/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | ec.c | 241 /* Generates a new EC key pair. The private key is a supplied 242 * value and the public key is the result of performing a scalar 251 ECPrivateKey *key; local 266 /* Initialize an arena for the EC key. */ 270 key = (ECPrivateKey *)PORT_ArenaZAlloc(arena, sizeof(ECPrivateKey), 272 if (!key) { 278 SECITEM_AllocItem(arena, &key->version, 1, kmflag); 279 key->version.data[0] = 1; 282 * ECParams structure within the private key 631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag) argument 830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument 868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument [all...] |
/illumos-gate/usr/src/cmd/hal/tools/ |
H A D | hal_set_property.c | 72 "usage : hal-set-property --udi <udi> --key <key>\n" 79 " --key Key of the property to set\n" 111 char *key = NULL; local 134 {"key", 1, NULL, 0}, 161 } else if (strcmp (opt, "key") == 0) { 162 key = strdup (optarg); 256 rc = libhal_device_remove_property (hal_ctx, udi, key, &error); 269 rc = libhal_device_set_property_string (hal_ctx, udi, key, str_value, &error); 272 rc = libhal_device_set_property_int (hal_ctx, udi, key, int_valu [all...] |
/illumos-gate/usr/src/tools/protocmp/ |
H A D | list.c | 140 find_elem(elem_list *list, elem *key, int flag) argument 144 for (e = list->list[hash(key->name) % list->num_of_buckets]; e; 146 if (!name_compare(e, key)) 163 find_elem_isa(elem_list *list, elem *key, int flag) argument 168 orig_arch = key->arch; 169 key->arch = P_ISA; 170 e = find_elem(list, key, flag); 171 key->arch = orig_arch; 181 find_elem_mach(elem_list *list, elem *key, int flag) argument 185 for (e = list->list[hash(key [all...] |
/illumos-gate/usr/src/lib/udapl/libdat/common/ |
H A D | dat_dictionary.c | 54 DAT_PROVIDER_INFO key; member in struct:DAT_DICTIONARY_NODE 258 IN const DAT_PROVIDER_INFO *key, 269 if (DAT_SUCCESS == dat_dictionary_search(p_dictionary, key, NULL)) { 274 dat_status = dat_dictionary_key_dup(key, &cur_node->key); 304 IN const DAT_PROVIDER_INFO *key, 317 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key, 318 key)) { 376 IN const DAT_PROVIDER_INFO *key, 390 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key, 255 dat_dictionary_insert( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY entry, IN const DAT_PROVIDER_INFO *key, IN DAT_DICTIONARY_DATA data) argument 302 dat_dictionary_search( IN DAT_DICTIONARY *p_dictionary, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument 373 dat_dictionary_remove( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY *p_entry, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/btree/ |
H A D | bt_search.c | 55 * Search a btree for a key. 59 * key: key to find 64 * of the key, if it were inserted into the tree, is entered into 68 __bt_search(t, key, exactp) 70 const DBT *key; 87 if ((cmp = __bt_cmp(t, key, &t->bt_cur)) == 0) { 112 __bt_sprev(t, h, key, exactp)) 116 __bt_snext(t, h, key, exactp)) 126 * key an [all...] |
H A D | bt_delete.c | 60 * Delete the item(s) referenced by a key. 62 * Return RET_SPECIAL if the key is not found. 65 __bt_delete(dbp, key, flags) 67 const DBT *key; 91 status = __bt_bdelete(t, key); 161 * Find the first occurrence of the key in the tree. Toss the 166 if ((e = __bt_search(t, &c->key, &exact)) == NULL) 225 if ((e = __bt_search(t, &c->key, &exact)) == NULL) 283 * Delete all key/data pairs matching the specified key [all...] |
/illumos-gate/usr/src/lib/libcrypt/common/ |
H A D | des_crypt.c | 79 * Permuted-choice 1 from the key bits 99 * Sequence of shifts used for the key schedule. 105 * the CD array that generate the key schedule. 122 * The C and D arrays used to calculate the key schedule. 128 * The key schedule. 129 * Generated from the key. 149 * Set up the key schedule from the key. 155 des_setkey_nolock(const char *key) argument 162 * the key 203 des_setkey(const char *key) argument 335 static thread_key_t key = THR_ONCE_KEY; local [all...] |
