Searched defs:keys (Results 1 - 25 of 40) sorted by relevance

12

/osnet-11/usr/src/cmd/ast/msgcc/
H A Dmsgcc.sh84 keys() function
86 $1 --??keys -- 2>&1 | grep '^".*"$'
265 keys $__a1__
297 do keys ${__cmdv__[__i__]}
H A Dmsgcpp.c39 " [+cmd \acommand\a?\acommand\a is a candidate for \b--??keys\b"
97 static struct ppkeyword keys[] = variable in typeref:struct:ppkeyword
169 ppop(PP_COMPILE, keys);
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_nsl_tmpl.c40 * keys based on the DH common key given the ALGTYPE and KEYLEN. That
51 des_block keys[], int keynum)
54 MODULUS, keys, keynum);
50 __dl_gen_common_dhkeys(char *xpublic, char *xsecret, des_block keys[], int keynum) argument
H A Dgeneric_key.c102 __generic_gen_dhkeys(int keylen, /* Size of keys in bits */
152 /* We get the private keys as private key modulo the modulus */
180 * Given a key extract keynum des keys
183 extractdeskeys(MINT *ck, int keylen, des_block keys[], int keynum) argument
190 /* len is the total number of bits we need for keynum des keys */
201 * the middle bits of the key for the bits in our DES keys.
208 * into the array of DES keys.
210 k = (char *)keys;
222 des_setparity((char *)&keys[i]);
224 des_setparity_g(&keys[
240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
[all...]
/osnet-11/usr/src/lib/libcurses/screen/
H A Dnewkey.c61 _KEY_MAP **keys, *key_info, local
68 (((keys = (_KEY_MAP **) malloc(sizeof (_KEY_MAP *) *
77 free(keys);
87 (void) memcpy((char *) keys, (char *) prev_keys,
89 keys[*numkeys] = key_info;
93 (void) memcpy((char *) keys, (char *) prev_keys,
95 (void) memcpy((char *) &(keys[*first + 1]),
98 keys[(*first)++] = key_info;
103 cur_term->_keys = keys;
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A DMICwrap.c40 * session keys). the message with the given qop and return
57 dh_key_set keys; local
78 /* Package the context session keys in a key_set for __make_token */
79 keys.dh_key_set_len = cntx->no_keys;
80 keys.dh_key_set_val = cntx->keys;
95 * non serialized tok and the context keys.
97 if ((*minor = __make_token(token, message, &tok, &keys))
126 dh_key_set keys; local
144 /* Package up the context session keys i
219 dh_key_set keys; local
309 dh_key_set keys; local
[all...]
H A Dtoken.c119 dh_key_set_t keys /* The session keys to sign the token */)
193 if ((stat = __xdr_encode_token(&xdrs, NULL, token, keys))
215 dh_key_set_t keys /* The keys to encrypt the check sum with */)
246 if ((stat = __xdr_encode_token(&xdrs, msg, token, keys))
382 * session keys established, so that keys is null. The unencrypted
384 * caller can then attempt to decrypt the session keys in token
385 * and encrypt the returned sig with those keys t
445 __xdr_encode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys) argument
492 __xdr_decode_token(register XDR *xdrs, gss_buffer_t msg, dh_token_desc *objp, dh_key_set_t keys, dh_signature_t sig) argument
[all...]
H A Dcontext_establish.c158 dh_key_set keys; local
175 /* Package the context session keys into a key_set */
176 keys.dh_key_set_len = ctx->no_keys;
177 keys.dh_key_set_val = ctx->keys;
180 return (__make_token(output, NULL, &token, &keys));
245 * establish_session_keys: This routine decrypts the session keys supplied
246 * and uses those keys to verifiy the signature over the input token
251 dh_key_set_t keys, dh_signature_t sig, dh_token_t token)
261 * mechanism uses a cache of public keys, the
250 establish_session_keys(const char *remote, dh_key_set_t keys, dh_signature_t sig, dh_token_t token) argument
586 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */ local
793 dh_key_set keys; local
[all...]
H A Ddh_gssapi.h64 * This function pointer will encrypt the set of supplied session keys
73 * This function decrypts the set of session keys from remote. It
80 * will be set to non zero if the session keys were decrypted using
87 * This entry point is used to generate a block of session keys
147 int no_keys; /* Number of session keys (currently 3) */
148 des_block *keys; /* The session keys */ member in struct:dh_gss_context_desc
H A Dcrypto.c90 * of keys is odd
93 * If we have an even number of keys and additional encryption will be
104 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument
124 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec);
138 * If we have an even number of keys then do an extra round of
142 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec);
158 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument
166 if (keys->dh_key_set_len < 1)
180 stat = __desN_crypt(keys->dh_key_set_val, keys
194 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument
228 MD5_verifier(gss_buffer_t tok, gss_buffer_t msg, cipher_proc signer, dh_key_set_t keys, dh_signature_t signature ) argument
364 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument
403 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument
504 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument
557 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument
[all...]
/osnet-11/usr/src/lib/rad/pykstat/common/
