/illumos-gate/usr/src/cmd/powertop/common/ |
H A D | suggestions.c | 66 pt_sugg_add(char *text, int weight, char key, char *sb_msg, sugg_func_t *func) argument 90 new->key = key; 117 new->key = key;
|
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/client/ |
H A D | pmUtility.java | 54 public static String getCopyrightResource(String key) { argument 67 keyvalue = bundle.getString(key); 69 Debug.error("CLNT: getCopyrightResource: Missing: " + key); 70 keyvalue = new String("<<" + key + ">>"); 76 public static String getResource(String key) { argument 89 keyvalue = bundle.getString(key); 91 Debug.error("CLNT: getResource: Missing: " + key); 92 keyvalue = new String("<<" + key + ">>"); 98 public static int getIntResource(String key) { argument 111 s = bundle.getString(key); [all...] |
/illumos-gate/usr/src/cmd/sgs/crle/common/ |
H A D | hash.c | 54 get_hash(Hash_tbl * tbl, Addr key, Half id, int mode) argument 61 hashval = elf_hash((const char *)key); 63 hashval = key; 72 (const char *)key) == 0) && ((id == 0) || 76 if (ent->e_key == key) 90 ent->e_key = key;
|
/illumos-gate/usr/src/cmd/getent/ |
H A D | dogetserv.c | 80 char key[BUFSIZ]; local 85 (void) strncpy(key, *list, sizeof (key)); 86 key[sizeof (key) - 1] = NULL; 88 if ((cp = strchr(key, '/')) != NULL) { 92 port = htons(atoi(key)); 96 sp = getservbyname(key, protocol);
|
/illumos-gate/usr/src/cmd/isns/isnsd/ |
H A D | isns_sched.h | 38 struct el_key *key; member in struct:el_notice
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keyserv_cache.h | 43 u_char key[1]; /* Binary data; allocated to correct length */ member in struct:dhkey 51 /* Convert key length in bits to bytes */ 54 /* Bytes to allocate for struct dhkey holding key of specified length (bits) */ 78 deskeyarray common, des_block key, 84 keybuf3 *public, des_block key);
|
/illumos-gate/usr/src/cmd/sgs/link_audit/common/ |
H A D | hash.h | 32 char *key; member in struct:hash_entry
|
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | certs.c | 61 * Description: Loads a public key certificate and associated private key 67 * key - Location to store resulting key if found 73 * match. If no key matches the cert, then only the cert 75 * keys are found, then the first key is returned. 79 keystore_encoding_format_t format, char *passarg, EVP_PKEY **key, 90 if (key) *key = NULL; 95 /* first try to load a DER cert, which cannot contain a key */ 78 load_cert_and_key(PKG_ERR *err, FILE *incert, keystore_encoding_format_t format, char *passarg, EVP_PKEY **key, X509 **cert) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | d3_cbc.c | 36 unsigned long length, krb5_keyblock *key, 46 if ((rv = get_algo(key->enctype, &algos)) != CKR_OK) { 53 rv = init_key_uef(krb_ctx_hSession(context), key); 69 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 71 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 113 unsigned long length, krb5_keyblock *key, 125 length, key, &ivdata, encrypt); 35 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument 110 mit_des3_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, unsigned long length, krb5_keyblock *key, const mit_des_cblock ivec, int encrypt) argument
|
H A D | ef_crypto.c | 17 long length, krb5_keyblock *key, 27 ASSERT(key != NULL); 28 ASSERT(key->contents != NULL); 45 mech.cm_type = key->kef_mt; 49 (long long)key->kef_mt); 63 &key->kef_key, 64 key->key_tmpl, 69 &key->kef_key, 70 key->key_tmpl, 16 k5_ef_crypto(const char *in, char *out, long length, krb5_keyblock *key, const krb5_data *ivec, int encrypt_flag) argument
|
H A D | f_cbc.c | 33 mit_des_cbc_encrypt(context, in, out, length, key, ivec, encrypt) 38 krb5_keyblock *key; 49 if ((rv = get_algo(key->enctype, &algos)) != CKR_OK) { 56 rv = init_key_uef(krb_ctx_hSession(context), key); 72 rv = C_EncryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 74 rv = C_DecryptInit(krb_ctx_hSession(context), &mechanism, key->hKey); 115 * The key schedule is passed as an arg, as well as the cleartext or 134 long length, krb5_keyblock *key, 147 (char *)out, length, key, &ivdata, encrypt); 131 mit_des_cbc_encrypt(krb5_context context, const mit_des_cblock *in, mit_des_cblock *out, long length, krb5_keyblock *key, mit_des_cblock ivec, int encrypt) argument
|
H A D | f_cksum.c | 17 * The key schedule is passed as an arg, as well as the cleartext or 29 unsigned long length, krb5_keyblock *key, 44 ret = k5_ef_mac(context, key, &ivecdata, 27 mit_des_cbc_cksum(krb5_context context, const krb5_octet *in, krb5_octet *out, unsigned long length, krb5_keyblock *key, const krb5_octet *ivec) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | checksum.c | 39 * Derive the key for checksum calculation. 