/illumos-gate/usr/src/lib/libdtrace_jni/java/src/org/opensolaris/os/dtrace/ |
H A D | Aggregation.java | 130 * uses {@link Tuple#EMPTY} as a key) 131 * @see #getRecord(Tuple key) 218 * contains a record with the same tuple key as the given record 223 Tuple key = record.getTuple(); 224 if (map.put(key, record) != null) { 226 "with tuple " + key); 278 * Gets the record associated with the given key, or the singleton 280 * {@code key} is {@code null} or empty. 282 * @param key The record key, o 292 getRecord(Tuple key) argument [all...] |
/illumos-gate/usr/src/cmd/devmgmt/cmds/ |
H A D | devfree.c | 34 * devfree key [device [...]] 81 * M_INVKEY Invalid key specified 83 * M_NOTONKEY Attempting to free with wrong key 89 #define M_USAGE "usage: devfree key [device [...]]" 90 #define M_INVKEY "Invalid key: %s" 116 * devfree key [device [device [...]]] 124 * key The key on which the device to free was allocated on. 127 * using the key are freed. 148 int key; /* Ke 146 int key; /* Key for locking */ local [all...] |
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | util.h | 54 gboolean hal_util_set_int_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file, gint base); 58 gboolean hal_util_set_uint64_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file, gint base); 62 gboolean hal_util_set_string_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file); 66 gboolean hal_util_set_bcd2_from_file (HalDevice *d, const gchar *key, const gchar *directory, const gchar *file); 82 gboolean hal_util_set_string_elem_from_file (HalDevice *d, const gchar *key, 86 gboolean hal_util_set_int_elem_from_file (HalDevice *d, const gchar *key, 90 gboolean hal_util_set_bool_elem_from_file (HalDevice *d, const gchar *key,
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/recno/ |
H A D | rec_close.c | 119 DBT data, key; local 149 key.size = sizeof(recno_t); 150 key.data = &trec; 158 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 162 status = (dbp->seq)(dbp, &key, &data, R_NEXT); 168 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 174 status = (dbp->seq)(dbp, &key, &data, R_NEXT);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa.c | 398 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", 409 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), " 507 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", 518 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), " 613 wpa_printf(MSG_WARNING, "Invalid key management type (%d).", 677 wpa_printf(MSG_WARNING, "Invalid key management type (%d).", 717 * PTK = PRF-X(PMK, "Pairwise key expansion", 744 sha1_prf(pmk, WPA_PMK_LEN, "Pairwise key expansion", data, 788 wpa_eapol_key_mic(uint8_t *key, int ver, uint8_t *buf, size_t len, uint8_t *mic) argument 791 hmac_md5(key, 1 871 wpa_supplicant_process_1_of_4(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, int ver) argument 999 wpa_supplicant_process_3_of_4_gtk(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, uint8_t *gtk, int gtk_len) argument 1103 wpa_supplicant_process_3_of_4(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, int extra_len, int ver) argument 1296 wpa_supplicant_process_1_of_2(struct wpa_supplicant *wpa_s, unsigned char *src_addr, struct wpa_eapol_key *key, int extra_len, int ver) argument 1529 wpa_supplicant_verify_eapol_key_mic(struct wpa_supplicant *wpa_s, struct wpa_eapol_key *key, int ver, uint8_t *buf, size_t len) argument 1579 wpa_supplicant_decrypt_key_data(struct wpa_supplicant *wpa_s, struct wpa_eapol_key *key, int ver) argument 1638 struct wpa_eapol_key *key; local [all...] |
/illumos-gate/usr/src/cmd/avs/rdc/ |
