Searched refs:key (Results 301 - 325 of 1341) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/common/crypto/ecc/
H A Dec.c241 /* Generates a new EC key pair. The private key is a supplied
242 * value and the public key is the result of performing a scalar
251 ECPrivateKey *key; local
266 /* Initialize an arena for the EC key. */
270 key = (ECPrivateKey *)PORT_ArenaZAlloc(arena, sizeof(ECPrivateKey),
272 if (!key) {
278 SECITEM_AllocItem(arena, &key->version, 1, kmflag);
279 key->version.data[0] = 1;
282 * ECParams structure within the private key
631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag) argument
830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument
868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument
[all...]
/illumos-gate/usr/src/cmd/hal/tools/
H A Dhal_set_property.c72 "usage : hal-set-property --udi <udi> --key <key>\n"
79 " --key Key of the property to set\n"
111 char *key = NULL; local
134 {"key", 1, NULL, 0},
161 } else if (strcmp (opt, "key") == 0) {
162 key = strdup (optarg);
256 rc = libhal_device_remove_property (hal_ctx, udi, key, &error);
269 rc = libhal_device_set_property_string (hal_ctx, udi, key, str_value, &error);
272 rc = libhal_device_set_property_int (hal_ctx, udi, key, int_valu
[all...]
/illumos-gate/usr/src/tools/protocmp/
H A Dlist.c140 find_elem(elem_list *list, elem *key, int flag) argument
144 for (e = list->list[hash(key->name) % list->num_of_buckets]; e;
146 if (!name_compare(e, key))
163 find_elem_isa(elem_list *list, elem *key, int flag) argument
168 orig_arch = key->arch;
169 key->arch = P_ISA;
170 e = find_elem(list, key, flag);
171 key->arch = orig_arch;
181 find_elem_mach(elem_list *list, elem *key, int flag) argument
185 for (e = list->list[hash(key
[all...]
/illumos-gate/usr/src/lib/udapl/libdat/common/
H A Ddat_dictionary.c54 DAT_PROVIDER_INFO key; member in struct:DAT_DICTIONARY_NODE
258 IN const DAT_PROVIDER_INFO *key,
269 if (DAT_SUCCESS == dat_dictionary_search(p_dictionary, key, NULL)) {
274 dat_status = dat_dictionary_key_dup(key, &cur_node->key);
304 IN const DAT_PROVIDER_INFO *key,
317 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key,
318 key)) {
376 IN const DAT_PROVIDER_INFO *key,
390 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key,
255 dat_dictionary_insert( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY entry, IN const DAT_PROVIDER_INFO *key, IN DAT_DICTIONARY_DATA data) argument
302 dat_dictionary_search( IN DAT_DICTIONARY *p_dictionary, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument
373 dat_dictionary_remove( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY *p_entry, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/btree/
H A Dbt_search.c55 * Search a btree for a key.
59 * key: key to find
64 * of the key, if it were inserted into the tree, is entered into
68 __bt_search(t, key, exactp)
70 const DBT *key;
87 if ((cmp = __bt_cmp(t, key, &t->bt_cur)) == 0) {
112 __bt_sprev(t, h, key, exactp))
116 __bt_snext(t, h, key, exactp))
126 * key an
[all...]
H A Dbt_delete.c60 * Delete the item(s) referenced by a key.
62 * Return RET_SPECIAL if the key is not found.
65 __bt_delete(dbp, key, flags)
67 const DBT *key;
91 status = __bt_bdelete(t, key);
161 * Find the first occurrence of the key in the tree. Toss the
166 if ((e = __bt_search(t, &c->key, &exact)) == NULL)
225 if ((e = __bt_search(t, &c->key, &exact)) == NULL)
283 * Delete all key/data pairs matching the specified key
[all...]
/illumos-gate/usr/src/lib/libcrypt/common/
H A Ddes_crypt.c79 * Permuted-choice 1 from the key bits
99 * Sequence of shifts used for the key schedule.
105 * the CD array that generate the key schedule.
122 * The C and D arrays used to calculate the key schedule.
128 * The key schedule.
129 * Generated from the key.
149 * Set up the key schedule from the key.
