/illumos-gate/usr/src/lib/nsswitch/nis/common/ |
H A D | getservent.c | 52 const char *name = args->key.serv.serv.name; 53 const char *proto = args->key.serv.proto; 78 keyp = argp->key.serv.serv.name; 86 if (argp->key.serv.proto == NULL) 105 if ((keyp = argp->key.serv.proto) == NULL) { 132 keyp = argp->key.serv.serv.name; 157 const char *name = argp->key.serv.serv.name; 158 const char *proto = argp->key.serv.proto; 178 char *key = malloc(len); local 180 if (key 279 char *key; local [all...] |
H A D | gethostent.c | 51 for (s = argp->key.name; (c = *s) != '\0'; s++) { 56 if ((copy = strdup(argp->key.name)) == 0) { 59 for (mung = copy + (s - argp->key.name); 73 "hosts.byname", argp->key.name, 0); 93 if (argp->key.hostaddr.type != AF_INET || 94 argp->key.hostaddr.len != sizeof (addr)) { 97 (void) memcpy(&addr, argp->key.hostaddr.addr, sizeof (addr));
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 51 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 64 if ((ret = krb5_c_encrypt_length(context, eblock->key->enctype, size, 71 return(krb5_c_encrypt(context, eblock->key, 0, ivec?&ivecd:0, 86 if ((ret = krb5_c_block_size(context, eblock->key->enctype, &blocksize))) 94 inputd.enctype = eblock->key->enctype; 105 return(krb5_c_decrypt(context, eblock->key, 0, ivec?&ivecd:0, 111 const krb5_keyblock *key) 113 eblock->key = (krb5_keyblock *) key; 156 krb5_keyblock *key; local 110 krb5_process_key(krb5_context context, krb5_encrypt_block *eblock, const krb5_keyblock *key) argument 214 krb5_keyblock key; local 252 krb5_keyblock key; local 285 krb5_encrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_data *data, krb5_enc_data *enc_data) argument 318 krb5_decrypt_data(krb5_context context, krb5_keyblock *key, krb5_pointer ivec, krb5_enc_data *enc_data, krb5_data *data) argument [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | dst_api.c | 32 * void dst_write_key() Function to write out a key. 35 * int dst_key_to_dnskey() Function to return a public key in DNS 38 * int *dst_key_to_buffer() Writes out DST_KEY key matterial in buffer 39 * void dst_free_key() Releases all memory referenced by key structure 65 const char *key_file_fmt_str = "Private-key-format: v%s\nAlgorithm: %d (%s)\n"; 73 static int dst_s_write_public_key(const DST_KEY *key); 74 static int dst_s_write_private_key(const DST_KEY *key); 148 * This function allocates key structure and fills in some of the 151 * name: the name of the key 153 * flags: the dns flags of the key 367 dst_write_key(const DST_KEY *key, const int type) argument 406 dst_s_write_private_key(const DST_KEY *key) argument 585 dst_s_write_public_key(const DST_KEY *key) argument 702 dst_key_to_dnskey(const DST_KEY *key, u_char *out_storage, const int out_len) argument 791 dst_key_to_buffer(DST_KEY *key, u_char *out_buff, int buf_len) argument 1032 dst_sig_size(DST_KEY *key) argument [all...] |
H A D | hmac_link.c | 81 * priv_key key to use for signing. 98 HMAC_Key *key; local 112 key = (HMAC_Key *) d_key->dk_KEY_struct; 116 MD5Update(ctx, key->hk_ipad, HMAC_LEN); 129 MD5Update(ctx, key->hk_opad, HMAC_LEN); 152 * dkey key to use for verify. 167 HMAC_Key *key; local 180 key = (HMAC_Key *) d_key->dk_KEY_struct; 183 MD5Update(ctx, key->hk_ipad, HMAC_LEN); 190 if (signature == NULL || key 226 dst_buffer_to_hmac_md5(DST_KEY *dkey, const u_char *key, const int keylen) argument 286 u_char key[HMAC_LEN]; local 348 u_char key[HMAC_LEN+1]; /* b64_pton needs more than 64 bytes do decode local 434 dst_hmac_md5_free_key_structure(void *key) argument 450 dst_hmac_md5_generate_key(DST_KEY *key, const int nothing) argument [all...] |
