/titanic_41/usr/src/lib/krb5/plugins/kdb/db2/libdb2/btree/ |
H A D | bt_utils.c | 69 __bt_ret(t, e, key, rkey, data, rdata, copy) in __bt_ret() argument 72 DBT *key, *rkey, *data, *rdata; 90 &key->size, &rkey->data, &rkey->size)) 92 key->data = rkey->data; 94 if (bl->ksize > rkey->size) { 95 p = (void *)(rkey->data == NULL ? 96 malloc(bl->ksize) : realloc(rkey->data, bl->ksize)); 99 rkey->data = p; 100 rkey->size = bl->ksize; 102 memmove(rkey->data, bl->bytes, bl->ksize); [all …]
|
/titanic_41/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 115 KMF_RAW_SYM_KEY *rkey = NULL; in genkey_pkcs11() local 221 rkey = malloc(sizeof (KMF_RAW_SYM_KEY)); in genkey_pkcs11() 222 if (rkey == NULL) { in genkey_pkcs11() 226 (void) memset(rkey, 0, sizeof (KMF_RAW_SYM_KEY)); in genkey_pkcs11() 227 kmfrv = kmf_get_sym_key_value(kmfhandle, &key, rkey); in genkey_pkcs11() 231 hexstrlen = 2 * rkey->keydata.len + 1; in genkey_pkcs11() 238 tohexstr(rkey->keydata.val, rkey->keydata.len, hexstr, in genkey_pkcs11() 245 kmf_free_raw_sym_key(rkey); in genkey_pkcs11() 260 KMF_RAW_SYM_KEY *rkey = NULL; in genkey_file() local 326 rkey = malloc(sizeof (KMF_RAW_SYM_KEY)); in genkey_file() [all …]
|
H A D | export.c | 524 KMF_RAW_SYM_KEY rkey; in pk_export_pk11_keys() local 526 (void) memset(&rkey, 0, sizeof (KMF_RAW_SYM_KEY)); in pk_export_pk11_keys() 527 rv = kmf_get_sym_key_value(kmfhandle, &key, &rkey); in pk_export_pk11_keys() 537 n = write(fd, rkey.keydata.val + total, in pk_export_pk11_keys() 538 rkey.keydata.len - total); in pk_export_pk11_keys() 548 } while (total < rkey.keydata.len); in pk_export_pk11_keys() 552 kmf_free_bigint(&rkey.keydata); in pk_export_pk11_keys()
|
H A D | list.c | 171 KMF_RAW_SYM_KEY rkey; in pk_show_keys() local 173 (void) memset(&rkey, 0, sizeof (rkey)); in pk_show_keys() 175 &rkey); in pk_show_keys() 178 rkey.keydata.len * 8); in pk_show_keys() 179 kmf_free_bigint(&rkey.keydata); in pk_show_keys()
|
/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth-rsa.c | 155 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in auth_rsa_key_allowed() argument 275 if (allowed && rkey != NULL) in auth_rsa_key_allowed() 276 *rkey = key; in auth_rsa_key_allowed()
|
/titanic_41/usr/src/cmd/lofiadm/ |
H A D | main.c | 375 mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly) in add_mapping() argument 390 bcopy(rkey, li.li_key, rksz); in add_mapping() 1013 char *rkey; in getkeyfromtoken() local 1106 rv = pkcs11_ObjectToKey(sess, obj, (void **)&rkey, &rksz, in getkeyfromtoken() 1114 getkeyfromfile(keyfile, cipher, &rkey, &rksz); in getkeyfromtoken() 1125 rv = C_UnwrapKey(sess, &unwrap, obj, (CK_BYTE_PTR)rkey, in getkeyfromtoken() 1132 rv = pkcs11_ObjectToKey(sess, rawobj, (void **)&rkey, &rksz, in getkeyfromtoken() 1149 *raw_key = (char *)rkey; in getkeyfromtoken() 1826 char *rkey = NULL; in main() local 2024 getkeyfromuser(cipher, &rkey, &rksz); in main() [all …]
|
/titanic_41/usr/src/lib/libkmf/libkmf/common/ |
H A D | keyop.c | 246 KMF_RAW_SYM_KEY *rkey) in kmf_get_sym_key_value() argument 255 if (symkey == NULL || rkey == NULL) in kmf_get_sym_key_value() 262 symkey, rkey)); in kmf_get_sym_key_value()
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2818 KMF_RAW_SYM_KEY *rkey = NULL; in fetch_key() local 2866 rkey = malloc(sizeof (KMF_RAW_SYM_KEY)); in fetch_key() 2867 if (rkey == NULL) { in fetch_key() 2872 (void) memset(rkey, 0, sizeof (KMF_RAW_SYM_KEY)); in fetch_key() 2877 rkey->keydata.len = keyvalue.Length; in fetch_key() 2878 rkey->keydata.val = keyvalue.Data; in fetch_key() 2883 key->keyp = (void *)rkey; in fetch_key() 2892 if (rkey != NULL) { in fetch_key() 2893 kmf_free_raw_sym_key(rkey); in fetch_key() 4595 KMF_RAW_SYM_KEY *rkey = NULL; in OpenSSL_CreateSymKey() local [all …]
