/titanic_44/usr/src/common/net/wanboot/ |
H A D | p12auxpars.c | 151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs); 209 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument 222 if (pkey) in sunw_PKCS12_parse() 223 *pkey = NULL; in sunw_PKCS12_parse() 265 name_str, pkey, cert, ca); in sunw_PKCS12_parse() 273 if (pkey && *pkey) { in sunw_PKCS12_parse() 274 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse() 320 int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in parse_pkcs12() argument 363 work_kl, work_cl, pkey, cert); in parse_pkcs12() 381 pkey, cert); in parse_pkcs12() [all …]
|
H A D | p12misc.c | 230 sunw_evp_pkey_free(EVP_PKEY *pkey) in sunw_evp_pkey_free() argument 232 if (pkey != NULL) { in sunw_evp_pkey_free() 233 if (pkey->attributes != NULL) { in sunw_evp_pkey_free() 234 sk_X509_ATTRIBUTE_pop_free(pkey->attributes, in sunw_evp_pkey_free() 236 pkey->attributes = NULL; in sunw_evp_pkey_free() 238 EVP_PKEY_free(pkey); in sunw_evp_pkey_free() 262 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, in sunw_set_localkeyid() argument 278 if (pkey != NULL) { in sunw_set_localkeyid() 299 if (pkey->attributes == NULL) { in sunw_set_localkeyid() 300 pkey->attributes = sk_X509_ATTRIBUTE_new_null(); in sunw_set_localkeyid() [all …]
|
H A D | p12access.c | 104 sunw_use_pkey(SSL_CTX *ctx, EVP_PKEY *pkey) in sunw_use_pkey() argument 107 if (ctx == NULL || pkey == NULL) { in sunw_use_pkey() 112 if (SSL_CTX_use_PrivateKey(ctx, pkey) != 1) { in sunw_use_pkey() 250 EVP_PKEY *pkey = NULL; in sunw_p12_use_keyfile() local 262 ret = p12_doparse(p12, passwd, DO_UNMATCHING, &pkey, NULL, in sunw_p12_use_keyfile() 264 if (ret > 0 && pkey != NULL) { in sunw_p12_use_keyfile() 265 if (sunw_use_pkey(ctx, pkey) != 1) { in sunw_p12_use_keyfile() 281 if (ret == -1 && pkey != NULL) { in sunw_p12_use_keyfile() 282 sunw_evp_pkey_free(pkey); in sunw_p12_use_keyfile() 283 pkey = NULL; in sunw_p12_use_keyfile() [all …]
|
H A D | auxutil.c | 328 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, argument 344 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL; 401 if (pkey != NULL && kl != NULL) { 412 if (pkey != NULL) 413 *pkey = sk_EVP_PKEY_delete(kl, k); 428 if (pkey != NULL) 429 *pkey = sk_EVP_PKEY_delete(kl, k); 495 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, argument 505 if (pkey != NULL && *pkey == NULL) { 507 *pkey = sk_EVP_PKEY_delete(kl, n); [all …]
|
H A D | p12auxutl.c | 112 EVP_PKEY *pkey = NULL; in sunw_PKCS12_create() local 259 pkey = sk_EVP_PKEY_value(pkeys, i); in sunw_PKCS12_create() 262 if ((p8 = EVP_PKEY2PKCS8(pkey)) == NULL) { in sunw_PKCS12_create() 277 len = sunw_get_pkey_fname(GETDO_COPY, pkey, in sunw_PKCS12_create() 289 len = sunw_get_pkey_localkeyid(GETDO_COPY, pkey, in sunw_PKCS12_create()
|
/titanic_44/usr/src/lib/libpkg/common/ |
