/titanic_51/usr/src/lib/libnisdb/ |
H A D | db_scheme.cc | 44 keys.keys_len = 0; in db_scheme() 45 keys.keys_val = NULL; in db_scheme() 54 numkeys = this->keys.keys_len = orig->keys.keys_len; in db_scheme() 55 db_key_desc * descols = this->keys.keys_val = new db_key_desc[numkeys]; in db_scheme() 56 db_key_desc * srccols = orig->keys.keys_val; in db_scheme() 94 keys.keys_len = 0; in db_scheme() 95 keys.keys_val = NULL; in db_scheme() 125 keys.keys_len = count; in db_scheme() 126 db_key_desc * scols = keys in db_scheme() [all...] |
H A D | db_scheme_c.x | 80 db_key_desc keys<>; 98 % } keys; variable 104 %/* Accessor: return number of keys in scheme. */ 105 % int numkeys() { return keys.keys_len; } 108 % db_key_desc* keyloc () { return keys.keys_val; } 112 % keys.keys_len = 0; 113 % keys.keys_val = NULL; 124 %/* Destructor: delete all keys associated with scheme and scheme itself. */
|
H A D | ldap_scheme.c | 52 if (index >= s->keys.keys_len) { in schemeQuery2Query() 55 myself, index, s->keys.keys_len-1); in schemeQuery2Query() 60 s->keys.keys_val[index].column_number - 1; in schemeQuery2Query() 110 s->keys.keys_len) { in schemeQuery2nisAttr() 115 s->keys.keys_len-1); in schemeQuery2nisAttr() 119 index = s->keys.keys_val[i].column_number - 1; in schemeQuery2nisAttr()
|
H A D | nis_hashitem.c | 93 (void) memset(table->keys, 0, sizeof (table->keys)); in __nis_init_hash_table() 243 key %= (sizeof (table->keys) / sizeof (table->keys[0])); in __find_item_mt() 248 for (pp = &table->keys[key]; (it = *pp) != 0; pp = &it->next) { in __find_item_mt() 434 for (cur = table->keys[item->keychain]; cur; in __nis_pop_item_mt() 440 table->keys[cur->keychain] = cur->next; in __nis_pop_item_mt() 690 slot < sizeof (table->keys) / sizeof (table->keys[0]); in __nis_scan_table_mt() 694 for (it = table->keys[slo in __nis_scan_table_mt() [all...] |
/titanic_51/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | ksslutil.c | 50 KMF_RAW_KEY_DATA *keys; in PKCS12_get_rsa_key_certs() local 55 keys = NULL; in PKCS12_get_rsa_key_certs() 68 &ncerts, &keys, &nkeys); in PKCS12_get_rsa_key_certs() 83 if (keys != NULL) { in PKCS12_get_rsa_key_certs() 85 kmf_free_raw_key(&keys[i]); in PKCS12_get_rsa_key_certs() 86 free(keys); in PKCS12_get_rsa_key_certs() 88 keys = NULL; in PKCS12_get_rsa_key_certs() 91 *rsa = keys; in PKCS12_get_rsa_key_certs() 97 * Parse a PEM file which should contain RSA private keys and 109 KMF_RAW_KEY_DATA *keys; in PEM_get_rsa_key_certs() local [all...] |
/titanic_51/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | context_establish.c | 164 dh_key_set keys; in gen_accept_token() local 181 /* Package the context session keys into a key_set */ in gen_accept_token() 182 keys.dh_key_set_len = ctx->no_keys; in gen_accept_token() 183 keys.dh_key_set_val = ctx->keys; in gen_accept_token() 186 return (__make_token(output, NULL, &token, &keys)); in gen_accept_token() 251 * establish_session_keys: This routine decrypts the session keys supplied 252 * and uses those keys to verifiy the signature over the input token 257 dh_key_set_t keys, dh_signature_t sig, dh_token_t token) in establish_session_keys() argument 267 * mechanism uses a cache of public keys, the in establish_session_keys() 595 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */ gen_init_token() local 804 dh_key_set keys; continue_context() local [all...] |
