Home
last modified time | relevance | path

Searched refs:newkey (Results 1 – 25 of 27) sorted by relevance

12

/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/
H A Dk5_kmd5des.c72 krb5_keyblock newkey; in k5_md5des_hash() local
130 newkey.enctype = key->enctype; in k5_md5des_hash()
131 newkey.contents = xorkey; in k5_md5des_hash()
133 newkey.dk_list = NULL; in k5_md5des_hash()
134 newkey.kef_key.ck_data = NULL; in k5_md5des_hash()
171 krb5_keyblock newkey; in k5_md5des_verify() local
200 newkey.enctype = key->enctype; in k5_md5des_verify()
201 newkey.contents = xorkey; in k5_md5des_verify()
203 newkey.dk_list = NULL; in k5_md5des_verify()
204 newkey.kef_key.ck_data = NULL; in k5_md5des_verify()
[all …]
/illumos-gate/usr/src/cmd/keyserv/
H A DMakefile27 SBINPROG = keyserv newkey
42 NEWKEYOBJS = newkey.o
82 newkey := LDLIBS += -lsldap -lsocket
104 newkey:$(CHANGE_OBJS) $(NEWKEYOBJS) $(OUTSIDE_UTIL_OBJS) target
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dkerberos5.c204 krb5_keyblock *newkey = 0; in kerberos5_send() local
344 krb5_auth_con_getlocalsubkey(telnet_context, auth_context, &newkey); in kerberos5_send()
350 if (newkey) { in kerberos5_send()
355 if (!(ACCEPTED_ENCTYPE(newkey->enctype))) { in kerberos5_send()
362 newkey, &session_key); in kerberos5_send()
364 krb5_free_keyblock(telnet_context, newkey); in kerberos5_send()
/illumos-gate/usr/src/lib/libtecla/common/
H A Dkeytab.c791 int newkey; /* The index of a key in the updated binding table */ in _kt_clear_bindings() local
805 newkey = 0; in _kt_clear_bindings()
811 if(oldkey != newkey) in _kt_clear_bindings()
812 kt->table[newkey] = *sym; in _kt_clear_bindings()
813 newkey++; in _kt_clear_bindings()
819 kt->nkey = newkey; in _kt_clear_bindings()
/illumos-gate/usr/src/uts/common/sys/
H A Dmhd.h125 mhioc_resv_key_t newkey; member
135 mhioc_resv_key_t newkey; member
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c1098 soft_derive_enforce_flags(soft_object_t *basekey, soft_object_t *newkey) in soft_derive_enforce_flags() argument
1108 if (newkey->bool_attr_mask & SENSITIVE_BOOL_ON) { in soft_derive_enforce_flags()
1112 if (newkey->bool_attr_mask & EXTRACTABLE_BOOL_ON) { in soft_derive_enforce_flags()
1122 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags()
1130 newkey->bool_attr_mask |= ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags()
1132 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags()
1142 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags()
1150 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags()
1152 newkey->bool_attr_mask |= NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags()
1157 newkey->bool_attr_mask &= ~LOCAL_BOOL_ON; in soft_derive_enforce_flags()
/illumos-gate/usr/src/uts/common/io/comstar/lu/stmf_sbd/
H A Dsbd_pgr.c1799 sbd_pgr_key_t *newkey; in sbd_pgr_out_register_and_move() local
1852 if (newkey) { in sbd_pgr_out_register_and_move()
1854 newkey->pgr_key = svc_key; in sbd_pgr_out_register_and_move()
1858 if (newkey->pgr_key_lpt_id && in sbd_pgr_out_register_and_move()
1859 newkey->pgr_key_lpt_len > 0) { in sbd_pgr_out_register_and_move()
1860 kmem_free(newkey->pgr_key_lpt_id, in sbd_pgr_out_register_and_move()
1861 newkey->pgr_key_lpt_len); in sbd_pgr_out_register_and_move()
1865 newkey->pgr_key_lpt_len = lpt_len; in sbd_pgr_out_register_and_move()
1866 newkey->pgr_key_lpt_id = (scsi_devid_desc_t *) in sbd_pgr_out_register_and_move()
1868 bcopy(lpt, newkey->pgr_key_lpt_id, lpt_len); in sbd_pgr_out_register_and_move()
[all …]
/illumos-gate/usr/src/lib/libzfs/common/
H A Dlibzfs_crypto.c340 zfs_keyformat_t keyformat, boolean_t confirm_key, boolean_t newkey, in get_key_interactive() argument
358 if ((ret = libzfs_getpassphrase(keyformat, B_FALSE, newkey, fsname, in get_key_interactive()
374 ret = libzfs_getpassphrase(keyformat, B_TRUE, newkey, fsname, &buf2, in get_key_interactive()
463 const char *fsname, zfs_keyformat_t keyformat, boolean_t newkey, in get_key_material_file() argument
