Searched refs:key (Results 351 - 375 of 892) sorted by relevance

<<11121314151617181920>>

/osnet-11/usr/src/lib/nsswitch/pynss/common/
H A Ddns.py191 key = vals[0] # verify key and values variable in class:DnsClient
192 tarray = self.ALLPROPS[key]
193 if key == 'options': # convert to single valued
195 vals = [ key, v ]
200 if key == 'sortlist': # convert sortlist -> net_addr
211 db.append((key, tarray[0], v))
217 # db now holds all key/value pars to send to smf
/osnet-11/usr/src/lib/pybootmgmt/common/bootmgmt/
H A Dbootloader.py232 def _prop_validate(self, key, value=None, validate_value=False):
233 """Validate the property key and optionally value"""
237 if key not in props and key not in specialprops:
238 raise BootmgmtUnsupportedPropertyError(key + ' is not a supported '
247 valfunc = validators.get(key)
354 def setprop(self, key, value):
358 newvalue = self._prop_validate(key, value, True)
365 if self._bl_props.get(key) != value:
366 self._bl_props[key]
[all...]
/osnet-11/usr/src/lib/fm/libfmd_snmp/common/
H A Dmodule.c93 static sunFmModule_data_t key; local
95 key.d_index = index;
97 (void) strlcpy(key.d_ami_name, name, sizeof (key.d_ami_name));
99 key.d_ami_name[0] = '\0';
101 return (&key);
113 sunFmModule_data_t *key; local
115 key = key_build(name, 0);
116 return (uu_avl_find(mod_name_avl, key, NULL, NULL));
128 sunFmModule_data_t *key; local
144 sunFmModule_data_t *key, *data; local
[all...]
H A Dresource.c77 static sunFmResource_data_t key; local
79 key.d_index = index;
81 (void) strlcpy(key.d_ari_fmri, fmri, sizeof (key.d_ari_fmri));
83 key.d_ari_fmri[0] = '\0';
85 return (&key);
97 sunFmResource_data_t *key; local
99 key = key_build(fmri, 0);
100 return (uu_avl_find(rsrc_fmri_avl, key, NULL, NULL));
112 sunFmResource_data_t *key; local
128 sunFmResource_data_t *key, *data; local
[all...]
/osnet-11/usr/src/lib/libsoftcrypto/common/
H A Dcrypt.c69 static int create_context(crypto_ctx_t *context, crypto_key_t key,
72 static int set_key(crypto_key_t *key, void *key_data, size_t key_len,
82 create_context(crypto_ctx_t *context, crypto_key_t key, crypto_mechanism_t mech, argument
118 rv = aes_common_init(context, &mech, &key, NULL, NULL,
136 rv = rsaprov_sign_verify_common_init(context, &mech, &key,
179 set_key(crypto_key_t *key, void *key_data, size_t key_len, argument
193 key->ck_format = CRYPTO_KEY_RAW;
194 key->ck_data = key_data;
195 key->ck_length = CRYPTO_BYTES2BITS(key_len);
206 key
254 crypto_key_t key = { 0 }; local
470 crypto_key_t key = { 0 }; local
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftAttributeUtil.c92 * attributes that exists only in public key objects
117 * Attributes that exist only in private key objects.
149 * Attributes that exist only in secret key objects.
1185 /* cleanup key data area */
1193 /* cleanup key schedule data area */
1314 * - Build the Public Key object according to the key type. Allocate
1316 * that are required for a certain key type.
1376 /* common key attributes */
1385 /* common public key attribute */
1400 * The following key relate
5216 soft_get_public_value(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *value, uint32_t *value_len) argument
5430 soft_get_private_value(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *value, uint32_t *value_len) argument
[all...]
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetgrent.c375 * as the key is being performed. The GROUP_DN tag indicates a group DN
376 * as the key. GROUP_DN_NS indicates a group DN key but with no result
503 * the necessary key information for psearch and for cache test operations.
599 /* Find the search key from the packed buffer header. */
615 arg->key.name = (char *)buffer + pbuf->key_off;
849 dn = arg.key.name;
851 /* malformed/improperly sized key/dn */
1056 do_lookup(char *cache_name, const char *tag, const char *key, int dbop, argument
1078 /* space needed for tag and key
1157 char key[256]; local
2097 key_uid_psearch(const char *key, void **bufpp) argument
2404 const char *key; local
2438 get_parent_gids(struct nss_groupsbymem *argp, const char *tag, const char *key, _nss_ldap_list_t **gl, int *rec_callp) argument
[all...]
