Searched defs:keys (Results 26 - 50 of 58) sorted by relevance

123

/illumos-gate/usr/src/lib/libcmd/common/
H A Dchgrp.c234 Key_t keys[3]; local
356 keys[1].gid = keys[2].uid = NOID;
397 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid;
398 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid;
402 if (m = (Map_t*)dtmatch(map, &keys[i]))
415 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID));
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Ddelete.c46 KMF_KEY_HANDLE *keys = NULL; local
117 keys = kmf_get_attr_ptr(KMF_KEY_HANDLE_ATTR, attrlist, numattr);
118 if (keys == NULL)
125 KMF_KEY_HANDLE_ATTR, &keys[i], sizeof (KMF_KEY_HANDLE));
151 KMF_KEY_HANDLE *keys = NULL; local
165 keys = (KMF_KEY_HANDLE *)malloc(numkeys *
167 if (keys == NULL)
169 (void) memset(keys, 0, numkeys *
173 KMF_KEY_HANDLE_ATTR, keys, sizeof (KMF_KEY_HANDLE));
181 free(keys);
[all...]
H A Dlist.c159 pk_show_keys(void *handle, KMF_KEY_HANDLE *keys, int numkeys) argument
165 i+1, describeKey(&keys[i]),
166 keys[i].keylabel ? keys[i].keylabel :
169 if (keys[i].keyclass == KMF_SYMMETRIC) {
174 rv = kmf_get_sym_key_value(handle, &keys[i],
180 } else if (keys[i].kstype == KMF_KEYSTORE_PK11TOKEN) {
259 KMF_KEY_HANDLE *keys; local
275 (void) printf(gettext("Found %d %s keys.\n"),
277 keys
[all...]
H A Dimport.c64 KMF_RAW_KEY_DATA *keys = NULL; local
73 &certs, &ncerts, &keys, &nkeys);
153 /* The order of certificates and keys should match */
180 KMF_RAW_KEY_ATTR, &keys[i],
197 if (keys) {
199 kmf_free_raw_key(&keys[i]);
200 free(keys);
217 KMF_RAW_KEY_DATA *keys = NULL; local
230 &certs, &ncerts, &keys, &nkeys);
266 /* The order of certificates and keys shoul
495 KMF_RAW_KEY_DATA *keys = NULL; local
[all...]
H A Dsigncsr.c373 int keys = 1; local
446 &keys, sizeof (keys));
/illumos-gate/usr/src/cmd/krb5/kadmin/cli/
H A Dkeytab.c267 krb5_keyblock *keys; local
275 keys = NULL;
309 * keys stored in the keytab, use the default "normal"
310 * salt for all keys
330 &keys, &nkeys);
340 code = kadm5_randkey_principal_old(handle, princ, &keys, &nkeys);
385 new_entry.key = keys[i];
400 etype_string(keys[i].enctype), keytab_str);
412 krb5_free_keyblock_contents(context, &keys[i]);
413 free(keys);
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.c86 * of keys is odd
89 * If we have an even number of keys and additional encryption will be
100 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument
120 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec);
134 * If we have an even number of keys then do an extra round of
138 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec);
152 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument
159 if (keys->dh_key_set_len < 1)
173 stat = __desN_crypt(keys->dh_key_set_val, keys
186 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument
218 MD5_verifier(gss_buffer_t tok, gss_buffer_t msg, cipher_proc signer, dh_key_set_t keys, dh_signature_t signature ) argument
354 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument
393 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument
494 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument
547 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument
[all...]
/illumos-gate/usr/src/cmd/oamuser/user/
H A Dfuncs.c82 static ua_key_t keys[] = { variable
99 #define NKEYS (sizeof (keys)/sizeof (ua_key_t))
126 if (strcmp(key, keys[i].key) == 0) {
127 if (keys[i].newvalue != NULL) {
133 if (keys[i].check != NULL &&
134 (res = keys[i].check(value)) != NULL) {
135 errmsg(M_INVALID, res, keys[i].errstr);
138 keys[i].newvalue = value;
148 * Add the keys to the argument vector.