155 des_setkey_nolock(const char *key) argument
162 * the key
203 des_setkey(const char *key) argument
335 static thread_key_t key = THR_ONCE_KEY; local
[all...]
/illumos-gate/usr/src/lib/libdtrace_jni/java/src/org/opensolaris/os/dtrace/
H A DAggregation.java130 * uses {@link Tuple#EMPTY} as a key)
131 * @see #getRecord(Tuple key)
218 * contains a record with the same tuple key as the given record
223 Tuple key = record.getTuple();
224 if (map.put(key, record) != null) {
226 "with tuple " + key);
278 * Gets the record associated with the given key, or the singleton
280 * {@code key} is {@code null} or empty.
282 * @param key The record key, o
292 getRecord(Tuple key) argument
[all...]
/illumos-gate/usr/src/cmd/devmgmt/cmds/
H A Ddevfree.c34 * devfree key [device [...]]
81 * M_INVKEY Invalid key specified
83 * M_NOTONKEY Attempting to free with wrong key
89 #define M_USAGE "usage: devfree key [device [...]]"
90 #define M_INVKEY "Invalid key: %s"
116 * devfree key [device [device [...]]]
124 * key The key on which the device to free was allocated on.
127 * using the key are freed.
148 int key; /* Ke
146 int key; /* Key for locking */ local
[all...]
/illumos-gate/usr/src/cmd/hal/hald/
H A Dutil.h54 gboolean hal_util_set_int_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file, gint base);
58 gboolean hal_util_set_uint64_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file, gint base);
62 gboolean hal_util_set_string_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file);
66 gboolean hal_util_set_bcd2_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file);
82 gboolean hal_util_set_string_elem_from_file (HalDevice *d, const gchar *key,
86 gboolean hal_util_set_int_elem_from_file (HalDevice *d, const gchar *key,
90 gboolean hal_util_set_bool_elem_from_file (HalDevice *d, const gchar *key,
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/recno/
H A Drec_close.c119 DBT data, key; local
149 key.size = sizeof(recno_t);
150 key.data = &trec;
158 status = (dbp->seq)(dbp, &key, &data, R_FIRST);
162 status = (dbp->seq)(dbp, &key, &data, R_NEXT);
168 status = (dbp->seq)(dbp, &key, &data, R_FIRST);
174 status = (dbp->seq)(dbp, &key, &data, R_NEXT);
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa.c398 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
409 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
507 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
518 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
613 wpa_printf(MSG_WARNING, "Invalid key management type (%d).",
677 wpa_printf(MSG_WARNING, "Invalid key management type (%d).",
717 * PTK = PRF-X(PMK, "Pairwise key expansion",
744 sha1_prf(pmk, WPA_PMK_LEN, "Pairwise key expansion", data,
788 wpa_eapol_key_mic(uint8_t *key, int ver, uint8_t *buf, size_t len, uint8_t *mic) argument
791 hmac_md5(key, 1
871 wpa_supplicant_process_1_of_4(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, int ver) argument
999 wpa_supplicant_process_3_of_4_gtk(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, uint8_t *gtk, int gtk_len) argument
1103 wpa_supplicant_process_3_of_4(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, int extra_len, int ver) argument
1296 wpa_supplicant_process_1_of_2(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, int extra_len, int ver) argument
1529 wpa_supplicant_verify_eapol_key_mic(struct wpa_supplicant *wpa_s, struct wpa_eapol_key *key, int ver, uint8_t *buf, size_t len) argument
1579 wpa_supplicant_decrypt_key_data(struct wpa_supplicant *wpa_s, struct wpa_eapol_key *key, int ver) argument
1638 struct wpa_eapol_key *key; local
[all...]