H A D | MICwrap.c | 44 * session keys). the message with the given qop and return 62 dh_key_set keys; in __dh_gss_sign() local 83 /* Package the context session keys in a key_set for __make_token */ in __dh_gss_sign() 84 keys.dh_key_set_len = cntx->no_keys; in __dh_gss_sign() 85 keys.dh_key_set_val = cntx->keys; in __dh_gss_sign() 100 * non serialized tok and the context keys. in __dh_gss_sign() 102 if ((*minor = __make_token(token, message, &tok, &keys)) in __dh_gss_sign() 132 dh_key_set keys; in __dh_gss_verify() local 150 /* Package up the context session keys i in __dh_gss_verify() 226 dh_key_set keys; __dh_gss_seal() local 317 dh_key_set keys; __dh_gss_unseal() local [all...] |
H A D | crypto.c | 86 * of keys is odd 89 * If we have an even number of keys and additional encryption will be 100 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, in __desN_crypt() argument 120 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); in __desN_crypt() 134 * If we have an even number of keys then do an extra round of in __desN_crypt() 138 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); in __desN_crypt() 152 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) in __dh_desN_crypt() argument 159 if (keys->dh_key_set_len < 1) in __dh_desN_crypt() 173 stat = __desN_crypt(keys->dh_key_set_val, keys in __dh_desN_crypt() 186 __dh_des_crypt(gss_buffer_t buf,dh_key_set_t keys,cipher_mode_t cipher_mode) __dh_des_crypt() argument 221 MD5_verifier(gss_buffer_t tok,gss_buffer_t msg,cipher_proc signer,dh_key_set_t keys,dh_signature_t signature) MD5_verifier() argument 358 __mk_sig(dh_qop_t qop,char * tok,long len,gss_buffer_t mesg,dh_key_set_t keys,dh_signature_t sig) __mk_sig() argument 395 __verify_sig(dh_token_t token,dh_qop_t qop,dh_key_set_t keys,dh_signature_t sig) __verify_sig() argument 497 __QOPSeal(dh_qop_t qop,gss_buffer_t input,int conf_req,dh_key_set_t keys,gss_buffer_t output,int * conf_ret) __QOPSeal() argument 550 __QOPUnSeal(dh_qop_t qop,gss_buffer_t input,int conf_req,dh_key_set_t keys,gss_buffer_t output) __QOPUnSeal() argument [all...] |
H A D | token.c | 119 dh_key_set_t keys /* The session keys to sign the token */) in __make_ap_token() argument 193 if ((stat = __xdr_encode_token(&xdrs, NULL, token, keys)) in __make_ap_token() 215 dh_key_set_t keys /* The keys to encrypt the check sum with */) in __make_token() argument 246 if ((stat = __xdr_encode_token(&xdrs, msg, token, keys)) in __make_token() 382 * session keys established, so that keys is null. The unencrypted in __get_ap_token() 384 * caller can then attempt to decrypt the session keys in token in __get_ap_token() 385 * and encrypt the returned sig with those keys t in __get_ap_token() 406 __get_token(gss_buffer_t input,gss_buffer_t msg,dh_token_t token,dh_key_set_t keys) __get_token() argument 446 __xdr_encode_token(register XDR * xdrs,gss_buffer_t msg,dh_token_desc * objp,dh_key_set_t keys) __xdr_encode_token() argument 493 __xdr_decode_token(register XDR * xdrs,gss_buffer_t msg,dh_token_desc * objp,dh_key_set_t keys,dh_signature_t sig) __xdr_decode_token() argument [all...] |
H A D | crypto.h | 47 dh_key_set_t keys, cipher_mode_t mode); 49 cipher_proc signer, dh_key_set_t keys, dh_signature_t signature); 61 dh_key_set_t keys, gss_buffer_t output, int *conf_ret); 65 dh_key_set_t keys, gss_buffer_t output);
|
/titanic_51/usr/src/cmd/print/lpget/ |
H A D | lpget.c | 73 display_value(ns_printer_t *printer, char *name, char **keys) in display_value() argument 80 if (keys != NULL) { in display_value() 81 while (*keys != NULL) { in display_value() 82 char *string = ns_get_value_string(*keys, in display_value() 84 rc += display_kvp(*keys, string); in display_value() 85 keys++; in display_value() 120 char **keys = NULL; in main() local 141 keys = (char **)list_append((void **)keys, in main() 164 (*printers)->name, keys); in main() [all...] |
