Searched defs:key (Results 1 - 25 of 898) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftRSA.h42 soft_object_t *key; member in struct:soft_rsa_ctx
H A DsoftDSA.h43 soft_object_t *key; member in struct:soft_dsa_ctx
H A DsoftEC.h42 soft_object_t *key; member in struct:soft_ecc_ctx
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgen_subkey.c27 * Routine to automatically generate a subsession key based on an input key.
34 krb5_generate_subkey(krb5_context context, const krb5_keyblock *key, krb5_keyblock **subkey) argument
46 seed.length = key->length;
47 seed.data = key->contents;
58 if ((retval = krb5_c_make_random_key(context, key->enctype, *subkey))) {
H A Dgen_seqnum.c33 * We do this by getting a random key and encrypting something with it,
44 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, krb5_ui_4 *seqno) argument
55 seed.length = key->length;
56 seed.data = key->contents;
H A Ddecode_kdc.c34 *key, putting result in *rep.
46 krb5_decode_kdc_rep(krb5_context context, krb5_data *enc_rep, const krb5_keyblock *key, krb5_kdc_rep **dec_rep) argument
70 if ((retval = krb5_kdc_rep_decrypt_proc(context, key, &usage,
H A Denc_helper.c30 krb5_encrypt_helper(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *plain, krb5_enc_data *cipher) argument
35 if ((ret = krb5_c_encrypt_length(context, key->enctype, plain->length,
46 ret = krb5_c_encrypt(context, key, usage, 0, plain, cipher);
H A Dkdc_rep_dc.c33 * Decrypt the encrypted portion of the KDC_REP message, using the key
40 krb5_kdc_rep_decrypt_proc(krb5_context context, const krb5_keyblock *key, krb5_const_pointer decryptarg, krb5_kdc_rep *dec_rep) argument
62 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part,
/illumos-gate/usr/src/cmd/makekey/
H A Dmakekey.c45 char key[8]; local
48 (void) read(0, key, 8);
50 (void) write(1, crypt(key, salt), 13);
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/
H A Dweak_key.c69 * mit_des_is_weak_key: returns true iff key is a [semi-]weak des key.
71 * Requires: key has correct odd parity.
74 mit_des_is_weak_key(mit_des_cblock key) argument
80 if (!memcmp(weak_p++,key,sizeof(mit_des_cblock)))
H A Df_parity.c24 mit_des_fixup_key_parity(mit_des_cblock key) argument
29 key[i] &= 0xfe;
30 key[i] |= 1^parity_char(key[i]);
37 * des_check_key_parity: returns true iff key has the correct des parity.
42 mit_des_check_key_parity(mit_des_cblock key) argument
48 if((key[i] & 1) == parity_char(0xfe&key[i]))
/illumos-gate/usr/src/lib/iconv_modules/inc/
H A Dpublic_struc.h31 unsigned int key; member in struct:key_value
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/
H A Ddefault_state.c42 (krb5_context context, const krb5_keyblock *key,
50 /* We need to copy in the key for des-cbc-cr--ick, but that's how it works*/
51 if (key->enctype == ENCTYPE_DES_CBC_CRC) {
53 (void) memcpy (new_state->data, key->contents, new_state->length);
41 krb5int_des_init_state(krb5_context context, const krb5_keyblock *key, krb5_keyusage usage, krb5_data *new_state ) argument
H A Ddecrypt.c37 krb5_c_decrypt(krb5_context context, const krb5_keyblock *key, argument
45 if (krb5_enctypes_list[i].etype == key->enctype)
60 if (key->kef_key.ck_data == NULL)
61 ret = init_key_kef(context->kef_cipher_mt, (krb5_keyblock *)key);
66 if ((ret = init_key_uef(krb_ctx_hSession(context), (krb5_keyblock *)key)))
74 key, usage, ivec, &input->ciphertext, output));
/illumos-gate/usr/src/lib/libwrap/
H A Dupdate.c46 int key; local
49 while ((key = va_arg(ap, int)) > 0) {
50 switch (key) {
52 tcpd_warn("request_fill: invalid key: %d", key);
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/old/
H A Ddes_stringtokey.c44 krb5_keyblock *key)
56 return(mit_des_string_to_key_int(context, key, string, salt));
59 return mit_afs_string_to_key(context, key, string, salt);
40 krb5int_des_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parm, krb5_keyblock *key) argument
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dstate.c44 krb5_c_init_state (krb5_context context, const krb5_keyblock *key, argument
50 if (krb5_enctypes_list[i].etype == key->enctype)
59 (context, key, keyusage, new_state);
63 krb5_c_free_state (krb5_context context, const krb5_keyblock *key, argument
69 if (krb5_enctypes_list[i].etype == key->enctype)
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/
H A Dhsearch.c75 DBT key, val; local
80 key.data = (u_char *)item.key;
81 key.size = strlen(item.key) + 1;
86 status = (dbp->put)(dbp, &key, &val, R_NOOVERWRITE);
91 status = (dbp->get)(dbp, &key, &val, 0);
97 retval.key = item.key;
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dlfind.c59 char *key = (char *)ky; local
64 if ((*compar)(key, base) == 0)
H A Dlsearch.c58 char *key = (char *)ky; local
64 if ((*compar)(key, base) == 0)
67 res = memcpy(base, key, width); /* base now == next */
/illumos-gate/usr/src/cmd/ypcmd/revnetgroup/
H A Dtable.h42 char *key; member in struct:tablenode
/illumos-gate/usr/src/cmd/sasinfo/
H A DprintAttrs.h41 int key; member in struct:state_string
64 extern char *getStateString(HBA_UINT32 key, SAS_STATE *stat_string);
/illumos-gate/usr/src/cmd/sendmail/db/hsearch/
H A Dhsearch.c87 DBT key, val; local
93 memset(&key, 0, sizeof(key));
95 key.data = item.key;
96 key.size = strlen(item.key) + 1;
104 * Try and add the key to the database. If we fail because
105 * the key already exists, return the existing key
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_status_tbl.c46 const smb_status_table_t *key = vkey; local
49 if (key->value == row->value)
51 if (key->value < row->value)
68 smb_status_table_t key; local
71 key.value = ntstatus;
72 key.name = NULL;
73 tep = bsearch(&key, ntx_table, ntx_rows,
/illumos-gate/usr/src/uts/common/fs/
H A Dpkp_hash.c58 uint_t key = 0x12345678; /* arbitrary value */ local
62 hash = MOD2((key + len), PKP_HASH_SIZE);

Completed in 81 milliseconds

1234567891011>>