/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | errlist | 93 53 Cryptographic key not available
|
H A D | getauthattr.c | 129 arg.key.name = name;
|
H A D | getprofattr.c | 129 arg.key.name = name;
|
H A D | getspent_r.c | 59 arg.key.name = name; 88 /* No key to fill in */ 105 /* No key to fill in */
|
H A D | getuserattr.c | 150 arg.key.name = name;
|
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 100 * This function finds the corresponding private key in keystore 111 KMF_KEY_HANDLE *key = NULL; local 135 * First, get the key algorithm info from the certificate and saves it 136 * in the returned key handle. 146 key = kmf_get_attr_ptr(KMF_KEY_HANDLE_ATTR, attrlist, numattr); 147 if (key == NULL) 149 key->keyalg = keyalg; 185 * for all key usage checking. 194 * public key is used for verifying a signature on 195 * public key certificate 328 setup_findprikey_attrlist(KMF_ATTRIBUTE *src_attrlist, int src_num, KMF_ATTRIBUTE **new_attrlist, int *new_num, KMF_KEY_HANDLE *key, KMF_DATA *cert) argument 390 get_default_signoid(KMF_KEY_HANDLE *key) argument [all...] |
/osnet-11/usr/src/lib/libsocket/inet/ |
H A D | netmasks.c | 87 * Given a 32 bit key look it up in the netmasks database 89 * If the key is a network number with the trailing zero's removed 91 * the address to the string key. 111 arg.key.name = tmp; 181 * we keep the previous lookup key and compare against it before
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/prldap/ |
H A D | ldappr-dns.c | 322 arg.key.name = name;
|
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 40 * setsecretkey(key) - set your secret key 41 * encryptsessionkey(agent, deskey) - encrypt a session key to talk to agent 43 * gendeskey(deskey) - generate a secure des key 102 * Actual key login 106 * set along with the key. Keylogin also uses KEY_NET_PUT. 110 /* erase our copy of the secret key */ 131 arg.key.keybuf3_len = keylen/4 + 1; 132 arg.key.keybuf3_val = secretkey; 153 debug("remove secret key cal 541 key_gendes(des_block *key) argument [all...] |
H A D | key_prot.c | 258 if (!xdr_keybuf3(xdrs, &objp->key))
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | libntsvcs.h | 96 * to zero. The session key and vc number are required to validate 101 int mlsvc_encrypt_nt_password(char *password, char *key, int keylen, char *out,
|
/osnet-11/usr/src/lib/libdtrace/common/ |
H A D | dt_ident.c | 74 argc, iskey ? "key" : "arg", argc == 1 ? " " : "s ", 90 iskey ? "key" : "argument", i + 1, 93 iskey ? "key" : "argument", 145 "used as %s index: key #%d\n", 798 dt_idhash_delete(dt_idhash_t *dhp, dt_ident_t *key) argument 801 ulong_t h = dt_strtab_hash(key->di_name, &len) % dhp->dh_hashsz; 806 if (idp == key) 812 assert(idp == key);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_keytab.c | 54 /* if there's already a key of the correct etype, we're done. 55 if the etype is wrong, free the existing key, and make 74 ret = krb5_copy_keyblock(context, &kt_ent.key, &kt_key);
|
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | kadm_rpc.h | 148 krb5_keyblock key; member in struct:chrand_ret
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto.h | 103 unsigned int ku_bits; /* key usage information */ 104 unsigned int eku_bits; /* extended key usage information */ 258 * this function checks for acceptable key usage values 262 * the kpKdc key usage. if allow_secondary_usage is 266 * kpClientAuth key usage. if allow_secondary_usage is 270 * key usage is consistent. 282 specifies if the secondary key usage 288 * this functions takes in generated DH secret key and converts 289 * it in to a kerberos session key. it takes into the account the 296 unsigned char *key, /* I [all...] |
H A D | pkinit_crypto_openssl.h | 59 EVP_PKEY *key; member in struct:_pkinit_cred_info
|
/osnet-11/usr/src/grub/grub2/util/ |
H A D | grub-setup.c | 870 help_filter (int key, const char *text, void *input __attribute__ ((unused))) argument 872 switch (key) 921 argp_parser (int key, char *arg, struct argp_state *state) argument 929 switch (key)
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ |
H A D | scope.c | 570 Perl_save_delete(pTHX_ HV *hv, char *key, I32 klen) argument 574 SSPUSHPTR(key); 636 Perl_save_helem(pTHX_ HV *hv, SV *key, SV **sptr) argument 641 SSPUSHPTR(SvREFCNT_inc(key));
|
/osnet-11/usr/src/cmd/powertop/common/ |
H A D | powertop.h | 217 char key; member in struct:suggestion
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Storable/t/ |
H A D | malice.t | 73 is (scalar keys %$clone, 1, "with 1 key"); 222 my ($key, $name) = @$_;
|
/osnet-11/usr/src/lib/libzpool/common/ |
H A D | kernel.c | 793 crypto_key_t *key, crypto_ctx_template_t *tmpl, int kmflag) 808 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, 836 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, 873 crypto_key_t *key, crypto_ctx_template_t impl, 792 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t *tmpl, int kmflag) argument 807 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 835 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 872 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t impl, crypto_data_t *mac, crypto_call_req_t *cr) argument
|
/osnet-11/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_print.c | 416 mddevidp->key, ep);
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getprinter.c | 133 * The attribute contains key=value 168 * Translate attr name ->key name 191 * The attrname is the key. The attribute 289 (void) strncpy(printername, argp->key.name, BUFSIZ);
|
H A D | getspent.c | 248 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0)
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sess_mgr.c | 1162 sess->encr_ctx.key = encr_key; 1171 sess->decr_ctx.key = encr_key; 1180 sess->sign_ctx.key = auth_key; 1189 sess->verify_ctx.key = auth_key;
|