/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_nis.c | 113 "Return value of a key", /* 3 */ 114 "Return first key-value pair in map", /* 4 */ 115 "Return next key-value pair in map", /* 5 */ 118 "Get all key-value pairs in map", /* 8 */ 258 char *dom, *map, *key; local 298 key = getxdr_string(buff3, YPMAXRECORD); 301 key, map); 350 (void) sprintf(line, " key=%s", 369 (void) sprintf(line, " key=%s", 590 case YP_NOKEY: str = "No such key"; brea [all...] |
/illumos-gate/usr/src/cmd/crypt/ |
H A D | crypt.c | 113 char key[8]; local 118 if ((buf = (char *)getpass("Enter key:")) == NULL) { 130 if (read(0, key, 8) != 8) 132 setup(key); 141 (void) strncpy(key, s, 8); 142 setup(key); 147 "usage: crypt [ -k ] [ key]\n");
|
/illumos-gate/usr/src/cmd/devmgmt/cmds/ |
H A D | devfree.c | 34 * devfree key [device [...]] 81 * M_INVKEY Invalid key specified 83 * M_NOTONKEY Attempting to free with wrong key 89 #define M_USAGE "usage: devfree key [device [...]]" 90 #define M_INVKEY "Invalid key: %s" 116 * devfree key [device [device [...]]] 124 * key The key on which the device to free was allocated on. 127 * using the key are freed. 148 int key; /* Ke 146 int key; /* Key for locking */ local [all...] |
/illumos-gate/usr/src/cmd/sendmail/db/dbm/ |
H A D | dbm.c | 102 __db_dbm_fetch(key) 103 datum key; 112 return (dbm_fetch(__cur_db, key)); 129 __db_dbm_nextkey(key) 130 datum key; 134 COMPQUIET(key.dsize, 0); 145 __db_dbm_delete(key) 146 datum key; 152 return (dbm_delete(__cur_db, key)); 156 __db_dbm_store(key, da 293 datum key; local 328 datum key; local [all...] |
/illumos-gate/usr/src/cmd/sgs/libld/common/ |
H A D | order.c | 70 * using a non-sorted section as a sort key. 95 * sh_info must be unsorted, and is used as the sort key. 106 * the section to use as a sort key and sh_info is set to 0. The standard 114 * be used as a sort key for a ordered section. Verify that the given 128 * Validate the key range. 210 * unorderd section which will be used as a sort key. 303 * Obtain the sort key section index for this ordered section. 313 * Validate the sort key section index. If something is wrong, 367 * sort key. Propagate the key requiremen 393 Word key = 1; local [all...] |
/illumos-gate/usr/src/cmd/abi/spectrans/parser/ |
H A D | extends.c | 38 static int find_fun(char *key, char *value, char *parentfun); 50 buf[BUFSIZ], key[20]; local 136 split(buf2, key, localvalue); 137 if ((found = find_fun(key, localvalue, parentfun))) { 216 split(buf2, key, localvalue); 217 ki = interesting_keyword(keywordlist, key); 236 "uninteresting keyword: %s\n", key); 269 * given a key value pair, and the name of the function you are 275 find_fun(char *key, char *value, char *parentfun) argument 279 if (strcasecmp(key, "functio 315 char key[20], buf[BUFSIZ], *buf2 = NULL, *localvalue = NULL, *p; local [all...] |
/illumos-gate/usr/src/cmd/acct/ |
H A D | acctdusg.c | 141 int key = HASHKEY(uid); local 151 curdisk->next = usglist[key]; 152 usglist[key] = curdisk;
|
/illumos-gate/usr/src/cmd/avs/dsw/ |
H A D | iicpshd.c | 72 char key[CFG_MAX_KEY]; variable 261 (void) snprintf(key, sizeof (key), token, i); 262 if (cfg_get_cstring(cfg, key, buf, DSW_NAMELEN) < 0) { 268 (void) snprintf(key, sizeof (key), 270 (void) cfg_get_cstring(cfg, key, 324 (void) sprintf(key, SHADOW_TOKEN, set_number); 325 if (cfg_put_cstring(cfg, key, new_shadow, len) < 0) { 329 (void) sprintf(key, SV_TOKE [all...] |
/illumos-gate/usr/src/cmd/avs/errgen/ |
