/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | k5_kmd5des.c | 72 krb5_keyblock newkey; in k5_md5des_hash() local 129 bzero(&newkey, sizeof(krb5_keyblock)); in k5_md5des_hash() 130 newkey.enctype = key->enctype; in k5_md5des_hash() 131 newkey.contents = xorkey; in k5_md5des_hash() 132 newkey.length = sizeof(xorkey); in k5_md5des_hash() 133 newkey.dk_list = NULL; in k5_md5des_hash() 134 newkey.kef_key.ck_data = NULL; in k5_md5des_hash() 135 ret = init_key_kef(context->kef_cipher_mt, &newkey); in k5_md5des_hash() 145 &newkey, (unsigned char*) mit_des_zeroblock, 1); in k5_md5des_hash() 148 (void)crypto_destroy_ctx_template(newkey.key_tmpl); in k5_md5des_hash() [all …]
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | Makefile | 27 SBINPROG = keyserv newkey 42 NEWKEYOBJS = newkey.o 82 newkey := LDLIBS += -lsldap -lsocket 104 newkey:$(CHANGE_OBJS) $(NEWKEYOBJS) $(OUTSIDE_UTIL_OBJS) target
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 204 krb5_keyblock *newkey = 0; in kerberos5_send() local 344 krb5_auth_con_getlocalsubkey(telnet_context, auth_context, &newkey); in kerberos5_send() 350 if (newkey) { in kerberos5_send() 355 if (!(ACCEPTED_ENCTYPE(newkey->enctype))) { in kerberos5_send() 362 newkey, &session_key); in kerberos5_send() 364 krb5_free_keyblock(telnet_context, newkey); in kerberos5_send()
|
/illumos-gate/usr/src/lib/libtecla/common/ |
H A D | keytab.c | 791 int newkey; /* The index of a key in the updated binding table */ in _kt_clear_bindings() local 805 newkey = 0; in _kt_clear_bindings() 811 if(oldkey != newkey) in _kt_clear_bindings() 812 kt->table[newkey] = *sym; in _kt_clear_bindings() 813 newkey++; in _kt_clear_bindings() 819 kt->nkey = newkey; in _kt_clear_bindings()
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | mhd.h | 125 mhioc_resv_key_t newkey; member 135 mhioc_resv_key_t newkey; member
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 1098 soft_derive_enforce_flags(soft_object_t *basekey, soft_object_t *newkey) in soft_derive_enforce_flags() argument 1108 if (newkey->bool_attr_mask & SENSITIVE_BOOL_ON) { in soft_derive_enforce_flags() 1112 if (newkey->bool_attr_mask & EXTRACTABLE_BOOL_ON) { in soft_derive_enforce_flags() 1122 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags() 1130 newkey->bool_attr_mask |= ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags() 1132 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags() 1142 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags() 1150 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags() 1152 newkey->bool_attr_mask |= NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags() 1157 newkey->bool_attr_mask &= ~LOCAL_BOOL_ON; in soft_derive_enforce_flags()
|
/illumos-gate/usr/src/uts/common/io/comstar/lu/stmf_sbd/ |
H A D | sbd_pgr.c | 1799 sbd_pgr_key_t *newkey; in sbd_pgr_out_register_and_move() local 1851 newkey = sbd_pgr_key_registered(pgr, lpt, &rport); in sbd_pgr_out_register_and_move() 1852 if (newkey) { in sbd_pgr_out_register_and_move() 1854 newkey->pgr_key = svc_key; in sbd_pgr_out_register_and_move() 1857 if (newkey->pgr_key_flags & SBD_PGR_KEY_ALL_TG_PT) { in sbd_pgr_out_register_and_move() 1858 if (newkey->pgr_key_lpt_id && in sbd_pgr_out_register_and_move() 1859 newkey->pgr_key_lpt_len > 0) { in sbd_pgr_out_register_and_move() 1860 kmem_free(newkey->pgr_key_lpt_id, in sbd_pgr_out_register_and_move() 1861 newkey->pgr_key_lpt_len); in sbd_pgr_out_register_and_move() 1865 newkey->pgr_key_lpt_len = lpt_len; in sbd_pgr_out_register_and_move() [all …]
|
/illumos-gate/usr/src/lib/libzfs/common/ |
H A D | libzfs_crypto.c | 340 zfs_keyformat_t keyformat, boolean_t confirm_key, boolean_t newkey, in get_key_interactive() argument 358 if ((ret = libzfs_getpassphrase(keyformat, B_FALSE, newkey, fsname, in get_key_interactive() 374 ret = libzfs_getpassphrase(keyformat, B_TRUE, newkey, fsname, &buf2, in get_key_interactive() 463 const char *fsname, zfs_keyformat_t keyformat, boolean_t newkey, in get_key_material_file() argument 499 get_key_material(libzfs_handle_t *hdl, boolean_t do_verify, boolean_t newkey, in get_key_material() argument 523 do_verify, newkey, &km, &kmlen); in get_key_material() 538 fsname, keyformat, newkey, &km, &kmlen)) != 0) in get_key_material() 699 zfs_handle_t *zhp, boolean_t newkey, zfs_keyformat_t keyformat, in populate_create_encryption_params_nvlists() argument 710 ret = get_key_material(hdl, B_TRUE, newkey, keyformat, keylocation, in populate_create_encryption_params_nvlists()
|
/illumos-gate/usr/src/lib/libcurses/screen/ |
H A D | newkey.c | 57 newkey(char *rcvchars, short keyval, bool macro) in newkey() function
|
H A D | mapfile-vers | 659 newkey;
|
H A D | curses.ed | 387 extern int newkey(char *, short, bool); 534 extern int mvwin(), mvderwin(), napms(), newkey(), filter(),
|
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | lock.c | 2052 char newkey[LOCK_KEY_MAXLEN]; in _getUniqueId() local 2070 (void) snprintf(newkey, sizeof (newkey), in _getUniqueId() 2076 log_msg(LOG_MSG_DEBUG, MSG_LOCK_GENUID_INTERNAL, newkey); in _getUniqueId() 2077 return (strdup(newkey)); in _getUniqueId()
|
/illumos-gate/usr/src/cmd/ypcmd/net_files/ |
H A D | publickey | 26 # newkey(8) on the local machine.
