/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | ksslutil.c | 50 KMF_RAW_KEY_DATA *keys; local 55 keys = NULL; 68 &ncerts, &keys, &nkeys); 83 if (keys != NULL) { 85 kmf_free_raw_key(&keys[i]); 86 free(keys); 88 keys = NULL; 91 *rsa = keys; 97 * Parse a PEM file which should contain RSA private keys and 109 KMF_RAW_KEY_DATA *keys; local [all...] |
/illumos-gate/usr/src/lib/libcurses/screen/ |
H A D | newkey.c | 61 _KEY_MAP **keys, *key_info, local 68 (((keys = (_KEY_MAP **) malloc(sizeof (_KEY_MAP *) * 77 free(keys); 87 (void) memcpy((char *) keys, (char *) prev_keys, 89 keys[*numkeys] = key_info; 93 (void) memcpy((char *) keys, (char *) prev_keys, 95 (void) memcpy((char *) &(keys[*first + 1]), 98 keys[(*first)++] = key_info; 103 cur_term->_keys = keys;
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_nsl_tmpl.c | 40 * keys based on the DH common key given the ALGTYPE and KEYLEN. That 51 des_block keys[], int keynum) 54 MODULUS, keys, keynum); 50 __dl_gen_common_dhkeys(char *xpublic, char *xsecret, des_block keys[], int keynum) argument
|
H A D | dh_common.h | 49 char *xmodulus, des_block keys[], int keynum);
|
H A D | generic_key.c | 102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ 152 /* We get the private keys as private key modulo the modulus */ 180 * Given a key extract keynum des keys 183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument 190 /* len is the total number of bits we need for keynum des keys */ 201 * the middle bits of the key for the bits in our DES keys. 208 * into the array of DES keys. 210 k = (char *)keys; 222 des_setparity((char *)&keys[i]); 224 des_setparity_g(&keys[ 240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument [all...] |
/illumos-gate/usr/src/lib/libnisdb/ |
H A D | db_scheme_c.x | 80 db_key_desc keys<>; 98 % } keys; 104 %/* Accessor: return number of keys in scheme. */ 105 % int numkeys() { return keys.keys_len; } 108 % db_key_desc* keyloc () { return keys.keys_val; } 112 % keys.keys_len = 0; 113 % keys.keys_val = NULL; 124 %/* Destructor: delete all keys associated with scheme and scheme itself. */
|
H A D | db_scheme.cc | 44 keys.keys_len = 0; 45 keys.keys_val = NULL; 54 numkeys = this->keys.keys_len = orig->keys.keys_len; 55 db_key_desc * descols = this->keys.keys_val = new db_key_desc[numkeys]; 56 db_key_desc * srccols = orig->keys.keys_val; 94 keys.keys_len = 0; 95 keys.keys_val = NULL; 125 keys.keys_len = count; 126 db_key_desc * scols = keys [all...] |
H A D | ldap_scheme.c | 52 if (index >= s->keys.keys_len) { 55 myself, index, s->keys.keys_len-1); 60 s->keys.keys_val[index].column_number - 1; 110 s->keys.keys_len) { 115 s->keys.keys_len-1); 119 index = s->keys.keys_val[i].column_number - 1;
|
/illumos-gate/usr/src/cmd/print/lpget/ |
H A D | lpget.c | 73 display_value(ns_printer_t *printer, char *name, char **keys) argument 80 if (keys != NULL) { 81 while (*keys != NULL) { 82 char *string = ns_get_value_string(*keys, 84 rc += display_kvp(*keys, string); 85 keys++; 120 char **keys = NULL; local 141 keys = (char **)list_append((void **)keys, 164 (*printers)->name, keys); [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | MICwrap.c | 44 * session keys). the message with the given qop and return 62 dh_key_set keys; local 83 /* Package the context session keys in a key_set for __make_token */ 84 keys.dh_key_set_len = cntx->no_keys; 85 keys.dh_key_set_val = cntx->keys; 100 * non serialized tok and the context keys. 102 if ((*minor = __make_token(token, message, &tok, &keys)) 132 dh_key_set keys; local 150 /* Package up the context session keys i 226 dh_key_set keys; local 317 dh_key_set keys; local [all...] |
H A D | context_establish.c | 164 dh_key_set keys; local 181 /* Package the context session keys into a key_set */ 182 keys.dh_key_set_len = ctx->no_keys; 183 keys.dh_key_set_val = ctx->keys; 186 return (__make_token(output, NULL, &token, &keys)); 251 * establish_session_keys: This routine decrypts the session keys supplied 252 * and uses those keys to verifiy the signature over the input token 257 dh_key_set_t keys, dh_signature_t sig, dh_token_t token) 267 * mechanism uses a cache of public keys, the 256 establish_session_keys(dh_context_t dhctx, const char *remote, dh_key_set_t keys, dh_signature_t sig, dh_token_t token) argument 595 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */ local 804 dh_key_set keys; local [all...] |
H A D | crypto.c | 86 * of keys is odd 89 * If we have an even number of keys and additional encryption will be 100 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument 120 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 134 * If we have an even number of keys then do an extra round of 138 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 152 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 159 if (keys->dh_key_set_len < 1) 173 stat = __desN_crypt(keys->dh_key_set_val, keys 186 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 218 MD5_verifier(gss_buffer_t tok, gss_buffer_t msg, cipher_proc signer, dh_key_set_t keys, dh_signature_t signature ) argument 354 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument 393 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument 494 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument 547 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument [all...] |
