Home
last modified time | relevance | path

Searched refs:newkey (Results 1 – 25 of 28) sorted by relevance

12

/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/
H A Dk5_kmd5des.c72 krb5_keyblock newkey; in k5_md5des_hash() local
129 bzero(&newkey, sizeof(krb5_keyblock)); in k5_md5des_hash()
130 newkey.enctype = key->enctype; in k5_md5des_hash()
131 newkey.contents = xorkey; in k5_md5des_hash()
132 newkey.length = sizeof(xorkey); in k5_md5des_hash()
133 newkey.dk_list = NULL; in k5_md5des_hash()
134 newkey.kef_key.ck_data = NULL; in k5_md5des_hash()
135 ret = init_key_kef(context->kef_cipher_mt, &newkey); in k5_md5des_hash()
145 &newkey, (unsigned char*) mit_des_zeroblock, 1); in k5_md5des_hash()
148 (void)crypto_destroy_ctx_template(newkey.key_tmpl); in k5_md5des_hash()
[all …]
/titanic_41/usr/src/cmd/keyserv/
H A DMakefile26 SBINPROG = keyserv newkey
41 NEWKEYOBJS = newkey.o
80 newkey := LDLIBS += -lsldap -lsocket
102 newkey:$(CHANGE_OBJS) $(NEWKEYOBJS) $(OUTSIDE_UTIL_OBJS) target
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dkerberos5.c206 krb5_keyblock *newkey = 0; in kerberos5_send() local
346 krb5_auth_con_getlocalsubkey(telnet_context, auth_context, &newkey); in kerberos5_send()
352 if (newkey) { in kerberos5_send()
357 if (!(ACCEPTED_ENCTYPE(newkey->enctype))) { in kerberos5_send()
364 newkey, &session_key); in kerberos5_send()
366 krb5_free_keyblock(telnet_context, newkey); in kerberos5_send()
/titanic_41/usr/src/uts/common/sys/
H A Dmhd.h127 mhioc_resv_key_t newkey; member
137 mhioc_resv_key_t newkey; member
/titanic_41/usr/src/lib/libtecla/common/
H A Dkeytab.c793 int newkey; /* The index of a key in the updated binding table */ in _kt_clear_bindings() local
807 newkey = 0; in _kt_clear_bindings()
813 if(oldkey != newkey) in _kt_clear_bindings()
814 kt->table[newkey] = *sym; in _kt_clear_bindings()
815 newkey++; in _kt_clear_bindings()
821 kt->nkey = newkey; in _kt_clear_bindings()
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c1095 soft_derive_enforce_flags(soft_object_t *basekey, soft_object_t *newkey) in soft_derive_enforce_flags() argument
1105 if (newkey->bool_attr_mask & SENSITIVE_BOOL_ON) { in soft_derive_enforce_flags()
1109 if (newkey->bool_attr_mask & EXTRACTABLE_BOOL_ON) { in soft_derive_enforce_flags()
1119 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags()
1127 newkey->bool_attr_mask |= ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags()
1129 newkey->bool_attr_mask &= ~ALWAYS_SENSITIVE_BOOL_ON; in soft_derive_enforce_flags()
1139 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags()
1147 newkey->bool_attr_mask &= ~NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags()
1149 newkey->bool_attr_mask |= NEVER_EXTRACTABLE_BOOL_ON; in soft_derive_enforce_flags()
1154 newkey->bool_attr_mask &= ~LOCAL_BOOL_ON; in soft_derive_enforce_flags()
/titanic_41/usr/src/uts/common/io/comstar/lu/stmf_sbd/
H A Dsbd_pgr.c1746 sbd_pgr_key_t *newkey; in sbd_pgr_out_register_and_move() local
1798 newkey = sbd_pgr_key_registered(pgr, lpt, &rport); in sbd_pgr_out_register_and_move()
1799 if (newkey) { in sbd_pgr_out_register_and_move()
1801 newkey->pgr_key = svc_key; in sbd_pgr_out_register_and_move()
1804 if (newkey->pgr_key_flags & SBD_PGR_KEY_ALL_TG_PT) { in sbd_pgr_out_register_and_move()
1805 if (newkey->pgr_key_lpt_id && in sbd_pgr_out_register_and_move()
1806 newkey->pgr_key_lpt_len > 0) { in sbd_pgr_out_register_and_move()
1807 kmem_free(newkey->pgr_key_lpt_id, in sbd_pgr_out_register_and_move()
1808 newkey->pgr_key_lpt_len); in sbd_pgr_out_register_and_move()
1812 newkey->pgr_key_lpt_len = lpt_len; in sbd_pgr_out_register_and_move()
[all …]