H A D | errgen.c | 58 static char key[SPCS_S_MAXKEY]; variable 66 static char key[SPCS_S_MAXKEY]; variable 166 (void) sprintf(keystring, "%s_E%s", modname, key); 347 (void) strcpy(key, tline); 348 if (strlen(key) == 0) {
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 43 KMF_KEY_HANDLE key; local 52 gettext("A key label must be specified \n")); 60 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE)); 70 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE)); 114 KMF_KEY_HANDLE key; local 128 gettext("A key label must be specified \n")); 164 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE)); 174 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE)); 217 gettext("Warning: can not reveal the key value " 218 "for a sensitive or non-extractable key 259 KMF_KEY_HANDLE key; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/ |
H A D | hashset.c | 45 * the actual key data only through the hash and equal functions given 53 const void *e_key; /* Pointer to a key */ 86 * - the function hash(key) is used to compute hash values for keys; if 129 * Return a pointer to a matching key 133 h_get(const HASHSET h, void *key) argument 135 uint_t hash = h->h_hash(key); 140 if (e->e_hash == hash && h->h_equal(e->e_key, key)) 180 * Store a key into a HASHSET 181 * - if there is already an "equal" key then the new key wil 187 h_put(HASHSET h, const void *key) argument 223 h_delete(HASHSET h, const void *key) argument 268 const void *key; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/ |
H A D | srvenum.c | 407 static uchar_t key[16]; local 418 err = smb_fh_getssnkey(fd, key, sizeof (key));
|
H A D | srvinfo.c | 386 static uchar_t key[16]; local 397 err = smb_fh_getssnkey(fd, key, sizeof (key));
|
/illumos-gate/usr/src/cmd/hal/tools/ |
H A D | hal_set_property.c | 72 "usage : hal-set-property --udi <udi> --key <key>\n" 79 " --key Key of the property to set\n" 111 char *key = NULL; local 134 {"key", 1, NULL, 0}, 161 } else if (strcmp (opt, "key") == 0) { 162 key = strdup (optarg); 256 rc = libhal_device_remove_property (hal_ctx, udi, key, &error); 269 rc = libhal_device_set_property_string (hal_ctx, udi, key, str_value, &error); 272 rc = libhal_device_set_property_int (hal_ctx, udi, key, int_valu [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksetpw.c | 335 krb5_keyblock key; local 360 code = krb5_c_string_to_key(ctx, enctype, &password, &salt, &key); 369 (void) memcpy(&entry->key, &key, sizeof (krb5_keyblock));
|
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/ |
H A D | ktutil_funcs.c | 97 * password or key. If the keytab list is NULL, allocate a new 116 krb5_keyblock key; local 183 &salt, &key); 188 memcpy(&lp->entry->key, &key, sizeof(krb5_keyblock)); 202 fprintf(stderr, "addent: %s", gettext("Error reading key.\n")); 207 lp->entry->key.enctype = enctype; 208 lp->entry->key.contents = (krb5_octet *) malloc((strlen(buf) + 1) / 2); 209 if (!lp->entry->key.contents) { 218 gettext("Illegal character in key 388 des_cblock key; local [all...] |
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | addcert.c | 60 * private key. 87 EVP_PKEY *key = NULL; local 146 /* for trusted certs, we cannot have a private key */ 171 * if specific key file supplied, open it, otherwise open 279 /* first, try to load user certificate and key */ 281 &key, &cert) != 0) { 293 if (key == NULL) { 296 * a key, try to load it from the key file 303 "Loading private key < [all...] |
/illumos-gate/usr/src/cmd/truss/ |
H A D | htbl.c | 83 free(prev->key); 84 prev->key = NULL; 119 add_fcall(htbl_t *htp, char *lib, char *key, unsigned long cnt) argument 126 bucket = hash_str(key, htp->size); 133 if (strcmp(tmp->key, key) == 0) { 149 new->key = strdup(key); 150 if (new->key == NULL)
