/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 44 int algtype, char *pkey, size_t pkeylen, int *cached) 46 return (getpublickey(remotename, pkey)); 53 int algtype, char *pkey, size_t pkeylen) 55 return (getpublickey(remotename, pkey)); 43 __getpublickey_cached_g(const char remotename[MAXNETNAMELEN], int keylen, int algtype, char *pkey, size_t pkeylen, int *cached) argument 52 getpublickey_g(const char remotename[MAXNETNAMELEN], int keylen, int algtype, char *pkey, size_t pkeylen) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | rd_cred.c | 25 krb5_key pkey, krb5_cred_enc_part *pcredenc) 35 if (pkey != NULL) { 36 if ((retval = krb5_k_decrypt(context, pkey, 65 krb5_key pkey, krb5_replay_data *replaydata, 83 if ((retval = decrypt_credencdata(context, pcred, pkey, &encpart))) 24 decrypt_credencdata(krb5_context context, krb5_cred *pcred, krb5_key pkey, krb5_cred_enc_part *pcredenc) argument 64 krb5_rd_cred_basic(krb5_context context, krb5_data *pcreddata, krb5_key pkey, krb5_replay_data *replaydata, krb5_creds ***pppcreds) argument
|
H A D | mk_cred.c | 34 krb5_key pkey, krb5_enc_data *pencdata) 47 if (pkey == NULL) { 55 retval = krb5_encrypt_keyhelper(context, pkey, 33 encrypt_credencpart(krb5_context context, krb5_cred_enc_part *pcredpart, krb5_key pkey, krb5_enc_data *pencdata) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 240 __generic_common_dhkeys(char *pkey, /* Public key of remote */ argument 248 MINT *pk = mp_xtom(pkey);
|
/osnet-11/usr/src/lib/libc/port/threads/ |
H A D | tsd.c | 51 thr_keycreate(thread_key_t *pkey, void (*destructor)(void *)) argument 128 *pkey = tsdm->tsdm_nused; 140 pthread_key_create(pthread_key_t *pkey, void (*destructor)(void *)) argument 142 return (thr_keycreate(pkey, destructor));
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getkeyent.c | 69 char *keytype = (char *)argp->key.pkey.keytype; 73 char *buffer, *pkey, *skey; local 98 pkey = *pkey_array + keytypelen; 126 len = strlen(pkey) + strlen(skey) + 2; 137 (void) snprintf(buffer, len, "%s:%s", pkey, skey); 175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname))
|
/osnet-11/usr/src/lib/pam_modules/dhkeys/ |
H A D | key_call_uid.c | 160 const char *pkey, keylen_t pkeylen, algtype_t algtype, 181 arg.st_pub_key.keybuf3_val = (char *)pkey; 159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, uid_t uid, gid_t gid) argument
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 168 __gen_dhkeys_g(char *pkey, /* out */ argument 176 if (! pkey || ! skey || ! pass) 180 __gen_dhkeys(pkey, skey, pass); 188 (*dlfp)(pkey, skey, pass); /* void */
|
H A D | publickey.c | 145 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 192 if (pkey) { 199 (void) strcpy(pkey, keyval); 225 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 273 if (pkey) { 282 (void) strcpy(pkey, mval); 307 __getpublickey_cached(char *netname, char *pkey, int *from_cache) argument 309 return (__getpublickey_cached_g(netname, KEYSIZE, 0, pkey, 314 getpublickey(const char *netname, char *pkey) argument 316 return (__getpublickey_cached((char *)netname, pkey, (in 419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 543 __getpublickey_cached_g(const char netname[], keylen_t keylen, algtype_t algtype, char *pkey, size_t pkeylen, int *from_cache) argument 609 getpublickey_g( const char *netname, int keylen, int algtype, char *pkey, size_t pkeylen) argument [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | auth_des.c | 106 netobj pkey; local 116 pkey.n_bytes = (char *)pkey_data; 117 pkey.n_len = (uint_t)strlen((char *)pkey_data) + 1; 118 return (authdes_pk_seccreate(servername, &pkey, win, timehost, 129 authdes_pk_seccreate(const char *servername, netobj *pkey, uint_t window, argument 156 (void) memcpy(ad->ad_pkey, pkey->n_bytes, pkey->n_len); 406 netobj pkey; local 422 pkey.n_bytes = (char *)(ad->ad_pkey); 423 pkey [all...] |
H A D | svcauth_des.c | 201 netobj pkey; local 234 pkey.n_bytes = pkey_data; 235 pkey.n_len = strlen(pkey_data) + 1; 236 if (key_decryptsession_pk(cred->adc_fullname.name, &pkey,
|
H A D | key_call.c | 611 * both, of skey or pkey may have zero length. If both lengths are 615 * Stores the specified netname/pkey/skey triplet in the keyserv. 625 const char *pkey, 646 arg.st_pub_key.keybuf3_val = (char *)pkey; 698 const char *pkey, keylen_t pkeylen, algtype_t algtype) 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, 709 const char *pkey, keylen_t pkeylen, algtype_t algtype) 711 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, 716 key_get_conv(char *pkey, des_block *deskey) argument 720 if (!key_call((rpcproc_t)KEY_GET_CONV, xdr_keybuf, pkey, 621 key_setnet_g_ext( const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, int use_ruid) argument 697 key_setnet_g(const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype) argument 708 key_setnet_g_ruid(const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype) argument 732 key_get_conv_g( const char *pkey, keylen_t pkeylen, algtype_t algtype, des_block deskey[], keynum_t keynum ) argument [all...] |
/osnet-11/usr/src/lib/libdladm/common/ |
H A D | libdlib.c | 422 * given in 'physlinkid' with the P_key 'pkey' and return the datalink ID in 424 * partition will be created even if the P_Key 'pkey' does not exist or if the 431 datalink_id_t physlinkid, ib_pkey_t pkey, uint32_t flags, char *pname, 442 pattr.dia_pkey = pkey; 533 ib_pkey_t pkey, uint32_t flags, char *pname, datalink_id_t *partlinkid, 537 pkey, flags, pname, partlinkid, proplist, B_FALSE)); 629 ib_pkey_t pkey; local 673 pkey = (ib_pkey_t)u64; 690 pattr.dia_pkey = pkey; 430 dladm_part_create_zone(dladm_handle_t handle, zoneid_t zoneid, datalink_id_t physlinkid, ib_pkey_t pkey, uint32_t flags, char *pname, datalink_id_t *partlinkid, dladm_arg_list_t *proplist, boolean_t anet) argument 532 dladm_part_create(dladm_handle_t handle, datalink_id_t physlinkid, ib_pkey_t pkey, uint32_t flags, char *pname, datalink_id_t *partlinkid, dladm_arg_list_t *proplist) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | elgamal.c | 55 ELG_public_key *pkey); 61 ELG_public_key *pkey); 451 do_encrypt(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) 460 k = gen_k( pkey->p, 1 ); 461 gcry_mpi_powm( a, pkey->g, k, pkey->p ); 467 gcry_mpi_powm( b, pkey->y, k, pkey->p ); 468 gcry_mpi_mulm( b, b, input, pkey->p ); 472 log_mpidump("elg encrypted y= ", pkey 705 elg_encrypt(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument 782 elg_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument 809 elg_get_nbits(int algo, gcry_mpi_t *pkey) argument [all...] |