/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | hmac_test.c | 46 unsigned char key[80]; member in struct:test_data 64 getxdata(td[0].key, "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", 71 (void) strcpy((char *)td[1].key, "Jefe"); 77 getxdata(td[2].key, "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 85 getxdata(td[3].key, "0102030405060708090a0b0c0d0e0f1011121314151617" 94 getxdata(td[4].key, "0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c", 101 getxdata(td[5].key, "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" 111 getxdata(td[6].key, "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" 126 HMACInit(&sha, td[i].key, td[i].keylen); 128 HMACFinal(&sha, td[i].key, t [all...] |
H A D | aes_test.c | 32 * Encrypts plain text with the defined key and verifies that the result 46 char key[AES_256_KEY_SIZE * 2]; member in struct:test_data 69 unsigned char key[AES_256_KEY_SIZE]; local 88 getxdata(key, td[i].key, td[i].keysize); 89 aes_key(ah, key, td[i].keysize);
|
/illumos-gate/usr/src/cmd/avs/rdc/ |
H A D | sndrsyncd.c | 359 char key[CFG_MAX_KEY]; local 398 bzero(key, sizeof (key)); 400 (void) snprintf(key, sizeof (key), "sndr.set%d.shost", 427 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0) { 441 (void) snprintf(key, sizeof (key), "sndr.set%d.phost", 443 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0) 448 (void) snprintf(key, sizeo 708 char key[CFG_MAX_KEY]; local 780 char key[CFG_MAX_KEY]; local 1164 char key[CFG_MAX_KEY]; local 1368 char key[CFG_MAX_KEY]; local [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | dk.h | 39 const krb5_keyblock *key, krb5_keyusage usage, 47 krb5_const krb5_keyblock *key, krb5_keyusage usage, 60 krb5_const krb5_keyblock *key, krb5_keyusage usage, 71 krb5_keyblock *key); 83 const krb5_keyblock *key, krb5_keyusage usage, 91 const krb5_keyblock *key, krb5_keyusage usage, 99 const krb5_data *, krb5_keyblock *key);
|
/illumos-gate/usr/src/uts/common/io/xge/hal/xgehal/ |
H A D | xgehal-mgmtaux.c | 29 #define __hal_aux_snprintf(retbuf, bufsize, fmt, key, value, retsize) \ 31 retsize = xge_os_snprintf(retbuf, bufsize, fmt, key, \ 35 #define __hal_aux_snprintf(retbuf, bufsize, fmt, key, value, retsize) \ 37 retsize = xge_os_sprintf(retbuf, fmt, key, XGE_HAL_AUX_SEPA, value); \ 47 #define __HAL_AUX_ENTRY(key, value, fmt) \ 49 __hal_aux_snprintf(ptr, leftsize, "%s%c"fmt"\n", key, value, entrysize) 891 char key[XGE_OS_SPRINTF_STRLEN]; local 959 (void) xge_os_snprintf(key, sizeof(key), "ring%d_", channel->post_qid); 961 dest_addr = key 1171 char key[XGE_OS_SPRINTF_STRLEN]; local 1269 char key[XGE_OS_SPRINTF_STRLEN]; local 1569 char key[XGE_OS_SPRINTF_STRLEN]; local [all...] |
/illumos-gate/usr/src/lib/libast/common/misc/ |
H A D | setenviron.c | 51 char* key = (char*)akey; local 116 if (!key) 120 t = key; 134 *p = key; 135 return (s = strchr(key, '=')) ? s + 1 : (char*)0; 141 if (!(s = strchr(key, '='))) 145 *p = key;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_enc.c | 25 * @kek: key encryption key (KEK) 26 * @n: length of the wrapped key in 64-bit units; e.g., 2 = 128-bit = 16 bytes 27 * @plain: plaintext key to be wrapped, n * 64 bit 28 * @cipher: wrapped key, (n + 1) * 64 bit 35 AES_KEY key; local 44 (void) AES_set_encrypt_key(kek, 128, &key); 59 AES_encrypt(b, b, &key); 76 * @kek: key encryption key (KE 86 AES_KEY key; local 134 hmac_sha1(unsigned char *key, unsigned int key_len, unsigned char *data, unsigned int data_len, unsigned char *mac) argument 138 (void) HMAC(EVP_sha1(), key, key_len, data, data_len, mac, &mac_len); local 143 hmac_sha1_vector(unsigned char *key, unsigned int key_len, size_t num_elem, unsigned char *addr[], unsigned int *len, unsigned char *mac) argument 168 sha1_prf(unsigned char *key, unsigned int key_len, char *label, unsigned char *data, unsigned int data_len, unsigned char *buf, size_t buf_len) argument 213 rc4_skip(uint8_t *key, size_t keylen, size_t skip, uint8_t *data, size_t data_len) argument 232 rc4(uint8_t *buf, size_t len, uint8_t *key, size_t key_len) argument 241 hmac_md5_vector(uint8_t *key, size_t key_len, size_t num_elem, uint8_t *addr[], size_t *len, uint8_t *mac) argument 265 hmac_md5(uint8_t *key, size_t key_len, uint8_t *data, size_t data_len, uint8_t *mac) argument 269 (void) HMAC(EVP_md5(), key, key_len, data, data_len, mac, &mac_len); local [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/btree/ |
