Searched defs:key (Results 351 - 375 of 889) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/lib/libresolv2/common/irs/
H A Dhesiod.c273 char *key, *data, *cp, **cpp; local
299 key = cp;
311 if (strcmp(key, "lhs") == 0)
313 else if (strcmp(key, "rhs") == 0)
/illumos-gate/usr/src/lib/libbc/inc/include/rpc/
H A Dauth.h69 } key; member in union:des_block
/illumos-gate/usr/src/lib/libbc/libc/gen/common/
H A D_crypt.c69 * Permuted-choice 1 from the key bits
89 * Sequence of shifts used for the key schedule.
97 * the CD array that generate the key schedule.
115 * The C and D arrays used to calculate the key schedule.
120 * The key schedule.
121 * Generated from the key.
135 * The combination of the key and the input, before selection.
158 * Set up the key schedule from the key.
165 setkey(char *key) argument
[all...]
H A Dgetgraent.c309 char *key = NULL; local
315 g->oldyp, g->oldyplen, &key, &keylen,
324 g->oldyp = key;
333 char *key = NULL; local
339 &key, &keylen, &g->yp, &g->yplen)) {
347 g->oldyp = key;
H A Dgetpwaent.c331 char *key; local
336 reason = yp_next(domain, "passwd_adjunct",oldyp, oldyplen, &key
346 oldyp = key;
355 char *key; local
360 reason = yp_first(domain, "passwd_adjunct", &key, &keylen, &yp, &yplen);
369 oldyp = key;
/illumos-gate/usr/src/lib/libcmd/common/
H A Dchgrp.c116 typedef struct Key_s /* uid/gid key */
125 Key_t key; /* key */ member in struct:Map_s
162 getids(register char* s, char** e, Key_t* key, int options) argument
169 key->uid = key->gid = NOID;
190 key->uid = n;
208 key->gid = n;
235 Key_t key; local
281 mapdisc.key
[all...]
/illumos-gate/usr/src/lib/libcommputil/common/
H A Dsdp_parse_helper.c62 sdp_free_key(sdp_key_t *key) argument
64 if (key != NULL) {
65 if (key->k_method != NULL)
66 free(key->k_method);
67 if (key->k_enckey != NULL)
68 free(key->k_enckey);
69 free(key);
/illumos-gate/usr/src/lib/libipmi/common/
H A Dipmi_hash.c91 ulong_t (*compute)(const void *key),
125 ipmi_hash_strhash(const void *key) argument
130 for (p = key; *p != '\0'; p++) {
149 ipmi_hash_ptrhash(const void *key) argument
151 return (*((const uintptr_t *)key) >> 4);
89 ipmi_hash_create(ipmi_handle_t *hp, size_t linkoffs, const void *(*convert)(const void *elem), ulong_t (*compute)(const void *key), int (*compare)(const void *lkey, const void *rkey)) argument
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Dsearch.c167 unsigned long key; /* XXXmcs: memcache */ local
199 attrs, attrsonly, serverctrls, clientctrls, &key)) == LDAP_SUCCESS
200 && ldap_memcache_result( ld, *msgidp, key ) == LDAP_SUCCESS ) {
231 ldap_memcache_new( ld, rc, key, base );
/illumos-gate/usr/src/cmd/ypcmd/
H A Dmakedbm.c115 datum key, content, tmp; local
392 key.dptr = buf;
393 key.dsize = p - buf;
407 for (i = (strncmp(key.dptr, "YP_MULTI_", 9) ? 0 : 9);
408 i < key.dsize; i++) {
410 ic = *(key.dptr+i);
412 *(key.dptr+i) = tolower(ic);
415 tmp = dbm_fetch(fdb, key);
417 if (dbm_store(fdb, key, content, 1) != 0) {
419 key
556 datum key; local
574 datum key, content; local
[all...]
H A Dmkalias.c158 datum key, value, part, partvalue; local
164 for (key = dbm_firstkey(Scandbm); key.dptr != NULL;
165 key = dbm_nextkey(Scandbm)) {
166 value = dbm_fetch(Indbm, key);
168 CopyName(user, key.dptr, key.dsize);
198 key.dptr = user;
199 key.dsize = strlen(user) + 1;
201 dbm_store(Outdbm, value, key, DBM_REPLAC
269 datum key, value; local
[all...]
