/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_sha.c | 96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 137 CK_BYTE *key = attr->pValue; local 140 k_ipad[i] = key[i] ^ 0x36; 141 k_opad[i] = key[i] ^ 0x5C; 237 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);
|
H A D | sign_mgr.c | 35 CK_OBJECT_HANDLE key) 52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 80 // must be a PRIVATE key 113 // must be a PRIVATE key operation 211 ctx->key = key; 228 ctx->key = 0; 31 sign_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
|
H A D | verify_mgr.c | 35 CK_OBJECT_HANDLE key) 52 // key usage restrictions 54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj); 58 // is key allowed to verify signatures? 196 ctx->key = key; 213 ctx->key = 0; 31 verify_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
|
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | support.c | 98 dst_s_id_calc(const u_char *key, const int keysize) argument 101 const u_char *kp = key; 104 if (!key || (keysize <= 0)) 124 * the key footprint/id calculated from the key data 140 /* compute a checksum on the key part of the key rr */ 225 * filename for a key file. '/', '\' and ':' are not allowed. 254 * Builds a key filename from the key nam [all...] |
/osnet-11/usr/src/lib/libresolv2/common/resolv/ |
H A D | res_update.c | 94 res_nupdate(res_state statp, ns_updrec *rrecp_in, ns_tsig_key *key) { argument 170 if (key != NULL) 171 n = res_nsendsigned(statp, packet, n, key,
|
/osnet-11/usr/src/lib/libsocket/inet/ |
H A D | getnetent_r.c | 69 arg.key.name = name; 86 arg.key.netaddr.net = (uint32_t)net; 87 arg.key.netaddr.type = type;
|
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | nhash.c | 121 bp = &cp->bp[(*cp->hfunc)(itemp->key, itemp->keyl, cp->hsz)]; 131 (*cp->hfunc)(itemp->key, itemp->keyl, cp->hsz)); 177 if (!(*cp->cfunc)((void *)bp->itempp[i]->key, datap, datalen)) {
|
/osnet-11/usr/src/lib/libcpc/common/ |
H A D | subr.c | 174 * Insert a new key into the hash table. 176 * Returns 0 if key was unique and insert successful. 178 * Returns 1 if key was already in table and no insert took place. 183 __cpc_strhash_add(cpc_strhash_t *hash, char *key) argument 188 if (strcmp(p->str, key) == 0) 195 p->str = key;
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | keytab.c | 165 /* match key */ 181 &entry->key, NULL); 187 entry->key.enctype, &similar); 200 entry->key.enctype = enctype;
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_db2.h | 46 krb5_keyblock *db_master_key; /* Master key of database */ 85 krb5_keyblock *key); 88 krb5_db2_db_set_mkey(krb5_context context, krb5_keyblock *key); 91 krb5_db2_db_get_mkey(krb5_context context, krb5_keyblock **key);
|
/osnet-11/usr/src/cmd/sendmail/libsm/ |
H A D | sem.c | 25 ** key -- key for semaphores. 36 sm_sem_start(key, nsem, semflg, owner) 37 key_t key; 50 semid = semget(key, nsem, semflg);
|
/osnet-11/usr/src/lib/nsswitch/files/common/ |
H A D | getgrent.c | 47 const char *keyp = argp->key.name; 98 return ((gid_t)gr_gid == argp->key.gid); 108 if (argp->key.gid > MAXUID)
|
H A D | getpwnam.c | 48 const char *keyp = argp->key.name; 99 return ((uid_t)pw_uid == argp->key.uid); 109 if (argp->key.uid > MAXUID)
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getrpcent.c | 147 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0) 182 _F_GETRPCBYNUMBER, argp->key.number); 187 _F_GETRPCBYNUMBER_SSD, argp->key.number);
|
H A D | getservent.c | 195 argp->key.serv.proto) { 209 argp->key.serv.proto) == 0) { 320 const char *proto = argp->key.serv.proto; 327 if (_ldap_filter_name(name, argp->key.serv.serv.name, sizeof (name)) 376 const char *proto = argp->key.serv.proto; 384 ntohs((ushort_t)argp->key.serv.serv.port));
|