H A D | bt_put.c | 60 * key: key 65 * RET_ERROR, RET_SUCCESS and RET_SPECIAL if the key is already in the 69 __bt_put(dbp, key, data, flags) 71 DBT *key; 119 * If the key/data pair won't fit on a page, store it on overflow 120 * pages. Only put the key on the overflow page if the pair are 127 if (key->size + data->size > t->bt_ovflsize) { 128 if (key->size > t->bt_ovflsize) { 130 storekey: if (__ovfl_put(t, key, [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 16 /* from a random bitstrem, construct a key */ 23 const krb5_keyblock *key, 34 if ((rv = get_algo(key->enctype, algos)) != CKR_OK) { 53 template[4].pValue = key->contents; 54 template[4].ulValueLen = key->length; 56 /* Create an object handle for the key */ 74 const krb5_keyblock *key, const krb5_data *state, 90 if (key->length != 16) 104 * Normally, the RC4 key is used as a single operation 107 * use a short-term key objec 22 setup_arcfour_crypto(CK_SESSION_HANDLE session, const krb5_keyblock *key, KRB5_MECH_TO_PKCS *algos, CK_OBJECT_HANDLE *hKey) argument 73 k5_arcfour_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument 190 k5_arcfour_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument 297 k5_arcfour_make_key(krb5_context context, const krb5_data *randombits, krb5_keyblock *key) argument 328 k5_arcfour_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage keyusage, krb5_data *new_state) argument [all...] |
/illumos-gate/usr/src/uts/common/io/hxge/ |
H A D | hxge_pfc.h | 68 #define WRITE_TCAM_REG_KEY0(handle, key) \ 69 REG_PIO_WRITE64(handle, PFC_TCAM_KEY0, key) 70 #define WRITE_TCAM_REG_KEY1(handle, key) \ 71 REG_PIO_WRITE64(handle, PFC_TCAM_KEY1, key) 220 } key, mask; member in struct:hxge_tcam_entry_S 225 #define key_reg0 key.regs.reg0 226 #define key_reg1 key.regs.reg1 230 #define key0 key.regs.reg0 231 #define key1 key.regs.reg1 235 #define ip4_class_key key [all...] |
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/client/ |
H A D | pmUtility.java | 54 public static String getCopyrightResource(String key) { argument 67 keyvalue = bundle.getString(key); 69 Debug.error("CLNT: getCopyrightResource: Missing: " + key); 70 keyvalue = new String("<<" + key + ">>"); 76 public static String getResource(String key) { argument 89 keyvalue = bundle.getString(key); 91 Debug.error("CLNT: getResource: Missing: " + key); 92 keyvalue = new String("<<" + key + ">>"); 98 public static int getIntResource(String key) { argument 111 s = bundle.getString(key); [all...] |
/illumos-gate/usr/src/lib/libnisdb/yptol/ |
H A D | update.c | 72 * Pointer to the entry key 81 update_entry_if_required(map_ctrl *map, datum *key) argument 95 if (0 == strncmp(key->dptr, yp_last_modified, yp_last_modified_sz)) { 102 if (is_special_key(key)) 105 if (!has_entry_expired(map, key)) 110 return (update_from_dit(map, key)); 119 * Entry key 127 update_from_dit(map_ctrl *map, datum *key) argument 143 ret = read_from_dit(map->map_name, map->domain, key, &dat); 170 dbm_delete(map->entries, *key); 373 is_special_key(datum *key) argument [all...] |
