Searched defs:hash (Results 51 - 75 of 99) sorted by relevance

1234

/osnet-11/usr/src/lib/libshadowfs/common/
H A Dshadow_migrate.c190 ulong_t hash = 0; local
194 hash += fidp->fid_data[i];
196 return (hash);
280 * hash based on FID and ignore those we've already seen.
/osnet-11/usr/src/lib/libsldap/common/
H A Dns_mapping.c33 * Calculate a hash for a string
34 * Based on elf_hash algorithm, hash is case insensitive
55 * Scan a hash table hit for a matching hash entry.
75 * Find an entry in the hash table
83 unsigned long hash; local
88 hash = ns_hash(str) % NS_HASH_MAX;
89 idx = config->hashTbl[hash];
124 * Remove a hash table entry.
142 * destroy the hash tabl
174 unsigned long hash; local
[all...]
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_auth.c94 * make a 16-byte hash.
113 * Create a LM response from the given LM hash and challenge.
119 smb_auth_lm_response(unsigned char *hash, argument
131 bcopy(hash, S21, SMBAUTH_HASH_SZ);
142 * The result will contain a 16-byte NTLM hash.
145 smb_auth_ntlm_hash(const char *password, unsigned char *hash) argument
151 if (password == NULL || hash == NULL)
162 rc = smb_auth_md4(hash, (unsigned char *)unicode_password, length);
175 smb_auth_ntlm_response(unsigned char *hash, argument
181 bcopy(hash, S2
384 smb_auth_v2_response( unsigned char *hash, unsigned char *srv_challenge, int slen, unsigned char *clnt_data, int clen, unsigned char *v2_rsp) argument
[all...]
/osnet-11/usr/src/lib/libdhcpsvc/modules/binfiles/
H A Ddhcp_network.c46 * in-use record is also on exactly one doubly-linked client id hash chain;
47 * the hash chains heads are contained in the header). For all other
49 * walking all of the hash chains. Here's a crude illustration of what
50 * this looks like on-disk (note that hash chains 2 and 3 are empty):
53 * | container info | hash chain heads (buckets) |
100 * when trying to achieve robustness is updating the client id hash chain.
103 * could leave our hash chains in an inconsistent state.
106 * the hash chains in the container. At any point in time, exactly one of
109 * operation, all hash chain modifications are done on the *inactive*
110 * image, then, once the inactive image has completed the hash chai
323 uint16_t hash; local
572 uint16_t hash; local
697 uint16_t hash; local
832 uint16_t hash, new_hash; local
1190 uint16_t hash; local
1340 nhconvert_header(dn_header_t *hdrp, boolean_t hash) argument
1397 read_header(int fd, dn_header_t *hdrp, boolean_t hash) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/
H A Dhash.h36 * @(#)hash.h 8.4 (Berkeley) 11/2/95
67 int32_t magic; /* Magic NO for hash tables */
78 int32_t nkeys; /* Number of keys in hash table */
80 int32_t h_charkey; /* value of hash(CHARKEY) */
89 u_int32_t (*hash) __P((const void *, size_t)); /* Hash Function */ member in struct:htab
/osnet-11/usr/src/grub/grub2/grub-core/commands/
H A Dlegacycfg.c537 grub_uint8_t hash[MD5_HASHLEN]; member in struct:legacy_md5_password
594 return (grub_crypto_memcmp (digest, pw->hash, MD5_HASHLEN) == 0);
661 pw->hash[i == 4 ? 5 : 12+i] = w & 0xff;
662 pw->hash[6+i] = (w >> 8) & 0xff;
663 pw->hash[i] = (w >> 16) & 0xff;
677 pw->hash[11] = w;
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Ddsa.c598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey )
615 /* s = (kinv * ( hash + x * r)) mod q */
618 mpi_add( tmp, tmp, hash );
631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey )
651 /* u1 = (hash * w) mod q */
652 mpi_mulm( u1, hash, w, pkey->q );
990 dsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey,
1000 if ((! data[0]) || (! data[1]) || (! hash)
1009 if (! verify (data[0], data[1], hash, &pk))
1036 " (hash sha
597 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) argument
630 verify(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) argument
989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument
[all...]
