/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | k5_kmd5des.c | 72 krb5_keyblock newkey; in k5_md5des_hash() local 129 bzero(&newkey, sizeof(krb5_keyblock)); in k5_md5des_hash() 130 newkey.enctype = key->enctype; in k5_md5des_hash() 131 newkey.contents = xorkey; in k5_md5des_hash() 132 newkey.length = sizeof(xorkey); in k5_md5des_hash() 133 newkey.dk_list = NULL; in k5_md5des_hash() 134 newkey.kef_key.ck_data = NULL; in k5_md5des_hash() 135 ret = init_key_kef(context->kef_cipher_mt, &newkey); in k5_md5des_hash() 145 &newkey, (unsigned char*) mit_des_zeroblock, 1); in k5_md5des_hash() 148 (void)crypto_destroy_ctx_template(newkey.key_tmpl); in k5_md5des_hash() [all …]
|
/titanic_41/usr/src/cmd/keyserv/ |
H A D | Makefile | 26 SBINPROG = keyserv newkey 41 NEWKEYOBJS = newkey.o 80 newkey := LDLIBS += -lsldap -lsocket 102 newkey:$(CHANGE_OBJS) $(NEWKEYOBJS) $(OUTSIDE_UTIL_OBJS) target
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 206 krb5_keyblock *newkey = 0; in kerberos5_send() local 346 krb5_auth_con_getlocalsubkey(telnet_context, auth_context, &newkey); in kerberos5_send() 352 if (newkey) { in kerberos5_send() 357 if (!(ACCEPTED_ENCTYPE(newkey->enctype))) { in kerberos5_send() 364 newkey, &session_key); in kerberos5_send() 366 krb5_free_keyblock(telnet_context, newkey); in kerberos5_send()
|
/titanic_41/usr/src/uts/common/sys/ |
H A D | mhd.h | 127 mhioc_resv_key_t newkey; member 137 mhioc_resv_key_t newkey; member
|
/titanic_41/usr/src/lib/libtecla/common/ |
H A D | keytab.c | 793 int newkey; /* The index of a key in the updated binding table */ in _kt_clear_bindings() local 807 newkey = 0; in _kt_clear_bindings() 813 if(oldkey != newkey) in _kt_clear_bindings() 814 kt->table[newkey] = *sym; in _kt_clear_bindings() 815 newkey++; in _kt_clear_bindings() 821 kt->nkey = newkey; in _kt_clear_bindings()
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 1095 soft_derive_enforce_flags(soft_object_t *basekey, soft_object_t *newkey) in soft_derive_enforce_flags() argument 1105 if (newkey->bool_attr_mask & SENSITIVE_BOOL_ON) { in soft_derive_enforce_flags() 1109 if (newkey->bool_attr_mask & EXTRACTABLE_BOOL_ON) { in soft_derive_enforce_flags() 1119 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags() 1127 newkey->bool_attr_mask |= ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags() 1129 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags() 1139 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags() 1147 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags() 1149 newkey->bool_attr_mask |= NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags() 1154 newkey->bool_attr_mask &= ~LOCAL_BOOL_ON; in soft_derive_enforce_flags()
|
/titanic_41/usr/src/uts/common/io/comstar/lu/stmf_sbd/ |
H A D | sbd_pgr.c | 1746 sbd_pgr_key_t *newkey; in sbd_pgr_out_register_and_move() local 1798 newkey = sbd_pgr_key_registered(pgr, lpt, &rport); in sbd_pgr_out_register_and_move() 1799 if (newkey) { in sbd_pgr_out_register_and_move() 1801 newkey->pgr_key = svc_key; in sbd_pgr_out_register_and_move() 1804 if (newkey->pgr_key_flags & SBD_PGR_KEY_ALL_TG_PT) { in sbd_pgr_out_register_and_move() 1805 if (newkey->pgr_key_lpt_id && in sbd_pgr_out_register_and_move() 1806 newkey->pgr_key_lpt_len > 0) { in sbd_pgr_out_register_and_move() 1807 kmem_free(newkey->pgr_key_lpt_id, in sbd_pgr_out_register_and_move() 1808 newkey->pgr_key_lpt_len); in sbd_pgr_out_register_and_move() 1812 newkey->pgr_key_lpt_len = lpt_len; in sbd_pgr_out_register_and_move() [all …]
|
/titanic_41/usr/src/lib/libcurses/screen/ |
H A D | newkey.c | 59 newkey(char *rcvchars, short keyval, bool macro) in newkey() function
|
H A D | mapfile-vers | 484 newkey;
|
H A D | llib-lcurses | 828 /* newkey.c */ 829 int newkey(char *rcvchars, short keyval, bool macro);
|
H A D | curses.ed | 387 extern int newkey(char *, short, bool); 534 extern int mvwin(), mvderwin(), napms(), newkey(), filter(),
|
/titanic_41/usr/src/cmd/ypcmd/net_files/ |
H A D | publickey | 26 # newkey(1M) on the local machine.
