/illumos-gate/usr/src/lib/libast/common/comp/ |
H A D | tsearch.c | 61 Void_t* key; member in struct:_tree_s 88 { { sizeof(Dtlink_t), -1, /* object is key */ 101 Void_t* tsearch(const Void_t* key, Void_t** rootp, argument 104 Void_t* tsearch(key, rootp, comparf) 105 Void_t* key; 120 if(!(o = (Tree_t*)dtmatch(dt,key)) ) 123 o->key = (Void_t*)key; 132 return (Void_t*)(&o->key); 137 Void_t* tfind(const Void_t* key, Void_ argument 163 tdelete(const Void_t* key, Void_t** rootp, int(*comparf)(const Void_t*, const Void_t*) ) argument [all...] |
/illumos-gate/usr/src/lib/libnisdb/yptol/ |
H A D | shim.c | 35 * NOTE : There is a major bug/feature in dbm. A key obtained by 38 * and the static strings pointed to by the key are destroyed. The 41 * key data in malloced memory. This is freed when map_ctrl is 116 shim_dbm_delete(DBM *db, datum key) argument 130 dbm_delete(map->ttl, key); 133 ret = dbm_delete(map->entries, key); 152 shim_dbm_fetch(DBM *db, datum key) argument 165 if (SUCCESS == update_entry_if_required(map, &key)) { 167 ret = dbm_fetch(map->entries, key); 171 ret = dbm_fetch(map->entries, key); 191 shim_dbm_fetch_noupdate(DBM *db, datum key) argument 454 shim_dbm_store(DBM *db, datum key, datum content, int store_mode) argument 565 datum key; local [all...] |
/illumos-gate/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_namespace.c | 44 * (by key) 50 mdkey_t key, 63 nm.key = key; 87 * (by key) 173 * (by key) 179 mdkey_t key, 189 nm.key = key; 203 * (by key) 47 meta_getnmentbykey( set_t setno, side_t sideno, mdkey_t key, char **drvnm, minor_t *mnum, md_dev64_t *dev, md_error_t *ep ) argument 176 meta_getdidminorbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 206 meta_getdidbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 258 meta_setdid( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 318 meta_getnmbykey( set_t setno, side_t sideno, mdkey_t key, md_error_t *ep ) argument 335 meta_getnmentbydev( set_t setno, side_t sideno, md_dev64_t dev, char **drvnm, minor_t *mnum, mdkey_t *key, md_error_t *ep ) argument 398 add_name( mdsetname_t *sp, side_t sideno, mdkey_t key, char *dname, minor_t mnum, char *bname, char *minorname, ddi_devid_t devid, md_error_t *ep ) argument 437 del_name( mdsetname_t *sp, side_t sideno, mdkey_t key, md_error_t *ep ) argument 537 mdkey_t key = MD_KEYWILD; local 734 mdkey_t key; local 833 del_self_name( mdsetname_t *sp, mdkey_t key, md_error_t *ep ) argument [all...] |
/illumos-gate/usr/src/lib/nsswitch/files/common/ |
H A D | tsol_gettpent.c | 43 keyp = args->key.name; 63 if (argp->key.name == NULL) 66 return (_nss_files_XY_all(be, argp, 1, argp->key.name, check_name));
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | read_servi.c | 28 * It is a convenience function that reads a key out of a keytab. 41 * principal, vno, and enctype and returns the resulting key in *key 47 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 77 krb5_copy_keyblock(context, &entry.key, key);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | enc_helper.c | 30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument 35 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length, 46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
|
H A D | decode_kdc.c | 34 *key, putting result in *rep. 46 krb5_decode_kdc_rep(krb5_context context, krb5_data *enc_rep, const krb5_keyblock *key, krb5_kdc_rep **dec_rep) argument 70 if ((retval = krb5_kdc_rep_decrypt_proc(context, key, &usage,
|
/illumos-gate/usr/src/cmd/ypcmd/ |