H A D | dsa.c | 110 DSA_public_key *pkey); 631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) 638 if( !(mpi_cmp_ui( r, 0 ) > 0 && mpi_cmp( r, pkey->q ) < 0) ) 640 if( !(mpi_cmp_ui( s, 0 ) > 0 && mpi_cmp( s, pkey->q ) < 0) ) 643 w = mpi_alloc( mpi_get_nlimbs(pkey->q) ); 644 u1 = mpi_alloc( mpi_get_nlimbs(pkey->q) ); 645 u2 = mpi_alloc( mpi_get_nlimbs(pkey->q) ); 646 v = mpi_alloc( mpi_get_nlimbs(pkey->p) ); 649 mpi_invm( w, s, pkey->q ); 652 mpi_mulm( u1, hash, w, pkey 989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument 1016 dsa_get_nbits(int algo, gcry_mpi_t *pkey) argument 1030 selftest_sign_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument 1091 gcry_sexp_t pkey = NULL; local [all...] |
H A D | ecc.c | 302 static gpg_err_code_t verify (gcry_mpi_t input, ECC_public_key *pkey, 760 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) 767 if( !(mpi_cmp_ui (r, 0) > 0 && mpi_cmp (r, pkey->E.n) < 0) ) 769 if( !(mpi_cmp_ui (s, 0) > 0 && mpi_cmp (s, pkey->E.n) < 0) ) 781 ctx = _gcry_mpi_ec_init (pkey->E.p, pkey->E.a); 784 mpi_invm (h, s, pkey->E.n); 787 mpi_mulm (h1, input, h, pkey->E.n); 790 _gcry_mpi_ec_mul_point (&Q1, h1, &pkey->E.G, ctx); 795 mpi_mulm (h2, r, h, pkey 756 verify(gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) argument 1029 ecc_get_param(const char *name, gcry_mpi_t *pkey) argument 1154 ecc_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument 1198 ecc_get_nbits(int algo, gcry_mpi_t *pkey) argument [all...] |
H A D | rsa.c | 601 public(gcry_mpi_t output, gcry_mpi_t input, RSA_public_key *pkey ) 606 mpi_powm( x, input, pkey->e, pkey->n ); 611 mpi_powm( output, input, pkey->e, pkey->n ); 888 gcry_mpi_t *pkey, int flags) 895 pk.n = pkey[0]; 896 pk.e = pkey[1]; 1007 rsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1019 pk.n = pkey[ 886 rsa_encrypt(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument 1006 rsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *opaque, gcry_mpi_t tmp), void *opaquev) argument 1038 rsa_get_nbits(int algo, gcry_mpi_t *pkey) argument 1091 selftest_sign_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument 1179 selftest_encr_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument 1282 gcry_sexp_t pkey = NULL; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | elgamal.c | 55 ELG_public_key *pkey); 61 ELG_public_key *pkey); 451 do_encrypt(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) 460 k = gen_k( pkey->p, 1 ); 461 gcry_mpi_powm( a, pkey->g, k, pkey->p ); 467 gcry_mpi_powm( b, pkey->y, k, pkey->p ); 468 gcry_mpi_mulm( b, b, input, pkey->p ); 472 log_mpidump("elg encrypted y= ", pkey 705 elg_encrypt(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument 782 elg_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument 809 elg_get_nbits(int algo, gcry_mpi_t *pkey) argument [all...] |
H A D | dsa.c | 110 DSA_public_key *pkey); 631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) 638 if( !(mpi_cmp_ui( r, 0 ) > 0 && mpi_cmp( r, pkey->q ) < 0) ) 640 if( !(mpi_cmp_ui( s, 0 ) > 0 && mpi_cmp( s, pkey->q ) < 0) ) 643 w = mpi_alloc( mpi_get_nlimbs(pkey->q) ); 644 u1 = mpi_alloc( mpi_get_nlimbs(pkey->q) ); 645 u2 = mpi_alloc( mpi_get_nlimbs(pkey->q) ); 646 v = mpi_alloc( mpi_get_nlimbs(pkey->p) ); 649 mpi_invm( w, s, pkey->q ); 652 mpi_mulm( u1, hash, w, pkey 989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument 1016 dsa_get_nbits(int algo, gcry_mpi_t *pkey) argument [all...] |