|
/titanic_41/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | lock.c | 2067 char newkey[LOCK_KEY_MAXLEN]; in _getUniqueId() local 2110 (void) snprintf(newkey, sizeof (newkey), in _getUniqueId() 2116 log_msg(LOG_MSG_DEBUG, MSG_LOCK_GENUID_INTERNAL, newkey); in _getUniqueId() 2117 return (strdup(newkey)); in _getUniqueId()
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 3133 EVP_PKEY *newkey = NULL; in ImportRawRSAKey() local 3175 if ((newkey = EVP_PKEY_new()) == NULL) in ImportRawRSAKey() 3178 (void) EVP_PKEY_set1_RSA(newkey, rsa); in ImportRawRSAKey() 3183 return (newkey); in ImportRawRSAKey() 3190 EVP_PKEY *newkey = NULL; in ImportRawDSAKey() local 3217 if ((newkey = EVP_PKEY_new()) == NULL) in ImportRawDSAKey() 3220 (void) EVP_PKEY_set1_DSA(newkey, dsa); in ImportRawDSAKey() 3224 return (newkey); in ImportRawDSAKey() 4203 KMF_RAW_KEY_DATA *newkey, int *nkeys) in add_key_to_list() argument 4218 list[n] = *newkey; in add_key_to_list() [all …]
|
/titanic_41/usr/src/pkg/manifests/ |
H A D | system-network-nis.mf | 77 file path=usr/sbin/newkey group=sys mode=0555 93 file path=usr/share/man/man1m/newkey.1m
|
/titanic_41/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 985 krb5_keyblock newkey, histkey; in check_pw_reuse() local 992 &newkey, NULL); in check_pw_reuse() 1004 if ((newkey.length == histkey.length) && in check_pw_reuse() 1005 (newkey.enctype == histkey.enctype) && in check_pw_reuse() 1006 (memcmp(newkey.contents, histkey.contents, in check_pw_reuse() 1009 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse() 1016 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse()
|
/titanic_41/usr/src/uts/common/rpc/sec/ |
H A D | sec_clnt.c | 661 revoke_key(AUTH *auth, int newkey) in revoke_key() argument 666 if (newkey) { in revoke_key()
|
/titanic_41/usr/src/cmd/passmgmt/ |
H A D | passmgmt.c | 222 assign_attr(userattr_t *user, const char *newkey, char *val) { in assign_attr() argument 236 } else if (strcmp(key, newkey) == 0) { in assign_attr() 244 kv_pair[avail].key = strdup(newkey); in assign_attr()
|
/titanic_41/usr/src/uts/common/io/usb/clients/usbkbm/ |
H A D | usbkbm.c | 1787 int newkey = 1; in usbkbm_unpack_usb_packet() local 1797 newkey = 0; in usbkbm_unpack_usb_packet() 1802 if (newkey) { in usbkbm_unpack_usb_packet()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 535 krb5_keyblock *newkey = NULL; in kerberos5_is() local 736 auth_context, &newkey); in kerberos5_is() 741 if (newkey != NULL) { in kerberos5_is() 743 newkey, &session_key); in kerberos5_is() 744 krb5_free_keyblock(telnet_context, newkey); in kerberos5_is()
|
/titanic_41/usr/src/lib/libcurses/ |
H A D | Makefile.com | 75 mvwscanw.o napms.o newkey.o newpad.o newscreen.o \
|
/titanic_41/usr/src/man/man1m/ |
H A D | Makefile | 353 newkey.1m \
|
/titanic_41/usr/src/tools/depcheck/ |
H A D | examples.txt | 377 Analyzing /usr/sbin/newkey:
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 4166 KMF_KEY_HANDLE newkey; in KMFPK11_ExportPK12() local 4187 KMF_KEY_HANDLE_ATTR, &newkey, sizeof (KMF_KEY_HANDLE)); in KMFPK11_ExportPK12() 4199 keylist[numkeys - 1] = newkey; in KMFPK11_ExportPK12()
|
/titanic_41/usr/src/lib/libsecdb/ |
H A D | exec_attr.txt | 179 Name Service Security:suser:cmd:::/usr/sbin/newkey:euid=0
|