H A D | ypserv_map.c | 69 datum key; local 76 key.dptr = yp_last_modified; 77 key.dsize = yp_last_modified_sz; 78 val = dbm_fetch(fdb, key); 114 datum key; local 117 key.dptr = yp_master_name; 118 key.dsize = yp_master_name_sz; 119 val = dbm_fetch(fdb, key); 247 datum key; local 250 key [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | descbc.c | 44 krb5_const krb5_keyblock *key, 52 if (key->length != MIT_DES_KEYSIZE) 64 ret = k5_ef_mac(context, (krb5_keyblock *)key, 43 k5_descbc_hash(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/lib/udapl/udapl_tavor/include/ |
H A D | dapl_hash.h | 99 IN DAPL_HASH_KEY key, 105 IN DAPL_HASH_KEY key, 111 IN DAPL_HASH_KEY key,
|
/illumos-gate/usr/src/cmd/refer/ |
H A D | inv2.c | 27 * reads key lines from inf; hashes and writes on outf; 28 * writes orig key on recf, records pointer on outf too. 36 char key[30], bkeys[40]; local 74 printf("key %s hash %d\n", 78 strcpy(key, keyv[nk]); 79 for (s = key; *s; s++) 87 if (s > key) 89 hash(key)%nhash, lp); 90 s = key;
|
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | property.h | 50 HalProperty *hal_property_new_string (const char *key, 52 HalProperty *hal_property_new_int (const char *key, 54 HalProperty *hal_property_new_uint64 (const char *key, 56 HalProperty *hal_property_new_bool (const char *key, 58 HalProperty *hal_property_new_double (const char *key, 60 HalProperty *hal_property_new_strlist (const char *key);
|
/illumos-gate/usr/src/lib/fm/libdiagcode/common/ |
H A D | diagcode.h | 58 /* return number of strings in key for a given dictionary, plus 1 for null */ 61 /* given a key, construct a diagcode */ 63 const char *key[], char *code, size_t maxcode); 65 /* given a diagcode, return the key (array of strings) */ 67 char *key[], int maxkey);
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | dst_internal.h | 37 char *dk_key_name; /*%< name of the key */ 38 int dk_key_size; /*%< this is the size of the key in bits */ 39 int dk_proto; /*%< what protocols this key can be used for */ 40 int dk_alg; /*%< algorithm number from key record */ 41 u_int32_t dk_flags; /*%< and the flags of the public key */ 42 u_int16_t dk_id; /*%< identifier of the key */ 43 void *dk_KEY_struct; /*%< pointer to key in crypto pkg fmt */ 60 /* suffixes for key file names */ 62 #define PUBLIC_KEY "key" 80 int (*sign)(const int mode, DST_KEY *key, voi [all...] |
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | lfind.c | 59 char *key = (char *)ky; local 64 if ((*compar)(key, base) == 0)
|
H A D | hsearch.c | 175 new->key = malloc((unsigned)strlen(line) + 1); 176 if (new->key == NULL) { 180 (void) strcpy(new->key, line); 194 printf("Key = %s, Value = %d\n", res->key, *res->data); 293 i = HASH(item.key); /* Primary hash on key */ 300 if (table[i].key == NULL) /* Empty slot? */ 302 else if (COMPARE(table[i].key, item.key) == 0) /* Match? */ 306 c = HASH2(item.key); /* N 493 hashm(POINTER key) argument 505 hash2m(POINTER key) argument 515 crunch(POINTER key) argument [all...] |
/illumos-gate/usr/src/head/rpcsvc/ |
H A D | ypupd.h | 79 yp_buf key; member in struct:ypupdate_args 87 yp_buf key; member in struct:ypdelete_args
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | f_cbc.c | 33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt) 38 krb5_keyblock *key; 49 if ((rv = get_algo(key->enctype, &algos)) != CKR_OK) { 56 rv = init_key_uef(krb_ctx_hSession(context), key); 72 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 74 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 115 * The key schedule is passed as an arg, as well as the cleartext or 134 long length, krb5_keyblock *key, 147 (char *)out, length, key, &ivdata, encrypt); 131 mit_des_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, long length, krb5_keyblock *key, mit_des_cblock ivec, int encrypt) argument
|