H A D | sndradm.c | 233 char key[CFG_MAX_KEY]; local 295 (void) snprintf(key, sizeof (key), 297 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0) { 675 char key[CFG_MAX_KEY]; local 696 (void) snprintf(key, sizeof (key), "sndr.set%d", setnumber); 697 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0) 801 char key[CFG_MAX_KEY]; local 808 (void) snprintf(key, sizeo 836 char key[CFG_MAX_KEY]; local 1241 char key[CFG_MAX_KEY]; local 1280 char key[CFG_MAX_KEY]; local 1755 char key[CFG_MAX_KEY]; local 2496 char key[CFG_MAX_KEY]; local 3469 char key[CFG_MAX_KEY], buf[CFG_MAX_BUF]; local 3722 char key[CFG_MAX_KEY]; local 3989 char key[CFG_MAX_KEY]; local 4204 char key[CFG_MAX_KEY]; local 5087 char key[CFG_MAX_KEY]; local 5440 char key[ CFG_MAX_KEY ]; local 5586 char key[CFG_MAX_KEY]; local [all...] |
/illumos-gate/usr/src/common/crypto/dh/ |
H A D | dh_impl.c | 72 DH_key_init(DHkey *key, int size) argument 78 key->size = size; 80 if ((err = big_init(&(key->p), len)) != BIG_OK) 82 if ((err = big_init(&(key->g), len)) != BIG_OK) 84 if ((err = big_init(&(key->x), len)) != BIG_OK) 86 if ((err = big_init(&(key->y), len)) != BIG_OK) 92 big_finish(&(key->x)); 94 big_finish(&(key->g)); 96 big_finish(&(key->p)); 101 DH_key_finish(DHkey *key) argument [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 468 * The kadmin client utility uses a specific set of key/salt tuples, 471 * being called twice - once with the specific key/salts specified by 480 krb5_keyblock **key, 491 if (key) 492 *key = NULL; 504 if (key) 505 krb5_copy_keyblock(handle->context, &r->key, key); 506 } else if (key && (r->n_keys > 0)) { 507 *key 478 kadm5_randkey_principal_old(void *server_handle, krb5_principal princ, krb5_keyblock **key, int *n_keys) argument 529 kadm5_randkey_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **key, int *n_keys) argument 588 kadm5_randkey_principal(void *server_handle, krb5_principal princ, krb5_keyblock **key, int *n_keys) argument [all...] |
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | svcauth_des.c | 74 des_block key; /* conversation key */ member in struct:cache_entry 172 cred->adc_fullname.key.key.high = (uint32_t)*ixdr++; 173 cred->adc_fullname.key.key.low = (uint32_t)*ixdr++; 191 verf.adv_xtimestamp.key.high = (uint32_t)*ixdr++; 192 verf.adv_xtimestamp.key.low = (uint32_t)*ixdr++; 198 * Get the conversation key 205 init_sessionkey = cred->adc_fullname.key; 567 cache_spot(des_block *key, char *name, struct timeval *timestamp) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/ |
H A D | ktutil_funcs.c | 97 * password or key. If the keytab list is NULL, allocate a new 116 krb5_keyblock key; local 183 &salt, &key); 188 memcpy(&lp->entry->key, &key, sizeof(krb5_keyblock)); 202 fprintf(stderr, "addent: %s", gettext("Error reading key.\n")); 207 lp->entry->key.enctype = enctype; 208 lp->entry->key.contents = (krb5_octet *) malloc((strlen(buf) + 1) / 2); 209 if (!lp->entry->key.contents) { 218 gettext("Illegal character in key 388 des_cblock key; local [all...] |
/illumos-gate/usr/src/common/crypto/aes/amd64/ |
H A D | aes_intel.s | 20 * the AES key expansion procedure. 102 * const int bits, AES_KEY *key); 104 * const int bits, AES_KEY *key); 108 * const AES_KEY *key); 110 * const AES_KEY *key); 116 * Note: AES_LONG is undefined (that is, Intel uses 32-bit key schedules 143 * Note: ks is the AES key schedule, Nr is number of rounds, pt is plain text, 302 * %xmm0 User-provided cipher key 305 * (%rcx) AES key 384 * Expand the cipher key int [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | aes_provider.c | 35 const krb5_keyblock *key, const krb5_data *ivec, 56 ASSERT(key != NULL); 57 ASSERT(key->key_tmpl != NULL); 58 ASSERT(key->kef_mt == crypto_mech2id(SUN_CKM_AES_CBC)); 103 input->length, (krb5_keyblock *)key, 210 mech.cm_type = key->kef_mt; 222 ret = crypto_encrypt(&mech, &pt, (crypto_key_t *)&key->kef_key, 223 key->key_tmpl, &ct, NULL); 270 const krb5_keyblock *key, const krb5_data *ivec, 291 assert(key ! 