H A Dypxfrd_server.c64 datum key; member in struct:mycon
211 datum key, val; local
213 key.dptr = yp_secure;
214 key.dsize = yp_secure_sz;
215 val = shim_dbm_fetch((DBM *)m.map, key);
228 m.key = shim_dbm_firstkey((DBM *)m.map);
364 for (; m->key.dptr;
365 m->key = shim_dbm_do_nextkey((DBM *)m->map, m->key)) {
376 /* advance key o
[all...]
/illumos-gate/usr/src/common/crypto/blowfish/
H A Dblowfish_impl.c614 * Initialize key schedules for Blowfish.
617 blowfish_init_keysched(uint8_t *key, uint_t bits, void *keysched) argument
636 bitrepeat(key, len, bits, rawkeybytes, 72);
645 bcopy(key, rawkeybytes, copylen);
680 * Allocate key schedule for Blowfish.
/illumos-gate/usr/src/common/crypto/rsa/
H A Drsa_impl.c108 RSA_key_init(RSAkey *key, int psize, int qsize) argument
117 key->size = psize + qsize;
118 if ((err = big_init(&(key->p), plen)) != BIG_OK)
120 if ((err = big_init(&(key->q), qlen)) != BIG_OK)
122 if ((err = big_init(&(key->n), nlen)) != BIG_OK)
124 if ((err = big_init(&(key->d), nlen)) != BIG_OK)
126 if ((err = big_init(&(key->e), nlen)) != BIG_OK)
128 if ((err = big_init(&(key->dmodpminus1), plen)) != BIG_OK)
130 if ((err = big_init(&(key->dmodqminus1), qlen)) != BIG_OK)
132 if ((err = big_init(&(key
168 RSA_key_finish(RSAkey *key) argument
187 generate_rsa_key(RSAkey *key, int psize, int qsize, BIGNUM *pubexp, int (*rfunc)(void *, size_t)) argument
[all...]
/illumos-gate/usr/src/common/net/wanboot/crypt/
H A Daes.c736 uint32_t rk_e[60]; /* max round key size */
737 uint32_t rk_d[60]; /* max round key size */
769 * and add initial round key:
971 * and add initial round key:
1161 * For now, just reality-check the key size.
1166 aes_keycheck(const uint8_t *key, uint32_t keysize) argument
1168 if (key == NULL) {
1191 aes_key(void *cookie, const uint8_t *key, uint32_t keysize) argument
1223 if (IS_P2ALIGNED(key, sizeof (uint32_t))) {
1227 * and add initial round key
[all...]
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dmd5.c207 md5_password (const char *key, char *crypted, int check) argument
209 int keylen = strlen (key);
238 md5_update (key, keylen);
240 md5_update (key, keylen);
246 md5_update (key, keylen);
253 md5_update (key + ((i & 1) ? keylen : 0), 1);
263 md5_update (key, keylen);
271 md5_update (key, keylen);
276 md5_update (key, keylen);
/illumos-gate/usr/src/cmd/pools/poold/com/sun/solaris/service/pools/
H A DConfiguration.java65 * The key of the configuration.
67 private String key; field in class:Configuration
135 key = "system." + name;
148 name = key = null;
679 * Return the key of the configuration.
683 return (key);
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Denc_des.c158 * 2: Not yet. Other things (like getting the key from
357 cfb64_session(Session_Key *key) argument
361 if (!key || key->type != SK_DES) {
364 "Can't set DES's session key (%d != %d)\r\n"),
365 key ? key->type : -1, SK_DES);
371 cfb64_stream_key(key->data, &fbp->streams[TELNET_DIR_ENCRYPT]);
372 cfb64_stream_key(key->data, &fbp->streams[TELNET_DIR_DECRYPT]);
376 * the key t
467 cfb64_stream_key(Block key, register struct stinfo *stp) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/keygen/
H A Dkeygen.c127 wbku_printerr("Missing key type option value\n");
226 * This routine generates a random key of the type defined by 'ka'.
227 * The key value is returned in 'rand_key' and the buffer pointed to
232 * generate randon keys until a non-weak key is generated.
241 * Generate key, until non-weak key generated.
