/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 241 char *skey, /* Our private key */ 249 MINT *sk = mp_xtom(skey); 240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getkeyent.c | 73 char *buffer, *pkey, *skey; local 123 skey = *skey_array + keytypelen; 126 len = strlen(pkey) + strlen(skey) + 2; 137 (void) snprintf(buffer, len, "%s:%s", pkey, skey);
|
/osnet-11/usr/src/lib/pam_modules/dhkeys/ |
H A D | key_call_uid.c | 159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, argument 174 arg.st_priv_key.keybuf3_val = (char *)skey; 201 (void) memcpy(&tmp.st_priv_key, skey, 208 (void) memcpy(&tmp.st_pub_key, skey,
|
H A D | dhkeys.c | 109 char *skey; local 115 if ((skey = malloc(skeylen)) == NULL) { 119 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { 122 if (skey[0]) { 125 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, 154 free(skey);
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 169 char *skey, /* out */ 176 if (! pkey || ! skey || ! pass) 180 __gen_dhkeys(pkey, skey, pass); 188 (*dlfp)(pkey, skey, pass); /* void */ 168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument
|
H A D | publickey.c | 145 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 203 if (skey && extract_secret(p, skey, passwd)) 225 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 286 if (skey && extract_secret(p, skey, passwd)) 326 getsecretkey(const char *netname, char *skey, const char *passwd) argument 328 return (getsecretkey_g(netname, KEYSIZE, 0, skey, HEXKEYBYTES+1, 424 char *skey, /* out */ 484 if (skey 419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 624 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | elgamal.c | 57 ELG_secret_key *skey); 59 ELG_secret_key *skey); 487 decrypt(gcry_mpi_t output, gcry_mpi_t a, gcry_mpi_t b, ELG_secret_key *skey ) 489 gcry_mpi_t t1 = mpi_alloc_secure( mpi_get_nlimbs( skey->p ) ); 492 gcry_mpi_powm( t1, a, skey->x, skey->p ); 493 mpi_invm( t1, t1, skey->p ); 494 mpi_mulm( output, b, t1, skey->p ); 498 log_mpidump("elg decrypted x= ", skey->x); 499 log_mpidump("elg decrypted p= ", skey 616 elg_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 661 elg_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 680 elg_check_secret_key(int algo, gcry_mpi_t *skey) argument 730 elg_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 756 elg_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument [all...] |
H A D | dsa.c | 108 DSA_secret_key *skey); 598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) 605 k = gen_k( skey->q ); 608 gcry_mpi_powm( r, skey->g, k, skey->p ); 609 mpi_fdiv_r( r, r, skey->q ); 613 mpi_invm(kinv, k, skey->q ); 616 tmp = mpi_alloc( mpi_get_nlimbs(skey->p) ); 617 mpi_mul( tmp, skey->x, r ); 619 mpi_mulm( s , kinv, tmp, skey 679 dsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 928 dsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 938 dsa_check_secret_key(int algo, gcry_mpi_t *skey) argument 963 dsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 1030 selftest_sign_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument 1090 gcry_sexp_t skey = NULL; local [all...] |
H A D | ecc.c | 300 static gpg_err_code_t sign (gcry_mpi_t input, ECC_secret_key *skey, 580 * To verify correct skey it use a random information. 699 sign (gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s) 716 ctx = _gcry_mpi_ec_init (skey->E.p, skey->E.a); 727 k = gen_k (skey->E.n, GCRY_STRONG_RANDOM); 728 _gcry_mpi_ec_mul_point (&I, k, &skey->E.G, ctx); 736 mpi_mod (r, x, skey->E.n); /* r = x mod n */ 738 mpi_mulm (dr, skey->d, r, skey 695 sign(gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s) argument 955 ecc_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 1019 ecc_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 1061 ecc_check_secret_key(int algo, gcry_mpi_t *skey) argument 1107 ecc_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument [all...] |
H A D | rsa.c | 90 static void public (gcry_mpi_t output, gcry_mpi_t input, RSA_public_key *skey); 91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 616 stronger_key_check ( RSA_secret_key *skey ) 624 mpi_mul( t, skey->p, skey->q); 625 if (mpi_cmp( t, skey->n) ) 629 if( mpi_cmp( skey->p, skey->q ) > 0 ) 632 _gcry_mpi_swap ( skey->p, skey 776 rsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 853 rsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 861 rsa_check_secret_key(int algo, gcry_mpi_t *skey) argument 904 rsa_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 986 rsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 1091 selftest_sign_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument 1179 selftest_encr_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument 1281 gcry_sexp_t skey = NULL; local [all...] |