H A D | f_cksum.c | 17 * The key schedule is passed as an arg, as well as the cleartext or 29 unsigned long length, krb5_keyblock *key, 44 ret = k5_ef_mac(context, key, &ivecdata, 27 mit_des_cbc_cksum(krb5_context context, const krb5_octet *in, krb5_octet *out, unsigned long length, krb5_keyblock *key, const krb5_octet *ivec) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_encrypt.c | 54 const krb5_keyblock *key, krb5_keyusage usage, 58 return((*(enc->encrypt))(context, key, ivec, input, output)); 51 krb5_raw_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_crypt.c | 70 kg_confounder_size(context, key) 72 krb5_keyblock *key; 77 if (key->enctype == ENCTYPE_ARCFOUR_HMAC) 79 code = krb5_c_block_size(context, key->enctype, &blocksize); 87 kg_make_confounder(context, key, buf) 89 krb5_keyblock *key; 96 code = krb5_c_block_size(context, key->enctype, &blocksize); 107 kg_encrypt_size(context, key, n) 109 krb5_keyblock *key; 114 if (krb5_c_encrypt_length(context, key [all...] |
/illumos-gate/usr/src/common/crypto/rsa/ |
H A D | rsa_impl.c | 108 RSA_key_init(RSAkey *key, int psize, int qsize) argument 117 key->size = psize + qsize; 118 if ((err = big_init(&(key->p), plen)) != BIG_OK) 120 if ((err = big_init(&(key->q), qlen)) != BIG_OK) 122 if ((err = big_init(&(key->n), nlen)) != BIG_OK) 124 if ((err = big_init(&(key->d), nlen)) != BIG_OK) 126 if ((err = big_init(&(key->e), nlen)) != BIG_OK) 128 if ((err = big_init(&(key->dmodpminus1), plen)) != BIG_OK) 130 if ((err = big_init(&(key->dmodqminus1), qlen)) != BIG_OK) 132 if ((err = big_init(&(key 168 RSA_key_finish(RSAkey *key) argument 187 generate_rsa_key(RSAkey *key, int psize, int qsize, BIGNUM *pubexp, int (*rfunc)(void *, size_t)) argument [all...] |
/illumos-gate/usr/src/lib/libsecdb/common/ |
H A D | secdb.c | 42 * kva_match(): Given a key-value array and a key, return a pointer to the 43 * value that matches the key. 46 kva_match(kva_t *kva, char *key) argument 51 if (kva == NULL || key == NULL) { 56 if (strcmp(data[i].key, key) == 0) { 78 if (data[i].key != NULL) { 79 free(data[i].key); 80 data[i].key 96 _kva_free_value(kva_t *kva, char *key) argument 149 char *key; local 233 _insert2kva(kva_t *kva, char *key, char *value) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.c | 42 soft_rsa_encrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len, argument 55 rv = soft_get_public_value(key, CKA_PUBLIC_EXPONENT, expo, 61 rv = soft_get_private_value(key, CKA_PRIVATE_EXPONENT, expo, 68 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len); 88 soft_rsa_decrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len, argument 108 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len); 113 rv = soft_get_private_value(key, CKA_PRIME_1, prime1, &prime1_len); 116 rv = soft_rsa_encrypt(key, in, in_len, out, 0); 123 rv = soft_get_private_value(key, CKA_PRIME_2, prime2, &prime2_len); 126 rv = soft_rsa_encrypt(key, i 246 soft_object_t *key = rsa_ctx->key; local 336 soft_object_t *key = rsa_ctx->key; local 530 soft_object_t *key = rsa_ctx->key; local 647 soft_object_t *key = rsa_ctx->key; local 747 soft_genRSAkey_set_attribute(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *buf, uint32_t buflen, boolean_t public) argument 983 soft_object_t *key = rsa_ctx->key; local 1098 soft_object_t *key = rsa_ctx->key; local 1182 soft_object_t *key = rsa_ctx->key; local [all...] |
/illumos-gate/usr/src/common/crypto/arcfour/sun4v/ |
H A D | arcfour_crypt.c | 28 /* Initialize the key stream 'key' using the key value */ 30 arcfour_key_init(ARCFour_key *key, uchar_t *keyval, int keyvallen) argument 43 key->arr[i] = (uchar_t)i; 47 j = (j + key->arr[i] + ext_keyval[i]) % 256; 48 tmp = key->arr[i]; 49 key->arr[i] = key->arr[j]; 50 key 62 arcfour_crypt(ARCFour_key *key, uchar_t *in, uchar_t *out, size_t len) argument [all...] |