H A Drad.py90 keys = [("type", "Kstat")] variable in class:Kstats
92 keys.append(("module", module))
94 keys.append(("name", name))
96 keys.append(("instance", "%d" % instance))
98 keys.append(("klass", clazz))
99 o = self._rc.list_objects(client.Name(_RAD_KSTAT_DOMAIN, keys))
/osnet-11/usr/src/lib/libnisdb/
H A Dnis_hashitem.h66 __nis_hash_item_mt *keys[64]; member in struct:__anon1983
H A Ddb_mindex.cc100 db_key_desc * keys = how->keyloc(); local
113 indices.indices_val[i].init(&(keys[i]));
387 "number of keys (%d) does not equal number of indices (%d)",
/osnet-11/usr/src/lib/libnsl/des/
H A Ddes_crypt.c192 desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument
206 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec);
219 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec);
231 __cbc_triple_crypt(des_block keys[], char *buf, uint_t len, argument
235 return (desN_crypt(keys, 3, buf, len, mode, ivec));
/osnet-11/usr/src/lib/libcmd/common/
H A Dchgrp.c244 Key_t keys[3]; local
375 keys[1].gid = keys[2].uid = NOID;
416 keys[0].uid = keys[1].uid = ent->fts_statp->st_uid;
417 keys[0].gid = keys[2].gid = ent->fts_statp->st_gid;
421 if (m = (Map_t*)dtmatch(map, &keys[i]))
434 } while (++i < elementsof(keys) && (uid == NOID || gid == NOID));
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/
H A Dav.c933 * hash keys to array indices.
948 HV *keys; local
952 keys = avhv_keys(av);
953 he = hv_fetch_ent(keys, keysv, FALSE, hash);
995 HV *keys = avhv_keys(av); local
998 he = hv_fetch_ent(keys, keysv, FALSE, hash);
1011 HV *keys = avhv_keys(av); local
1014 he = hv_fetch_ent(keys, keysv, FALSE, hash);
1024 HV *keys = avhv_keys(av); local
1025 return hv_iternext(keys);
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/
H A Dkadm_rpc.h149 krb5_keyblock *keys; member in struct:chrand_ret
/osnet-11/usr/src/lib/libadr/common/
H A Dadr_name.c49 char **an_keys; /* Unsorted keys */
51 char **an_skeys; /* Sorted keys */
88 * Sort keys and reject duplicates.
340 int keys = 0; local
349 keys++;
384 keys++;
387 adr_name_t *result = adr_name_create_common(keys);
392 for (int i = 0; i < keys; i++) {
506 * are equals, and they contain the same set of keys with the same values.
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Dgeli.c113 struct grub_geli_key keys[2]; member in struct:grub_geli_phdr
482 for (i = 0; i < ARRAY_SIZE (header.keys); i++)
499 &header.keys[i],
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dserpent.c51 serpent_subkeys_t keys; /* Generated subkeys. */ member in struct:serpent_context
671 serpent_subkeys_generate (key_prepared, context->keys);
720 ROUND (0, context->keys, b, b_next);
721 ROUND (1, context->keys, b, b_next);
722 ROUND (2, context->keys, b, b_next);
723 ROUND (3, context->keys, b, b_next);
724 ROUND (4, context->keys, b, b_next);
725 ROUND (5, context->keys, b, b_next);
726 ROUND (6, context->keys, b, b_next);
727 ROUND (7, context->keys,
[all...]
H A Ddes.c45 * For Triple-DES you could use either two 64bit keys or three 64bit keys.
85 * * If you would like to use two 64bit keys, fill 'key1' and'key2'
89 * * To use three 64bit keys with Triple-DES use: *
316 * Table with weak DES keys sorted in ascending order.
317 * In DES their are 64 known keys which are weak. They are weak
320 * The keys in this table have all their parity bits cleared.
583 * Does not check for weak keys.
624 u32 *keys; local
626 keys
741 u32 *keys; local
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Ddes.c49 * For Triple-DES you could use either two 64bit keys or three 64bit keys.
89 * * If you would like to use two 64bit keys, fill 'key1' and'key2'
93 * * To use three 64bit keys with Triple-DES use: *
314 * Table with weak DES keys sorted in ascending order.
315 * In DES their are 64 known keys which are weak. They are weak
318 * The keys in this table have all their parity bits cleared.
577 * Does not check for weak keys.
618 u32 *keys; local
620 keys
707 u32 *keys; local
[all...]
H A Dserpent.c52 serpent_subkeys_t keys; /* Generated subkeys. */ member in struct:serpent_context
672 serpent_subkeys_generate (key_prepared, context->keys);
721 ROUND (0, context->keys, b, b_next);
722 ROUND (1, context->keys, b, b_next);
723 ROUND (2, context->keys, b, b_next);
724 ROUND (3, context->keys, b, b_next);
725 ROUND (4, context->keys, b, b_next);
726 ROUND (5, context->keys, b, b_next);
727 ROUND (6, context->keys, b, b_next);
728 ROUND (7, context->keys,
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/term/
H A Dterminfo.c391 grub_terminfo_readkey (struct grub_term_input *term, int *keys, int *len,
407 keys[*len] = c; \
418 keys[0] = c;
427 keys[0] = c;
488 keys[0] = three_code_table[i].ascii;
500 keys[0] = fx_code[i];
522 keys[0] = fx_code[num - 1];
534 keys[0] = three_code_table[i].ascii;
390 grub_terminfo_readkey(struct grub_term_input *term, int *keys, int *len, int (*readkey) (struct grub_term_input *term)) argument
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ldap.h237 struct berval **keys; member in struct:__anon1085

Completed in 189 milliseconds

12