/osnet-11/usr/src/lib/libshadowfs/common/ |
H A D | shadow_migrate.c | 190 ulong_t hash = 0; local 194 hash += fidp->fid_data[i]; 196 return (hash); 280 * hash based on FID and ignore those we've already seen.
|
/osnet-11/usr/src/lib/libsldap/common/ |
H A D | ns_mapping.c | 33 * Calculate a hash for a string 34 * Based on elf_hash algorithm, hash is case insensitive 55 * Scan a hash table hit for a matching hash entry. 75 * Find an entry in the hash table 83 unsigned long hash; local 88 hash = ns_hash(str) % NS_HASH_MAX; 89 idx = config->hashTbl[hash]; 124 * Remove a hash table entry. 142 * destroy the hash tabl 174 unsigned long hash; local [all...] |
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_auth.c | 94 * make a 16-byte hash. 113 * Create a LM response from the given LM hash and challenge. 119 smb_auth_lm_response(unsigned char *hash, argument 131 bcopy(hash, S21, SMBAUTH_HASH_SZ); 142 * The result will contain a 16-byte NTLM hash. 145 smb_auth_ntlm_hash(const char *password, unsigned char *hash) argument 151 if (password == NULL || hash == NULL) 162 rc = smb_auth_md4(hash, (unsigned char *)unicode_password, length); 175 smb_auth_ntlm_response(unsigned char *hash, argument 181 bcopy(hash, S2 384 smb_auth_v2_response( unsigned char *hash, unsigned char *srv_challenge, int slen, unsigned char *clnt_data, int clen, unsigned char *v2_rsp) argument [all...] |
/osnet-11/usr/src/lib/libdhcpsvc/modules/binfiles/ |
H A D | dhcp_network.c | 46 * in-use record is also on exactly one doubly-linked client id hash chain; 47 * the hash chains heads are contained in the header). For all other 49 * walking all of the hash chains. Here's a crude illustration of what 50 * this looks like on-disk (note that hash chains 2 and 3 are empty): 53 * | container info | hash chain heads (buckets) | 100 * when trying to achieve robustness is updating the client id hash chain. 103 * could leave our hash chains in an inconsistent state. 106 * the hash chains in the container. At any point in time, exactly one of 109 * operation, all hash chain modifications are done on the *inactive* 110 * image, then, once the inactive image has completed the hash chai 323 uint16_t hash; local 572 uint16_t hash; local 697 uint16_t hash; local 832 uint16_t hash, new_hash; local 1190 uint16_t hash; local 1340 nhconvert_header(dn_header_t *hdrp, boolean_t hash) argument 1397 read_header(int fd, dn_header_t *hdrp, boolean_t hash) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/ |
H A D | hash.h | 36 * @(#)hash.h 8.4 (Berkeley) 11/2/95 67 int32_t magic; /* Magic NO for hash tables */ 78 int32_t nkeys; /* Number of keys in hash table */ 80 int32_t h_charkey; /* value of hash(CHARKEY) */ 89 u_int32_t (*hash) __P((const void *, size_t)); /* Hash Function */ member in struct:htab
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | legacycfg.c | 537 grub_uint8_t hash[MD5_HASHLEN]; member in struct:legacy_md5_password 594 return (grub_crypto_memcmp (digest, pw->hash, MD5_HASHLEN) == 0); 661 pw->hash[i == 4 ? 5 : 12+i] = w & 0xff; 662 pw->hash[6+i] = (w >> 8) & 0xff; 663 pw->hash[i] = (w >> 16) & 0xff; 677 pw->hash[11] = w;
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | dsa.c | 598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) 615 /* s = (kinv * ( hash + x * r)) mod q */ 618 mpi_add( tmp, tmp, hash ); 631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) 651 /* u1 = (hash * w) mod q */ 652 mpi_mulm( u1, hash, w, pkey->q ); 990 dsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1000 if ((! data[0]) || (! data[1]) || (! hash) 1009 if (! verify (data[0], data[1], hash, &pk)) 1036 " (hash sha 597 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) argument 630 verify(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) argument 989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument [all...] |
H A D | ecc.c | 695 * Return the signature struct (r,s) from the message hash. The caller 739 mpi_addm (sum, input, dr, skey->E.n); /* sum = hash + (d*r) mod n */ 741 mpi_mulm (s, k_1, sum, skey->E.n); /* s = k^(-1)*(hash+(d*r)) mod n */ 786 /* h1 = hash * s^(-1) (mod n) */ 789 /* Q1 = [ hash * s^(-1) ]G */ 802 /* Q = ([hash * s^(-1)]G) + ([r * s^(-1)]Q) */ 1158 ecc_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1168 if (!data[0] || !data[1] || !hash || !pkey[0] || !pkey[1] || !pkey[2] 1192 err = verify (hash, &pk, data[0], data[1]); 1154 ecc_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument
|
H A D | rsa.c | 1007 rsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1027 log_mpidump (" hash:", hash ); 1031 rc = mpi_cmp (result, hash) ? GPG_ERR_BAD_SIGNATURE : GPG_ERR_NO_ERROR; 1047 /* Compute a keygrip. MD is the hash context which we are going to 1059 0 should be prefixed. We hash the raw bytes. */ 1097 " (hash sha1 #11223344556677889900aabbccddeeff10203040#))"; 1100 " (hash sha1 #11223344556677889900aabbccddeeff80203040#))"; 1006 rsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *opaque, gcry_mpi_t tmp), void *opaquev) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | dsa.c | 598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) 615 /* s = (kinv * ( hash + x * r)) mod q */ 618 mpi_add( tmp, tmp, hash ); 631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) 651 /* u1 = (hash * w) mod q */ 652 mpi_mulm( u1, hash, w, pkey->q ); 990 dsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1000 if ((! data[0]) || (! data[1]) || (! hash) 1009 if (! verify (data[0], data[1], hash, &pk)) 597 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) argument 630 verify(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) argument 989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument
|
H A D | rsa.c | 1006 rsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1026 log_mpidump (" hash:", hash ); 1030 rc = mpi_cmp (result, hash) ? GPG_ERR_BAD_SIGNATURE : GPG_ERR_NO_ERROR; 1046 /* Compute a keygrip. MD is the hash context which we are going to 1058 0 should be prefixed. We hash the raw bytes. */ 1005 rsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *opaque, gcry_mpi_t tmp), void *opaquev) argument
|
H A D | ecc.c | 695 * Return the signature struct (r,s) from the message hash. The caller 739 mpi_addm (sum, input, dr, skey->E.n); /* sum = hash + (d*r) mod n */ 741 mpi_mulm (s, k_1, sum, skey->E.n); /* s = k^(-1)*(hash+(d*r)) mod n */ 786 /* h1 = hash * s^(-1) (mod n) */ 789 /* Q1 = [ hash * s^(-1) ]G */ 802 /* Q = ([hash * s^(-1)]G) + ([r * s^(-1)]Q) */ 1158 ecc_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, 1168 if (!data[0] || !data[1] || !hash || !pkey[0] || !pkey[1] || !pkey[2] 1192 err = verify (hash, &pk, data[0], data[1]); 1154 ecc_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/net/ |
H A D | dns.c | 115 hash (const char *str) function 385 h = hash (data->oname); 446 h = hash (name);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ |
H A D | dump.c | 1258 /* The "quality" of a hash is defined as the total number of 1260 to the expected number needed for a random hash. 1264 For a random hash of n keys into k buckets, the expected 1277 Perl_dump_indent(aTHX_ level, file, " hash quality = %.1"NVff"%%", theoret/sum*100); 1300 U32 hash = HeHASH(he); local 1310 PerlIO_printf(file, "HASH = 0x%"UVxf"\n", (UV)hash);
|
H A D | pp_hot.c | 787 Perl_croak(aTHX_ "Can't return hash to lvalue scalar context"); 804 Perl_croak(aTHX_ "Can't return hash to lvalue" 864 Perl_croak(aTHX_ "Can't return hash to lvalue" 910 av_fill(ary, 0); /* clear all but the fields hash */ 934 S_do_oddball(pTHX_ HV *hash, SV **relem, SV **firstrelem) argument 949 "Odd number of elements in hash assignment"); 951 if (SvTYPE(hash) == SVt_PVAV) { 954 if (avhv_store_ent((AV*)hash,*relem,tmpstr,0)) 956 if (SvMAGICAL(hash) && SvSMAGICAL(tmpstr)) 962 didstore = hv_store_ent(hash,*rele 989 HV *hash; local 1706 U32 hash = (SvFAKE(keysv) && SvREADONLY(keysv)) ? SvUVX(keysv) : 0; local 3074 U32 hash = SvUVX(sv); local [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | FTP.pm | 107 $ftp->hash(exists $arg{Hash} ? $arg{Hash} : 0, 1024); 127 sub hash { subroutine 864 my $hash = ${*$ftp}{'net_ftp_supported'} ||= {}; 866 return $hash->{$cmd} 867 if exists $hash->{$cmd}; 869 return $hash->{$cmd} = 0 876 $hash->{"\U$2"} = !length("$1$3"); 880 $hash->{$cmd} = $text !~ /unimplemented/i; 883 $hash->{$cmd} ||= 0; 1288 C<OPTIONS> are passed in a hash lik [all...] |
/osnet-11/usr/src/lib/libast/common/vmalloc/ |
H A D | vmprofile.c | 35 #define PFHASH(pf) ((pf)->data.data.hash) 49 { Vmulong_t hash; /* hash value */ member in struct:_pfdata_s 71 static Pfobj_t** Pftable; /* hash table */ 92 /* make hash table; PFTABLE'th slot hold regions' records */ 100 /* see if it's there with a combined hash value of vm,file,line */ 388 /* remove from hash table */ 450 /* reinsert into hash table */