/osnet-11/usr/src/lib/libcommputil/common/
H A Dsdp_parse_helper.c62 sdp_free_key(sdp_key_t *key) argument
64 if (key != NULL) {
65 if (key->k_method != NULL)
66 free(key->k_method);
67 if (key->k_enckey != NULL)
68 free(key->k_enckey);
69 free(key);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dmk_cred.c77 krb5_key key, krb5_replay_data *replaydata,
147 retval = encrypt_credencpart(context, &credenc, key, &pcred->enc_part);
177 krb5_key key; local
209 if ((key = auth_context->send_subkey) == NULL)
210 key = auth_context->key;
268 if ((retval = krb5_mk_ncred_basic(context, ppcreds, ncred, key,
75 krb5_mk_ncred_basic(krb5_context context, krb5_creds **ppcreds, krb5_int32 nppcreds, krb5_key key, krb5_replay_data *replaydata, krb5_address *local_addr, krb5_address *remote_addr, krb5_cred *pcred, krb5_cred_enc_part **ret_credenc) argument
H A Drd_req_dec.c54 * any server will be accepted if the key can be found, and the caller should
60 * keyproc specifies a procedure to generate a decryption key for the
62 * used as a decryption key. If keyproc is NULL, then fetchfrom is checked;
64 * decryption key. If fetchfrom is NULL, then the default key store is
93 krb5_keyblock *key)
110 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket);
111 if (retval == 0 && key != NULL)
112 retval = krb5_copy_keyblock_contents(context, &ktent.key, key);
91 rd_req_decrypt_tkt_part(krb5_context context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_keyblock *key) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/db/hash/
H A Dhash.c237 __ham_delete(dbp, txn, key, flags)
240 DBT *key;
250 __db_delchk(dbp, key, flags, F_ISSET(dbp, DB_AM_RDONLY))) != 0)
256 DEBUG_LWRITE(dbc, txn, "ham_delete", key, NULL, flags);
264 if ((ret = __ham_lookup(dbc, key, 0, DB_LOCK_WRITE)) == 0)
506 __ham_c_get(dbc, key, data, flags)
508 DBT *key;
518 flags == DB_SET || flags == DB_SET_RANGE ? key : NULL,
526 __db_cgetchk(dbp, key, data, flags, IS_VALID(hcp))) != 0)
579 ret = __ham_lookup(dbc, key,
[all...]
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaKeys.c43 meta_object_t *key = NULL; local
53 rv = meta_object_alloc(session, &key);
57 rv = meta_generate_keys(session, pMechanism, pTemplate, ulCount, key,
62 meta_object_activate(key);
64 *phKey = (CK_OBJECT_HANDLE) key;
68 if (key)
69 (void) meta_object_dealloc(session, key, B_TRUE);
270 * for the derived key handle at phKey. Two (related) mechanisms
335 /* Get the key the application is providing */
356 /* Get the key th
[all...]
/osnet-11/usr/src/lib/libc/port/gen/
H A Dndbm.c233 dbm_forder(DBM *db, datum key) argument
237 hash = dcalchash(key);
248 dbm_fetch(DBM *db, datum key) argument
255 dbm_access(db, dcalchash(key));
256 if ((i = finddatum(db->dbm_pagbuf, key)) >= 0) {
268 dbm_delete(DBM *db, datum key) argument
279 dbm_access(db, dcalchash(key));
280 if ((i = finddatum(db->dbm_pagbuf, key)) < 0)
300 dbm_store(DBM *db, datum key, datum dat, int replace) argument
315 key_hash = dcalchash(key);
542 datum key; local
[all...]
/osnet-11/usr/src/lib/libsasl/lib/
H A Dmd5.c367 const unsigned char *key,
371 * key XORd with ipad
374 * key XORd with opad
378 /* if key is longer than 64 bytes reset it to key=MD5(key) */
384 _sasl_MD5Update(&tctx, key, key_len);
387 key = tk;
396 * where K is an n byte key
402 /* start out by storing key i
366 _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, const unsigned char *key, int key_len) argument
436 _sasl_hmac_md5_precalc(HMAC_MD5_STATE *state, const unsigned char *key, int key_len) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/term/
H A Dat_keyboard.c435 grub_dprintf ("atkeyb", "Unknown key 0xe0+0x%02x from set %d\n",
438 grub_dprintf ("atkeyb", "Unknown key 0x%02x from set %d\n",
448 grub_keyboard_isr (grub_keyboard_key_t key, int is_break) argument
451 switch (key)
475 switch (key)
500 /* If there is a raw key pending, return it; otherwise return -1. */
504 int key; local
507 key = fetch_key (&is_break);
508 if (key == -1)
511 if (grub_keyboard_isr (key, is_brea
[all...]
