/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_set_keyblock.c | 33 krb5_get_key_enctype(krb5_keyblock *kb) argument 35 return (kb->enctype); 39 krb5_get_key_length(krb5_keyblock *kb) argument 41 return (kb->length); 45 krb5_get_key_data(krb5_keyblock *kb) argument 47 return (kb->contents); 51 krb5_set_key_enctype(krb5_keyblock *kb, krb5_enctype enctype) argument 53 kb->enctype = enctype; 57 krb5_set_key_length(krb5_keyblock *kb, unsigned int len) argument 59 kb 63 krb5_set_key_data(krb5_keyblock *kb, krb5_octet *data) argument [all...] |
H A D | init_allocated_keyblock.c | 36 krb5_keyblock *kb) 39 if (!kb) 42 (void) memset(kb, 0, sizeof (*kb)); 43 kb->enctype = enctype; 44 kb->length = length; 47 kb->contents = malloc(length); 48 if (!kb->contents) { 51 (void) memset(kb->contents, 0, length); 53 kb 32 krb5_init_allocated_keyblock( krb5_context context, krb5_enctype enctype, unsigned int length, krb5_keyblock *kb) argument [all...] |
H A D | gen_save_subkey.c | 59 krb5_keyblock *kb = NULL; local 70 retval = krb5_generate_subkey_extended(context, keyblock, enctype, &kb); 73 retval = krb5_auth_con_setsendsubkey(context, auth_context, kb); 76 retval = krb5_auth_con_setrecvsubkey(context, auth_context, kb); 85 krb5_free_keyblock(context, kb);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 644 uchar_t key_block[MAX_KEYBLOCK], *kb, *export_keys = NULL; local 764 kb = key_block; 769 ClientRandomLen, rounds, kb); 775 kb, size); 803 obj_tmpl[5].pValue = kb; 812 kb += mac_key_bytes; 814 obj_tmpl[5].pValue = kb; 821 kb += mac_key_bytes; 880 soft_ssl_weaken_key(mech, kb, (uint_t)secret_key_bytes, 887 new_tmpl[n].pValue = kb; [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/btree/ |
H A D | bt_put.c | 81 char *dest, db[NOVFLSIZE], kb[NOVFLSIZE]; local 130 tkey.data = kb; 132 memmove(kb, &pg, sizeof(db_pgno_t)); 136 memmove(kb + sizeof(db_pgno_t),
|
/osnet-11/usr/src/lib/libdtrace_jni/java/src/org/opensolaris/os/dtrace/ |
H A D | Option.java | 141 kb(int n) method in class:Option
|
H A D | LocalConsumer.java | 58 new Option(Option.bufsize, Option.kb(256)), 59 new Option(Option.aggsize, Option.kb(256)),
|
/osnet-11/usr/src/common/crypto/ecc/ |
H A D | ec.c | 623 * on the digest using the given key and the random value kb (used in 628 const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag) 655 if (!key || !signature || !digest || !kb || (kblen < 0)) { 683 CHECK_MPI_OK( mp_read_unsigned_octets(&k, kb, kblen) ); 627 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag) argument
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Term/ |
H A D | Cap.pm | 649 kb=\0177:
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ |
H A D | CGI.pm | 7722 http://web.archive.org/web/20010812012030/http://support.microsoft.com/support/kb/articles/Q280/3/41.ASP
|