Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 270) sorted by relevance

1234567891011

/titanic_51/usr/src/lib/libnisdb/
H A Ddb_scheme.cc44 keys.keys_len = 0; in db_scheme()
45 keys.keys_val = NULL; in db_scheme()
54 numkeys = this->keys.keys_len = orig->keys.keys_len; in db_scheme()
55 db_key_desc * descols = this->keys.keys_val = new db_key_desc[numkeys]; in db_scheme()
56 db_key_desc * srccols = orig->keys.keys_val; in db_scheme()
94 keys.keys_len = 0; in db_scheme()
95 keys.keys_val = NULL; in db_scheme()
125 keys.keys_len = count; in db_scheme()
126 db_key_desc * scols = keys in db_scheme()
[all...]
H A Ddb_scheme_c.x80 db_key_desc keys<>;
98 % } keys; variable
104 %/* Accessor: return number of keys in scheme. */
105 % int numkeys() { return keys.keys_len; }
108 % db_key_desc* keyloc () { return keys.keys_val; }
112 % keys.keys_len = 0;
113 % keys.keys_val = NULL;
124 %/* Destructor: delete all keys associated with scheme and scheme itself. */
H A Dldap_scheme.c52 if (index >= s->keys.keys_len) { in schemeQuery2Query()
55 myself, index, s->keys.keys_len-1); in schemeQuery2Query()
60 s->keys.keys_val[index].column_number - 1; in schemeQuery2Query()
110 s->keys.keys_len) { in schemeQuery2nisAttr()
115 s->keys.keys_len-1); in schemeQuery2nisAttr()
119 index = s->keys.keys_val[i].column_number - 1; in schemeQuery2nisAttr()
H A Dnis_hashitem.c93 (void) memset(table->keys, 0, sizeof (table->keys)); in __nis_init_hash_table()
243 key %= (sizeof (table->keys) / sizeof (table->keys[0])); in __find_item_mt()
248 for (pp = &table->keys[key]; (it = *pp) != 0; pp = &it->next) { in __find_item_mt()
434 for (cur = table->keys[item->keychain]; cur; in __nis_pop_item_mt()
440 table->keys[cur->keychain] = cur->next; in __nis_pop_item_mt()
690 slot < sizeof (table->keys) / sizeof (table->keys[0]); in __nis_scan_table_mt()
694 for (it = table->keys[slo in __nis_scan_table_mt()
[all...]
/titanic_51/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dksslutil.c50 KMF_RAW_KEY_DATA *keys; in PKCS12_get_rsa_key_certs() local
55 keys = NULL; in PKCS12_get_rsa_key_certs()
68 &ncerts, &keys, &nkeys); in PKCS12_get_rsa_key_certs()
83 if (keys != NULL) { in PKCS12_get_rsa_key_certs()
85 kmf_free_raw_key(&keys[i]); in PKCS12_get_rsa_key_certs()
86 free(keys); in PKCS12_get_rsa_key_certs()
88 keys = NULL; in PKCS12_get_rsa_key_certs()
91 *rsa = keys; in PKCS12_get_rsa_key_certs()
97 * Parse a PEM file which should contain RSA private keys and
109 KMF_RAW_KEY_DATA *keys; in PEM_get_rsa_key_certs() local
[all...]
/titanic_51/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcontext_establish.c164 dh_key_set keys; in gen_accept_token() local
181 /* Package the context session keys into a key_set */ in gen_accept_token()
182 keys.dh_key_set_len = ctx->no_keys; in gen_accept_token()
183 keys.dh_key_set_val = ctx->keys; in gen_accept_token()
186 return (__make_token(output, NULL, &token, &keys)); in gen_accept_token()
251 * establish_session_keys: This routine decrypts the session keys supplied
252 * and uses those keys to verifiy the signature over the input token
257 dh_key_set_t keys, dh_signature_t sig, dh_token_t token) in establish_session_keys() argument
267 * mechanism uses a cache of public keys, the in establish_session_keys()
595 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */ gen_init_token() local
804 dh_key_set keys; continue_context() local
[all...]
