Searched defs:key (Results 251 - 275 of 889) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dsnoop_nis.c113 "Return value of a key", /* 3 */
114 "Return first key-value pair in map", /* 4 */
115 "Return next key-value pair in map", /* 5 */
118 "Get all key-value pairs in map", /* 8 */
258 char *dom, *map, *key; local
298 key = getxdr_string(buff3, YPMAXRECORD);
301 key, map);
350 (void) sprintf(line, " key=%s",
369 (void) sprintf(line, " key=%s",
590 case YP_NOKEY: str = "No such key"; brea
[all...]
/illumos-gate/usr/src/cmd/crypt/
H A Dcrypt.c113 char key[8]; local
118 if ((buf = (char *)getpass("Enter key:")) == NULL) {
130 if (read(0, key, 8) != 8)
132 setup(key);
141 (void) strncpy(key, s, 8);
142 setup(key);
147 "usage: crypt [ -k ] [ key]\n");
/illumos-gate/usr/src/cmd/devmgmt/cmds/
H A Ddevfree.c34 * devfree key [device [...]]
81 * M_INVKEY Invalid key specified
83 * M_NOTONKEY Attempting to free with wrong key
89 #define M_USAGE "usage: devfree key [device [...]]"
90 #define M_INVKEY "Invalid key: %s"
116 * devfree key [device [device [...]]]
124 * key The key on which the device to free was allocated on.
127 * using the key are freed.
148 int key; /* Ke
146 int key; /* Key for locking */ local
[all...]
/illumos-gate/usr/src/cmd/sendmail/db/dbm/
H A Ddbm.c102 __db_dbm_fetch(key)
103 datum key;
112 return (dbm_fetch(__cur_db, key));
129 __db_dbm_nextkey(key)
130 datum key;
134 COMPQUIET(key.dsize, 0);
145 __db_dbm_delete(key)
146 datum key;
152 return (dbm_delete(__cur_db, key));
156 __db_dbm_store(key, da
293 datum key; local
328 datum key; local
[all...]
/illumos-gate/usr/src/cmd/sgs/libld/common/
H A Dorder.c70 * using a non-sorted section as a sort key.
95 * sh_info must be unsorted, and is used as the sort key.
106 * the section to use as a sort key and sh_info is set to 0. The standard
114 * be used as a sort key for a ordered section. Verify that the given
128 * Validate the key range.
210 * unorderd section which will be used as a sort key.
303 * Obtain the sort key section index for this ordered section.
313 * Validate the sort key section index. If something is wrong,
367 * sort key. Propagate the key requiremen
393 Word key = 1; local
[all...]
/illumos-gate/usr/src/cmd/abi/spectrans/parser/
H A Dextends.c38 static int find_fun(char *key, char *value, char *parentfun);
50 buf[BUFSIZ], key[20]; local
136 split(buf2, key, localvalue);
137 if ((found = find_fun(key, localvalue, parentfun))) {
216 split(buf2, key, localvalue);
217 ki = interesting_keyword(keywordlist, key);
236 "uninteresting keyword: %s\n", key);
269 * given a key value pair, and the name of the function you are
275 find_fun(char *key, char *value, char *parentfun) argument
279 if (strcasecmp(key, "functio
315 char key[20], buf[BUFSIZ], *buf2 = NULL, *localvalue = NULL, *p; local
[all...]
/illumos-gate/usr/src/cmd/acct/
H A Dacctdusg.c141 int key = HASHKEY(uid); local
151 curdisk->next = usglist[key];
152 usglist[key] = curdisk;
/illumos-gate/usr/src/cmd/avs/dsw/
H A Diicpshd.c72 char key[CFG_MAX_KEY]; variable
261 (void) snprintf(key, sizeof (key), token, i);
262 if (cfg_get_cstring(cfg, key, buf, DSW_NAMELEN) < 0) {
268 (void) snprintf(key, sizeof (key),
270 (void) cfg_get_cstring(cfg, key,
324 (void) sprintf(key, SHADOW_TOKEN, set_number);
325 if (cfg_put_cstring(cfg, key, new_shadow, len) < 0) {
329 (void) sprintf(key, SV_TOKE
[all...]
