (BYTE *) keys);
|
/illumos-gate/usr/src/lib/krb5/kadm5/ |
H A D | kadm_rpc.h | 146 krb5_keyblock *keys; member in struct:chrand_ret
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaUtil.c | 915 * Generates symmetric (k1=key, k2=null) or asymmetric (k1=pub, k2=priv) keys. 1000 * a FreeObject if the first is not. Both keys will have the 1441 * and creates a single new key as output. But a few mechanisms take 2 keys 1442 * as input, and the two SSL/TLS mechanisms create 4 keys as output. 1614 * the new key is unused (NULL). Instead, there are 4 keys which 1620 CK_SSL3_KEY_MAT_OUT *keys; local 1624 keys = keyparams->pReturnedKeyMaterial; 1626 slotkey1->hObject = keys->hClientMacSecret; 1627 slotkey2->hObject = keys->hServerMacSecret; 1628 slotkey3->hObject = keys [all...] |
/illumos-gate/usr/src/lib/libnisdb/ |
H A D | db_mindex.cc | 102 db_key_desc * keys = how->keyloc(); local 115 indices.indices_val[i].init(&(keys[i])); 389 "number of keys (%d) does not equal number of indices (%d)",
|
/illumos-gate/usr/src/cmd/fm/fmd/common/ |
H A D | fmd_module.c | 1009 char *const keys[], char *code, size_t codelen) 1014 if ((err = fm_dc_key2code(mp->mod_dictv[i], (const char **)keys, 1008 fmd_module_dc_key2code(fmd_module_t *mp, char *const keys[], char *code, size_t codelen) argument
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | chkey_common.c | 475 char *keys[2]; local 484 keys[0] = public; 485 keys[1] = crypt; 515 alist[q][j] = keys[q]; 527 alist[q][attr->value_count] = keys[q]; 537 alist[q][0] = keys[q]; 878 /* Entry exists, modify attributes for public and secret keys */ 882 /* Add NisKeyObject objectclass and the keys */ 949 /* object class already exists, replace keys */
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ldap.h | 245 struct berval **keys; member in struct:__anon2571
|
/illumos-gate/usr/src/cmd/iscsiadm/ |
H A D | iscsiadm.h | 154 SUN_IMA_DISC_ADDRESS_KEY keys[1]; member in struct:_SUN_IMA_DISC_ADDRESS_KEY_PROPERTIES
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 256 * princ which has no keys initially. 259 /* have a princ with keys, return dupe princ error */ 264 * have a princ with no keys, let's replace it. Note, want to 387 /* initialize the keys */ 952 * Purpose: Check if a key appears in a list of keys, in order to 961 * new_key_data (r) keys to check against 1033 * key_data (r) keys to add to the history entry 1098 * adb (r/w) admin principal entry to add keys to 1100 * pw (r) keys for the password to add to adb's key history 1105 * pw contains n_key_data keys i 2096 krb5_keyblock *keys; local [all...] |
/illumos-gate/usr/src/uts/common/io/lvm/trans/ |
H A D | trans_ioctl.c | 358 static uint_t keys[NKEYS]; variable 445 if (tsd_set(keys[i], tp)) { 462 if ((tsd_get(keys[0]) != NULL) || 463 (tsd_get(keys[NKEYS-1]) != NULL) || 464 (tsd_get(keys[NKEYS>>1]) != NULL)) { 469 if (tsd_get(keys[i]) != tp) 528 * destroy old keys, if any 531 tsd_destroy(&keys[i]); 533 * test 1 -- simple create and destroy keys tests 538 tsd_create(&keys[ [all...] |
/illumos-gate/usr/src/lib/libdladm/common/ |
H A D | libdlwlan.c | 433 dladm_wlan_attr_t *attrp, boolean_t create_ibss, void *keys, 476 if (keys == NULL || key_count == 0 || 481 status = do_set_key(handle, linkid, keys, key_count); 485 if (keys == NULL || key_count == 0 || 530 if (secmode == DLADM_WLAN_SECMODE_WPA && keys != NULL) 531 (void) wpa_instance_create(handle, linkid, keys); 557 dladm_wlan_attr_t *attrp, int timeout, void *keys, uint_t key_count, 592 create_ibss, keys, key_count, timeout); 610 attrp, create_ibss, keys, key_count, timeout); 632 ap, create_ibss, keys, key_coun 432 do_connect(dladm_handle_t handle, datalink_id_t linkid, void *buf, int bufsize, dladm_wlan_attr_t *attrp, boolean_t create_ibss, void *keys, uint_t key_count, int timeout) argument 556 dladm_wlan_connect(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_attr_t *attrp, int timeout, void *keys, uint_t key_count, uint_t flags) argument 1325 do_set_key(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_key_t *keys, uint_t key_count) argument [all...] |
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1375 KMF_KEY_HANDLE *keys; local 1397 /* It is OK if this is NULL, we dont need a cred to find public keys */ 1442 keys = kmf_get_attr_ptr(KMF_KEY_HANDLE_ATTR, attrlist, numattr); 1443 /* it is okay to have "keys" contains NULL */ 1462 if (keys != NULL && match) { 1463 keys[count].kstype = KMF_KEYSTORE_NSS; 1464 keys[count].keyclass = KMF_ASYM_PUB; 1465 keys[count].keyp = (void *)pubnode->key; 1466 keys[count].keylabel = nick; 1469 keys[coun [all...] |
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 576 krb5_keyblock *keys; local 603 keys = malloc(sizeof(krb5_keyblock) * (request->nktypes + 1)); 604 if (keys == NULL) { 608 ret->data = (char *) keys; 618 entry_key, &keys[k], NULL) != 0) { 619 if (keys[k].contents != NULL) 620 krb5_free_keyblock_contents(context, &keys[k]); 621 memset(&keys[k], 0, sizeof(keys[k])); 630 free(keys); [all...] |
/illumos-gate/usr/src/uts/common/inet/kssl/ |
H A D | ksslrec.c | 56 /* 2 X 16 byte keys + 2 x 20 byte MAC secrets, no IVs */ 59 /* 2 X 16 byte keys + 2 x 16 byte MAC secrets, no IVs */ 62 /* 2 X 8 byte keys + 2 x 20 byte MAC secrets, 2 x 8 byte IVs */ 65 /* 2 X 24 byte keys + 2 x 20 byte MAC secrets, 2 x 8 byte IVs */ 68 /* 2 X 16 byte keys + 2 x 20 byte MAC secrets, 2 x 16 byte IVs */ 71 /* 2 X 32 byte keys + 2 x 20 byte MAC secrets, 2 x 16 byte IVs */ 1159 /* length of secret keys is ceil(length/2) */ 1295 uchar_t *keys = ssl->pending_keyblock; local 1304 kssl_ssl3_key_material_derive_step(ssl, ms, mslen, i, keys, 1); 1305 keys [all...] |