H A D | pubkey.c | 34 gcry_mpi_t *data, gcry_mpi_t *skey, 37 gcry_mpi_t hash, gcry_mpi_t *skey); 111 gcry_mpi_t *skey, gcry_mpi_t **retfactors) 116 (void)skey; 123 dummy_check_secret_key (int algorithm, gcry_mpi_t *skey) argument 126 (void)skey; 146 gcry_mpi_t *skey, int flags) 151 (void)skey; 159 gcry_mpi_t *skey) 164 (void)skey; 110 dummy_generate(int algorithm, unsigned int nbits, unsigned long dummy, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 145 dummy_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 158 dummy_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 541 pubkey_generate(int algorithm, unsigned int nbits, unsigned long use_e, gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 580 pubkey_check_secret_key(int algorithm, gcry_mpi_t *skey) argument 658 pubkey_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 705 pubkey_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument 1736 gcry_mpi_t *skey = NULL, *data = NULL, plain = NULL; local 1831 gcry_mpi_t *skey = NULL, hash = NULL, *result = NULL; local 2080 gcry_mpi_t skey[12]; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | elgamal.c | 57 ELG_secret_key *skey); 59 ELG_secret_key *skey); 487 decrypt(gcry_mpi_t output, gcry_mpi_t a, gcry_mpi_t b, ELG_secret_key *skey ) 489 gcry_mpi_t t1 = mpi_alloc_secure( mpi_get_nlimbs( skey->p ) ); 492 gcry_mpi_powm( t1, a, skey->x, skey->p ); 493 mpi_invm( t1, t1, skey->p ); 494 mpi_mulm( output, b, t1, skey->p ); 498 log_mpidump("elg decrypted x= ", skey->x); 499 log_mpidump("elg decrypted p= ", skey 616 elg_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 661 elg_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 680 elg_check_secret_key(int algo, gcry_mpi_t *skey) argument 730 elg_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 756 elg_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument [all...] |
H A D | dsa.c | 108 DSA_secret_key *skey); 598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) 605 k = gen_k( skey->q ); 608 gcry_mpi_powm( r, skey->g, k, skey->p ); 609 mpi_fdiv_r( r, r, skey->q ); 613 mpi_invm(kinv, k, skey->q ); 616 tmp = mpi_alloc( mpi_get_nlimbs(skey->p) ); 617 mpi_mul( tmp, skey->x, r ); 619 mpi_mulm( s , kinv, tmp, skey 679 dsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 928 dsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 938 dsa_check_secret_key(int algo, gcry_mpi_t *skey) argument 963 dsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument [all...] |
H A D | rsa.c | 89 static void public (gcry_mpi_t output, gcry_mpi_t input, RSA_public_key *skey); 90 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 615 stronger_key_check ( RSA_secret_key *skey ) 623 mpi_mul( t, skey->p, skey->q); 624 if (mpi_cmp( t, skey->n) ) 628 if( mpi_cmp( skey->p, skey->q ) > 0 ) 631 _gcry_mpi_swap ( skey->p, skey 775 rsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 852 rsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 860 rsa_check_secret_key(int algo, gcry_mpi_t *skey) argument 903 rsa_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument 985 rsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument [all...] |
H A D | ecc.c | 300 static gpg_err_code_t sign (gcry_mpi_t input, ECC_secret_key *skey, 580 * To verify correct skey it use a random information. 699 sign (gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s) 716 ctx = _gcry_mpi_ec_init (skey->E.p, skey->E.a); 727 k = gen_k (skey->E.n, GCRY_STRONG_RANDOM); 728 _gcry_mpi_ec_mul_point (&I, k, &skey->E.G, ctx); 736 mpi_mod (r, x, skey->E.n); /* r = x mod n */ 738 mpi_mulm (dr, skey->d, r, skey 695 sign(gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s) argument 955 ecc_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument 1019 ecc_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument 1061 ecc_check_secret_key(int algo, gcry_mpi_t *skey) argument 1107 ecc_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument [all...] |
/osnet-11/usr/src/lib/libnisdb/yptol/ |
H A D | dit_access_utils.c | 1019 char *skey, *str, *sipkey; local 1040 if ((skey = am(myself, key->dsize + 1)) == 0) { 1044 (void) memcpy(skey, key->dptr, key->dsize); 1059 if (verifyIndexMatch(t, 0, 0, N2LKEY, skey) == 0 || 1060 verifyIndexMatch(t, 0, 0, N2LIPKEY, skey) == 0) 1077 myself, *statP, skey, t->dbId, map); 1093 myself, skey, t->dbId, map, 1120 myself, nr, skey, t->dbId, map, 1136 *statP, skey, 1145 if ((rc = verifyKey(skey, 1221 char *dn = 0, *skey, *svalue, *str; local [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 611 * both, of skey or pkey may have zero length. If both lengths are 615 * Stores the specified netname/pkey/skey triplet in the keyserv. 623 const char *skey, 640 arg.st_priv_key.keybuf3_val = (char *)skey; 664 (void) memcpy(&tmp.st_priv_key, skey, 671 (void) memcpy(&tmp.st_pub_key, skey, 697 key_setnet_g(const char *netname, const char *skey, keylen_t skeylen, argument 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, 708 key_setnet_g_ruid(const char *netname, const char *skey, keylen_t skeylen, argument 711 return (key_setnet_g_ext(netname, skey, skeyle 621 key_setnet_g_ext( const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, int use_ruid) argument [all...] |
/osnet-11/usr/src/lib/fm/libdiskstatus/common/ |
H A D | ds_scsi.c | 337 uint_t skey, asc, ascq; local 362 &headers, &skey, &asc, &ascq)) == 0) { 387 } else if (SCSI_INVALID_OPCODE(skey, asc, ascq)) { 394 &headers, &skey, &asc, &ascq); 463 "ASC=0x%x ASCQ=0x%x)\n", skey, asc, ascq); 778 uint_t skey, asc, ascq; local 788 MODEPAGE_INFO_EXCPT_LEN, &sip->si_hdrs, &skey, &asc, 793 MODEPAGE_INFO_EXCPT_LEN, &junk_hdrs, &skey, &asc, &ascq); 798 "ASC=0x%x ASCQ=0x%x)", skey, asc, ascq); 846 uint_t skey, as local 926 uint_t skey, asc, ascq; local 981 uint_t skey, asc, ascq; local 1172 uint_t skey, asc, ascq; local [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2548 EVP_PKEY *skey = NULL; local 2605 skey = X509_get_pubkey(signer); 2606 if (skey == NULL) { 2611 ret = OCSP_BASICRESP_verify(bs, skey, 0); 2626 if (skey != NULL) { 2627 EVP_PKEY_free(skey);
|