499 get_key_material(libzfs_handle_t *hdl, boolean_t do_verify, boolean_t newkey, in get_key_material() argument
523 do_verify, newkey, &km, &kmlen); in get_key_material()
538 fsname, keyformat, newkey, &km, &kmlen)) != 0) in get_key_material()
699 zfs_handle_t *zhp, boolean_t newkey, zfs_keyformat_t keyformat, in populate_create_encryption_params_nvlists() argument
710 ret = get_key_material(hdl, B_TRUE, newkey, keyformat, keylocation, in populate_create_encryption_params_nvlists()
/illumos-gate/usr/src/lib/libcurses/screen/
H A Dnewkey.c57 newkey(char *rcvchars, short keyval, bool macro) in newkey() function
H A Dmapfile-vers659 newkey;
H A Dcurses.ed387 extern int newkey(char *, short, bool);
534 extern int mvwin(), mvderwin(), napms(), newkey(), filter(),
/illumos-gate/usr/src/cmd/ypcmd/net_files/
H A Dpublickey26 # newkey(8) on the local machine.
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/
H A Dlock.c2052 char newkey[LOCK_KEY_MAXLEN]; in _getUniqueId() local
2070 (void) snprintf(newkey, sizeof (newkey), in _getUniqueId()
2076 log_msg(LOG_MSG_DEBUG, MSG_LOCK_GENUID_INTERNAL, newkey); in _getUniqueId()
2077 return (strdup(newkey)); in _getUniqueId()
/illumos-gate/usr/src/pkg/manifests/
H A Dsystem-network-nis.p5m69 file path=usr/sbin/newkey group=sys mode=0555
90 file path=usr/share/man/man8/newkey.8
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c3169 EVP_PKEY *newkey = NULL; in ImportRawRSAKey() local
3216 if ((newkey = EVP_PKEY_new()) == NULL) in ImportRawRSAKey()
3219 (void) EVP_PKEY_set1_RSA(newkey, rsa); in ImportRawRSAKey()
3234 return (newkey); in ImportRawRSAKey()
3241 EVP_PKEY *newkey = NULL; in ImportRawDSAKey() local
3287 return (newkey); in ImportRawDSAKey()
4265 list[n] = *newkey; in add_key_to_list()
4520 unsigned char *newkey = NULL; in create_des3key() local
4588 *des3key = newkey; in create_des3key()
4600 if (ret != KMF_OK && newkey != NULL) in create_des3key()
[all …]
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c978 krb5_keyblock newkey, histkey; in check_pw_reuse() local
985 &newkey, NULL); in check_pw_reuse()
997 if ((newkey.length == histkey.length) && in check_pw_reuse()
998 (newkey.enctype == histkey.enctype) && in check_pw_reuse()
999 (memcmp(newkey.contents, histkey.contents, in check_pw_reuse()
1002 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse()
1009 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse()
/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dsec_clnt.c661 revoke_key(AUTH *auth, int newkey) in revoke_key() argument
666 if (newkey) { in revoke_key()
/illumos-gate/usr/src/cmd/bhyve/
H A Dsmbiostbl.c898 const char *newkey; member
936 smbios_legacy_config_map[i].newkey, v); in smbios_build()
/illumos-gate/usr/src/cmd/passmgmt/
H A Dpassmgmt.c222 assign_attr(userattr_t *user, const char *newkey, char *val) in assign_attr() argument
237 } else if (strcmp(key, newkey) == 0) { in assign_attr()
245 kv_pair[avail].key = strdup(newkey); in assign_attr()
/illumos-gate/usr/src/uts/common/io/usb/clients/usbkbm/
H A Dusbkbm.c1812 int newkey = 1; in usbkbm_unpack_usb_packet() local
1822 newkey = 0; in usbkbm_unpack_usb_packet()
1827 if (newkey) { in usbkbm_unpack_usb_packet()
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.telnetd.c535 krb5_keyblock *newkey = NULL; in kerberos5_is() local
736 auth_context, &newkey); in kerberos5_is()
741 if (newkey != NULL) { in kerberos5_is()
743 newkey, &session_key); in kerberos5_is()
744 krb5_free_keyblock(telnet_context, newkey); in kerberos5_is()
/illumos-gate/usr/src/man/man8/
H A DMakefile325 newkey.8 \
/illumos-gate/usr/src/lib/libcurses/
H A DMakefile.com76 mvwscanw.o napms.o newkey.o newpad.o newscreen.o \
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c4167 KMF_KEY_HANDLE newkey; in KMFPK11_ExportPK12() local
4188 KMF_KEY_HANDLE_ATTR, &newkey, sizeof (KMF_KEY_HANDLE)); in KMFPK11_ExportPK12()
4200 keylist[numkeys - 1] = newkey; in KMFPK11_ExportPK12()
/illumos-gate/usr/src/lib/libsecdb/
H A Dexec_attr.txt181 Name Service Security:suser:cmd:::/usr/sbin/newkey:euid=0

12