/osnet-11/usr/src/lib/nsswitch/pynss/common/ |
H A D | dns.py | 191 key = vals[0] # verify key and values variable in class:DnsClient 192 tarray = self.ALLPROPS[key] 193 if key == 'options': # convert to single valued 195 vals = [ key, v ] 200 if key == 'sortlist': # convert sortlist -> net_addr 211 db.append((key, tarray[0], v)) 217 # db now holds all key/value pars to send to smf
|
/osnet-11/usr/src/lib/pybootmgmt/common/bootmgmt/ |
H A D | bootloader.py | 232 def _prop_validate(self, key, value=None, validate_value=False): 233 """Validate the property key and optionally value""" 237 if key not in props and key not in specialprops: 238 raise BootmgmtUnsupportedPropertyError(key + ' is not a supported ' 247 valfunc = validators.get(key) 354 def setprop(self, key, value): 358 newvalue = self._prop_validate(key, value, True) 365 if self._bl_props.get(key) != value: 366 self._bl_props[key] [all...] |
/osnet-11/usr/src/lib/fm/libfmd_snmp/common/ |
H A D | module.c | 93 static sunFmModule_data_t key; local 95 key.d_index = index; 97 (void) strlcpy(key.d_ami_name, name, sizeof (key.d_ami_name)); 99 key.d_ami_name[0] = '\0'; 101 return (&key); 113 sunFmModule_data_t *key; local 115 key = key_build(name, 0); 116 return (uu_avl_find(mod_name_avl, key, NULL, NULL)); 128 sunFmModule_data_t *key; local 144 sunFmModule_data_t *key, *data; local [all...] |
H A D | resource.c | 77 static sunFmResource_data_t key; local 79 key.d_index = index; 81 (void) strlcpy(key.d_ari_fmri, fmri, sizeof (key.d_ari_fmri)); 83 key.d_ari_fmri[0] = '\0'; 85 return (&key); 97 sunFmResource_data_t *key; local 99 key = key_build(fmri, 0); 100 return (uu_avl_find(rsrc_fmri_avl, key, NULL, NULL)); 112 sunFmResource_data_t *key; local 128 sunFmResource_data_t *key, *data; local [all...] |
/osnet-11/usr/src/lib/libsoftcrypto/common/ |
H A D | crypt.c | 69 static int create_context(crypto_ctx_t *context, crypto_key_t key, 72 static int set_key(crypto_key_t *key, void *key_data, size_t key_len, 82 create_context(crypto_ctx_t *context, crypto_key_t key, crypto_mechanism_t mech, argument 118 rv = aes_common_init(context, &mech, &key, NULL, NULL, 136 rv = rsaprov_sign_verify_common_init(context, &mech, &key, 179 set_key(crypto_key_t *key, void *key_data, size_t key_len, argument 193 key->ck_format = CRYPTO_KEY_RAW; 194 key->ck_data = key_data; 195 key->ck_length = CRYPTO_BYTES2BITS(key_len); 206 key 254 crypto_key_t key = { 0 }; local 470 crypto_key_t key = { 0 }; local [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softAttributeUtil.c | 92 * attributes that exists only in public key objects 117 * Attributes that exist only in private key objects. 149 * Attributes that exist only in secret key objects. 1185 /* cleanup key data area */ 1193 /* cleanup key schedule data area */ 1314 * - Build the Public Key object according to the key type. Allocate 1316 * that are required for a certain key type. 1376 /* common key attributes */ 1385 /* common public key attribute */ 1400 * The following key relate 5216 soft_get_public_value(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *value, uint32_t *value_len) argument 5430 soft_get_private_value(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *value, uint32_t *value_len) argument [all...] |
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getgrent.c | 375 * as the key is being performed. The GROUP_DN tag indicates a group DN 376 * as the key. GROUP_DN_NS indicates a group DN key but with no result 503 * the necessary key information for psearch and for cache test operations. 599 /* Find the search key from the packed buffer header. */ 615 arg->key.name = (char *)buffer + pbuf->key_off; 849 dn = arg.key.name; 851 /* malformed/improperly sized key/dn */ 1056 do_lookup(char *cache_name, const char *tag, const char *key, int dbop, argument 1078 /* space needed for tag and key 1157 char key[256]; local 2097 key_uid_psearch(const char *key, void **bufpp) argument 2404 const char *key; local 2438 get_parent_gids(struct nss_groupsbymem *argp, const char *tag, const char *key, _nss_ldap_list_t **gl, int *rec_callp) argument [all...] |