/illumos-gate/usr/src/cmd/avs/rdc/
H A Dsndradm.c233 char key[CFG_MAX_KEY]; local
295 (void) snprintf(key, sizeof (key),
297 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0) {
675 char key[CFG_MAX_KEY]; local
696 (void) snprintf(key, sizeof (key), "sndr.set%d", setnumber);
697 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0)
801 char key[CFG_MAX_KEY]; local
808 (void) snprintf(key, sizeo
836 char key[CFG_MAX_KEY]; local
1241 char key[CFG_MAX_KEY]; local
1280 char key[CFG_MAX_KEY]; local
1755 char key[CFG_MAX_KEY]; local
2496 char key[CFG_MAX_KEY]; local
3469 char key[CFG_MAX_KEY], buf[CFG_MAX_BUF]; local
3722 char key[CFG_MAX_KEY]; local
3989 char key[CFG_MAX_KEY]; local
4204 char key[CFG_MAX_KEY]; local
5087 char key[CFG_MAX_KEY]; local
5440 char key[ CFG_MAX_KEY ]; local
5586 char key[CFG_MAX_KEY]; local
[all...]
/illumos-gate/usr/src/common/crypto/dh/
H A Ddh_impl.c72 DH_key_init(DHkey *key, int size) argument
78 key->size = size;
80 if ((err = big_init(&(key->p), len)) != BIG_OK)
82 if ((err = big_init(&(key->g), len)) != BIG_OK)
84 if ((err = big_init(&(key->x), len)) != BIG_OK)
86 if ((err = big_init(&(key->y), len)) != BIG_OK)
92 big_finish(&(key->x));
94 big_finish(&(key->g));
96 big_finish(&(key->p));
101 DH_key_finish(DHkey *key) argument
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_principal.c468 * The kadmin client utility uses a specific set of key/salt tuples,
471 * being called twice - once with the specific key/salts specified by
480 krb5_keyblock **key,
491 if (key)
492 *key = NULL;
504 if (key)
505 krb5_copy_keyblock(handle->context, &r->key, key);
506 } else if (key && (r->n_keys > 0)) {
507 *key
478 kadm5_randkey_principal_old(void *server_handle, krb5_principal princ, krb5_keyblock **key, int *n_keys) argument
529 kadm5_randkey_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **key, int *n_keys) argument
588 kadm5_randkey_principal(void *server_handle, krb5_principal princ, krb5_keyblock **key, int *n_keys) argument
[all...]
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Dsvcauth_des.c74 des_block key; /* conversation key */ member in struct:cache_entry
172 cred->adc_fullname.key.key.high = (uint32_t)*ixdr++;
173 cred->adc_fullname.key.key.low = (uint32_t)*ixdr++;
191 verf.adv_xtimestamp.key.high = (uint32_t)*ixdr++;
192 verf.adv_xtimestamp.key.low = (uint32_t)*ixdr++;
198 * Get the conversation key
205 init_sessionkey = cred->adc_fullname.key;
567 cache_spot(des_block *key, char *name, struct timeval *timestamp) argument
[all...]
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/
H A Dktutil_funcs.c97 * password or key. If the keytab list is NULL, allocate a new
116 krb5_keyblock key; local
183 &salt, &key);
188 memcpy(&lp->entry->key, &key, sizeof(krb5_keyblock));
202 fprintf(stderr, "addent: %s", gettext("Error reading key.\n"));
207 lp->entry->key.enctype = enctype;
208 lp->entry->key.contents = (krb5_octet *) malloc((strlen(buf) + 1) / 2);
209 if (!lp->entry->key.contents) {
218 gettext("Illegal character in key
388 des_cblock key; local
[all...]
/illumos-gate/usr/src/common/crypto/aes/amd64/
H A Daes_intel.s20 * the AES key expansion procedure.
102 * const int bits, AES_KEY *key);
104 * const int bits, AES_KEY *key);
108 * const AES_KEY *key);
110 * const AES_KEY *key);
116 * Note: AES_LONG is undefined (that is, Intel uses 32-bit key schedules
143 * Note: ks is the AES key schedule, Nr is number of rounds, pt is plain text,
302 * %xmm0 User-provided cipher key
305 * (%rcx) AES key
384 * Expand the cipher key int
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Daes_provider.c35 const krb5_keyblock *key, const krb5_data *ivec,
56 ASSERT(key != NULL);
57 ASSERT(key->key_tmpl != NULL);
58 ASSERT(key->kef_mt == crypto_mech2id(SUN_CKM_AES_CBC));
103 input->length, (krb5_keyblock *)key,
210 mech.cm_type = key->kef_mt;
222 ret = crypto_encrypt(&mech, &pt, (crypto_key_t *)&key->kef_key,
223 key->key_tmpl, &ct, NULL);
270 const krb5_keyblock *key, const krb5_data *ivec,
291 assert(key !