/titanic_51/usr/src/lib/libcurses/screen/ |
H A D | newkey.c | 61 _KEY_MAP **keys, *key_info, in newkey() local 68 (((keys = (_KEY_MAP **) malloc(sizeof (_KEY_MAP *) * in newkey() 77 free(keys); in newkey() 87 (void) memcpy((char *) keys, (char *) prev_keys, in newkey() 89 keys[*numkeys] = key_info; in newkey() 93 (void) memcpy((char *) keys, (char *) prev_keys, in newkey() 95 (void) memcpy((char *) &(keys[*first + 1]), in newkey() 98 keys[(*first)++] = key_info; in newkey() 103 cur_term->_keys = keys; in newkey()
|
/titanic_51/usr/src/cmd/mandoc/ |
H A D | tbl_opts.c | 41 static const struct tbl_phrase keys[] = { variable 59 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0]))) 107 tbl->parse, ln, *pos, keys[key].name); in arg() 111 keys[key].name, want, len); in arg() 155 (strncasecmp(p + pos, keys[i].name, len) || in tbl_option() 156 keys[i].name[len] != '\0')) in tbl_option() 169 if (keys[i].key) in tbl_option() 170 tbl->opts.opts |= keys[i].key; in tbl_option()
|
/titanic_51/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | certs.c | 64 * incert - File to read certs and keys from 71 * and one or more keys are found, then the first 72 * certificate is used, and the keys are searched for a 75 * keys are found, then the first key is returned. 84 STACK_OF(EVP_PKEY) *keys = NULL; in load_cert_and_key() 107 &data, &keys, &certs) < 0) { in load_cert_and_key() 128 if (key && (keys != NULL)) { in load_cert_and_key() 131 * if we found a cert and some keys, in load_cert_and_key() 135 for (i = 0; i < sk_EVP_PKEY_num(keys); i++) { in load_cert_and_key() 137 sk_EVP_PKEY_value(keys, in load_cert_and_key() [all...] |
/titanic_51/usr/src/cmd/oamuser/user/ |
H A D | funcs.c | 82 static ua_key_t keys[] = { variable 99 #define NKEYS (sizeof (keys)/sizeof (ua_key_t)) 126 if (strcmp(key, keys[i].key) == 0) { in change_key() 127 if (keys[i].newvalue != NULL) { in change_key() 133 if (keys[i].check != NULL && in change_key() 134 (res = keys[i].check(value)) != NULL) { in change_key() 135 errmsg(M_INVALID, res, keys[i].errstr); in change_key() 138 keys[i].newvalue = value; in change_key() 148 * Add the keys to the argument vector. 156 const char *key = keys[ in addkey_args() [all...] |
/titanic_51/usr/src/cmd/fm/dicts/ |
H A D | SMF.po | 28 # keys: defect.sunos.smf.svc.disabled 44 # keys: defect.sunos.smf.svc.temporarily_disabled 60 # keys: defect.sunos.smf.svc.invalid_restarter 76 # keys: defect.sunos.smf.svc.restarter_absent 92 # keys: defect.sunos.smf.svc.uninitialized 108 # keys: defect.sunos.smf.svc.restarter_dead 124 # keys: defect.sunos.smf.svc.administrative_request 140 # keys: defect.sunos.smf.svc.fault_threshold_reached 156 # keys: defect.sunos.smf.svc.method_fail 172 # keys [all...] |
H A D | INTEL.po | 28 # keys: fault.cpu.intel.internal 44 # keys: fault.cpu.intel.l0cache 60 # keys: fault.cpu.intel.l1cache 76 # keys: fault.cpu.intel.l2cache 92 # keys: fault.cpu.intel.cache 108 # keys: fault.cpu.intel.l0dtlb 124 # keys: fault.cpu.intel.l1dtlb 140 # keys: fault.cpu.intel.l2dtlb 156 # keys: fault.cpu.intel.dtlb 172 # keys [all...] |
/titanic_51/usr/src/cmd/pools/poold/com/sun/solaris/domain/pools/ |