/osnet-11/usr/src/lib/libcommputil/common/ |
H A D | sdp_parse_helper.c | 62 sdp_free_key(sdp_key_t *key) argument 64 if (key != NULL) { 65 if (key->k_method != NULL) 66 free(key->k_method); 67 if (key->k_enckey != NULL) 68 free(key->k_enckey); 69 free(key);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_cred.c | 77 krb5_key key, krb5_replay_data *replaydata, 147 retval = encrypt_credencpart(context, &credenc, key, &pcred->enc_part); 177 krb5_key key; local 209 if ((key = auth_context->send_subkey) == NULL) 210 key = auth_context->key; 268 if ((retval = krb5_mk_ncred_basic(context, ppcreds, ncred, key, 75 krb5_mk_ncred_basic(krb5_context context, krb5_creds **ppcreds, krb5_int32 nppcreds, krb5_key key, krb5_replay_data *replaydata, krb5_address *local_addr, krb5_address *remote_addr, krb5_cred *pcred, krb5_cred_enc_part **ret_credenc) argument
|
H A D | rd_req_dec.c | 54 * any server will be accepted if the key can be found, and the caller should 60 * keyproc specifies a procedure to generate a decryption key for the 62 * used as a decryption key. If keyproc is NULL, then fetchfrom is checked; 64 * decryption key. If fetchfrom is NULL, then the default key store is 93 krb5_keyblock *key) 110 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket); 111 if (retval == 0 && key != NULL) 112 retval = krb5_copy_keyblock_contents(context, &ktent.key, key); 91 rd_req_decrypt_tkt_part(krb5_context context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_keyblock *key) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/db/hash/ |
H A D | hash.c | 237 __ham_delete(dbp, txn, key, flags) 240 DBT *key; 250 __db_delchk(dbp, key, flags, F_ISSET(dbp, DB_AM_RDONLY))) != 0) 256 DEBUG_LWRITE(dbc, txn, "ham_delete", key, NULL, flags); 264 if ((ret = __ham_lookup(dbc, key, 0, DB_LOCK_WRITE)) == 0) 506 __ham_c_get(dbc, key, data, flags) 508 DBT *key; 518 flags == DB_SET || flags == DB_SET_RANGE ? key : NULL, 526 __db_cgetchk(dbp, key, data, flags, IS_VALID(hcp))) != 0) 579 ret = __ham_lookup(dbc, key, [all...] |
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaKeys.c | 43 meta_object_t *key = NULL; local 53 rv = meta_object_alloc(session, &key); 57 rv = meta_generate_keys(session, pMechanism, pTemplate, ulCount, key, 62 meta_object_activate(key); 64 *phKey = (CK_OBJECT_HANDLE) key; 68 if (key) 69 (void) meta_object_dealloc(session, key, B_TRUE); 270 * for the derived key handle at phKey. Two (related) mechanisms 335 /* Get the key the application is providing */ 356 /* Get the key th [all...] |
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | ndbm.c | 233 dbm_forder(DBM *db, datum key) argument 237 hash = dcalchash(key); 248 dbm_fetch(DBM *db, datum key) argument 255 dbm_access(db, dcalchash(key)); 256 if ((i = finddatum(db->dbm_pagbuf, key)) >= 0) { 268 dbm_delete(DBM *db, datum key) argument 279 dbm_access(db, dcalchash(key)); 280 if ((i = finddatum(db->dbm_pagbuf, key)) < 0) 300 dbm_store(DBM *db, datum key, datum dat, int replace) argument 315 key_hash = dcalchash(key); 542 datum key; local [all...] |
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | md5.c | 367 const unsigned char *key, 371 * key XORd with ipad 374 * key XORd with opad 378 /* if key is longer than 64 bytes reset it to key=MD5(key) */ 384 _sasl_MD5Update(&tctx, key, key_len); 387 key = tk; 396 * where K is an n byte key 402 /* start out by storing key i 366 _sasl_hmac_md5_init(HMAC_MD5_CTX *hmac, const unsigned char *key, int key_len) argument 436 _sasl_hmac_md5_precalc(HMAC_MD5_STATE *state, const unsigned char *key, int key_len) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/term/ |
H A D | at_keyboard.c | 435 grub_dprintf ("atkeyb", "Unknown key 0xe0+0x%02x from set %d\n", 438 grub_dprintf ("atkeyb", "Unknown key 0x%02x from set %d\n", 448 grub_keyboard_isr (grub_keyboard_key_t key, int is_break) argument 451 switch (key) 475 switch (key) 500 /* If there is a raw key pending, return it; otherwise return -1. */ 504 int key; local 507 key = fetch_key (&is_break); 508 if (key == -1) 511 if (grub_keyboard_isr (key, is_brea [all...] |