34 krb5int_aes_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
269 krb5int_aes_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
486 krb5int_aes_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
721 krb5int_aes_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
1012 k5_aes_make_key(krb5_context context, const krb5_data *randombits, krb5_keyblock *key) argument
1041 krb5int_aes_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, krb5_data *state) argument
[all...]
/illumos-gate/usr/src/cmd/sendmail/libsmdb/
H A Dsmndbm.c110 smdbm_del(database, key, flags)
112 SMDB_DBENT *key;
120 dbkey.dptr = key->data;
121 dbkey.dsize = key->size;
164 smdbm_get(database, key, data, flags)
166 SMDB_DBENT *key;
175 dbkey.dptr = key->data;
176 dbkey.dsize = key->size;
198 smdbm_put(database, key, data, flags)
200 SMDB_DBENT *key;
[all...]
/illumos-gate/usr/src/lib/fm/libdiagcode/common/
H A Ddiagcode_test.c197 const char *key[MAXKEY]; local
213 /* convert key into array */
217 key[nel++] = beginp;
224 key[nel] = NULL;
231 if (fm_dc_key2code(Dhp, key, code, MAXCODE) < 0)
252 char *key[MAXKEY]; local
270 if (fm_dc_code2key(Dhp, argv[2], key, fm_dc_maxkey(Dhp)) < 0)
284 /* convert key into string */
286 for (nel = 0; key[nel]; nel++) {
289 (void) strcat(keystr, key[ne
[all...]
/illumos-gate/usr/src/lib/libnisdb/
H A Ddb_index_entry.cc40 if ((key = new item(name, nlen)) == NULL)
55 if ((key = new item(k)) == NULL)
141 with the same hashvalue, key and location as this entry. */
149 (np->key->equal(i, casein)) && l == location) {
161 * Return pointer to index entry with same hash value, same key,
171 if (np->hashval == hval && np->key->equal(i, casein) &&
182 * key as those given. Returns in 'how_many' the number of entries in the
195 if ((fst->hashval == hval) && (fst->key->equal(i, casein))) {
201 * gather all the ones with the same key; assume that all entries
202 * with same key ar
[all...]
/illumos-gate/usr/src/cmd/ypcmd/revnetgroup/
H A Drevnetgroup.c47 * will begin with a key formed by concatenating the host or user name
48 * with the domain name. The key will be followed by a tab, then the
139 group = cur->key;
186 char *key; local
200 key = malloc((unsigned) (strlen(name)+strlen(domain)+2));
201 (void) sprintf(key, "%s.%s", name, domain);
202 enter(key, group);
244 int key; local
248 key = tablekey(name);
249 if (grouptable[key]
[all...]
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/client/
H A DpmHelpRepository.java163 public static String getResource(String key) { argument
167 Debug.message("HELP: getResource(" + key + ")");
178 keyvalue = bundle.getString(key);
180 keyvalue = bundle.getString("Missing:") + key;
181 Debug.error("HELP: Missing: " + key);
184 Debug.error("HELP: getResource(" + key + ") : " + other);
215 String key = (String) e.nextElement();
216 if (key.endsWith(".tag")) {
219 tagName = bundle.getString(key);
221 Debug.warning("HELP: Unable to find tag for " + key);
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/encr/
H A Dencr.c93 * This routine is used to find the key of type defined by 'ka' and
94 * return it in 'key'. The key file should have been opened by the
101 get_key(FILE *key_fp, wbku_key_attr_t *ka, uint8_t *key) argument
106 * Find the client key, if it exists.
108 ret = wbku_find_key(key_fp, NULL, ka, key, B_FALSE);
223 encr_gen_3des(const wbku_key_attr_t *ka, const uint8_t *key) argument
235 des3_key(eh, key);
264 encr_gen_aes(const wbku_key_attr_t *ka, const uint8_t *key) argument
276 aes_key(eh, key, k
319 uint8_t key[WANBOOT_MAXKEYLEN]; local
[all...]

Completed in 162 milliseconds

<<11121314151617181920>>