156 const char *key = keys[
[all...]
/illumos-gate/usr/src/cmd/print/bsd-sysv-commands/
H A Din.lpd.c557 char *keys[] = { "printer-is-accepting-jobs", NULL }; local
559 status = papiPrinterQuery(svc, printer, keys, NULL, &p);
H A Dcommon.c533 char *keys[] = { "printer-name", NULL }; local
536 status = papiPrintersList(svc, keys, NULL, &printers);
H A Dlpstat.c141 char *keys[] = { "device-uri", NULL }; local
144 status = papiPrinterQuery(svc, name, keys, NULL, &p);
729 char **keys = NULL; local
737 keys = report_device_keys;
739 keys = report_class_keys;
741 keys = report_accepting_keys;
743 keys = report_printer_keys;
745 status = papiPrinterQuery(svc, name, keys,
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/
H A Dadmin_cmds.c423 TSS_KM_KEYINFO2 *keys; local
435 TSS_PS_TYPE_USER, NULL, &num_keys, &keys);
442 parent = hash_insert(keys[i].parentKeyUUID, NULL);
443 child = hash_insert(keys[i].keyUUID, &keys[i]);
445 if (memcmp(&(keys[i].keyUUID), &srk_uuid,
452 ret = Tspi_Context_FreeMemory(hContext, (BYTE *) keys);
/illumos-gate/usr/src/lib/krb5/kadm5/
H A Dkadm_rpc.h146 krb5_keyblock *keys; member in struct:chrand_ret
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaUtil.c915 * Generates symmetric (k1=key, k2=null) or asymmetric (k1=pub, k2=priv) keys.
1000 * a FreeObject if the first is not. Both keys will have the
1441 * and creates a single new key as output. But a few mechanisms take 2 keys
1442 * as input, and the two SSL/TLS mechanisms create 4 keys as output.
1614 * the new key is unused (NULL). Instead, there are 4 keys which
1620 CK_SSL3_KEY_MAT_OUT *keys; local
1624 keys = keyparams->pReturnedKeyMaterial;
1626 slotkey1->hObject = keys->hClientMacSecret;
1627 slotkey2->hObject = keys->hServerMacSecret;
1628 slotkey3->hObject = keys
[all...]
/illumos-gate/usr/src/lib/libnisdb/
H A Ddb_mindex.cc102 db_key_desc * keys = how->keyloc(); local
115 indices.indices_val[i].init(&(keys[i]));
389 "number of keys (%d) does not equal number of indices (%d)",
/illumos-gate/usr/src/cmd/fm/fmd/common/
H A Dfmd_module.c1009 char *const keys[], char *code, size_t codelen)
1014 if ((err = fm_dc_key2code(mp->mod_dictv[i], (const char **)keys,
1008 fmd_module_dc_key2code(fmd_module_t *mp, char *const keys[], char *code, size_t codelen) argument
/illumos-gate/usr/src/cmd/keyserv/
H A Dchkey_common.c475 char *keys[2]; local
484 keys[0] = public;
485 keys[1] = crypt;
515 alist[q][j] = keys[q];
527 alist[q][attr->value_count] = keys[q];
537 alist[q][0] = keys[q];
878 /* Entry exists, modify attributes for public and secret keys */
882 /* Add NisKeyObject objectclass and the keys */
949 /* object class already exists, replace keys */
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ldap.h245 struct berval **keys; member in struct:__anon2571
/illumos-gate/usr/src/cmd/iscsiadm/
H A Discsiadm.h154 SUN_IMA_DISC_ADDRESS_KEY keys[1]; member in struct:_SUN_IMA_DISC_ADDRESS_KEY_PROPERTIES
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c256 * princ which has no keys initially.
259 /* have a princ with keys, return dupe princ error */
264 * have a princ with no keys, let's replace it. Note, want to
387 /* initialize the keys */
952 * Purpose: Check if a key appears in a list of keys, in order to
961 * new_key_data (r) keys to check against
1033 * key_data (r) keys to add to the history entry
1098 * adb (r/w) admin principal entry to add keys to
1100 * pw (r) keys for the password to add to adb's key history
1105 * pw contains n_key_data keys i
2096 krb5_keyblock *keys; local
[all...]