H A DMICwrap.c44 * session keys). the message with the given qop and return
62 dh_key_set keys; in __dh_gss_sign() local
83 /* Package the context session keys in a key_set for __make_token */ in __dh_gss_sign()
84 keys.dh_key_set_len = cntx->no_keys; in __dh_gss_sign()
85 keys.dh_key_set_val = cntx->keys; in __dh_gss_sign()
100 * non serialized tok and the context keys. in __dh_gss_sign()
102 if ((*minor = __make_token(token, message, &tok, &keys)) in __dh_gss_sign()
132 dh_key_set keys; in __dh_gss_verify() local
150 /* Package up the context session keys i in __dh_gss_verify()
226 dh_key_set keys; __dh_gss_seal() local
317 dh_key_set keys; __dh_gss_unseal() local
[all...]
H A Dcrypto.c86 * of keys is odd
89 * If we have an even number of keys and additional encryption will be
100 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, in __desN_crypt() argument
120 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); in __desN_crypt()
134 * If we have an even number of keys then do an extra round of in __desN_crypt()
138 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); in __desN_crypt()
152 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) in __dh_desN_crypt() argument
159 if (keys->dh_key_set_len < 1) in __dh_desN_crypt()
173 stat = __desN_crypt(keys->dh_key_set_val, keys in __dh_desN_crypt()
186 __dh_des_crypt(gss_buffer_t buf,dh_key_set_t keys,cipher_mode_t cipher_mode) __dh_des_crypt() argument
221 MD5_verifier(gss_buffer_t tok,gss_buffer_t msg,cipher_proc signer,dh_key_set_t keys,dh_signature_t signature) MD5_verifier() argument
358 __mk_sig(dh_qop_t qop,char * tok,long len,gss_buffer_t mesg,dh_key_set_t keys,dh_signature_t sig) __mk_sig() argument
395 __verify_sig(dh_token_t token,dh_qop_t qop,dh_key_set_t keys,dh_signature_t sig) __verify_sig() argument
497 __QOPSeal(dh_qop_t qop,gss_buffer_t input,int conf_req,dh_key_set_t keys,gss_buffer_t output,int * conf_ret) __QOPSeal() argument
550 __QOPUnSeal(dh_qop_t qop,gss_buffer_t input,int conf_req,dh_key_set_t keys,gss_buffer_t output) __QOPUnSeal() argument
[all...]
H A Dtoken.c119 dh_key_set_t keys /* The session keys to sign the token */) in __make_ap_token() argument
193 if ((stat = __xdr_encode_token(&xdrs, NULL, token, keys)) in __make_ap_token()
215 dh_key_set_t keys /* The keys to encrypt the check sum with */) in __make_token() argument
246 if ((stat = __xdr_encode_token(&xdrs, msg, token, keys)) in __make_token()
382 * session keys established, so that keys is null. The unencrypted in __get_ap_token()
384 * caller can then attempt to decrypt the session keys in token in __get_ap_token()
385 * and encrypt the returned sig with those keys t in __get_ap_token()
406 __get_token(gss_buffer_t input,gss_buffer_t msg,dh_token_t token,dh_key_set_t keys) __get_token() argument
446 __xdr_encode_token(register XDR * xdrs,gss_buffer_t msg,dh_token_desc * objp,dh_key_set_t keys) __xdr_encode_token() argument
493 __xdr_decode_token(register XDR * xdrs,gss_buffer_t msg,dh_token_desc * objp,dh_key_set_t keys,dh_signature_t sig) __xdr_decode_token() argument
[all...]
H A Dcrypto.h47 dh_key_set_t keys, cipher_mode_t mode);
49 cipher_proc signer, dh_key_set_t keys, dh_signature_t signature);
61 dh_key_set_t keys, gss_buffer_t output, int *conf_ret);
65 dh_key_set_t keys, gss_buffer_t output);
/titanic_51/usr/src/cmd/print/lpget/
H A Dlpget.c73 display_value(ns_printer_t *printer, char *name, char **keys) in display_value() argument
80 if (keys != NULL) { in display_value()
81 while (*keys != NULL) { in display_value()
82 char *string = ns_get_value_string(*keys, in display_value()
84 rc += display_kvp(*keys, string); in display_value()
85 keys++; in display_value()
120 char **keys = NULL; in main() local
141 keys = (char **)list_append((void **)keys, in main()
164 (*printers)->name, keys); in main()
[all...]
