/illumos-gate/usr/src/lib/libcurses/screen/ |
H A D | newkey.c | 59 newkey(char *rcvchars, short keyval, bool macro) function 81 strcpy(term_parm_err, "newkey");
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | Makefile | 26 SBINPROG = keyserv newkey 41 NEWKEYOBJS = newkey.o 80 newkey := LDLIBS += -lsldap -lsocket macro 102 newkey:$(CHANGE_OBJS) $(NEWKEYOBJS) $(OUTSIDE_UTIL_OBJS)
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | k5_kmd5des.c | 72 krb5_keyblock newkey; local 129 bzero(&newkey, sizeof(krb5_keyblock)); 130 newkey.enctype = key->enctype; 131 newkey.contents = xorkey; 132 newkey.length = sizeof(xorkey); 133 newkey.dk_list = NULL; 134 newkey.kef_key.ck_data = NULL; 135 ret = init_key_kef(context->kef_cipher_mt, &newkey); 145 &newkey, (unsigned char*) mit_des_zeroblock, 1); 148 (void)crypto_destroy_ctx_template(newkey 171 krb5_keyblock newkey; local [all...] |
/illumos-gate/usr/src/lib/libtecla/common/ |
H A D | keytab.c | 793 int newkey; /* The index of a key in the updated binding table */ local 807 newkey = 0; 813 if(oldkey != newkey) 814 kt->table[newkey] = *sym; 815 newkey++; 821 kt->nkey = newkey;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 206 krb5_keyblock *newkey = 0; local 346 krb5_auth_con_getlocalsubkey(telnet_context, auth_context, &newkey); 352 if (newkey) { 357 if (!(ACCEPTED_ENCTYPE(newkey->enctype))) { 364 newkey, &session_key); 366 krb5_free_keyblock(telnet_context, newkey);
|
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | sec_clnt.c | 654 * it to NULL. If newkey is true, then generate a new key instead of 661 revoke_key(AUTH *auth, int newkey) argument 666 if (newkey) {
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | mhd.h | 127 mhioc_resv_key_t newkey; member in struct:mhioc_register 137 mhioc_resv_key_t newkey; member in struct:mhioc_registerandignorekey
|
/illumos-gate/usr/src/uts/common/io/comstar/lu/stmf_sbd/ |
H A D | sbd_pgr.c | 1746 sbd_pgr_key_t *newkey; local 1798 newkey = sbd_pgr_key_registered(pgr, lpt, &rport); 1799 if (newkey) { 1801 newkey->pgr_key = svc_key; 1804 if (newkey->pgr_key_flags & SBD_PGR_KEY_ALL_TG_PT) { 1805 if (newkey->pgr_key_lpt_id && 1806 newkey->pgr_key_lpt_len > 0) { 1807 kmem_free(newkey->pgr_key_lpt_id, 1808 newkey->pgr_key_lpt_len); 1812 newkey [all...] |
/illumos-gate/usr/src/uts/common/io/usb/clients/usbkbm/ |
H A D | usbkbm.c | 1787 int newkey = 1; local 1797 newkey = 0; 1802 if (newkey) {
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 1095 soft_derive_enforce_flags(soft_object_t *basekey, soft_object_t *newkey) argument 1103 * the newkey was built. 1105 if (newkey->bool_attr_mask & SENSITIVE_BOOL_ON) { 1109 if (newkey->bool_attr_mask & EXTRACTABLE_BOOL_ON) { 1119 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; 1127 newkey->bool_attr_mask |= ALWAYS_SENSITIVE_BOOL_ON; 1129 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; 1139 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; 1147 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; 1149 newkey [all...] |
/illumos-gate/usr/src/cmd/passmgmt/ |
H A D | passmgmt.c | 222 assign_attr(userattr_t *user, const char *newkey, char *val) { argument 236 } else if (strcmp(key, newkey) == 0) { 244 kv_pair[avail].key = strdup(newkey);
|
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | lock.c | 2067 char newkey[LOCK_KEY_MAXLEN]; local 2110 (void) snprintf(newkey, sizeof (newkey), 2116 log_msg(LOG_MSG_DEBUG, MSG_LOCK_GENUID_INTERNAL, newkey); 2117 return (strdup(newkey));
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 985 krb5_keyblock newkey, histkey; local 992 &newkey, NULL); 1004 if ((newkey.length == histkey.length) && 1005 (newkey.enctype == histkey.enctype) && 1006 (memcmp(newkey.contents, histkey.contents, 1009 krb5_free_keyblock_contents(context, &newkey); 1016 krb5_free_keyblock_contents(context, &newkey);
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 4166 KMF_KEY_HANDLE newkey; local 4187 KMF_KEY_HANDLE_ATTR, &newkey, sizeof (KMF_KEY_HANDLE)); 4199 keylist[numkeys - 1] = newkey;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 535 krb5_keyblock *newkey = NULL; local 736 auth_context, &newkey); 741 if (newkey != NULL) { 743 newkey, &session_key); 744 krb5_free_keyblock(telnet_context, newkey);
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 3131 EVP_PKEY *newkey = NULL; local 3173 if ((newkey = EVP_PKEY_new()) == NULL) 3176 (void) EVP_PKEY_set1_RSA(newkey, rsa); 3181 return (newkey); 3188 EVP_PKEY *newkey = NULL; local 3215 if ((newkey = EVP_PKEY_new()) == NULL) 3218 (void) EVP_PKEY_set1_DSA(newkey, dsa); 3222 return (newkey); 4201 KMF_RAW_KEY_DATA *newkey, int *nkeys) 4216 list[n] = *newkey; 4200 add_key_to_list(KMF_RAW_KEY_DATA **keylist, KMF_RAW_KEY_DATA *newkey, int *nkeys) argument 4500 unsigned char *newkey = NULL; local [all...] |