Searched refs:keys (Results 1 - 25 of 108) sorted by relevance

12345

/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dksslutil.c50 KMF_RAW_KEY_DATA *keys; local
55 keys = NULL;
68 &ncerts, &keys, &nkeys);
83 if (keys != NULL) {
85 kmf_free_raw_key(&keys[i]);
86 free(keys);
88 keys = NULL;
91 *rsa = keys;
97 * Parse a PEM file which should contain RSA private keys and
109 KMF_RAW_KEY_DATA *keys; local
[all...]
/illumos-gate/usr/src/lib/libcurses/screen/
H A Dnewkey.c61 _KEY_MAP **keys, *key_info, local
68 (((keys = (_KEY_MAP **) malloc(sizeof (_KEY_MAP *) *
77 free(keys);
87 (void) memcpy((char *) keys, (char *) prev_keys,
89 keys[*numkeys] = key_info;
93 (void) memcpy((char *) keys, (char *) prev_keys,
95 (void) memcpy((char *) &(keys[*first + 1]),
98 keys[(*first)++] = key_info;
103 cur_term->_keys = keys;
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_nsl_tmpl.c40 * keys based on the DH common key given the ALGTYPE and KEYLEN. That
51 des_block keys[], int keynum)
54 MODULUS, keys, keynum);
50 __dl_gen_common_dhkeys(char *xpublic, char *xsecret, des_block keys[], int keynum) argument
H A Ddh_common.h49 char *xmodulus, des_block keys[], int keynum);
H A Dgeneric_key.c102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */
152 /* We get the private keys as private key modulo the modulus */
180 * Given a key extract keynum des keys
183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument
190 /* len is the total number of bits we need for keynum des keys */
201 * the middle bits of the key for the bits in our DES keys.
208 * into the array of DES keys.
210 k = (char *)keys;
222 des_setparity((char *)&keys[i]);
224 des_setparity_g(&keys[
240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
[all...]
/illumos-gate/usr/src/lib/libnisdb/
H A Ddb_scheme_c.x80 db_key_desc keys<>;
98 % } keys;
104 %/* Accessor: return number of keys in scheme. */
105 % int numkeys() { return keys.keys_len; }
108 % db_key_desc* keyloc () { return keys.keys_val; }
112 % keys.keys_len = 0;
113 % keys.keys_val = NULL;
124 %/* Destructor: delete all keys associated with scheme and scheme itself. */
H A Ddb_scheme.cc44 keys.keys_len = 0;
45 keys.keys_val = NULL;
54 numkeys = this->keys.keys_len = orig->keys.keys_len;
55 db_key_desc * descols = this->keys.keys_val = new db_key_desc[numkeys];
56 db_key_desc * srccols = orig->keys.keys_val;
94 keys.keys_len = 0;
95 keys.keys_val = NULL;
125 keys.keys_len = count;
126 db_key_desc * scols = keys
[all...]
H A Dldap_scheme.c52 if (index >= s->keys.keys_len) {
55 myself, index, s->keys.keys_len-1);
60 s->keys.keys_val[index].column_number - 1;
110 s->keys.keys_len) {
115 s->keys.keys_len-1);
119 index = s->keys.keys_val[i].column_number - 1;
/illumos-gate/usr/src/cmd/print/lpget/
H A Dlpget.c73 display_value(ns_printer_t *printer, char *name, char **keys) argument
80 if (keys != NULL) {
81 while (*keys != NULL) {
82 char *string = ns_get_value_string(*keys,
84 rc += display_kvp(*keys, string);
85 keys++;
120 char **keys = NULL; local
141 keys = (char **)list_append((void **)keys,
164 (*printers)->name, keys);
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A DMICwrap.c44 * session keys). the message with the given qop and return
62 dh_key_set keys; local
83 /* Package the context session keys in a key_set for __make_token */
84 keys.dh_key_set_len = cntx->no_keys;
85 keys.dh_key_set_val = cntx->keys;
100 * non serialized tok and the context keys.
102 if ((*minor = __make_token(token, message, &tok, &keys))
132 dh_key_set keys; local
150 /* Package up the context session keys i
226 dh_key_set keys; local
317 dh_key_set keys; local
[all...]
H A Dcontext_establish.c164 dh_key_set keys; local
181 /* Package the context session keys into a key_set */
182 keys.dh_key_set_len = ctx->no_keys;
183 keys.dh_key_set_val = ctx->keys;
186 return (__make_token(output, NULL, &token, &keys));
251 * establish_session_keys: This routine decrypts the session keys supplied
252 * and uses those keys to verifiy the signature over the input token
257 dh_key_set_t keys, dh_signature_t sig, dh_token_t token)
267 * mechanism uses a cache of public keys, the
256 establish_session_keys(dh_context_t dhctx, const char *remote, dh_key_set_t keys, dh_signature_t sig, dh_token_t token) argument
595 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */ local
804 dh_key_set keys; local
[all...]
H A Dcrypto.c86 * of keys is odd
89 * If we have an even number of keys and additional encryption will be
100 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument
120 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec);
134 * If we have an even number of keys then do an extra round of
138 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec);
152 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument
159 if (keys->dh_key_set_len < 1)
173 stat = __desN_crypt(keys->dh_key_set_val, keys
186 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument
218 MD5_verifier(gss_buffer_t tok, gss_buffer_t msg, cipher_proc signer, dh_key_set_t keys, dh_signature_t signature ) argument
