Searched refs:akey (Results 1 – 4 of 4) sorted by relevance
/titanic_41/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | dump.c | 613 krb5_key_data *pkey, *akey, nullkey; local 656 pkey = akey = (krb5_key_data *) NULL; 700 &akey))) { 709 if (!pkey && akey) { 710 pkey = akey; 711 akey = &nullkey; 714 if (!akey) 715 akey = &nullkey; 725 (krb5_int32) akey->key_data_length[0], 727 (krb5_int32) akey->key_data_length[1], [all …]
|
/titanic_41/usr/src/lib/libast/common/misc/ |
H A D | setenviron.c | 43 setenviron(const char* akey) in setenviron() argument 51 char* key = (char*)akey; in setenviron() 60 return (*intercepts.intercept_setenviron)(akey); in setenviron()
|
/titanic_41/usr/src/uts/common/inet/ip/ |
H A D | sadb.c | 2908 sadb_key_t *akey = (sadb_key_t *)ksi->ks_in_extv[SADB_EXT_KEY_AUTH]; local 3171 if (akey != NULL && newbie->ipsa_auth_alg != SADB_AALG_NONE) { 3173 if (akey != NULL) { 3178 newbie->ipsa_authkeybits = akey->sadb_key_bits; 3179 newbie->ipsa_authkeylen = SADB_1TO8(akey->sadb_key_bits); 3181 if ((akey->sadb_key_bits & 0x7) != 0) 3190 bcopy(akey + 1, newbie->ipsa_authkey, newbie->ipsa_authkeylen); 3191 bzero(akey + 1, newbie->ipsa_authkeylen); 4485 sadb_key_t *akey = (sadb_key_t *)ksi->ks_in_extv[SADB_EXT_KEY_AUTH]; local 4529 if (akey != NULL) {
|
H A D | ipsecesp.c | 3575 sadb_key_t *akey = (sadb_key_t *)ksi->ks_in_extv[SADB_EXT_KEY_AUTH]; local 3700 if (akey != NULL && assoc->sadb_sa_auth != SADB_AALG_NONE) { 3702 if (akey != NULL) { 3723 if (!ipsec_valid_key_size(akey->sadb_key_bits, aalg)) { 3731 if (ipsec_check_key(aalg->alg_mech_type, akey, B_TRUE,
|