H A Decc.c695 * Return the signature struct (r,s) from the message hash. The caller
739 mpi_addm (sum, input, dr, skey->E.n); /* sum = hash + (d*r) mod n */
741 mpi_mulm (s, k_1, sum, skey->E.n); /* s = k^(-1)*(hash+(d*r)) mod n */
786 /* h1 = hash * s^(-1) (mod n) */
789 /* Q1 = [ hash * s^(-1) ]G */
802 /* Q = ([hash * s^(-1)]G) + ([r * s^(-1)]Q) */
1158 ecc_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey,
1168 if (!data[0] || !data[1] || !hash || !pkey[0] || !pkey[1] || !pkey[2]
1192 err = verify (hash, &pk, data[0], data[1]);
1154 ecc_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument
H A Drsa.c1007 rsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey,
1027 log_mpidump (" hash:", hash );
1031 rc = mpi_cmp (result, hash) ? GPG_ERR_BAD_SIGNATURE : GPG_ERR_NO_ERROR;
1047 /* Compute a keygrip. MD is the hash context which we are going to
1059 0 should be prefixed. We hash the raw bytes. */
1097 " (hash sha1 #11223344556677889900aabbccddeeff10203040#))";
1100 " (hash sha1 #11223344556677889900aabbccddeeff80203040#))";
1006 rsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *opaque, gcry_mpi_t tmp), void *opaquev) argument
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Ddsa.c598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey )
615 /* s = (kinv * ( hash + x * r)) mod q */
618 mpi_add( tmp, tmp, hash );
631 verify (gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey )
651 /* u1 = (hash * w) mod q */
652 mpi_mulm( u1, hash, w, pkey->q );
990 dsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey,
1000 if ((! data[0]) || (! data[1]) || (! hash)
1009 if (! verify (data[0], data[1], hash, &pk))
597 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey ) argument
630 verify(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) argument
989 dsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *, gcry_mpi_t), void *opaquev) argument
H A Drsa.c1006 rsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey,
1026 log_mpidump (" hash:", hash );
1030 rc = mpi_cmp (result, hash) ? GPG_ERR_BAD_SIGNATURE : GPG_ERR_NO_ERROR;
1046 /* Compute a keygrip. MD is the hash context which we are going to
1058 0 should be prefixed. We hash the raw bytes. */
1005 rsa_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *opaque, gcry_mpi_t tmp), void *opaquev) argument
H A Decc.c695 * Return the signature struct (r,s) from the message hash. The caller
739 mpi_addm (sum, input, dr, skey->E.n); /* sum = hash + (d*r) mod n */
741 mpi_mulm (s, k_1, sum, skey->E.n); /* s = k^(-1)*(hash+(d*r)) mod n */
786 /* h1 = hash * s^(-1) (mod n) */
789 /* Q1 = [ hash * s^(-1) ]G */
802 /* Q = ([hash * s^(-1)]G) + ([r * s^(-1)]Q) */
1158 ecc_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey,
1168 if (!data[0] || !data[1] || !hash || !pkey[0] || !pkey[1] || !pkey[2]
1192 err = verify (hash, &pk, data[0], data[1]);
1154 ecc_verify(int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp)(void *, gcry_mpi_t), void *opaquev) argument
/osnet-11/usr/src/grub/grub2/grub-core/net/
H A Ddns.c115 hash (const char *str) function
385 h = hash (data->oname);
446 h = hash (name);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/
H A Ddump.c1258 /* The "quality" of a hash is defined as the total number of
1260 to the expected number needed for a random hash.
1264 For a random hash of n keys into k buckets, the expected
1277 Perl_dump_indent(aTHX_ level, file, " hash quality = %.1"NVff"%%", theoret/sum*100);
1300 U32 hash = HeHASH(he); local
1310 PerlIO_printf(file, "HASH = 0x%"UVxf"\n", (UV)hash);
H A Dpp_hot.c787 Perl_croak(aTHX_ "Can't return hash to lvalue scalar context");
804 Perl_croak(aTHX_ "Can't return hash to lvalue"
864 Perl_croak(aTHX_ "Can't return hash to lvalue"
910 av_fill(ary, 0); /* clear all but the fields hash */
934 S_do_oddball(pTHX_ HV *hash, SV **relem, SV **firstrelem) argument
949 "Odd number of elements in hash assignment");
951 if (SvTYPE(hash) == SVt_PVAV) {
954 if (avhv_store_ent((AV*)hash,*relem,tmpstr,0))
956 if (SvMAGICAL(hash) && SvSMAGICAL(tmpstr))
962 didstore = hv_store_ent(hash,*rele
989 HV *hash; local
1706 U32 hash = (SvFAKE(keysv) && SvREADONLY(keysv)) ? SvUVX(keysv) : 0; local
3074 U32 hash = SvUVX(sv); local
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/
H A DFTP.pm107 $ftp->hash(exists $arg{Hash} ? $arg{Hash} : 0, 1024);
127 sub hash { subroutine
864 my $hash = ${*$ftp}{'net_ftp_supported'} ||= {};
866 return $hash->{$cmd}
867 if exists $hash->{$cmd};
869 return $hash->{$cmd} = 0
876 $hash->{"\U$2"} = !length("$1$3");
880 $hash->{$cmd} = $text !~ /unimplemented/i;
883 $hash->{$cmd} ||= 0;
1288 C<OPTIONS> are passed in a hash lik
[all...]
/osnet-11/usr/src/lib/libast/common/vmalloc/
H A Dvmprofile.c35 #define PFHASH(pf) ((pf)->data.data.hash)
49 { Vmulong_t hash; /* hash value */ member in struct:_pfdata_s
71 static Pfobj_t** Pftable; /* hash table */
92 /* make hash table; PFTABLE'th slot hold regions' records */
100 /* see if it's there with a combined hash value of vm,file,line */
388 /* remove from hash table */
450 /* reinsert into hash table */
/osnet-11/usr/src/lib/libc/port/gen/
H A Dndbm.c235 unsigned long hash; local
237 hash = dcalchash(key);
239 db->dbm_blkno = hash & db->dbm_hmask;
399 dbm_hashinc(DBM *db, unsigned long hash) argument
403 hash &= db->dbm_hmask;
409 if ((hash&bit) == 0)
410 return (hash|bit);
411 hash &= ~bit;
420 dbm_firsthash(DBM *db, unsigned long hash) argument
426 dbm_access(db, hash);
541 unsigned long hash; local
714 dbm_access(DBM *db, unsigned long hash) argument
[all...]