H A D | p12lib.c | 277 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument 290 if (pkey) in sunw_PKCS12_parse() 291 *pkey = NULL; in sunw_PKCS12_parse() 333 name_str, pkey, cert, ca); in sunw_PKCS12_parse() 341 if (pkey && *pkey) { in sunw_PKCS12_parse() 342 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse() 392 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) in sunw_PEM_contents() 418 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, NULL, NULL, in sunw_PEM_contents() 455 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, in sunw_PKCS12_contents() argument 484 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, in sunw_PKCS12_contents() [all …]
|
/titanic_44/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_nis() argument 195 if (pkey) { in getkeys_nis() 202 (void) strcpy(pkey, keyval); in getkeys_nis() 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_files() argument 276 if (pkey) { in getkeys_files() 285 (void) strcpy(pkey, mval); in getkeys_files() 310 __getpublickey_cached(char *netname, char *pkey, int *from_cache) in __getpublickey_cached() argument 312 return (__getpublickey_cached_g(netname, KEYSIZE, 0, pkey, in __getpublickey_cached() 317 getpublickey(const char *netname, char *pkey) in getpublickey() argument 319 return (__getpublickey_cached((char *)netname, pkey, (int *)0)); in getpublickey() [all …]
|
H A D | gen_dhkeys.c | 168 __gen_dhkeys_g(char *pkey, /* out */ in __gen_dhkeys_g() argument 176 if (! pkey || ! skey || ! pass) in __gen_dhkeys_g() 180 __gen_dhkeys(pkey, skey, pass); in __gen_dhkeys_g() 188 (*dlfp)(pkey, skey, pass); /* void */ in __gen_dhkeys_g()
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 799 readAltFormatPrivateKey(KMF_DATA *filedata, EVP_PKEY **pkey) in readAltFormatPrivateKey() argument 814 *pkey = NULL; in readAltFormatPrivateKey() 905 *pkey = ImportRawRSAKey(&rsa); in readAltFormatPrivateKey() 958 EVP_PKEY *pkey = NULL; in openssl_load_key() local 977 pkey = d2i_PrivateKey_bio(keyfile, NULL); in openssl_load_key() 978 if (pkey == NULL) { in openssl_load_key() 987 &pkey); in openssl_load_key() 993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL); in openssl_load_key() 994 if (pkey == NULL) { in openssl_load_key() 1011 &derdata, &pkey); in openssl_load_key() [all …]
|
/titanic_44/usr/src/cmd/ibd_upgrade/ |
H A D | ibd_upgrade.sh | 40 pkey= 56 pkey=0x$2 131 -o "$pkey" = "0x0" -o "$pkey" = "0x" ]; then 151 do_cmd "dladm create-part -f -l $2 -P $pkey $partition_name"
|
/titanic_44/usr/src/lib/nsswitch/ldap/common/ |
H A D | getkeyent.c | 69 char *keytype = (char *)argp->key.pkey.keytype; in _nss_ldap_key2str() 73 char *buffer, *pkey, *skey; in _nss_ldap_key2str() local 98 pkey = *pkey_array + keytypelen; in _nss_ldap_key2str() 126 len = strlen(pkey) + strlen(skey) + 2; in _nss_ldap_key2str() 137 (void) snprintf(buffer, len, "%s:%s", pkey, skey); in _nss_ldap_key2str() 175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname)) in getkeys()
|
/titanic_44/usr/src/lib/libnsl/rpc/ |
H A D | auth_des.c | 106 netobj pkey; in authdes_seccreate() local 116 pkey.n_bytes = (char *)pkey_data; in authdes_seccreate() 117 pkey.n_len = (uint_t)strlen((char *)pkey_data) + 1; in authdes_seccreate() 118 return (authdes_pk_seccreate(servername, &pkey, win, timehost, in authdes_seccreate() 129 authdes_pk_seccreate(const char *servername, netobj *pkey, uint_t window, in authdes_pk_seccreate() argument 156 (void) memcpy(ad->ad_pkey, pkey->n_bytes, pkey->n_len); in authdes_pk_seccreate() 406 netobj pkey; in authdes_refresh() local 422 pkey.n_bytes = (char *)(ad->ad_pkey); in authdes_refresh() 423 pkey.n_len = (uint_t)strlen((char *)ad->ad_pkey) + 1; in authdes_refresh() 424 if (key_encryptsession_pk(ad->ad_servername, &pkey, &ad->ad_xkey) < 0) { in authdes_refresh()