50 const krb5_keyblock *key, 60 (krb5_keyblock *)key); 64 *outkey = krb5_create_derived_keyblock(key->length); 77 ret = krb5_derive_key(context, enc, key, 102 ret = add_derived_key((krb5_keyblock *)key, usage, 113 krb5_dk_make_checksum(context, hash, key, usage, input, output) 116 krb5_const krb5_keyblock *key; 129 if (krb5_enctypes_list[i].etype == key->enctype) 135 key 48 derive_cksum_key(krb5_context context, struct krb5_enc_provider *enc, const krb5_keyblock *key, krb5_keyusage usage, krb5_keyblock **outkey) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | des.c | 38 k5_des_docrypt(krb5_context context, krb5_const krb5_keyblock *key, argument 45 /* key->enctype was checked by the caller */ 47 if (key->length != 8) 58 (krb5_keyblock *)key, 67 k5_des_encrypt(krb5_context context, krb5_const krb5_keyblock *key, argument 71 return(k5_des_docrypt(context, key, ivec, input, output, 1)); 75 k5_des_decrypt(krb5_context context, krb5_const krb5_keyblock *key, argument 79 return(k5_des_docrypt(context, key, ivec, input, output, 0)); 84 krb5_keyblock *key) 87 if (key 83 k5_des_make_key(krb5_context context, krb5_const krb5_data *randombits, krb5_keyblock *key) argument [all...] |
H A D | des3.c | 38 krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, 46 /* key->enctype was checked by the caller */ 48 if (key->length != 24) 59 (krb5_keyblock *)key, 69 krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, 72 return(k5_des3_docrypt(context, key, ivec, input, output, 1)); 77 krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, 80 return(k5_des3_docrypt(context, key, ivec, input, output, 0)); 85 krb5_keyblock *key) 92 if (key 37 k5_des3_docrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output, int encrypt) argument 68 k5_des3_encrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument 76 k5_des3_decrypt(krb5_context context, krb5_const krb5_keyblock *key, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument 84 k5_des3_make_key(krb5_context context, krb5_const krb5_data *randombits, krb5_keyblock *key) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | etypes.c | 396 get_cipher_mech_type(krb5_context context, krb5_keyblock *key) argument 401 if (key == NULL) 406 if (kt->etype == key->enctype) { 419 get_hash_mech_type(krb5_context context, krb5_keyblock *key) argument 424 if (key == NULL) 429 if (kt->etype == key->enctype) {
|
H A D | make_checksum.c | 39 const krb5_keyblock *key, krb5_keyusage usage, 74 /* check if key is compatible */ 83 if (krb5_enctypes_list[e2].etype == key->enctype) 87 * Solaris Kerberos: The actual key encryption type could be 98 if (key->kef_key.ck_data == NULL) { 100 (krb5_keyblock *)key))) 104 if ((ret = init_key_uef(krb_ctx_hSession(context), (krb5_keyblock *)key))) 108 ret = (*(krb5_cksumtypes_list[i].keyhash->hash))(context, key, 113 (krb5_keyblock *)key); 115 (krb5_keyblock *)key); 38 krb5_c_make_checksum(krb5_context context, krb5_cksumtype cksumtype, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *input, krb5_checksum *cksum) argument [all...] |
H A D | verify_checksum.c | 37 krb5_c_verify_checksum(krb5_context context, const krb5_keyblock *key, argument 64 context, key, usage, 0, data, &indata, valid)); 76 if ((ret = krb5_c_make_checksum(context, cksum->checksum_type, key, usage,
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/hash_provider/ |
H A D | hash_kef_generic.c | 89 krb5_keyblock *key, 135 rv = crypto_mac(&mech, &d1, &key->kef_key, key->key_tmpl, &d2, NULL); 88 k5_ef_mac(krb5_context context, krb5_keyblock *key, krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_encrypt.c | 54 const krb5_keyblock *key, krb5_keyusage usage, 58 return((*(enc->encrypt))(context, key, ivec, input, output)); 51 krb5_raw_encrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_set.c | 38 void *key; member in struct:_g_set_elt 65 int g_set_entry_add(g_set_elt *s, void *key, void *value) argument 72 first->key = key; 81 int g_set_entry_delete(g_set_elt *s, void *key) argument 86 if ((*p)->key == key) { 98 int g_set_entry_get(g_set_elt *s, void *key, void **value) argument 103 if (p->key == key) { [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_ctxops.c | 52 * key: pointer to a crypto_key_t structure. 76 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, argument 108 error = KCF_PROV_CREATE_CTX_TEMPLATE(pd, &prov_mech, key,
|
/illumos-gate/usr/src/psm/promif/ieee1275/sun4u/ |
H A D | prom_starcat.c | 101 * associated with 'key', into the memory indicated by 'buf'. Although there is 107 prom_starcat_iosram_read(uint32_t key, uint32_t offset, uint32_t len, argument 139 ci[6] = p1275_uint2cell(key); 162 * the IOSRAM chunk associated with 'key', starting at 'offset'. Although there 168 prom_starcat_iosram_write(uint32_t key, uint32_t offset, uint32_t len, argument 200 ci[6] = p1275_uint2cell(key);
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/ |
H A D | search.h | 55 char *key; member in struct:entry
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/recno/ |
H A D | rec_close.c | 119 DBT data, key; local 149 key.size = sizeof(recno_t); 150 key.data = &trec; 158 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 162 status = (dbp->seq)(dbp, &key, &data, R_NEXT); 168 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 174 status = (dbp->seq)(dbp, &key, &data, R_NEXT);
|