34 krb5int_aes_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 269 krb5int_aes_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 486 krb5int_aes_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 721 krb5int_aes_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 1012 k5_aes_make_key(krb5_context context, const krb5_data *randombits, krb5_keyblock *key) argument 1041 krb5int_aes_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, krb5_data *state) argument [all...] |
/illumos-gate/usr/src/cmd/sendmail/libsmdb/ |
H A D | smndbm.c | 110 smdbm_del(database, key, flags) 112 SMDB_DBENT *key; 120 dbkey.dptr = key->data; 121 dbkey.dsize = key->size; 164 smdbm_get(database, key, data, flags) 166 SMDB_DBENT *key; 175 dbkey.dptr = key->data; 176 dbkey.dsize = key->size; 198 smdbm_put(database, key, data, flags) 200 SMDB_DBENT *key; [all...] |
/illumos-gate/usr/src/lib/fm/libdiagcode/common/ |
H A D | diagcode_test.c | 197 const char *key[MAXKEY]; local 213 /* convert key into array */ 217 key[nel++] = beginp; 224 key[nel] = NULL; 231 if (fm_dc_key2code(Dhp, key, code, MAXCODE) < 0) 252 char *key[MAXKEY]; local 270 if (fm_dc_code2key(Dhp, argv[2], key, fm_dc_maxkey(Dhp)) < 0) 284 /* convert key into string */ 286 for (nel = 0; key[nel]; nel++) { 289 (void) strcat(keystr, key[ne [all...] |
/illumos-gate/usr/src/lib/libnisdb/ |
H A D | db_index_entry.cc | 40 if ((key = new item(name, nlen)) == NULL) 55 if ((key = new item(k)) == NULL) 141 with the same hashvalue, key and location as this entry. */ 149 (np->key->equal(i, casein)) && l == location) { 161 * Return pointer to index entry with same hash value, same key, 171 if (np->hashval == hval && np->key->equal(i, casein) && 182 * key as those given. Returns in 'how_many' the number of entries in the 195 if ((fst->hashval == hval) && (fst->key->equal(i, casein))) { 201 * gather all the ones with the same key; assume that all entries 202 * with same key ar [all...] |
/illumos-gate/usr/src/cmd/ypcmd/revnetgroup/ |
H A D | revnetgroup.c | 47 * will begin with a key formed by concatenating the host or user name 48 * with the domain name. The key will be followed by a tab, then the 139 group = cur->key; 186 char *key; local 200 key = malloc((unsigned) (strlen(name)+strlen(domain)+2)); 201 (void) sprintf(key, "%s.%s", name, domain); 202 enter(key, group); 244 int key; local 248 key = tablekey(name); 249 if (grouptable[key] [all...] |
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/client/ |
H A D | pmHelpRepository.java | 163 public static String getResource(String key) { argument 167 Debug.message("HELP: getResource(" + key + ")"); 178 keyvalue = bundle.getString(key); 180 keyvalue = bundle.getString("Missing:") + key; 181 Debug.error("HELP: Missing: " + key); 184 Debug.error("HELP: getResource(" + key + ") : " + other); 215 String key = (String) e.nextElement(); 216 if (key.endsWith(".tag")) { 219 tagName = bundle.getString(key); 221 Debug.warning("HELP: Unable to find tag for " + key); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/encr/ |
H A D | encr.c | 93 * This routine is used to find the key of type defined by 'ka' and 94 * return it in 'key'. The key file should have been opened by the 101 get_key(FILE *key_fp, wbku_key_attr_t *ka, uint8_t *key) argument 106 * Find the client key, if it exists. 108 ret = wbku_find_key(key_fp, NULL, ka, key, B_FALSE); 223 encr_gen_3des(const wbku_key_attr_t *ka, const uint8_t *key) argument 235 des3_key(eh, key); 264 encr_gen_aes(const wbku_key_attr_t *ka, const uint8_t *key) argument 276 aes_key(eh, key, k 319 uint8_t key[WANBOOT_MAXKEYLEN]; local [all...] |