|
H A D | htbl.h | 42 char *key; /* hash key (function name) */ member in struct:hentry 78 size_t sz_key; /* size of key string on disk */ 79 unsigned long count; /* count of occurrances of key */
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | derive.c | 38 * Search for a derived key based on the input key, 41 * Return *derived key on success, NULL on failure. 45 krb5_keyblock *key) 47 krb5_dk_node *dknode = key->dk_list; 64 * Add a derived key to the dk_list for the indicated key. 67 add_derived_key(krb5_keyblock *key, argument 75 if (key->dk_list == NULL) { 76 key 44 find_derived_key(krb5_keyusage usage, uchar_t dkid, krb5_keyblock *key) argument 107 krb5_keyblock *key = MALLOC(sizeof(krb5_keyblock)); local 136 init_derived_keydata(krb5_context context, const struct krb5_enc_provider *enc, krb5_keyblock *key, krb5_keyusage usage, krb5_keyblock **d_encr_key, krb5_keyblock **d_hmac_key) argument [all...] |
H A D | dk_encrypt.c | 61 const krb5_keyblock *key, krb5_keyusage usage, 77 * from the original key's DK list. 80 (krb5_keyblock *)key, 119 * Always use the derived encryption key here. 223 const krb5_keyblock *key, 239 * from the original key's DK list. 242 (krb5_keyblock *)key, 254 /* key->length, ivec will be tested in enc->encrypt */ 58 krb5_dk_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument 220 krb5int_aes_dk_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 16 /* from a random bitstrem, construct a key */ 23 const krb5_keyblock *key, 34 if ((rv = get_algo(key->enctype, algos)) != CKR_OK) { 53 template[4].pValue = key->contents; 54 template[4].ulValueLen = key->length; 56 /* Create an object handle for the key */ 74 const krb5_keyblock *key, const krb5_data *state, 90 if (key->length != 16) 104 * Normally, the RC4 key is used as a single operation 107 * use a short-term key objec 22 setup_arcfour_crypto(CK_SESSION_HANDLE session, const krb5_keyblock *key, KRB5_MECH_TO_PKCS *algos, CK_OBJECT_HANDLE *hKey) argument 73 k5_arcfour_decrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument 190 k5_arcfour_encrypt(krb5_context context, const krb5_keyblock *key, const krb5_data *state, const krb5_data *input, krb5_data *output) argument 297 k5_arcfour_make_key(krb5_context context, const krb5_data *randombits, krb5_keyblock *key) argument 328 k5_arcfour_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage keyusage, krb5_data *new_state) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_validate.c | 86 DBT key; local 105 key.data = &vk; 106 key.size = sizeof(vk); 108 ret = ((*((*vdb)->put))(*vdb, &key, &dbtone, 0) == 0); 147 DBT key, value; local 162 key.data = &vk; 163 key.size = sizeof(vk); 165 if ((*((*vdb)->get))(*vdb, &key, &value, 0)) { 206 DBT key; local 221 key [all...] |
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_sign.c | 77 * Compute HMAC-MD5 of packet data, using the stored MAC key. 87 crypto_data_t key; local 136 key.cd_format = CRYPTO_DATA_RAW; 137 key.cd_offset = 0; 138 key.cd_length = vcp->vc_mackeylen; 139 key.cd_miscdata = 0; 140 key.cd_raw.iov_base = (char *)vcp->vc_mackey; 141 key.cd_raw.iov_len = vcp->vc_mackeylen; 142 status = crypto_digest_update(crypto_ctx, &key, 0); 211 * Signing is required, but we have no key ye [all...] |
/illumos-gate/usr/src/tools/ctf/cvt/ |
H A D | strtab.c | 87 strtab_hash(const char *key, size_t *len) argument 93 for (p = key; *p != '\0'; p++, n++) {
|