/osnet-11/usr/src/cmd/sendmail/db/btree/ |
H A D | bt_delete.c | 65 * Delete the items referenced by a key. 70 __bam_delete(dbp, txn, key, flags) 73 DBT *key; 85 __db_delchk(dbp, key, flags, F_ISSET(dbp, DB_AM_RDONLY))) != 0) 92 DEBUG_LWRITE(dbc, txn, "bam_delete", key, NULL, flags); 95 * Walk a cursor through the key/data pairs, deleting as we go. Set 111 /* Walk through the set of key/data pairs, deleting as we go. */ 112 if ((ret = dbc->c_get(dbc, key, &data, f_init)) != 0) 117 if ((ret = dbc->c_get(dbc, key, &data, f_next)) != 0) { 176 * If it's a duplicate key, discar [all...] |
/osnet-11/usr/src/lib/libwrap/ |
H A D | options.c | 143 char *key; local 170 key = curr_opt; 175 if (*key == 0) 183 for (op = option_table; op->name && STR_NE(op->name, key); op++) 186 tcpd_jump("bad option name: \"%s\"", key); 188 tcpd_jump("option \"%s\" requires value", key); 190 tcpd_jump("option \"%s\" requires no value", key); 192 tcpd_jump("option \"%s\" must be at end", key); 196 syslog(LOG_DEBUG, "option: %s %s", key, value ? value : "");
|
/osnet-11/usr/src/lib/libipmi/common/ |
H A D | ipmi_hash.c | 91 ulong_t (*compute)(const void *key), 125 ipmi_hash_strhash(const void *key) argument 130 for (p = key; *p != '\0'; p++) { 149 ipmi_hash_ptrhash(const void *key) argument 151 return (*((const uintptr_t *)key) >> 4); 89 ipmi_hash_create(ipmi_handle_t *hp, size_t linkoffs, const void *(*convert)(const void *elem), ulong_t (*compute)(const void *key), int (*compare)(const void *lkey, const void *rkey)) argument
|
/osnet-11/usr/src/lib/fm/libdiagcode/common/ |
H A D | diagcode.c | 97 static void sortkey(const char *key[]); 98 static const char *keymatch(const char *linebuf, const char *key[]); 362 /* return number of strings in key for a given dictionary */ 375 /* given a key, construct a diagcode */ 378 const char *key[], char *code, size_t maxcode) 393 for (nel = 0; key[nel]; nel++) 394 (void) fprintf(stderr, "\"%s\" ", key[nel]); 399 sortkey(key); 412 if ((rhsp = keymatch(linebuf, key)) != NULL) { 435 /* given a diagcode, return the key (arra 377 fm_dc_key2code(fm_dc_handle_t *dhp, const char *key[], char *code, size_t maxcode) argument 437 fm_dc_code2key(fm_dc_handle_t *dhp, const char *code, char *key[], int maxkey) argument 625 sortkey(const char *key[]) argument 655 keymatch(const char *linebuf, const char *key[]) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | inq_context.c | 195 krb5_key key; local 202 key = ctx->have_acceptor_subkey ? ctx->acceptor_subkey : ctx->subkey; 204 keyvalue.value = key->keyblock.contents; 205 keyvalue.length = key->keyblock.length; 217 key->keyblock.enctype,
|
/osnet-11/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 185 bcrypt(key, salt) 186 const char *key; 239 key_len = strlen(key) + (minor >= 'a' ? 1 : 0); 244 (uint8_t *) key, key_len); 246 Blowfish_expand0state(&state, (uint8_t *) key, key_len);
|
/osnet-11/usr/src/lib/libast/common/path/ |
H A D | pathprobe.c | 122 char key[16]; local 153 pathkey(lang, tool, proc, key, sizeof(key), attr, attrsize); 156 strncopy(p, key, x - p); 204 strncopy(p, key, x - p);
|
/osnet-11/usr/src/lib/libtsnet/common/ |
H A D | misc.c | 186 int key; local 211 if ((key = keyword - rtsa_keywords) == SAK_INVAL) { 216 if ((key == SAK_CIPSO && *valptr == '=') || 217 (key != SAK_CIPSO && *valptr != '=')) { 237 switch (key) {
|
/osnet-11/usr/src/lib/nsswitch/files/common/ |
H A D | getexecattr.c | 63 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp); 76 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp); 89 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp); 118 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp); 196 _priv_execattr *pe = (_priv_execattr *)(argp->key.attrp);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 406 CK_BYTE *key = attr->pValue; local 409 k_ipad[i] = key[i] ^ 0x36; 410 k_opad[i] = key[i] ^ 0x5C; 507 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);
|