/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | tsearch.c | 41 typedef struct node { POINTER key; struct node *llink, *rlink; } NODE; member in struct:node 44 * Find or insert key into search tree 47 * key: Key to be located 52 tsearch(POINTER key, NODE **rootp, int (*compar)(POINTER, POINTER)) argument 54 NODE *q; /* New node if key not found */ 59 int r = (*compar)(key, (*rootp)->key); /* T2: */ 69 q->key = key; /* Initialize new node */ 76 * Delete node with key ke 84 tdelete(POINTER key, NODE **rootp, int (*compar)(POINTER, POINTER)) argument [all...] |
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | tsearch.c | 55 typedef struct node { char *key; struct node *llink, *rlink; } NODE; member in struct:node 60 /* Find or insert key into search tree */ 64 char *key = (char *)ky; local 66 NODE *q; /* New node if key not found */ 71 int r = (*compar)(key, (*rootp)->key); /* T2: */ 81 q->key = key; /* Initialize new node */ 87 /* Delete node with key key */ 91 char *key = (char *)ky; local [all...] |
/illumos-gate/usr/src/cmd/fm/fminject/common/ |
H A D | inj_hash.c | 56 inj_var_alloc(void *key, uintmax_t value, inj_var_t *next) argument 61 v->v_key = key; 93 inj_hash_insert(inj_hash_t *h, void *key, uintmax_t value) argument 95 size_t i = h->h_hashfn(key) % h->h_hashsz; 99 if (h->h_cmpfn(v->v_key, key) == 0) 104 v = inj_var_alloc(key, value, h->h_hash[i]); 112 inj_hash_lookup(inj_hash_t *h, void *key) argument 114 size_t i = h->h_hashfn(key) % h->h_hashsz; 118 if (h->h_cmpfn(v->v_key, key) == 0)
|
/illumos-gate/usr/src/cmd/nscd/ |
H A D | getgr.c | 64 (void) snprintf(whoami, len, "%s [key=%d]", name, argp->key.gid); 73 return (_NSC_INT_KEY_CMP(e1->key.gid, e2->key.gid)); 77 grgid_gethash(nss_XbyY_key_t *key, int htsize) { argument 78 return ((uint_t)key->gid % htsize);
|
H A D | getpw.c | 71 return (_NSC_INT_KEY_CMP(e1->key.uid, e2->key.uid)); 75 pwuid_gethash(nss_XbyY_key_t *key, int htsize) { argument 76 return ((uint_t)key->uid % htsize); 81 (void) snprintf(whoami, len, "%s [key=%d]", name, argp->key.uid);
|
/illumos-gate/usr/src/cmd/fs.d/autofs/ |
H A D | ns_nis.c | 75 getmapent_nis(key, map, ml, stack, stkptr, iswildcard, isrestricted) 76 char *key, *map; 91 nserr = yp_match(nis_mydomain, map, key, strlen(key), 101 nserr = yp_match(nis_mydomain, my_map, key, 102 strlen(key), &nisline, &nislen); 173 char *key, *nkey, *val; local 180 key = NULL; kl = 0; 221 err = yp_next(nis_mydomain, my_mapname, key, kl, 231 if (key) 315 char *key, *nkey, *val, *my_nismap; local 438 char *key = NULL, *val = NULL; local 523 char key[MAXPATHLEN]; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softMAC.c | 187 mac_init_ctx(soft_session_t *session_p, soft_object_t *key, argument 198 if (OBJ_SEC(key)->sk_value_len > MD5_SSL_PAD_AND_KEY_SIZE) { 205 /* SSL MAC is HASH(key + opad + HASH(key + ipad + data)) */ 206 (void) memcpy(md5_ipad, OBJ_SEC(key)->sk_value, 207 OBJ_SEC(key)->sk_value_len); 208 (void) memcpy(&md5_ipad[OBJ_SEC(key)->sk_value_len], 210 (void) memcpy(md5_opad, OBJ_SEC(key)->sk_value, 211 OBJ_SEC(key)->sk_value_len); 212 (void) memcpy(&md5_opad[OBJ_SEC(key) [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_ht.c | 54 static size_t ht_default_hash(HT_HANDLE *handle, const char *key); 76 * must be a power of two. The key size must be a positive integer. 77 * For null terminated keys, the key size does not need to include the 78 * null terminating character. The type of key is indicated by the 170 * on the specified key. This will identify the location for the 171 * corresponding item in the hash table. The handle and key pointers 177 ht_default_hash(HT_HANDLE *handle, const char *key) argument 183 while (*key) { 184 hash_ndx += *key; 185 ++key; 230 ht_add_item(HT_HANDLE *handle, const char *key, const void *data) argument 287 ht_replace_item(HT_HANDLE *handle, const char *key, const void *data) argument 308 ht_remove_item(HT_HANDLE *handle, const char *key) argument 372 ht_find_item(HT_HANDLE *handle, const char *key) argument [all...] |