/osnet-11/usr/src/lib/nsswitch/files/common/
H A Dgethostent.c50 uint_t hash = 0; local
54 hash = hash * 15 + tolower(name[i]);
57 return (hash);
172 uint_t hash; local
186 /* hash is equal to IPv4 address */
187 hash = addr_ipv4.s_addr;
189 return (hash);
422 * For non-nscd and libnsl API there is non-hash function with different output.
432 * For systems without nscd and for libnsl API there is non-hash
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftRSA.c980 CK_BYTE hash[SHA512_DIGEST_LENGTH]; /* space enough for all mechs */ local
1020 rv = soft_digest_final(session_p, hash, &hash_len);
1022 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
1041 (void) memcpy(der_data + MD5_DER_PREFIX_Len, hash, hash_len);
1048 (void) memcpy(der_data + der_len, hash, hash_len);
1054 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len);
1060 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len);
1066 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len);
1072 (void) memcpy(der_data + SHA2_DER_PREFIX_Len, hash, hash_len);
1102 CK_BYTE hash[SHA512_DIGEST_LENGT local
[all...]
/osnet-11/usr/src/lib/libshell/common/sh/
H A Dparse.c47 #define hash nvlink.hl._hash macro
2033 sfprintf(lexp->kiafile,"%..64d;%c;%.*s;%d;%d;%..64d;%..64d;%c;%d;%s\n",np->hash,type,len,name,first,last,parent,lexp->fscript,pkind,width,attr);
2035 sfprintf(lexp->kiafile,"%..64d;%c;%s;%d;%d;%..64d;%..64d;%c;%d;%s\n",np->hash,type,name,first,last,parent,lexp->fscript,pkind,width,attr);
2037 return(np->hash);
/osnet-11/usr/src/lib/libcpc/common/
H A Dlibcpc.c880 cpc_strhash_t *hash; local
885 if ((hash = __cpc_strhash_alloc()) == NULL) {
907 if (__cpc_strhash_add(hash, p) == -1)
915 if (__cpc_strhash_add(hash, p) == -1)
920 while ((p = __cpc_strhash_next(hash)) != NULL)
924 __cpc_strhash_free(hash);
/osnet-11/usr/src/lib/libdevinfo/
H A Ddevinfo_devlink.h102 struct cache_link *hash; /* next link on same hash chain */ member in struct:cache_link
126 uint_t hash_sz; /* number of hash chains */
127 cache_link_t **hash; /* hash table */ member in struct:cache
207 #define MIN_HASH_SIZE 1024 /* Min number of chains in hash table */
249 #define CACHE_HASH(h, i) (CACHE(h)->hash[i])
/osnet-11/usr/src/lib/libelfsign/common/
H A Delfsignlib.c893 elfsign_hash_common(ELFsign_t ess, uchar_t *hash, size_t *hash_len, argument
901 /* The buffer must be large enough to hold the hash */
905 bzero(hash, *hash_len);
945 * throw this section into the hash
956 cryptodebug("elfsign_hash: updating hash "
967 SHA1Final(hash, &ctx);
974 tohexstr(hash, *hash_len, hashstr, hashstr_len);
975 cryptodebug("hash value is: %s", hashstr);
985 * elfsign_hash - return the hash of the ELF sections affecting execution.
988 * OUT: hash, hash_le
991 elfsign_hash(ELFsign_t ess, uchar_t *hash, size_t *hash_len) argument
1004 elfsign_hash_mem_resident(ELFsign_t ess, uchar_t *hash, size_t *hash_len) argument
1026 uchar_t hash[SIG_MAX_LENGTH]; local
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/gnulib/
H A Dregex_internal.c27 re_hashval_t hash) internal_function;
31 re_hashval_t hash) internal_function;
1464 re_hashval_t hash = nodes->nelem + context;
1467 hash += nodes->elems[i];
1468 return hash;
1485 re_hashval_t hash;
1498 hash = calc_state_hash (nodes, 0);
1499 spot = dfa->state_table + (hash & dfa->state_hash_mask);
1504 if (hash != state->hash)
1461 re_hashval_t hash = nodes->nelem + context; local
1482 re_hashval_t hash; local
1530 re_hashval_t hash; local
1568 register_state(const re_dfa_t *dfa, re_dfastate_t *newstate, re_hashval_t hash) argument
1623 create_ci_newstate(const re_dfa_t *dfa, const re_node_set *nodes, re_hashval_t hash) argument
1673 create_cd_newstate(const re_dfa_t *dfa, const re_node_set *nodes, unsigned int context, re_hashval_t hash) argument
[all...]

Completed in 132 milliseconds

1234