/illumos-gate/usr/src/uts/common/io/lvm/trans/
H A Dtrans_ioctl.c358 static uint_t keys[NKEYS]; variable
445 if (tsd_set(keys[i], tp)) {
462 if ((tsd_get(keys[0]) != NULL) ||
463 (tsd_get(keys[NKEYS-1]) != NULL) ||
464 (tsd_get(keys[NKEYS>>1]) != NULL)) {
469 if (tsd_get(keys[i]) != tp)
528 * destroy old keys, if any
531 tsd_destroy(&keys[i]);
533 * test 1 -- simple create and destroy keys tests
538 tsd_create(&keys[
[all...]
/illumos-gate/usr/src/lib/libdladm/common/
H A Dlibdlwlan.c433 dladm_wlan_attr_t *attrp, boolean_t create_ibss, void *keys,
476 if (keys == NULL || key_count == 0 ||
481 status = do_set_key(handle, linkid, keys, key_count);
485 if (keys == NULL || key_count == 0 ||
530 if (secmode == DLADM_WLAN_SECMODE_WPA && keys != NULL)
531 (void) wpa_instance_create(handle, linkid, keys);
557 dladm_wlan_attr_t *attrp, int timeout, void *keys, uint_t key_count,
592 create_ibss, keys, key_count, timeout);
610 attrp, create_ibss, keys, key_count, timeout);
632 ap, create_ibss, keys, key_coun
432 do_connect(dladm_handle_t handle, datalink_id_t linkid, void *buf, int bufsize, dladm_wlan_attr_t *attrp, boolean_t create_ibss, void *keys, uint_t key_count, int timeout) argument
556 dladm_wlan_connect(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_attr_t *attrp, int timeout, void *keys, uint_t key_count, uint_t flags) argument
1325 do_set_key(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_key_t *keys, uint_t key_count) argument
[all...]
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c1375 KMF_KEY_HANDLE *keys; local
1397 /* It is OK if this is NULL, we dont need a cred to find public keys */
1442 keys = kmf_get_attr_ptr(KMF_KEY_HANDLE_ATTR, attrlist, numattr);
1443 /* it is okay to have "keys" contains NULL */
1462 if (keys != NULL && match) {
1463 keys[count].kstype = KMF_KEYSTORE_NSS;
1464 keys[count].keyclass = KMF_ASYM_PUB;
1465 keys[count].keyp = (void *)pubnode->key;
1466 keys[count].keylabel = nick;
1469 keys[coun
[all...]
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_preauth.c576 krb5_keyblock *keys; local
603 keys = malloc(sizeof(krb5_keyblock) * (request->nktypes + 1));
604 if (keys == NULL) {
608 ret->data = (char *) keys;
618 entry_key, &keys[k], NULL) != 0) {
619 if (keys[k].contents != NULL)
620 krb5_free_keyblock_contents(context, &keys[k]);
621 memset(&keys[k], 0, sizeof(keys[k]));
630 free(keys);
[all...]
/illumos-gate/usr/src/uts/common/inet/kssl/
H A Dksslrec.c56 /* 2 X 16 byte keys + 2 x 20 byte MAC secrets, no IVs */
59 /* 2 X 16 byte keys + 2 x 16 byte MAC secrets, no IVs */
62 /* 2 X 8 byte keys + 2 x 20 byte MAC secrets, 2 x 8 byte IVs */
65 /* 2 X 24 byte keys + 2 x 20 byte MAC secrets, 2 x 8 byte IVs */
68 /* 2 X 16 byte keys + 2 x 20 byte MAC secrets, 2 x 16 byte IVs */
71 /* 2 X 32 byte keys + 2 x 20 byte MAC secrets, 2 x 16 byte IVs */
1159 /* length of secret keys is ceil(length/2) */
1295 uchar_t *keys = ssl->pending_keyblock; local
1304 kssl_ssl3_key_material_derive_step(ssl, ms, mslen, i, keys, 1);
1305 keys
[all...]

Completed in 284 milliseconds

123