/osnet-11/usr/src/cmd/ast/msgcc/ |
H A D | msgcc.sh | 84 keys() function 86 $1 --??keys -- 2>&1 | grep '^".*"$' 265 keys $__a1__ 297 do keys ${__cmdv__[__i__]}
|
H A D | msgcpp.c | 39 " [+cmd \acommand\a?\acommand\a is a candidate for \b--??keys\b" 97 static struct ppkeyword keys[] = variable in typeref:struct:ppkeyword 169 ppop(PP_COMPILE, keys);
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_nsl_tmpl.c | 40 * keys based on the DH common key given the ALGTYPE and KEYLEN. That 51 des_block keys[], int keynum) 54 MODULUS, keys, keynum); 50 __dl_gen_common_dhkeys(char *xpublic, char *xsecret, des_block keys[], int keynum) argument
|
H A D | generic_key.c | 102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */ 152 /* We get the private keys as private key modulo the modulus */ 180 * Given a key extract keynum des keys 183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument 190 /* len is the total number of bits we need for keynum des keys */ 201 * the middle bits of the key for the bits in our DES keys. 208 * into the array of DES keys. 210 k = (char *)keys; 222 des_setparity((char *)&keys[i]); 224 des_setparity_g(&keys[ 240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument [all...] |
/osnet-11/usr/src/lib/libcurses/screen/ |
H A D | newkey.c | 61 _KEY_MAP **keys, *key_info, local 68 (((keys = (_KEY_MAP **) malloc(sizeof (_KEY_MAP *) * 77 free(keys); 87 (void) memcpy((char *) keys, (char *) prev_keys, 89 keys[*numkeys] = key_info; 93 (void) memcpy((char *) keys, (char *) prev_keys, 95 (void) memcpy((char *) &(keys[*first + 1]), 98 keys[(*first)++] = key_info; 103 cur_term->_keys = keys;
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | MICwrap.c | 40 * session keys). the message with the given qop and return 57 dh_key_set keys; local 78 /* Package the context session keys in a key_set for __make_token */ 79 keys.dh_key_set_len = cntx->no_keys; 80 keys.dh_key_set_val = cntx->keys; 95 * non serialized tok and the context keys. 97 if ((*minor = __make_token(token, message, &tok, &keys)) 126 dh_key_set keys; local 144 /* Package up the context session keys i 219 dh_key_set keys; local 309 dh_key_set keys; local [all...] |
H A D | token.c | 119 dh_key_set_t keys /* The session keys to sign the token */) 193 if ((stat = __xdr_encode_token(&xdrs, NULL, token, keys)) 215 dh_key_set_t keys /* The keys to encrypt the check sum with */) 246 if ((stat = __xdr_encode_token(&xdrs, msg, token, keys)) 382 * session keys established, so that keys is null. The unencrypted 384 * caller can then attempt to decrypt the session keys in token 385 * and encrypt the returned sig with those keys t 445 __xdr_encode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys) argument 492 __xdr_decode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys, dh_signature_t sig) argument [all...] |
H A D | context_establish.c | 158 dh_key_set keys; local 175 /* Package the context session keys into a key_set */ 176 keys.dh_key_set_len = ctx->no_keys; 177 keys.dh_key_set_val = ctx->keys; 180 return (__make_token(output, NULL, &token, &keys)); 245 * establish_session_keys: This routine decrypts the session keys supplied 246 * and uses those keys to verifiy the signature over the input token 251 dh_key_set_t keys, dh_signature_t sig, dh_token_t token) 261 * mechanism uses a cache of public keys, the 250 establish_session_keys(const char *remote, dh_key_set_t keys, dh_signature_t sig, dh_token_t token) argument 586 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */ local 793 dh_key_set keys; local [all...] |
H A D | dh_gssapi.h | 64 * This function pointer will encrypt the set of supplied session keys 73 * This function decrypts the set of session keys from remote. It 80 * will be set to non zero if the session keys were decrypted using 87 * This entry point is used to generate a block of session keys 147 int no_keys; /* Number of session keys (currently 3) */ 148 des_block *keys; /* The session keys */ member in struct:dh_gss_context_desc
|
H A D | crypto.c | 90 * of keys is odd 93 * If we have an even number of keys and additional encryption will be 104 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument 124 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 138 * If we have an even number of keys then do an extra round of 142 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 158 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 166 if (keys->dh_key_set_len < 1) 180 stat = __desN_crypt(keys->dh_key_set_val, keys 194 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 228 MD5_verifier(gss_buffer_t tok, gss_buffer_t msg, cipher_proc signer, dh_key_set_t keys, dh_signature_t signature ) argument 364 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument 403 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument 504 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument 557 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument [all...] |
/osnet-11/usr/src/lib/rad/pykstat/common/ |