354 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument
393 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument
494 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument
547 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument
[all...]
H A Dcrypto.h47 dh_key_set_t keys, cipher_mode_t mode);
49 cipher_proc signer, dh_key_set_t keys, dh_signature_t signature);
61 dh_key_set_t keys, gss_buffer_t output, int *conf_ret);
65 dh_key_set_t keys, gss_buffer_t output);
H A Dtoken.c119 dh_key_set_t keys /* The session keys to sign the token */)
193 if ((stat = __xdr_encode_token(&xdrs, NULL, token, keys))
215 dh_key_set_t keys /* The keys to encrypt the check sum with */)
246 if ((stat = __xdr_encode_token(&xdrs, msg, token, keys))
382 * session keys established, so that keys is null. The unencrypted
384 * caller can then attempt to decrypt the session keys in token
385 * and encrypt the returned sig with those keys t
445 __xdr_encode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys) argument
492 __xdr_decode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys, dh_signature_t sig) argument
[all...]
/illumos-gate/usr/src/cmd/mandoc/
H A Dtbl_opts.c41 static const struct tbl_phrase keys[] = { variable in typeref:struct:tbl_phrase
59 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0])))
106 tbl->parse, ln, *pos, keys[key].name);
110 keys[key].name, want, len);
154 (strncasecmp(p + pos, keys[i].name, len) ||
155 keys[i].name[len] != '\0'))
168 if (keys[i].key)
169 tbl->opts.opts |= keys[i].key;
/illumos-gate/usr/src/cmd/krb5/kadmin/server/
H A Dmisc.c43 * keepold (input) whether to preserve old keys
88 * keepold (input) whether to preserve old keys
108 krb5_keyblock **keys, int *n_keys)
118 keys, n_keys);
140 krb5_keyblock ** keys, int *n_keys)
149 return kadm5_randkey_principal(server_handle, princ, keys, n_keys);
103 randkey_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument
139 randkey_principal_wrapper(void *server_handle, krb5_principal princ, krb5_keyblock ** keys, int *n_keys) argument
/illumos-gate/usr/src/cmd/tnf/prex/
H A Dset.h64 boolean_t set_match(set_t * set_p, const char *name, const char *keys);
/illumos-gate/usr/src/cmd/ipf/examples/
H A Dmkfilters.sh13 foreach $i (keys %ifaces) {
22 foreach $i (keys %ifaces) {
36 foreach $i (keys %ifaces) {
52 foreach $j (keys %ifaces) {
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/
H A Dcerts.c64 * incert - File to read certs and keys from
71 * and one or more keys are found, then the first
72 * certificate is used, and the keys are searched for a
75 * keys are found, then the first key is returned.
84 STACK_OF(EVP_PKEY) *keys = NULL;
107 &data, &keys, &certs) < 0) {
128 if (key && (keys != NULL)) {
131 * if we found a cert and some keys,
135 for (i = 0; i < sk_EVP_PKEY_num(keys); i++) {
137 sk_EVP_PKEY_value(keys,
[all...]
/illumos-gate/usr/src/cmd/oamuser/user/
H A Dfuncs.c82 static ua_key_t keys[] = { variable
99 #define NKEYS (sizeof (keys)/sizeof (ua_key_t))
126 if (strcmp(key, keys[i].key) == 0) {
127 if (keys[i].newvalue != NULL) {
133 if (keys[i].check != NULL &&
134 (res = keys[i].check(value)) != NULL) {
135 errmsg(M_INVALID, res, keys[i].errstr);
138 keys[i].newvalue = value;
148 * Add the keys to the argument vector.
156 const char *key = keys[
[all...]
/illumos-gate/usr/src/cmd/nscd/
H A Dgetexec.c109 char keys[1024]; local
112 len = snprintf(keys, sizeof (keys), "%s:%s:%s:%s:%d",
116 return (db_gethash(keys, len, htsize));
/illumos-gate/usr/src/cmd/pools/poold/com/sun/solaris/domain/pools/
H A DExpression.java139 * supplied keys.
141 * @param keys Array of valid key strings.
145 * a member of the keys array.
147 protected static void validateKeyword(String keys[], String key) argument
150 for (int i = 0; i < keys.length; i++) {
151 if (keys[i].compareTo(key) == 0)
204 * The array of valid keys for this type of expression.
206 private static final String keys[] = { "utilization" }; field in class:KVOpExpression
262 validateKeyword(keys, m.group(3));
397 * The array of valid keys fo
399 private static final String keys[] = { "locality" }; field in class:KVExpression
552 private static final String keys[] = { "wt-load" }; field in class:KExpression
[all...]
/illumos-gate/usr/src/lib/print/libipp-listener/common/
H A Dcreate-job.c47 char *keys[] = { "attributes-natural-language", "attributes-charset", local
81 split_and_copy_attributes(keys, operational, NULL, &job_attributes);
H A Dvalidate-job.c50 char *keys[] = { "attributes-natural-language", "attributes-charset", local
82 split_and_copy_attributes(keys, operational, NULL, &job_attributes);
/illumos-gate/usr/src/lib/libnsl/des/
H A Ddes_crypt.c169 desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument
183 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec);
196 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec);
207 __cbc_triple_crypt(des_block keys[], char *buf, uint_t len, argument
210 return (desN_crypt(keys, 3, buf, len, mode, ivec));

Completed in 140 milliseconds

12345