/titanic_51/usr/src/lib/libcurses/screen/
H A Dnewkey.c61 _KEY_MAP **keys, *key_info, in newkey() local
68 (((keys = (_KEY_MAP **) malloc(sizeof (_KEY_MAP *) * in newkey()
77 free(keys); in newkey()
87 (void) memcpy((char *) keys, (char *) prev_keys, in newkey()
89 keys[*numkeys] = key_info; in newkey()
93 (void) memcpy((char *) keys, (char *) prev_keys, in newkey()
95 (void) memcpy((char *) &(keys[*first + 1]), in newkey()
98 keys[(*first)++] = key_info; in newkey()
103 cur_term->_keys = keys; in newkey()
/titanic_51/usr/src/cmd/mandoc/
H A Dtbl_opts.c41 static const struct tbl_phrase keys[] = { variable
59 #define KEY_MAXKEYS ((int)(sizeof(keys)/sizeof(keys[0])))
107 tbl->parse, ln, *pos, keys[key].name); in arg()
111 keys[key].name, want, len); in arg()
155 (strncasecmp(p + pos, keys[i].name, len) || in tbl_option()
156 keys[i].name[len] != '\0')) in tbl_option()
169 if (keys[i].key) in tbl_option()
170 tbl->opts.opts |= keys[i].key; in tbl_option()
/titanic_51/usr/src/cmd/svr4pkg/pkgadm/
H A Dcerts.c64 * incert - File to read certs and keys from
71 * and one or more keys are found, then the first
72 * certificate is used, and the keys are searched for a
75 * keys are found, then the first key is returned.
84 STACK_OF(EVP_PKEY) *keys = NULL; in load_cert_and_key()
107 &data, &keys, &certs) < 0) { in load_cert_and_key()
128 if (key && (keys != NULL)) { in load_cert_and_key()
131 * if we found a cert and some keys, in load_cert_and_key()
135 for (i = 0; i < sk_EVP_PKEY_num(keys); i++) { in load_cert_and_key()
137 sk_EVP_PKEY_value(keys, in load_cert_and_key()
[all...]
/titanic_51/usr/src/cmd/oamuser/user/
H A Dfuncs.c82 static ua_key_t keys[] = { variable
99 #define NKEYS (sizeof (keys)/sizeof (ua_key_t))
126 if (strcmp(key, keys[i].key) == 0) { in change_key()
127 if (keys[i].newvalue != NULL) { in change_key()
133 if (keys[i].check != NULL && in change_key()
134 (res = keys[i].check(value)) != NULL) { in change_key()
135 errmsg(M_INVALID, res, keys[i].errstr); in change_key()
138 keys[i].newvalue = value; in change_key()
148 * Add the keys to the argument vector.
156 const char *key = keys[ in addkey_args()
[all...]
/titanic_51/usr/src/cmd/fm/dicts/
H A DSMF.po28 # keys: defect.sunos.smf.svc.disabled
44 # keys: defect.sunos.smf.svc.temporarily_disabled
60 # keys: defect.sunos.smf.svc.invalid_restarter
76 # keys: defect.sunos.smf.svc.restarter_absent
92 # keys: defect.sunos.smf.svc.uninitialized
108 # keys: defect.sunos.smf.svc.restarter_dead
124 # keys: defect.sunos.smf.svc.administrative_request
140 # keys: defect.sunos.smf.svc.fault_threshold_reached
156 # keys: defect.sunos.smf.svc.method_fail
172 # keys
[all...]
H A DINTEL.po28 # keys: fault.cpu.intel.internal
44 # keys: fault.cpu.intel.l0cache
60 # keys: fault.cpu.intel.l1cache
76 # keys: fault.cpu.intel.l2cache
92 # keys: fault.cpu.intel.cache
108 # keys: fault.cpu.intel.l0dtlb
124 # keys: fault.cpu.intel.l1dtlb
140 # keys: fault.cpu.intel.l2dtlb
156 # keys: fault.cpu.intel.dtlb
172 # keys
[all...]