/titanic_41/usr/src/lib/libcurses/screen/
H A Dnewkey.c59 newkey(char *rcvchars, short keyval, bool macro) in newkey() function
H A Dmapfile-vers484 newkey;
H A Dllib-lcurses828 /* newkey.c */
829 int newkey(char *rcvchars, short keyval, bool macro);
H A Dcurses.ed387 extern int newkey(char *, short, bool);
534 extern int mvwin(), mvderwin(), napms(), newkey(), filter(),
/titanic_41/usr/src/cmd/ypcmd/net_files/
H A Dpublickey26 # newkey(1M) on the local machine.
/titanic_41/usr/src/cmd/svr4pkg/pkgadm/
H A Dlock.c2067 char newkey[LOCK_KEY_MAXLEN]; in _getUniqueId() local
2110 (void) snprintf(newkey, sizeof (newkey), in _getUniqueId()
2116 log_msg(LOG_MSG_DEBUG, MSG_LOCK_GENUID_INTERNAL, newkey); in _getUniqueId()
2117 return (strdup(newkey)); in _getUniqueId()
/titanic_41/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c3133 EVP_PKEY *newkey = NULL; in ImportRawRSAKey() local
3175 if ((newkey = EVP_PKEY_new()) == NULL) in ImportRawRSAKey()
3178 (void) EVP_PKEY_set1_RSA(newkey, rsa); in ImportRawRSAKey()
3183 return (newkey); in ImportRawRSAKey()
3190 EVP_PKEY *newkey = NULL; in ImportRawDSAKey() local
3217 if ((newkey = EVP_PKEY_new()) == NULL) in ImportRawDSAKey()
3220 (void) EVP_PKEY_set1_DSA(newkey, dsa); in ImportRawDSAKey()
3224 return (newkey); in ImportRawDSAKey()
4203 KMF_RAW_KEY_DATA *newkey, int *nkeys) in add_key_to_list() argument
4218 list[n] = *newkey; in add_key_to_list()
[all …]
/titanic_41/usr/src/pkg/manifests/
H A Dsystem-network-nis.mf77 file path=usr/sbin/newkey group=sys mode=0555
93 file path=usr/share/man/man1m/newkey.1m
/titanic_41/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c985 krb5_keyblock newkey, histkey; in check_pw_reuse() local
992 &newkey, NULL); in check_pw_reuse()
1004 if ((newkey.length == histkey.length) && in check_pw_reuse()
1005 (newkey.enctype == histkey.enctype) && in check_pw_reuse()
1006 (memcmp(newkey.contents, histkey.contents, in check_pw_reuse()
1009 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse()
1016 krb5_free_keyblock_contents(context, &newkey); in check_pw_reuse()
/titanic_41/usr/src/uts/common/rpc/sec/
H A Dsec_clnt.c661 revoke_key(AUTH *auth, int newkey) in revoke_key() argument
666 if (newkey) { in revoke_key()
/titanic_41/usr/src/cmd/passmgmt/
H A Dpassmgmt.c222 assign_attr(userattr_t *user, const char *newkey, char *val) { in assign_attr() argument
236 } else if (strcmp(key, newkey) == 0) { in assign_attr()
244 kv_pair[avail].key = strdup(newkey); in assign_attr()
/titanic_41/usr/src/uts/common/io/usb/clients/usbkbm/
H A Dusbkbm.c1787 int newkey = 1; in usbkbm_unpack_usb_packet() local
1797 newkey = 0; in usbkbm_unpack_usb_packet()
1802 if (newkey) { in usbkbm_unpack_usb_packet()
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.telnetd.c535 krb5_keyblock *newkey = NULL; in kerberos5_is() local
736 auth_context, &newkey); in kerberos5_is()
741 if (newkey != NULL) { in kerberos5_is()
743 newkey, &session_key); in kerberos5_is()
744 krb5_free_keyblock(telnet_context, newkey); in kerberos5_is()
/titanic_41/usr/src/lib/libcurses/
H A DMakefile.com75 mvwscanw.o napms.o newkey.o newpad.o newscreen.o \
/titanic_41/usr/src/man/man1m/
H A DMakefile353 newkey.1m \
/titanic_41/usr/src/tools/depcheck/
H A Dexamples.txt377 Analyzing /usr/sbin/newkey:
/titanic_41/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c4166 KMF_KEY_HANDLE newkey; in KMFPK11_ExportPK12() local
4187 KMF_KEY_HANDLE_ATTR, &newkey, sizeof (KMF_KEY_HANDLE)); in KMFPK11_ExportPK12()
4199 keylist[numkeys - 1] = newkey; in KMFPK11_ExportPK12()
/titanic_41/usr/src/lib/libsecdb/
H A Dexec_attr.txt179 Name Service Security:suser:cmd:::/usr/sbin/newkey:euid=0

12