Searched refs:key (Results 376 - 400 of 892) sorted by relevance

<<11121314151617181920>>

/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_sha.c96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
137 CK_BYTE *key = attr->pValue; local
140 k_ipad[i] = key[i] ^ 0x36;
141 k_opad[i] = key[i] ^ 0x5C;
237 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);
H A Dsign_mgr.c35 CK_OBJECT_HANDLE key)
52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
80 // must be a PRIVATE key
113 // must be a PRIVATE key operation
211 ctx->key = key;
228 ctx->key = 0;
31 sign_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
H A Dverify_mgr.c35 CK_OBJECT_HANDLE key)
52 // key usage restrictions
54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
58 // is key allowed to verify signatures?
196 ctx->key = key;
213 ctx->key = 0;
31 verify_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Dsupport.c98 dst_s_id_calc(const u_char *key, const int keysize) argument
101 const u_char *kp = key;
104 if (!key || (keysize <= 0))
124 * the key footprint/id calculated from the key data
140 /* compute a checksum on the key part of the key rr */
225 * filename for a key file. '/', '\' and ':' are not allowed.
254 * Builds a key filename from the key nam
[all...]
/osnet-11/usr/src/lib/libresolv2/common/resolv/
H A Dres_update.c94 res_nupdate(res_state statp, ns_updrec *rrecp_in, ns_tsig_key *key) { argument
170 if (key != NULL)
171 n = res_nsendsigned(statp, packet, n, key,
/osnet-11/usr/src/lib/libsocket/inet/
H A Dgetnetent_r.c69 arg.key.name = name;
86 arg.key.netaddr.net = (uint32_t)net;
87 arg.key.netaddr.type = type;
/osnet-11/usr/src/lib/libpkg/common/
H A Dnhash.c121 bp = &cp->bp[(*cp->hfunc)(itemp->key, itemp->keyl, cp->hsz)];
131 (*cp->hfunc)(itemp->key, itemp->keyl, cp->hsz));
177 if (!(*cp->cfunc)((void *)bp->itempp[i]->key, datap, datalen)) {
/osnet-11/usr/src/lib/libcpc/common/
H A Dsubr.c174 * Insert a new key into the hash table.
176 * Returns 0 if key was unique and insert successful.
178 * Returns 1 if key was already in table and no insert took place.
183 __cpc_strhash_add(cpc_strhash_t *hash, char *key) argument
188 if (strcmp(p->str, key) == 0)
195 p->str = key;
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkeytab.c165 /* match key */
181 &entry->key, NULL);
187 entry->key.enctype, &similar);
200 entry->key.enctype = enctype;
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_db2.h46 krb5_keyblock *db_master_key; /* Master key of database */
85 krb5_keyblock *key);
88 krb5_db2_db_set_mkey(krb5_context context, krb5_keyblock *key);
91 krb5_db2_db_get_mkey(krb5_context context, krb5_keyblock **key);
/osnet-11/usr/src/cmd/sendmail/libsm/
H A Dsem.c25 ** key -- key for semaphores.
36 sm_sem_start(key, nsem, semflg, owner)
37 key_t key;
50 semid = semget(key, nsem, semflg);
/osnet-11/usr/src/lib/nsswitch/files/common/
H A Dgetgrent.c47 const char *keyp = argp->key.name;
98 return ((gid_t)gr_gid == argp->key.gid);
108 if (argp->key.gid > MAXUID)
H A Dgetpwnam.c48 const char *keyp = argp->key.name;
99 return ((uid_t)pw_uid == argp->key.uid);
109 if (argp->key.uid > MAXUID)
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetrpcent.c147 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0)
182 _F_GETRPCBYNUMBER, argp->key.number);
187 _F_GETRPCBYNUMBER_SSD, argp->key.number);
H A Dgetservent.c195 argp->key.serv.proto) {
209 argp->key.serv.proto) == 0) {
320 const char *proto = argp->key.serv.proto;
327 if (_ldap_filter_name(name, argp->key.serv.serv.name, sizeof (name))
376 const char *proto = argp->key.serv.proto;
384 ntohs((ushort_t)argp->key.serv.serv.port));
/osnet-11/usr/src/lib/nsswitch/nis/common/
H A Dgetspent.c110 res = _nss_nis_lookup(be, argp, 0, "passwd.byname", argp->key.name, 0);