H A D | Expression.java | 139 * supplied keys. 141 * @param keys Array of valid key strings. 145 * a member of the keys array. 147 protected static void validateKeyword(String keys[], String key) in validateKeyword() argument 150 for (int i = 0; i < keys.length; i++) { in validateKeyword() 151 if (keys[i].compareTo(key) == 0) in validateKeyword() 204 * The array of valid keys for this type of expression. 206 private static final String keys[] = { "utilization" }; field in KVOpExpression 262 validateKeyword(keys, m.group(3)); in valueOf() 397 * The array of valid keys fo 399 private static final String keys[] = { "locality" }; global() field in KVExpression 552 private static final String keys[] = { "wt-load" }; global() field in KExpression [all...] |
/titanic_51/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ in __generic_gen_dhkeys() 152 /* We get the private keys as private key modulo the modulus */ in __generic_gen_dhkeys() 180 * Given a key extract keynum des keys 183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) in extractdeskeys() argument 190 /* len is the total number of bits we need for keynum des keys */ in extractdeskeys() 201 * the middle bits of the key for the bits in our DES keys. in extractdeskeys() 208 * into the array of DES keys. in extractdeskeys() 210 k = (char *)keys; in extractdeskeys() 222 des_setparity((char *)&keys[i]); in extractdeskeys() 224 des_setparity_g(&keys[ in extractdeskeys() 244 __generic_common_dhkeys(char * pkey,char * skey,int keylen,char * xmodulus,des_block keys[],int keynum) __generic_common_dhkeys() argument [all...] |
/titanic_51/usr/src/cmd/krb5/kadmin/server/ |
H A D | misc.c | 43 * keepold (input) whether to preserve old keys 88 * keepold (input) whether to preserve old keys 108 krb5_keyblock **keys, int *n_keys) in randkey_principal_wrapper_3() argument 118 keys, n_keys); in randkey_principal_wrapper_3() 140 krb5_keyblock ** keys, int *n_keys) in randkey_principal_wrapper() argument 149 return kadm5_randkey_principal(server_handle, princ, keys, n_keys); in randkey_principal_wrapper()
|
/titanic_51/usr/src/cmd/ipf/examples/ |
H A D | mkfilters.sh | 13 foreach $i (keys %ifaces) { 22 foreach $i (keys %ifaces) { 36 foreach $i (keys %ifaces) { 52 foreach $j (keys %ifaces) {
|
/titanic_51/usr/src/lib/libcmd/common/ |
H A D | chgrp.c | 234 Key_t keys[3]; in b_chgrp() local 356 keys[1].gid = keys[2].uid = NOID; in b_chgrp() 397 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid; in b_chgrp() 398 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid; in b_chgrp() 402 if (m = (Map_t*)dtmatch(map, &keys[i])) in b_chgrp() 415 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID)); in b_chgrp()
|
/titanic_51/usr/src/cmd/fm/scripts/ |
H A D | dictck.pl | 179 # make sure keys are sorted 181 die "$name:$line: keys not in expected format of:\n" . 185 # check for duplicate or unexpected keys 186 my %keys; 193 if defined($keys{$e}); 194 $keys{$e} = 1; 196 $maxkey = keys(%keys) if $maxkey < keys(%keys); [all...] |
/titanic_51/usr/src/contrib/ast/src/lib/libcmd/ |
H A D | chgrp.c | 239 Key_t keys[3]; in b_chgrp() local 370 keys[1].gid = keys[2].uid = NOID; in b_chgrp() 429 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid; in b_chgrp() 430 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid; in b_chgrp() 434 if (m = (Map_t*)dtmatch(map, &keys[i])) in b_chgrp() 447 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID)); in b_chgrp()
|
/titanic_51/usr/src/lib/libnsl/des/ |
H A D | des_crypt.c | 169 desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, in desN_crypt() argument 183 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); in desN_crypt() 196 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); in desN_crypt() 207 __cbc_triple_crypt(des_block keys[], char *buf, uint_t len, in __cbc_triple_crypt() argument 210 return (desN_crypt(keys, 3, buf, len, mode, ivec)); in __cbc_triple_crypt()
|