/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 50 krb5_keyblock ks; local 59 bzero(&ks, sizeof(krb5_keyblock)); 68 ks.length = MD5_CKSUM_LENGTH; 72 ks.contents = (void *) ds.data; 118 ret = krb5_hmac (context, &krb5int_hash_md5, &ks, 1, &md5tmp, output); 121 bzero(ks.contents, ks.length); 123 FREE (ks.contents, ks.length);
|
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AuthBlock.java | 297 KeyStore ks = getKeyStore(); 298 if (ks == null) { 302 X509Certificate cert = getCert(someDN, ks); 316 KeyStore ks = getKeyStore(); 318 caCert = getCert(caDN, ks); 341 KeyStore ks = getKeyStore(); 343 caCert = getCert(caDN, ks); 419 KeyStore ks = getKeyPkg(); 429 cert = getCert(alias, ks); 600 KeyStore ks 867 checkSPIs(X509Certificate cert, KeyStore ks) argument 923 configuredToVerify( java.security.cert.Certificate[] chain, String conf_spis, KeyStore ks) argument 1020 getCert(String DN, KeyStore ks) argument [all...] |
/osnet-11/usr/src/cmd/perl/contrib/Sun/Solaris/Pg/ |
H A D | Pg.pm | 269 my $ks = $self->{KSTAT}; 271 $ks->update(); 274 my $pg_info = $ks->{$self->{PG_MODULE}}; 301 $self->{CPU_LOAD} = _get_sw_cpu_load($ks); 704 my $ks = $self->{KSTAT} or return; 706 my $cpu_info = $ks->{cpu_info} or return; 978 my $ks = $self->{KSTAT}; 981 return unless $ks; 984 my $pg_info = $ks->{$self->{PG_MODULE}}; 1087 my $ks [all...] |
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | keystore.c | 614 * ks - Keystore to search 631 keystore_t *ks = ks_h; local 635 gettext(ERR_KEYSTORE_NOPUBCERTS), ks->path); 640 if (ks->clcerts == NULL) { 643 gettext(ERR_KEYSTORE_NOCERTS), ks->path); 647 if (ks->pkeys == NULL) { 650 gettext(ERR_KEYSTORE_NOKEYS), ks->path); 656 if ((sk_EVP_PKEY_num(ks->pkeys) == 1) && 657 (sk_X509_num(ks->clcerts) == 1)) { 658 tmpkey = sk_EVP_PKEY_value(ks 719 keystore_t *ks = ks_h; local 749 keystore_t *ks = ks_h; local 889 keystore_t *ks = ks_h; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/dtrace/ |
H A D | kerberos_dtrace.c | 999 k5_ksafeinfo_t *ks = NULL; local 1002 ks = malloc(sizeof (k5_ksafeinfo_t)); 1003 if (ks != NULL) { 1004 (void) memset(ks, 0, sizeof (k5_ksafeinfo_t)); 1005 ks->user_data = safe->user_data.data; 1006 ks->user_data_length = safe->user_data.length; 1007 ks->timestamp = safe->timestamp; 1008 ks->usec = safe->usec; 1009 ks->seq_number = safe->seq_number; 1010 ks 1026 k5_ksafeinfo_free(k5_ksafeinfo_t *ks) argument [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_kdb.c | 139 krb5_key_salt_tuple ks[1]; local 168 ks[0].ks_enctype = handle->params.enctype; 169 ks[0].ks_salttype = KRB5_KDB_SALTTYPE_NORMAL; 173 1, ks, NULL); 179 ret = kadm5_randkey_principal_3(handle, ent.principal, 0, 1, ks,
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softBlowfishCrypt.c | 68 void *ks; local 72 ks = blowfish_alloc_keysched(&size, 0); 73 if (ks == NULL) { 82 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 85 OBJ_KEY_SCHED(key_p) = ks;
|
H A D | softDESCrypt.c | 81 void *ks; local 86 ks = des_alloc_keysched(&size, DES, 0); 88 ks = des_alloc_keysched(&size, DES3, 0); 89 if (ks == NULL) { 99 OBJ_SEC(key_p)->sk_value, DES, ks); 106 OBJ_SEC(key_p)->sk_value, DES2, ks); local 109 OBJ_SEC(key_p)->sk_value, DES3, ks); 112 OBJ_KEY_SCHED(key_p) = ks;
|
H A D | softAESCrypt.c | 101 void *ks; local 105 ks = aes_alloc_keysched(&size, 0); 106 if (ks == NULL) { 116 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 119 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 122 OBJ_KEY_SCHED(key_p) = ks;
|
H A D | softRawDataCrypt.c | 102 ks = &(((aes_key_t *)cctx->cc_keysched)->encr_ks.ks64[0]); 105 ks = &(((des_keysched_t *)cctx->cc_keysched)->ksch_##op[0]); 108 ks = &(((des3_keysched_t *)cctx->cc_keysched)->ksch_##op[0]); 113 uint64_t *ks; \ 118 funcs->load_keys(ks); \ 119 funcs->contig_blocks(ks, (uint64_t *)(void *)in_buf, \
|
/osnet-11/usr/src/lib/fm/topo/modules/sun4u/chip/common/ |
H A D | chip_sun4u.c | 180 kstat_named_t *ks, *kf; local 197 if ((ks = kstat_data_lookup(chip->chip_cpustats[i], 199 (void) snprintf(sbuf, 21, "%llX", ks->value.ui64);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsAESCrypt.c | 126 void *ks; local 130 ks = aes_alloc_keysched(&size, 0); 131 if (ks == NULL) { 140 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 143 (OBJ_SEC_VALUE_LEN(key_p) * 8), ks); 146 OBJ_KEY_SCHED(key_p) = ks;
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 902 char *ks; local 911 ks = calloc(16, 48 * sizeof (char)); 919 if ((KS = ks) == NULL) /* calloc() failed */ 924 free(ks);
|
/osnet-11/usr/src/lib/fm/topo/libtopo/common/ |
H A D | cpu.c | 187 kstat_named_t *ks; local 195 if ((ks = kstat_data_lookup(cpuip->cn_cpustats[i], 197 (void) snprintf(sbuf, 21, "%llX", ks->value.ui64);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Locale/ |
H A D | Language.pm | 209 ks:Kashmiri
|
H A D | Script.pm | 244 ks:kst:305:Kharoshthi
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 910 int ks; local 915 ks = PQG_PBITS_TO_INDEX(keylen); 916 nssrv = PK11_PQG_ParamGen(ks, &pqgParams, &pqgVerify);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/I18N/ |
H A D | LangTags.pm | 663 as bn gu kn ks kok ml mni mr ne or pa sa sd te ta ur
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/I18N/LangTags/ |
H A D | List.pm | 909 =item {ks} : Kashmiri
|