/titanic_51/usr/src/cmd/pools/poold/com/sun/solaris/domain/pools/
H A DExpression.java139 * supplied keys.
141 * @param keys Array of valid key strings.
145 * a member of the keys array.
147 protected static void validateKeyword(String keys[], String key) in validateKeyword() argument
150 for (int i = 0; i < keys.length; i++) { in validateKeyword()
151 if (keys[i].compareTo(key) == 0) in validateKeyword()
204 * The array of valid keys for this type of expression.
206 private static final String keys[] = { "utilization" }; field in KVOpExpression
262 validateKeyword(keys, m.group(3)); in valueOf()
397 * The array of valid keys fo
399 private static final String keys[] = { "locality" }; global() field in KVExpression
552 private static final String keys[] = { "wt-load" }; global() field in KExpression
[all...]
/titanic_51/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Dgeneric_key.c102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ in __generic_gen_dhkeys()
152 /* We get the private keys as private key modulo the modulus */ in __generic_gen_dhkeys()
180 * Given a key extract keynum des keys
183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) in extractdeskeys() argument
190 /* len is the total number of bits we need for keynum des keys */ in extractdeskeys()
201 * the middle bits of the key for the bits in our DES keys. in extractdeskeys()
208 * into the array of DES keys. in extractdeskeys()
210 k = (char *)keys; in extractdeskeys()
222 des_setparity((char *)&keys[i]); in extractdeskeys()
224 des_setparity_g(&keys[ in extractdeskeys()
244 __generic_common_dhkeys(char * pkey,char * skey,int keylen,char * xmodulus,des_block keys[],int keynum) __generic_common_dhkeys() argument
[all...]
/titanic_51/usr/src/cmd/krb5/kadmin/server/
H A Dmisc.c43 * keepold (input) whether to preserve old keys
88 * keepold (input) whether to preserve old keys
108 krb5_keyblock **keys, int *n_keys) in randkey_principal_wrapper_3() argument
118 keys, n_keys); in randkey_principal_wrapper_3()
140 krb5_keyblock ** keys, int *n_keys) in randkey_principal_wrapper() argument
149 return kadm5_randkey_principal(server_handle, princ, keys, n_keys); in randkey_principal_wrapper()
/titanic_51/usr/src/cmd/ipf/examples/
H A Dmkfilters.sh13 foreach $i (keys %ifaces) {
22 foreach $i (keys %ifaces) {
36 foreach $i (keys %ifaces) {
52 foreach $j (keys %ifaces) {
/titanic_51/usr/src/lib/libcmd/common/
H A Dchgrp.c234 Key_t keys[3]; in b_chgrp() local
356 keys[1].gid = keys[2].uid = NOID; in b_chgrp()
397 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid; in b_chgrp()
398 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid; in b_chgrp()
402 if (m = (Map_t*)dtmatch(map, &keys[i])) in b_chgrp()
415 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID)); in b_chgrp()
/titanic_51/usr/src/cmd/fm/scripts/
H A Ddictck.pl179 # make sure keys are sorted
181 die "$name:$line: keys not in expected format of:\n" .
185 # check for duplicate or unexpected keys
186 my %keys;
193 if defined($keys{$e});
194 $keys{$e} = 1;
196 $maxkey = keys(%keys) if $maxkey < keys(%keys);
[all...]
/titanic_51/usr/src/contrib/ast/src/lib/libcmd/
H A Dchgrp.c239 Key_t keys[3]; in b_chgrp() local
370 keys[1].gid = keys[2].uid = NOID; in b_chgrp()
429 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid; in b_chgrp()
430 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid; in b_chgrp()
434 if (m = (Map_t*)dtmatch(map, &keys[i])) in b_chgrp()
447 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID)); in b_chgrp()
/titanic_51/usr/src/lib/libnsl/des/
H A Ddes_crypt.c169 desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, in desN_crypt() argument
183 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); in desN_crypt()
196 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); in desN_crypt()
207 __cbc_triple_crypt(des_block keys[], char *buf, uint_t len, in __cbc_triple_crypt() argument
210 return (desN_crypt(keys, 3, buf, len, mode, ivec)); in __cbc_triple_crypt()

1234567891011