256 * This routine generates a random master key of the type (currently only
257 * HMAC SHA1 supported) defined by 'ka' and stores it in the master key
296 * If the file already exists, then see if a master key already
304 wbku_printerr("The master %s key alread
513 keydump(const char *key, int keylen) argument
537 uint8_t key[WANBOOT_MAXKEYLEN]; local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa_enc.c25 * @kek: key encryption key (KEK)
26 * @n: length of the wrapped key in 64-bit units; e.g., 2 = 128-bit = 16 bytes
27 * @plain: plaintext key to be wrapped, n * 64 bit
28 * @cipher: wrapped key, (n + 1) * 64 bit
35 AES_KEY key; local
44 (void) AES_set_encrypt_key(kek, 128, &key);
59 AES_encrypt(b, b, &key);
76 * @kek: key encryption key (KE
86 AES_KEY key; local
134 hmac_sha1(unsigned char *key, unsigned int key_len, unsigned char *data, unsigned int data_len, unsigned char *mac) argument
138 (void) HMAC(EVP_sha1(), key, key_len, data, data_len, mac, &mac_len); local
143 hmac_sha1_vector(unsigned char *key, unsigned int key_len, size_t num_elem, unsigned char *addr[], unsigned int *len, unsigned char *mac) argument
168 sha1_prf(unsigned char *key, unsigned int key_len, char *label, unsigned char *data, unsigned int data_len, unsigned char *buf, size_t buf_len) argument
213 rc4_skip(uint8_t *key, size_t keylen, size_t skip, uint8_t *data, size_t data_len) argument
232 rc4(uint8_t *buf, size_t len, uint8_t *key, size_t key_len) argument
241 hmac_md5_vector(uint8_t *key, size_t key_len, size_t num_elem, uint8_t *addr[], size_t *len, uint8_t *mac) argument
265 hmac_md5(uint8_t *key, size_t key_len, uint8_t *data, size_t data_len, uint8_t *mac) argument
269 (void) HMAC(EVP_md5(), key, key_len, data, data_len, mac, &mac_len); local
[all...]
/illumos-gate/usr/src/cmd/devmgmt/cmds/
H A Ddevreserv.c80 * M_INVKEY Invalid key specified
88 #define M_USAGE "usage: devreserv [key [devicelist [...]]]"
89 #define M_INVKEY "Invalid key: %s"
124 * devreserv [key [devlist [devlist [...]]]]
128 * lists presented to it, reserving them on the key (<key>). If no
130 * on the given key (<key>). If no key (<key>) i
165 int key; /* Key for locking */ local
[all...]
/illumos-gate/usr/src/cmd/mdb/common/mdb/
H A Dmdb_nv.c47 nv_hashstring(const char *key) argument
52 ASSERT(key != NULL);
54 for (p = key; *p != '\0'; p++) {
/illumos-gate/usr/src/cmd/fm/fminject/common/
H A Dinj_string.c198 inj_hashfn_string(void *key) argument
203 assert(key != NULL);
205 for (p = key; *p != '\0'; p++) {
/illumos-gate/usr/src/cmd/fs.d/autofs/
H A Dns_files.c51 static int read_execout(char *key, char **lp, char *fname, char *line,
53 static int call_read_execout(char *key, char **lp, char *fname, char *line,
74 getmapent_files(key, mapname, ml, stack, stkptr, iswildcard, isrestricted)
75 char *key;
106 * Execute it and pass the key as an argument.
115 "\tExecutable map: map=%s key=%s\n",
116 fname, key);
119 rc = call_read_execout(key, &lp, fname, ml->linebuf, LINESZ);
139 * Search for the entry with the required key.
158 if (strcmp(word, key)
564 read_execout(char *key, char **lp, char *fname, char *line, int linesz) argument
684 call_read_execout(char *key, char **lp, char *fname, char *line, int linesz) argument
[all...]
H A Dns_nis.c75 getmapent_nis(key, map, ml, stack, stkptr, iswildcard, isrestricted)
76 char *key, *map;
91 nserr = yp_match(nis_mydomain, map, key, strlen(key),
101 nserr = yp_match(nis_mydomain, my_map, key,
102 strlen(key), &nisline, &nislen);
173 char *key, *nkey, *val; local
180 key = NULL; kl = 0;
221 err = yp_next(nis_mydomain, my_mapname, key, kl,
231 if (key)
315 char *key, *nkey, *val, *my_nismap; local
438 char *key = NULL, *val = NULL; local
523 char key[MAXPATHLEN]; local
[all...]

Completed in 143 milliseconds

<<11121314151617181920>>