H A D | rsa.c | 600 public(gcry_mpi_t output, gcry_mpi_t input, RSA_public_key *pkey ) 605 mpi_powm( x, input, pkey->e, pkey->n ); 610 mpi_powm( output, input, pkey->e, pkey->n ); 887 gcry_mpi_t *pkey, int flags) 894 pk.n = pkey[0]; 895 pk.e = pkey[1]; 1006 rsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1018 pk.n = pkey[ 885 rsa_encrypt(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) argument 1005 rsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *opaque, gcry_mpi_t tmp), void *opaquev) argument 1037 rsa_get_nbits(int algo, gcry_mpi_t *pkey) argument [all...] |
H A D | ecc.c | 302 static gpg_err_code_t verify (gcry_mpi_t input, ECC_public_key *pkey, 760 verify (gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) 767 if( !(mpi_cmp_ui (r, 0) > 0 && mpi_cmp (r, pkey->E.n) < 0) ) 769 if( !(mpi_cmp_ui (s, 0) > 0 && mpi_cmp (s, pkey->E.n) < 0) ) 781 ctx = _gcry_mpi_ec_init (pkey->E.p, pkey->E.a); 784 mpi_invm (h, s, pkey->E.n); 787 mpi_mulm (h1, input, h, pkey->E.n); 790 _gcry_mpi_ec_mul_point (&Q1, h1, &pkey->E.G, ctx); 795 mpi_mulm (h2, r, h, pkey 756 verify(gcry_mpi_t input, ECC_public_key *pkey, gcry_mpi_t r, gcry_mpi_t s) argument 1029 ecc_get_param(const char *name, gcry_mpi_t *pkey) argument 1154 ecc_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument 1198 ecc_get_nbits(int algo, gcry_mpi_t *pkey) argument [all...] |
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | p12lib.c | 221 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 235 * pkey - Points to location pointing to the private key returned. 272 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, 285 if (pkey) 286 *pkey = NULL; 328 name_str, pkey, cert, ca); 336 if (pkey && *pkey) { 337 sunw_evp_pkey_free(*pkey); variable 387 STACK_OF(EVP_PKEY) **pkey, STACK_O 386 sunw_PEM_contents(FILE *fp, pem_password_cb *cb, void *userdata, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument 450 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument 641 EVP_PKEY *pkey = NULL; local 922 sunw_evp_pkey_free(EVP_PKEY *pkey) argument 954 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument 1041 sunw_get_pkey_localkeyid(getdo_actions_t dowhat, EVP_PKEY *pkey, char **keyid_str, int *keyid_len) argument 1106 sunw_get_pkey_fname(getdo_actions_t dowhat, EVP_PKEY *pkey, char **fname) argument 1370 sunw_set_fname(const char *ascname, EVP_PKEY *pkey, X509 *cert) argument 1465 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument 1536 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 1802 EVP_PKEY *pkey = NULL; local 2249 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument 2589 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/db/hash/ |
H A D | hash_page.c | 1244 const DBT *pkey, *pdata; local 1316 pkey = &key_dbt; 1319 pkey = key; 1352 &LSN(hcp->pagep), pkey, pdata)) != 0) 1359 __ham_putitem(hcp->pagep, pkey, key_type);
|
/osnet-11/usr/src/lib/pylibbe/common/ |
H A D | libbe_py.c | 177 PyObject *pkey = NULL; local 204 while (PyDict_Next(beNameProperties, &pos, &pkey, &pvalue)) { 206 PyString_AsString(pkey),
|
/osnet-11/usr/src/lib/libntfs/common/libntfs/ |
H A D | crypto.c | 304 gnutls_x509_privkey_t pkey = NULL; local 399 err = gnutls_x509_privkey_init(&pkey); 407 err = gnutls_x509_privkey_import_pkcs8(pkey, &dkey, 430 err = gnutls_x509_privkey_export_pkcs8(pkey, 442 ntfs_rsa_private_key_import_from_gnutls(pkey); 535 if (pkey) 536 gnutls_x509_privkey_deinit(pkey);
|