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2298 KMF_RAW_KEY_DATA *rkey = NULL; in KMFPK11_FindPrikeyByCert() local 2299 rv = keyObj2RawKey(handle, key, &rkey); in KMFPK11_FindPrikeyByCert() 2301 key->keyp = rkey; in KMFPK11_FindPrikeyByCert() 2786 KMF_RAW_KEY_DATA *rkey; in keyObj2RawKey() local 2789 rkey = malloc(sizeof (KMF_RAW_KEY_DATA)); in keyObj2RawKey() 2790 if (rkey == NULL) in keyObj2RawKey() 2793 (void) memset(rkey, 0, sizeof (KMF_RAW_KEY_DATA)); in keyObj2RawKey() 2795 rkey->keytype = inkey->keyalg; in keyObj2RawKey() 2799 &rkey->rawdata.rsa); in keyObj2RawKey() 2802 &rkey->rawdata.dsa); in keyObj2RawKey() [all …]
|
/titanic_41/usr/src/cmd/sendmail/db/db/ |
H A D | db_am.c | 297 if (dbc->rkey.data != NULL) 298 __os_free(dbc->rkey.data, dbc->rkey.ulen);
|
/titanic_41/usr/src/uts/common/sys/ib/clients/of/rdma/ |
H A D | ib_user_verbs.h | 292 uint32_t rkey; member 607 uint32_t rkey; member 614 uint32_t rkey; member
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 2026 KMF_RAW_SYM_KEY *rkey) in NSS_GetSymKeyValue() argument 2037 if (symkey == NULL || rkey == NULL) in NSS_GetSymKeyValue() 2050 rkey->keydata.len = rawkey->rawdata.sym.keydata.len; in NSS_GetSymKeyValue() 2051 if ((rkey->keydata.val = malloc(rkey->keydata.len)) == NULL) in NSS_GetSymKeyValue() 2053 (void) memcpy(rkey->keydata.val, in NSS_GetSymKeyValue() 2054 rawkey->rawdata.sym.keydata.val, rkey->keydata.len); in NSS_GetSymKeyValue() 2079 rkey->keydata.val = malloc(value->len); in NSS_GetSymKeyValue() 2080 if (rkey->keydata.val == NULL) { in NSS_GetSymKeyValue() 2084 (void) memcpy(rkey->keydata.val, value->data, value->len); in NSS_GetSymKeyValue() 2085 rkey->keydata.len = value->len; in NSS_GetSymKeyValue()
|
/titanic_41/usr/src/cmd/sendmail/db/btree/ |
H A D | bt_cursor.c | 142 NULL, &dbc->rkey.data)) != 0) { 146 dbc->rkey.ulen = sizeof(db_recno_t); 558 h, cp->indx, key, &dbc->rkey.data, &dbc->rkey.ulen); 809 &dbt, &dbc->rkey.data, &dbc->rkey.ulen)) != 0)
|
H A D | bt_recno.c | 626 &dbc->rkey.data, &dbc->rkey.ulen, dbp->db_malloc)) != 0)
|
/titanic_41/usr/src/uts/common/io/ib/ibtl/ |
H A D | ibtl_mem.c | 392 ibt_mw_hdl_t *mw_hdl_p, ibt_rkey_t *rkey) in ibt_alloc_mw() argument 400 IBTL_HCA2CIHCA(hca_hdl), pd, flags, mw_hdl_p, rkey); in ibt_alloc_mw()
|
/titanic_41/usr/src/lib/libipmi/common/ |
H A D | ipmi_hash.c | 92 int (*compare)(const void *lkey, const void *rkey)) in ipmi_hash_create() argument
|
/titanic_41/usr/src/lib/udapl/udapl_tavor/tavor/ |
H A D | dapl_tavor_hw.h | 406 uint32_t rkey; member
|
/titanic_41/usr/src/uts/common/io/ib/adapters/hermon/ |
H A D | hermon_wr.c | 452 uint32_t rkey; in hermon_post_send_rc() local 551 rkey = wr->wr.rc.rcwr.rdma.rdma_rkey; in hermon_post_send_rc() 693 "total len %x", tail, rkey, raddr, rlen); in hermon_post_send_rc()
|
/titanic_41/usr/src/cmd/sendmail/db/hash/ |
H A D | hash.c | 602 H_KEYINDEX(hcp->bndx), key, &dbc->rkey.data, 603 &dbc->rkey.size)) != 0)
|
H A D | hash_page.c | 919 &tmp, &dbc->rkey.data, &dbc->rkey.size)) != 0)
|
/titanic_41/usr/src/cmd/sendmail/db/ |
H A D | db.h | 506 DBT rkey; /* Returned key. */ member
|
/titanic_41/usr/src/uts/common/sys/ib/ibtl/ |
H A D | ibti_common.h | 1233 ibt_mw_flags_t flags, ibt_mw_hdl_t *mw_hdl_p, ibt_rkey_t *rkey);
|
/titanic_41/usr/src/uts/common/sys/ib/adapters/hermon/ |
H A D | hermon_hw.h | 4543 uint32_t rkey; member 4582 uint32_t rkey; member
|
/titanic_41/usr/src/uts/common/sys/ib/adapters/tavor/ |
H A D | tavor_hw.h | 2240 uint32_t rkey; member
|
/titanic_41/usr/src/uts/common/io/ib/clients/of/sol_uverbs/ |
H A D | sol_uverbs.c | 2147 resp.rkey = new_mr_desc.md_rkey; in sol_uverbs_reg_mr()
|