/illumos-gate/usr/src/cmd/avs/errgen/
H A Derrgen.c58 static char key[SPCS_S_MAXKEY]; variable
66 static char key[SPCS_S_MAXKEY]; variable
166 (void) sprintf(keystring, "%s_E%s", modname, key);
347 (void) strcpy(key, tline);
348 if (strlen(key) == 0) {
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkey.c43 KMF_KEY_HANDLE key; local
52 gettext("A key label must be specified \n"));
60 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE));
70 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE));
114 KMF_KEY_HANDLE key; local
128 gettext("A key label must be specified \n"));
164 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE));
174 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE));
217 gettext("Warning: can not reveal the key value "
218 "for a sensitive or non-extractable key
259 KMF_KEY_HANDLE key; local
[all...]
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/
H A Dhashset.c45 * the actual key data only through the hash and equal functions given
53 const void *e_key; /* Pointer to a key */
86 * - the function hash(key) is used to compute hash values for keys; if
129 * Return a pointer to a matching key
133 h_get(const HASHSET h, void *key) argument
135 uint_t hash = h->h_hash(key);
140 if (e->e_hash == hash && h->h_equal(e->e_key, key))
180 * Store a key into a HASHSET
181 * - if there is already an "equal" key then the new key wil
187 h_put(HASHSET h, const void *key) argument
223 h_delete(HASHSET h, const void *key) argument
268 const void *key; local
[all...]
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/
H A Dsrvenum.c407 static uchar_t key[16]; local
418 err = smb_fh_getssnkey(fd, key, sizeof (key));
H A Dsrvinfo.c386 static uchar_t key[16]; local
397 err = smb_fh_getssnkey(fd, key, sizeof (key));
/illumos-gate/usr/src/cmd/hal/tools/
H A Dhal_set_property.c72 "usage : hal-set-property --udi <udi> --key <key>\n"
79 " --key Key of the property to set\n"
111 char *key = NULL; local
134 {"key", 1, NULL, 0},
161 } else if (strcmp (opt, "key") == 0) {
162 key = strdup (optarg);
256 rc = libhal_device_remove_property (hal_ctx, udi, key, &error);
269 rc = libhal_device_set_property_string (hal_ctx, udi, key, str_value, &error);
272 rc = libhal_device_set_property_int (hal_ctx, udi, key, int_valu
[all...]
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/
H A Dksetpw.c335 krb5_keyblock key; local
360 code = krb5_c_string_to_key(ctx, enctype, &password, &salt, &key);
369 (void) memcpy(&entry->key, &key, sizeof (krb5_keyblock));
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/
H A Dktutil_funcs.c97 * password or key. If the keytab list is NULL, allocate a new
116 krb5_keyblock key; local
183 &salt, &key);
188 memcpy(&lp->entry->key, &key, sizeof(krb5_keyblock));
202 fprintf(stderr, "addent: %s", gettext("Error reading key.\n"));
207 lp->entry->key.enctype = enctype;
208 lp->entry->key.contents = (krb5_octet *) malloc((strlen(buf) + 1) / 2);
209 if (!lp->entry->key.contents) {
218 gettext("Illegal character in key
388 des_cblock key; local
[all...]
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/
H A Daddcert.c60 * private key.
87 EVP_PKEY *key = NULL; local
146 /* for trusted certs, we cannot have a private key */
171 * if specific key file supplied, open it, otherwise open
279 /* first, try to load user certificate and key */
281 &key, &cert) != 0) {
293 if (key == NULL) {
296 * a key, try to load it from the key file
303 "Loading private key <
[all...]