/osnet-11/usr/src/cmd/sendmail/db/btree/
H A Dbt_delete.c65 * Delete the items referenced by a key.
70 __bam_delete(dbp, txn, key, flags)
73 DBT *key;
85 __db_delchk(dbp, key, flags, F_ISSET(dbp, DB_AM_RDONLY))) != 0)
92 DEBUG_LWRITE(dbc, txn, "bam_delete", key, NULL, flags);
95 * Walk a cursor through the key/data pairs, deleting as we go. Set
111 /* Walk through the set of key/data pairs, deleting as we go. */
112 if ((ret = dbc->c_get(dbc, key, &data, f_init)) != 0)
117 if ((ret = dbc->c_get(dbc, key, &data, f_next)) != 0) {
176 * If it's a duplicate key, discar
[all...]
/osnet-11/usr/src/lib/libwrap/
H A Doptions.c143 char *key; local
170 key = curr_opt;
175 if (*key == 0)
183 for (op = option_table; op->name && STR_NE(op->name, key); op++)
186 tcpd_jump("bad option name: \"%s\"", key);
188 tcpd_jump("option \"%s\" requires value", key);
190 tcpd_jump("option \"%s\" requires no value", key);
192 tcpd_jump("option \"%s\" must be at end", key);
196 syslog(LOG_DEBUG, "option: %s %s", key, value ? value : "");
/osnet-11/usr/src/lib/libipmi/common/
H A Dipmi_hash.c91 ulong_t (*compute)(const void *key),
125 ipmi_hash_strhash(const void *key) argument
130 for (p = key; *p != '\0'; p++) {
149 ipmi_hash_ptrhash(const void *key) argument
151 return (*((const uintptr_t *)key) >> 4);
89 ipmi_hash_create(ipmi_handle_t *hp, size_t linkoffs, const void *(*convert)(const void *elem), ulong_t (*compute)(const void *key), int (*compare)(const void *lkey, const void *rkey)) argument
/osnet-11/usr/src/lib/fm/libdiagcode/common/
H A Ddiagcode.c97 static void sortkey(const char *key[]);
98 static const char *keymatch(const char *linebuf, const char *key[]);
362 /* return number of strings in key for a given dictionary */
375 /* given a key, construct a diagcode */
378 const char *key[], char *code, size_t maxcode)
393 for (nel = 0; key[nel]; nel++)
394 (void) fprintf(stderr, "\"%s\" ", key[nel]);
399 sortkey(key);
412 if ((rhsp = keymatch(linebuf, key)) != NULL) {
435 /* given a diagcode, return the key (arra
377 fm_dc_key2code(fm_dc_handle_t *dhp, const char *key[], char *code, size_t maxcode) argument
437 fm_dc_code2key(fm_dc_handle_t *dhp, const char *code, char *key[], int maxkey) argument
625 sortkey(const char *key[]) argument
655 keymatch(const char *linebuf, const char *key[]) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dinq_context.c195 krb5_key key; local
202 key = ctx->have_acceptor_subkey ? ctx->acceptor_subkey : ctx->subkey;
204 keyvalue.value = key->keyblock.contents;
205 keyvalue.length = key->keyblock.length;
217 key->keyblock.enctype,
/osnet-11/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c185 bcrypt(key, salt)
186 const char *key;
239 key_len = strlen(key) + (minor >= 'a' ? 1 : 0);
244 (uint8_t *) key, key_len);
246 Blowfish_expand0state(&state, (uint8_t *) key, key_len);
/osnet-11/usr/src/lib/libast/common/path/
H A Dpathprobe.c122 char key[16]; local
153 pathkey(lang, tool, proc, key, sizeof(key), attr, attrsize);
156 strncopy(p, key, x - p);
204 strncopy(p, key, x - p);
/osnet-11/usr/src/lib/libtsnet/common/
H A Dmisc.c186 int key; local
211 if ((key = keyword - rtsa_keywords) == SAK_INVAL) {
216 if ((key == SAK_CIPSO && *valptr == '=') ||
217 (key != SAK_CIPSO && *valptr != '=')) {
237 switch (key) {
/osnet-11/usr/src/lib/nsswitch/files/common/
H A Dgetexecattr.c63 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp);
76 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp);
89 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp);
118 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp);
196 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp);
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_md5.c363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
406 CK_BYTE *key = attr->pValue; local
409 k_ipad[i] = key[i] ^ 0x36;
410 k_opad[i] = key[i] ^ 0x5C;
507 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);

Completed in 171 milliseconds

<<11121314151617181920>>