|
/illumos-gate/usr/src/pkg/manifests/ |
H A D | system-network-nis.p5m | 69 file path=usr/sbin/newkey group=sys mode=0555 90 file path=usr/share/man/man8/newkey.8
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 3169 EVP_PKEY *newkey = NULL; in ImportRawRSAKey() local 3216 if ((newkey = EVP_PKEY_new()) == NULL) in ImportRawRSAKey() 3219 (void) EVP_PKEY_set1_RSA(newkey, rsa); in ImportRawRSAKey() 3234 return (newkey); in ImportRawRSAKey() 3241 EVP_PKEY *newkey = NULL; in ImportRawDSAKey() local 3272 if ((newkey = EVP_PKEY_new()) == NULL) in ImportRawDSAKey() 3275 (void) EVP_PKEY_set1_DSA(newkey, dsa); in ImportRawDSAKey() 3287 return (newkey); in ImportRawDSAKey() 4250 KMF_RAW_KEY_DATA *newkey, int *nkeys) in add_key_to_list() argument 4265 list[n] = *newkey; in add_key_to_list() [all …]
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 978 krb5_keyblock newkey, histkey; in check_pw_reuse() local 985 &newkey, NULL); in check_pw_reuse() 997 if ((newkey.length == histkey.length) && in check_pw_reuse() 998 (newkey.enctype == histkey.enctype) && in check_pw_reuse() 999 (memcmp(newkey.contents, histkey.contents, in check_pw_reuse() 1002 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse() 1009 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse()
|
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | sec_clnt.c | 661 revoke_key(AUTH *auth, int newkey) in revoke_key() argument 666 if (newkey) { in revoke_key()
|
/illumos-gate/usr/src/cmd/bhyve/common/ |
H A D | smbiostbl.c | 897 const char *newkey; member 936 smbios_legacy_config_map[i].newkey, v); in smbios_build()
|
/illumos-gate/usr/src/cmd/passmgmt/ |
H A D | passmgmt.c | 222 assign_attr(userattr_t *user, const char *newkey, char *val) in assign_attr() argument 237 } else if (strcmp(key, newkey) == 0) { in assign_attr() 245 kv_pair[avail].key = strdup(newkey); in assign_attr()
|
/illumos-gate/usr/src/uts/common/io/usb/clients/usbkbm/ |
H A D | usbkbm.c | 1812 int newkey = 1; in usbkbm_unpack_usb_packet() local 1822 newkey = 0; in usbkbm_unpack_usb_packet() 1827 if (newkey) { in usbkbm_unpack_usb_packet()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 535 krb5_keyblock *newkey = NULL; in kerberos5_is() local 736 auth_context, &newkey); in kerberos5_is() 741 if (newkey != NULL) { in kerberos5_is() 743 newkey, &session_key); in kerberos5_is() 744 krb5_free_keyblock(telnet_context, newkey); in kerberos5_is()
|
/illumos-gate/usr/src/man/man8/ |
H A D | Makefile | 326 newkey.8 \
|
/illumos-gate/usr/src/lib/libcurses/ |
H A D | Makefile.com | 76 mvwscanw.o napms.o newkey.o newpad.o newscreen.o \
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 4167 KMF_KEY_HANDLE newkey; in KMFPK11_ExportPK12() local 4188 KMF_KEY_HANDLE_ATTR, &newkey, sizeof (KMF_KEY_HANDLE)); in KMFPK11_ExportPK12() 4200 keylist[numkeys - 1] = newkey; in KMFPK11_ExportPK12()
|
/illumos-gate/usr/src/lib/libsecdb/ |
H A D | exec_attr.txt | 181 Name Service Security:suser:cmd:::/usr/sbin/newkey:euid=0
|