H A D | rad.py | 90 keys = [("type", "Kstat")] variable in class:Kstats 92 keys.append(("module", module)) 94 keys.append(("name", name)) 96 keys.append(("instance", "%d" % instance)) 98 keys.append(("klass", clazz)) 99 o = self._rc.list_objects(client.Name(_RAD_KSTAT_DOMAIN, keys))
|
/osnet-11/usr/src/lib/libnisdb/ |
H A D | nis_hashitem.h | 66 __nis_hash_item_mt *keys[64]; member in struct:__anon1983
|
H A D | db_mindex.cc | 100 db_key_desc * keys = how->keyloc(); local 113 indices.indices_val[i].init(&(keys[i])); 387 "number of keys (%d) does not equal number of indices (%d)",
|
/osnet-11/usr/src/lib/libnsl/des/ |
H A D | des_crypt.c | 192 desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument 206 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 219 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 231 __cbc_triple_crypt(des_block keys[], char *buf, uint_t len, argument 235 return (desN_crypt(keys, 3, buf, len, mode, ivec));
|
/osnet-11/usr/src/lib/libcmd/common/ |
H A D | chgrp.c | 244 Key_t keys[3]; local 375 keys[1].gid = keys[2].uid = NOID; 416 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid; 417 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid; 421 if (m = (Map_t*)dtmatch(map, &keys[i])) 434 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID));
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ |
H A D | av.c | 933 * hash keys to array indices. 948 HV *keys; local 952 keys = avhv_keys(av); 953 he = hv_fetch_ent(keys, keysv, FALSE, hash); 995 HV *keys = avhv_keys(av); local 998 he = hv_fetch_ent(keys, keysv, FALSE, hash); 1011 HV *keys = avhv_keys(av); local 1014 he = hv_fetch_ent(keys, keysv, FALSE, hash); 1024 HV *keys = avhv_keys(av); local 1025 return hv_iternext(keys); [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | kadm_rpc.h | 149 krb5_keyblock *keys; member in struct:chrand_ret
|
/osnet-11/usr/src/lib/libadr/common/ |
H A D | adr_name.c | 49 char **an_keys; /* Unsorted keys */ 51 char **an_skeys; /* Sorted keys */ 88 * Sort keys and reject duplicates. 340 int keys = 0; local 349 keys++; 384 keys++; 387 adr_name_t *result = adr_name_create_common(keys); 392 for (int i = 0; i < keys; i++) { 506 * are equals, and they contain the same set of keys with the same values.
|
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | geli.c | 113 struct grub_geli_key keys[2]; member in struct:grub_geli_phdr 482 for (i = 0; i < ARRAY_SIZE (header.keys); i++) 499 &header.keys[i],
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | serpent.c | 51 serpent_subkeys_t keys; /* Generated subkeys. */ member in struct:serpent_context 671 serpent_subkeys_generate (key_prepared, context->keys); 720 ROUND (0, context->keys, b, b_next); 721 ROUND (1, context->keys, b, b_next); 722 ROUND (2, context->keys, b, b_next); 723 ROUND (3, context->keys, b, b_next); 724 ROUND (4, context->keys, b, b_next); 725 ROUND (5, context->keys, b, b_next); 726 ROUND (6, context->keys, b, b_next); 727 ROUND (7, context->keys, [all...] |
H A D | des.c | 45 * For Triple-DES you could use either two 64bit keys or three 64bit keys. 85 * * If you would like to use two 64bit keys, fill 'key1' and'key2' 89 * * To use three 64bit keys with Triple-DES use: * 316 * Table with weak DES keys sorted in ascending order. 317 * In DES their are 64 known keys which are weak. They are weak 320 * The keys in this table have all their parity bits cleared. 583 * Does not check for weak keys. 624 u32 *keys; local 626 keys 741 u32 *keys; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | des.c | 49 * For Triple-DES you could use either two 64bit keys or three 64bit keys. 89 * * If you would like to use two 64bit keys, fill 'key1' and'key2' 93 * * To use three 64bit keys with Triple-DES use: * 314 * Table with weak DES keys sorted in ascending order. 315 * In DES their are 64 known keys which are weak. They are weak 318 * The keys in this table have all their parity bits cleared. 577 * Does not check for weak keys. 618 u32 *keys; local 620 keys 707 u32 *keys; local [all...] |
H A D | serpent.c | 52 serpent_subkeys_t keys; /* Generated subkeys. */ member in struct:serpent_context 672 serpent_subkeys_generate (key_prepared, context->keys); 721 ROUND (0, context->keys, b, b_next); 722 ROUND (1, context->keys, b, b_next); 723 ROUND (2, context->keys, b, b_next); 724 ROUND (3, context->keys, b, b_next); 725 ROUND (4, context->keys, b, b_next); 726 ROUND (5, context->keys, b, b_next); 727 ROUND (6, context->keys, b, b_next); 728 ROUND (7, context->keys, [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/term/ |
H A D | terminfo.c | 391 grub_terminfo_readkey (struct grub_term_input *term, int *keys, int *len, 407 keys[*len] = c; \ 418 keys[0] = c; 427 keys[0] = c; 488 keys[0] = three_code_table[i].ascii; 500 keys[0] = fx_code[i]; 522 keys[0] = fx_code[num - 1]; 534 keys[0] = three_code_table[i].ascii; 390 grub_terminfo_readkey(struct grub_term_input *term, int *keys, int *len, int (*readkey) (struct grub_term_input *term)) argument
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ldap.h | 237 struct berval **keys; member in struct:__anon1085
|