/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.h | 42 soft_object_t *key; member in struct:soft_rsa_ctx 54 CK_RV soft_rsa_encrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len, 57 CK_RV soft_rsa_decrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len,
|
H A D | softDSA.h | 43 soft_object_t *key; member in struct:soft_dsa_ctx
|
H A D | softEC.h | 41 soft_object_t *key; member in struct:soft_ecc_ctx
|
/osnet-11/usr/src/lib/libnsctl/common/ |
H A D | nsc_hash.h | 35 char *key; member in struct:hash_node_s
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_status_tbl.c | 46 const smb_status_table_t *key = vkey; local 49 if (key->value == row->value) 51 if (key->value < row->value) 68 smb_status_table_t key; local 71 key.value = ntstatus; 72 key.name = NULL; 73 tep = bsearch(&key, ntx_table, ntx_rows,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/old/ |
H A D | des_stringtokey.c | 44 krb5_keyblock *key) 56 return(mit_des_string_to_key_int(context, key, string, salt)); 59 return mit_afs_string_to_key(context, key, string, salt); 40 krb5int_des_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parm, krb5_keyblock *key) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | state.c | 44 krb5_c_init_state (krb5_context context, const krb5_keyblock *key, argument 50 if (krb5_enctypes_list[i].etype == key->enctype) 59 (context, key, keyusage, new_state); 63 krb5_c_free_state (krb5_context context, const krb5_keyblock *key, argument 69 if (krb5_enctypes_list[i].etype == key->enctype)
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | decode_kdc.c | 42 *key, putting result in *rep. 54 krb5int_decode_tgs_rep(krb5_context context, krb5_data *enc_rep, const krb5_keyblock *key, argument 74 if ((retval = krb5_kdc_rep_decrypt_proc(context, key, &usage,
|
H A D | enc_helper.c | 37 const krb5_keyblock *key, krb5_keyusage usage, 43 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length, 50 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher); 36 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
|
H A D | enc_keyhelper.c | 36 krb5_encrypt_keyhelper(krb5_context context, krb5_key key, krb5_keyusage usage, argument 43 enctype = krb5_k_key_enctype(context, key); 52 ret = krb5_k_encrypt(context, key, usage, 0, plain, cipher);
|
H A D | gen_seqnum.c | 29 * We do this by getting a random key and encrypting something with it, 54 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, krb5_ui_4 *seqno) argument 64 seed = key2data(*key);
|
H A D | kdc_rep_dc.c | 34 * Decrypt the encrypted portion of the KDC_REP message, using the key 41 krb5_kdc_rep_decrypt_proc(krb5_context context, const krb5_keyblock *key, krb5_const_pointer decryptarg, krb5_kdc_rep *dec_rep) argument 63 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part,
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/ |
H A D | hsearch.c | 73 DBT key, val; local 78 key.data = (u_char *)item.key; 79 key.size = strlen(item.key) + 1; 84 status = (dbp->put)(dbp, &key, &val, R_NOOVERWRITE); 89 status = (dbp->get)(dbp, &key, &val, 0); 95 retval.key = item.key;
|
H A D | search.h | 41 char *key; member in struct:entry
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_fetch_mkey.c | 36 * get the master key from the database specific context 40 krb5_ldap_get_mkey(krb5_context context, krb5_keyblock **key) argument 54 *key = &ldap_context->lrparams->mkey; 60 * set the master key into the database specific context 64 krb5_ldap_set_mkey(krb5_context context, char *pwd, krb5_keyblock *key) argument 86 r_params->mkey.magic = key->magic; 87 r_params->mkey.enctype = key->enctype; 88 r_params->mkey.length = key->length; 89 r_params->mkey.contents = malloc(key->length); 93 memcpy(r_params->mkey.contents, key [all...] |
/osnet-11/usr/src/cmd/sendmail/db/hsearch/ |
H A D | hsearch.c | 87 DBT key, val; local 93 memset(&key, 0, sizeof(key)); 95 key.data = item.key; 96 key.size = strlen(item.key) + 1; 104 * Try and add the key to the database. If we fail because 105 * the key already exists, return the existing key [all...] |
/osnet-11/usr/src/lib/libast/common/cdt/ |
H A D | dtrenew.c | 38 reg Void_t* key; local 72 key = _DTKEY(obj,disc->key,disc->size); 73 e->hash = _DTHSH(dt,key,disc,disc->size);
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | lfind.c | 59 char *key = (char *)ky; local 64 if ((*compar)(key, base) == 0)
|
H A D | lsearch.c | 58 char *key = (char *)ky; local 64 if ((*compar)(key, base) == 0) 67 res = memcpy(base, key, width); /* base now == next */
|
/osnet-11/usr/src/lib/libwrap/ |
H A D | update.c | 46 int key; local 49 while ((key = va_arg(ap, int)) > 0) { 50 switch (key) { 52 tcpd_warn("request_fill: invalid key: %d", key);
|
/osnet-11/usr/src/lib/libresolv2/common/resolv/ |
H A D | mtctxres.c | 20 static pthread_key_t key; variable 35 * Initialize the TSD key. By doing this at library load time, we're 43 pthread_keycreate_ret = pthread_key_create(&key, __res_destroy_ctx); 72 if (pthread_getspecific(key) != 0) { 84 if ((ret = pthread_setspecific(key, mt)) != 0) { 127 if (((mt = pthread_getspecific(key)) != 0) || 129 (mt = pthread_getspecific(key)) != 0)) {
|
/osnet-11/usr/src/lib/libldap4/sec/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 19 void hmac_md5(unsigned char *text, int text_len, unsigned char *key, argument 32 (void) MD5Update(&tctx, key, key_len); 34 key = tk; 40 bcopy(key, k_ipad, key_len); 41 bcopy(key, k_opad, key_len);
|
/osnet-11/usr/src/lib/libnisdb/yptol/ |
H A D | update.c | 73 * Pointer to the entry key 82 update_entry_if_required(map_ctrl *map, datum *key) argument 96 if (0 == strncmp(key->dptr, yp_last_modified, yp_last_modified_sz)) { 103 if (is_special_key(key)) 106 if (!has_entry_expired(map, key)) 111 return (update_from_dit(map, key)); 120 * Entry key 128 update_from_dit(map_ctrl *map, datum *key) argument 144 ret = read_from_dit(map->map_name, map->domain, key, &dat); 171 dbm_delete(map->entries, *key); 372 is_special_key(datum *key) argument [all...] |
/osnet-11/usr/src/lib/libnwam/common/ |
H A D | libnwam_wlan.c | 32 * and key setting). 68 * Create/update security key for WLAN <essid, bssid>. 72 uint32_t secmode, uint_t keyslot, const char *key) 75 linkname, essid, bssid, secmode, keyslot, key, B_FALSE)); 71 nwam_wlan_set_key(const char *linkname, const char *essid, const char *bssid, uint32_t secmode, uint_t keyslot, const char *key) argument
|
/osnet-11/usr/src/lib/libcmd/common/ |
H A D | pids.c | 59 key(void* handle, Sffmt_t* fp, const char* arg, char** ps, Sflong_t* pn) function 117 sfkeyprintf(sfstdout, format, format, key, NiL);
|