H A D | crypto.h | 47 dh_key_set_t keys, cipher_mode_t mode); 49 cipher_proc signer, dh_key_set_t keys, dh_signature_t signature); 61 dh_key_set_t keys, gss_buffer_t output, int *conf_ret); 65 dh_key_set_t keys, gss_buffer_t output);
|
H A D | token.c | 119 dh_key_set_t keys /* The session keys to sign the token */) 193 if ((stat = __xdr_encode_token(&xdrs, NULL, token, keys)) 215 dh_key_set_t keys /* The keys to encrypt the check sum with */) 246 if ((stat = __xdr_encode_token(&xdrs, msg, token, keys)) 382 * session keys established, so that keys is null. The unencrypted 384 * caller can then attempt to decrypt the session keys in token 385 * and encrypt the returned sig with those keys t 445 __xdr_encode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys) argument 492 __xdr_decode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys, dh_signature_t sig) argument [all...] |
/illumos-gate/usr/src/cmd/mandoc/ |
H A D | tbl_opts.c | 41 static const struct tbl_phrase keys[] = { variable in typeref:struct:tbl_phrase 59 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0]))) 106 tbl->parse, ln, *pos, keys[key].name); 110 keys[key].name, want, len); 154 (strncasecmp(p + pos, keys[i].name, len) || 155 keys[i].name[len] != '\0')) 168 if (keys[i].key) 169 tbl->opts.opts |= keys[i].key;
|
/illumos-gate/usr/src/cmd/krb5/kadmin/server/ |
H A D | misc.c | 43 * keepold (input) whether to preserve old keys 88 * keepold (input) whether to preserve old keys 108 krb5_keyblock **keys, int *n_keys) 118 keys, n_keys); 140 krb5_keyblock ** keys, int *n_keys) 149 return kadm5_randkey_principal(server_handle, princ, keys, n_keys); 103 randkey_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument 139 randkey_principal_wrapper(void *server_handle, krb5_principal princ, krb5_keyblock ** keys, int *n_keys) argument
|
/illumos-gate/usr/src/cmd/tnf/prex/ |
H A D | set.h | 64 boolean_t set_match(set_t * set_p, const char *name, const char *keys);
|
/illumos-gate/usr/src/cmd/ipf/examples/ |
H A D | mkfilters.sh | 13 foreach $i (keys %ifaces) { 22 foreach $i (keys %ifaces) { 36 foreach $i (keys %ifaces) { 52 foreach $j (keys %ifaces) {
|
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | certs.c | 64 * incert - File to read certs and keys from 71 * and one or more keys are found, then the first 72 * certificate is used, and the keys are searched for a 75 * keys are found, then the first key is returned. 84 STACK_OF(EVP_PKEY) *keys = NULL; 107 &data, &keys, &certs) < 0) { 128 if (key && (keys != NULL)) { 131 * if we found a cert and some keys, 135 for (i = 0; i < sk_EVP_PKEY_num(keys); i++) { 137 sk_EVP_PKEY_value(keys, [all...] |
/illumos-gate/usr/src/cmd/oamuser/user/ |
H A D | funcs.c | 82 static ua_key_t keys[] = { variable 99 #define NKEYS (sizeof (keys)/sizeof (ua_key_t)) 126 if (strcmp(key, keys[i].key) == 0) { 127 if (keys[i].newvalue != NULL) { 133 if (keys[i].check != NULL && 134 (res = keys[i].check(value)) != NULL) { 135 errmsg(M_INVALID, res, keys[i].errstr); 138 keys[i].newvalue = value; 148 * Add the keys to the argument vector. 156 const char *key = keys[ [all...] |
/illumos-gate/usr/src/cmd/nscd/ |
H A D | getexec.c | 109 char keys[1024]; local 112 len = snprintf(keys, sizeof (keys), "%s:%s:%s:%s:%d", 116 return (db_gethash(keys, len, htsize));
|
/illumos-gate/usr/src/cmd/pools/poold/com/sun/solaris/domain/pools/ |
H A D | Expression.java | 139 * supplied keys. 141 * @param keys Array of valid key strings. 145 * a member of the keys array. 147 protected static void validateKeyword(String keys[], String key) argument 150 for (int i = 0; i < keys.length; i++) { 151 if (keys[i].compareTo(key) == 0) 204 * The array of valid keys for this type of expression. 206 private static final String keys[] = { "utilization" }; field in class:KVOpExpression 262 validateKeyword(keys, m.group(3)); 397 * The array of valid keys fo 399 private static final String keys[] = { "locality" }; field in class:KVExpression 552 private static final String keys[] = { "wt-load" }; field in class:KExpression [all...] |
/illumos-gate/usr/src/lib/print/libipp-listener/common/ |
H A D | create-job.c | 47 char *keys[] = { "attributes-natural-language", "attributes-charset", local 81 split_and_copy_attributes(keys, operational, NULL, &job_attributes);
|
H A D | validate-job.c | 50 char *keys[] = { "attributes-natural-language", "attributes-charset", local 82 split_and_copy_attributes(keys, operational, NULL, &job_attributes);
|
/illumos-gate/usr/src/lib/libnsl/des/ |
H A D | des_crypt.c | 169 desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument 183 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 196 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 207 __cbc_triple_crypt(des_block keys[], char *buf, uint_t len, argument 210 return (desN_crypt(keys, 3, buf, len, mode, ivec));
|