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | ndbm.c | 235 unsigned long hash; local 237 hash = dcalchash(key); 239 db->dbm_blkno = hash & db->dbm_hmask; 399 dbm_hashinc(DBM *db, unsigned long hash) argument 403 hash &= db->dbm_hmask; 409 if ((hash&bit) == 0) 410 return (hash|bit); 411 hash &= ~bit; 420 dbm_firsthash(DBM *db, unsigned long hash) argument 426 dbm_access(db, hash); 541 unsigned long hash; local 714 dbm_access(DBM *db, unsigned long hash) argument [all...] |
/osnet-11/usr/src/lib/nsswitch/files/common/ |
H A D | gethostent.c | 50 uint_t hash = 0; local 54 hash = hash * 15 + tolower(name[i]); 57 return (hash); 172 uint_t hash; local 186 /* hash is equal to IPv4 address */ 187 hash = addr_ipv4.s_addr; 189 return (hash); 422 * For non-nscd and libnsl API there is non-hash function with different output. 432 * For systems without nscd and for libnsl API there is non-hash [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softRSA.c | 980 CK_BYTE hash[SHA512_DIGEST_LENGTH]; /* space enough for all mechs */ local 1020 rv = soft_digest_final(session_p, hash, &hash_len); 1022 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len); 1041 (void) memcpy(der_data + MD5_DER_PREFIX_Len, hash, hash_len); 1048 (void) memcpy(der_data + der_len, hash, hash_len); 1054 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len); 1060 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len); 1066 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len); 1072 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len); 1102 CK_BYTE hash[SHA512_DIGEST_LENGT local [all...] |
/osnet-11/usr/src/lib/libshell/common/sh/ |
H A D | parse.c | 47 #define hash nvlink.hl._hash macro 2033 sfprintf(lexp->kiafile,"%..64d;%c;%.*s;%d;%d;%..64d;%..64d;%c;%d;%s\n",np->hash,type,len,name,first,last,parent,lexp->fscript,pkind,width,attr); 2035 sfprintf(lexp->kiafile,"%..64d;%c;%s;%d;%d;%..64d;%..64d;%c;%d;%s\n",np->hash,type,name,first,last,parent,lexp->fscript,pkind,width,attr); 2037 return(np->hash);
|
/osnet-11/usr/src/lib/libcpc/common/ |
H A D | libcpc.c | 880 cpc_strhash_t *hash; local 885 if ((hash = __cpc_strhash_alloc()) == NULL) { 907 if (__cpc_strhash_add(hash, p) == -1) 915 if (__cpc_strhash_add(hash, p) == -1) 920 while ((p = __cpc_strhash_next(hash)) != NULL) 924 __cpc_strhash_free(hash);
|
/osnet-11/usr/src/lib/libdevinfo/ |
H A D | devinfo_devlink.h | 102 struct cache_link *hash; /* next link on same hash chain */ member in struct:cache_link 126 uint_t hash_sz; /* number of hash chains */ 127 cache_link_t **hash; /* hash table */ member in struct:cache 207 #define MIN_HASH_SIZE 1024 /* Min number of chains in hash table */ 249 #define CACHE_HASH(h, i) (CACHE(h)->hash[i])
|
/osnet-11/usr/src/lib/libelfsign/common/ |
H A D | elfsignlib.c | 893 elfsign_hash_common(ELFsign_t ess, uchar_t *hash, size_t *hash_len, argument 901 /* The buffer must be large enough to hold the hash */ 905 bzero(hash, *hash_len); 945 * throw this section into the hash 956 cryptodebug("elfsign_hash: updating hash " 967 SHA1Final(hash, &ctx); 974 tohexstr(hash, *hash_len, hashstr, hashstr_len); 975 cryptodebug("hash value is: %s", hashstr); 985 * elfsign_hash - return the hash of the ELF sections affecting execution. 988 * OUT: hash, hash_le 991 elfsign_hash(ELFsign_t ess, uchar_t *hash, size_t *hash_len) argument 1004 elfsign_hash_mem_resident(ELFsign_t ess, uchar_t *hash, size_t *hash_len) argument 1026 uchar_t hash[SIG_MAX_LENGTH]; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/gnulib/ |
H A D | regex_internal.c | 27 re_hashval_t hash) internal_function; 31 re_hashval_t hash) internal_function; 1464 re_hashval_t hash = nodes->nelem + context; 1467 hash += nodes->elems[i]; 1468 return hash; 1485 re_hashval_t hash; 1498 hash = calc_state_hash (nodes, 0); 1499 spot = dfa->state_table + (hash & dfa->state_hash_mask); 1504 if (hash != state->hash) 1461 re_hashval_t hash = nodes->nelem + context; local 1482 re_hashval_t hash; local 1530 re_hashval_t hash; local 1568 register_state(const re_dfa_t *dfa, re_dfastate_t *newstate, re_hashval_t hash) argument 1623 create_ci_newstate(const re_dfa_t *dfa, const re_node_set *nodes, re_hashval_t hash) argument 1673 create_cd_newstate(const re_dfa_t *dfa, const re_node_set *nodes, unsigned int context, re_hashval_t hash) argument [all...] |