|
H A D | key_call.c | 625 const char *pkey, in key_setnet_g_ext() argument 646 arg.st_pub_key.keybuf3_val = (char *)pkey; in key_setnet_g_ext() 698 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g() argument 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g() 709 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g_ruid() argument 711 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g_ruid() 716 key_get_conv(char *pkey, des_block *deskey) in key_get_conv() argument 720 if (!key_call((rpcproc_t)KEY_GET_CONV, xdr_keybuf, pkey, in key_get_conv() 733 const char *pkey, in key_get_conv_g() argument 744 return (key_get_conv((char *)pkey, deskey)); in key_get_conv_g() [all …]
|
/titanic_44/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 44 int algtype, char *pkey, size_t pkeylen, int *cached) in __getpublickey_cached_g() argument 46 return (getpublickey(remotename, pkey)); in __getpublickey_cached_g() 53 int algtype, char *pkey, size_t pkeylen) in getpublickey_g() argument 55 return (getpublickey(remotename, pkey)); in getpublickey_g()
|
/titanic_44/usr/src/uts/common/io/ib/ibnex/ |
H A D | ibnex_hca.c | 318 ib_pkey_t pkey; in ibnex_config_obp_args() local 344 devname, &pkey, &port_num) != IBNEX_SUCCESS) { in ibnex_config_obp_args() 382 rval = ibnex_get_dip_from_guid(port_guid, index, pkey, &cdip); in ibnex_config_obp_args() 390 if (pkey == port_attr->pa_pkey_tbl[ii].pt_pkey) { in ibnex_config_obp_args() 392 index, IBNEX_VPPA_COMMSVC_NODE, pkey, &rval, in ibnex_config_obp_args() 413 char *devname, ib_pkey_t *pkey, uint8_t *port) in ibnex_prom_devname_to_pkey_n_portnum() argument 429 *pkey = ibnex_str2hex(tmp, (tmp1 - tmp), &ret); in ibnex_prom_devname_to_pkey_n_portnum() 481 ib_pkey_t pkey; in ibnex_hca_bus_config_one() local 543 &index, &pkey, &port_num) != IBNEX_SUCCESS) { in ibnex_hca_bus_config_one() 550 if ((pkey != 0) && (port_num != 0)) { in ibnex_hca_bus_config_one()
|
H A D | ibnex.c | 1479 ib_pkey_t pkey; in ibnex_create_vppa_nodes() local 1497 pkey = port_attr->pa_pkey_tbl[ii].pt_pkey; in ibnex_create_vppa_nodes() 1499 if (IBNEX_INVALID_PKEY(pkey)) { in ibnex_create_vppa_nodes() 1503 port_attr->pa_port_guid, idx, pkey, &dip); in ibnex_create_vppa_nodes() 1507 pkey, &rval, IBNEX_CFGADM_ENUMERATE); in ibnex_create_vppa_nodes() 1609 ib_pkey_t pkey; in ibnex_config_port_node() local 1617 &index, &pkey, &port_num) != IBNEX_SUCCESS) { in ibnex_config_port_node() 1653 rval = ibnex_get_dip_from_guid(port_guid, index, pkey, &cdip); in ibnex_config_port_node() 1664 if (pkey == 0 && port_num != 0) { in ibnex_config_port_node() 1666 port_attr, index, IBNEX_PORT_COMMSVC_NODE, pkey, &rval, in ibnex_config_port_node() [all …]
|
/titanic_44/usr/src/uts/common/sys/ib/clients/of/rdma/ |