/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | getspent.c | 110 res = _nss_nis_lookup(be, argp, 0, "passwd.byname", argp->key.name, 0); 139 argp->key.name, 0); 152 argp->key.name, 0);
|
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | ServerDATable.java | 191 String key = makeKey(url, hdr.locale); // need locale also... 192 forwardRegs.put(key, msg); // fresh doesn't matter. 201 String key = makeKey(smsg.URL, hdr.locale); 202 forwardRegs.remove(key); 215 // We are only concerned with the unicast key, since it contains 251 // Make a key for the service agent message table. 488 String key = makeKey(regurl, hdr.locale); 490 forwardRegs.remove(key);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/support/ |
H A D | threads.c | 104 Thread termination concurrent with key deletion can cause two 109 Other cases, like looking up data while the library owning the key 182 static pthread_key_t key; variable 245 t = pthread_getspecific(key); 294 t = pthread_getspecific(key); 304 err = pthread_setspecific(key, t); 440 err = pthread_key_create(&key, thread_termination); 482 pthread_key_delete(key);
|
/osnet-11/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_init.c | 212 * Returns: > 0 success and return 'key' 240 * and return the key 372 mdkey_t key = MD_KEYWILD; local 412 if ((key = meta_init_make_device(spp, uname, 427 if (key == MD_KEYWILD) { 428 if ((key = meta_init_make_device(spp, uname, 453 key, NULL, &mnum, NULL, ep) != NULL) && 461 (void) del_self_name(*spp, key, &t_e);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSignUtil.c | 45 * key_p: pointer to key soft_object_t struct 485 if (rsa_ctx != NULL && rsa_ctx->key != NULL) { 486 soft_cleanup_object(rsa_ctx->key); 487 free(rsa_ctx->key); 505 if (dsa_ctx != NULL && dsa_ctx->key != NULL) { 506 soft_cleanup_object(dsa_ctx->key); 507 free(dsa_ctx->key);
|
/osnet-11/usr/src/lib/libnisdb/ |
H A D | nis_hashitem.c | 234 int key = 0; local 241 key += *s; 243 key %= (sizeof (table->keys) / sizeof (table->keys[0])); 246 *keyp = key; 248 for (pp = &table->keys[key]; (it = *pp) != 0; pp = &it->next) { 272 int key; local 278 if ((*(pp = __find_item_mt(item->name, table, &key))) != 0) { 297 item->keychain = key;
|
/osnet-11/usr/src/lib/libnisdb/yptol/ |
H A D | dit_access.c | 113 * Entry key 121 read_from_dit(char *map, char *domain, datum *key, datum *value) argument 146 if (TRUE == singleReadFromDIT(map, domain, key, value, &res)) 185 * The entries key 197 write_to_dit(char *map, char *domain, datum key, datum value, argument 223 res = singleWriteToDIT(map, domain, &key, &value, replace); 609 datum key; local 825 /* Obtain the datum for key */ 831 "key from LDAP data (dn:%s) " 861 "for (key 1199 datum key; local [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | smb_autohome.c | 292 * only used for key substitution, so that the caller sees the entry 390 char key[SMB_AUTOHOME_KEYSIZ]; local 395 (void) strlcpy(key, buf, SMB_AUTOHOME_KEYSIZ); 397 if ((tmp = strpbrk(key, " \t")) == NULL) 403 * Substitution characters are not allowed in the key. 405 if (strpbrk(key, "?&") != NULL) 408 if (strcmp(key, "*") == 0 && name != NULL) 409 (void) strlcpy(key, name, SMB_AUTOHOME_KEYSIZ); 411 (void) strsubst(buf, '?', *key); 418 (void) strlcpy(ampersand, key, bufsiz [all...] |
/osnet-11/usr/src/lib/libgen/common/ |
H A D | pathfind.c | 103 static thread_key_t key = THR_ONCE_KEY; local 104 char *cpath = _get_cpath(&key);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 44 const krb5_keyblock *key, krb5_keyusage usage, 62 * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key 64 * length. The signing key is the digest and therefore is also the same 78 ret = krb5_hmac(context, &krb5int_hash_md5, key, 1, 43 k5_hmac_md5_hash(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *iv, const krb5_data *input, krb5_data *output) argument
|