139 argp->key.name, 0);
152 argp->key.name, 0);
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/
H A DServerDATable.java191 String key = makeKey(url, hdr.locale); // need locale also...
192 forwardRegs.put(key, msg); // fresh doesn't matter.
201 String key = makeKey(smsg.URL, hdr.locale);
202 forwardRegs.remove(key);
215 // We are only concerned with the unicast key, since it contains
251 // Make a key for the service agent message table.
488 String key = makeKey(regurl, hdr.locale);
490 forwardRegs.remove(key);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/support/
H A Dthreads.c104 Thread termination concurrent with key deletion can cause two
109 Other cases, like looking up data while the library owning the key
182 static pthread_key_t key; variable
245 t = pthread_getspecific(key);
294 t = pthread_getspecific(key);
304 err = pthread_setspecific(key, t);
440 err = pthread_key_create(&key, thread_termination);
482 pthread_key_delete(key);
/osnet-11/usr/src/lib/lvm/libmeta/common/
H A Dmeta_init.c212 * Returns: > 0 success and return 'key'
240 * and return the key
372 mdkey_t key = MD_KEYWILD; local
412 if ((key = meta_init_make_device(spp, uname,
427 if (key == MD_KEYWILD) {
428 if ((key = meta_init_make_device(spp, uname,
453 key, NULL, &mnum, NULL, ep) != NULL) &&
461 (void) del_self_name(*spp, key, &t_e);
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSignUtil.c45 * key_p: pointer to key soft_object_t struct
485 if (rsa_ctx != NULL && rsa_ctx->key != NULL) {
486 soft_cleanup_object(rsa_ctx->key);
487 free(rsa_ctx->key);
505 if (dsa_ctx != NULL && dsa_ctx->key != NULL) {
506 soft_cleanup_object(dsa_ctx->key);
507 free(dsa_ctx->key);
/osnet-11/usr/src/lib/libnisdb/
H A Dnis_hashitem.c234 int key = 0; local
241 key += *s;
243 key %= (sizeof (table->keys) / sizeof (table->keys[0]));
246 *keyp = key;
248 for (pp = &table->keys[key]; (it = *pp) != 0; pp = &it->next) {
272 int key; local
278 if ((*(pp = __find_item_mt(item->name, table, &key))) != 0) {
297 item->keychain = key;
/osnet-11/usr/src/lib/libnisdb/yptol/
H A Ddit_access.c113 * Entry key
121 read_from_dit(char *map, char *domain, datum *key, datum *value) argument
146 if (TRUE == singleReadFromDIT(map, domain, key, value, &res))
185 * The entries key
197 write_to_dit(char *map, char *domain, datum key, datum value, argument
223 res = singleWriteToDIT(map, domain, &key, &value, replace);
609 datum key; local
825 /* Obtain the datum for key */
831 "key from LDAP data (dn:%s) "
861 "for (key
1199 datum key; local
[all...]
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dsmb_autohome.c292 * only used for key substitution, so that the caller sees the entry
390 char key[SMB_AUTOHOME_KEYSIZ]; local
395 (void) strlcpy(key, buf, SMB_AUTOHOME_KEYSIZ);
397 if ((tmp = strpbrk(key, " \t")) == NULL)
403 * Substitution characters are not allowed in the key.
405 if (strpbrk(key, "?&") != NULL)
408 if (strcmp(key, "*") == 0 && name != NULL)
409 (void) strlcpy(key, name, SMB_AUTOHOME_KEYSIZ);
411 (void) strsubst(buf, '?', *key);
418 (void) strlcpy(ampersand, key, bufsiz
[all...]
/osnet-11/usr/src/lib/libgen/common/
H A Dpathfind.c103 static thread_key_t key = THR_ONCE_KEY; local
104 char *cpath = _get_cpath(&key);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dhmac_md5.c44 const krb5_keyblock *key, krb5_keyusage usage,
62 * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key
64 * length. The signing key is the digest and therefore is also the same
78 ret = krb5_hmac(context, &krb5int_hash_md5, key, 1,
43 k5_hmac_md5_hash(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *iv, const krb5_data *input, krb5_data *output) argument

Completed in 92 milliseconds

<<11121314151617181920>>