H A D | ib_addr.h | 72 uint16_t pkey) in ib_addr_set_pkey() argument 74 dev_addr->broadcast[8] = pkey >> 8; in ib_addr_set_pkey() 75 dev_addr->broadcast[9] = (unsigned char) pkey; in ib_addr_set_pkey()
|
/titanic_44/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | dump.c | 613 krb5_key_data *pkey, *akey, nullkey; local 656 pkey = akey = (krb5_key_data *) NULL; 696 &pkey)) && 709 if (!pkey && akey) { 710 pkey = akey; 724 (krb5_int32) pkey->key_data_length[0], 726 (krb5_int32) pkey->key_data_length[1], 729 (krb5_int32) pkey->key_data_type[0]); 730 for (i=0; i<pkey->key_data_length[0]; i++) { 731 fprintf(arg->ofile, "%02x", pkey->key_data_contents[0][i]); [all …]
|
/titanic_44/usr/src/uts/common/io/ib/ibtl/ |
H A D | ibtl_hca.c | 1338 ib_pkey_t pkey, uint16_t *pkey_ix) in ibtl_pkey2index() argument 1345 hca_devp, port_num, pkey); in ibtl_pkey2index() 1349 if ((pkey == IB_PKEY_INVALID_FULL) || in ibtl_pkey2index() 1350 (pkey == IB_PKEY_INVALID_LIMITED)) in ibtl_pkey2index() 1362 if (pkey == port_infop->p_pkey_tbl[i]) { in ibtl_pkey2index() 1387 uint16_t pkey_ix, ib_pkey_t *pkey) in ibtl_index2pkey() argument 1412 *pkey = port_infop->p_pkey_tbl[pkey_ix]; in ibtl_index2pkey() 1413 if ((*pkey == IB_PKEY_INVALID_FULL) || in ibtl_index2pkey() 1414 (*pkey == IB_PKEY_INVALID_LIMITED)) in ibtl_index2pkey() 1435 ibt_pkey2index(ibt_hca_hdl_t hca_hdl, uint8_t port_num, ib_pkey_t pkey, in ibt_pkey2index() argument [all …]
|
/titanic_44/usr/src/uts/common/sys/ib/ibnex/ |
H A D | ibnex.h | 275 #define IBNEX_INVALID_PKEY(pkey) \ argument 276 (((pkey) == IB_PKEY_INVALID_FULL) || \ 277 ((pkey) == IB_PKEY_INVALID_LIMITED))
|
/titanic_44/usr/src/lib/libc/port/threads/ |
H A D | tsd.c | 51 thr_keycreate(thread_key_t *pkey, void (*destructor)(void *)) in thr_keycreate() argument 128 *pkey = tsdm->tsdm_nused; in thr_keycreate() 140 pthread_key_create(pthread_key_t *pkey, void (*destructor)(void *)) in pthread_key_create() argument 142 return (thr_keycreate(pkey, destructor)); in pthread_key_create()
|
/titanic_44/usr/src/uts/common/sys/ib/mgt/ibdm/ |
H A D | ibdm_impl.h | 374 #define IBDM_INVALID_PKEY(pkey) \ argument 375 (((pkey) == IB_PKEY_INVALID_FULL) || \ 376 ((pkey) == IB_PKEY_INVALID_LIMITED))
|
/titanic_44/usr/src/lib/libdladm/common/ |
H A D | libdlib.c | 425 ib_pkey_t pkey, uint32_t flags, char *pname, datalink_id_t *partlinkid, in dladm_part_create() argument 436 pattr.dia_pkey = pkey; in dladm_part_create() 613 ib_pkey_t pkey; in i_dladm_part_up() local 657 pkey = (ib_pkey_t)u64; in i_dladm_part_up() 674 pattr.dia_pkey = pkey; in i_dladm_part_up()
|
/titanic_44/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 240 __generic_common_dhkeys(char *pkey, /* Public key of remote */ in __generic_common_dhkeys() argument 248 MINT *pk = mp_xtom(pkey); in __generic_common_dhkeys()
|
/titanic_44/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/ |
H A D | p12split.c | 527 do_ofile(char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ta) in do_ofile() argument 559 if (pkey != NULL && sk_EVP_PKEY_push(klist, pkey) == 0) { in do_ofile() 595 if (pkey != NULL && sk_EVP_PKEY_num(klist) == 1) { in do_ofile()
|