/illumos-gate/usr/src/cmd/truss/
H A Dhtbl.c83 free(prev->key);
84 prev->key = NULL;
119 add_fcall(htbl_t *htp, char *lib, char *key, unsigned long cnt) argument
126 bucket = hash_str(key, htp->size);
133 if (strcmp(tmp->key, key) == 0) {
149 new->key = strdup(key);
150 if (new->key == NULL)
H A Dhtbl.h42 char *key; /* hash key (function name) */ member in struct:hentry
78 size_t sz_key; /* size of key string on disk */
79 unsigned long count; /* count of occurrances of key */
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/
H A Dderive.c38 * Search for a derived key based on the input key,
41 * Return *derived key on success, NULL on failure.
45 krb5_keyblock *key)
47 krb5_dk_node *dknode = key->dk_list;
64 * Add a derived key to the dk_list for the indicated key.
67 add_derived_key(krb5_keyblock *key, argument
75 if (key->dk_list == NULL) {
76 key
44 find_derived_key(krb5_keyusage usage, uchar_t dkid, krb5_keyblock *key) argument
107 krb5_keyblock *key = MALLOC(sizeof(krb5_keyblock)); local
136 init_derived_keydata(krb5_context context, const struct krb5_enc_provider *enc, krb5_keyblock *key, krb5_keyusage usage, krb5_keyblock **d_encr_key, krb5_keyblock **d_hmac_key) argument
[all...]
H A Ddk_encrypt.c61 const krb5_keyblock *key, krb5_keyusage usage,
77 * from the original key's DK list.
80 (krb5_keyblock *)key,
119 * Always use the derived encryption key here.
223 const krb5_keyblock *key,
239 * from the original key's DK list.
242 (krb5_keyblock *)key,
254 /* key->length, ivec will be tested in enc->encrypt */
58 krb5_dk_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
220 krb5int_aes_dk_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Darcfour_provider.c16 /* from a random bitstrem, construct a key */
23 const krb5_keyblock *key,
34 if ((rv = get_algo(key->enctype, algos)) != CKR_OK) {
53 template[4].pValue = key->contents;
54 template[4].ulValueLen = key->length;
56 /* Create an object handle for the key */
74 const krb5_keyblock *key, const krb5_data *state,
90 if (key->length != 16)
104 * Normally, the RC4 key is used as a single operation
107 * use a short-term key objec
22 setup_arcfour_crypto(CK_SESSION_HANDLE session, const krb5_keyblock *key, KRB5_MECH_TO_PKCS *algos, CK_OBJECT_HANDLE *hKey) argument
73 k5_arcfour_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument
190 k5_arcfour_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument
297 k5_arcfour_make_key(krb5_context context, const krb5_data *randombits, krb5_keyblock *key) argument
328 k5_arcfour_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage keyusage, krb5_data *new_state) argument
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dutil_validate.c86 DBT key; local
105 key.data = &vk;
106 key.size = sizeof(vk);
108 ret = ((*((*vdb)->put))(*vdb, &key, &dbtone, 0) == 0);
147 DBT key, value; local
162 key.data = &vk;
163 key.size = sizeof(vk);
165 if ((*((*vdb)->get))(*vdb, &key, &value, 0)) {
206 DBT key; local
221 key
[all...]
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/
H A Dsmb_sign.c77 * Compute HMAC-MD5 of packet data, using the stored MAC key.
87 crypto_data_t key; local
136 key.cd_format = CRYPTO_DATA_RAW;
137 key.cd_offset = 0;
138 key.cd_length = vcp->vc_mackeylen;
139 key.cd_miscdata = 0;
140 key.cd_raw.iov_base = (char *)vcp->vc_mackey;
141 key.cd_raw.iov_len = vcp->vc_mackeylen;
142 status = crypto_digest_update(crypto_ctx, &key, 0);
211 * Signing is required, but we have no key ye
[all...]
/illumos-gate/usr/src/tools/ctf/cvt/
H A Dstrtab.c87 strtab_hash(const char *key, size_t *len) argument
93 for (p = key; *p != '\0'; p++, n++) {

Completed in 124 milliseconds

<<11121314151617181920>>