/illumos-gate/usr/src/cmd/sendmail/libsm/ |
H A D | shm.c | 27 ** key -- key for shared memory. 42 sm_shmstart(key, size, shmflg, shmid, owner) 43 key_t key; 57 *shmid = shmget(key, size, shmflg);
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | kiconv_cck_common.h | 102 uint32_t key; member in struct:__anon8034 108 uint32_t key; member in struct:__anon8035 124 size_t kiconv_binsearch(uint32_t key, void *tbl, size_t nitems);
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_wep.c | 116 * WEP key length is standardized to 40-bit. Many 123 * Add privacy headers appropriate for the specified key. 142 * IV must not duplicate during the lifetime of the key. 145 * because of the session key itself is shared. 178 * the specified key. 225 wep_encrypt(struct ieee80211_key *key, mblk_t *mp, int hdrlen) argument 234 ASSERT(key->wk_flags & IEEE80211_KEY_SWCRYPT); 239 (void) memcpy(rc4key + IEEE80211_WEP_IVLEN, key->wk_key, 240 key->wk_keylen); 244 IEEE80211_WEP_IVLEN + key 272 wep_decrypt(struct ieee80211_key *key, mblk_t *mp, int hdrlen) argument 323 rc4_init(crypto_context_t *ctx, const uint8_t *key, int keylen) argument [all...] |
/illumos-gate/usr/src/lib/nsswitch/ad/common/ |
H A D | getgrent.c | 78 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0) 127 if (argp->key.gid <= MAXUID) 131 if (idmap_get_u2w_mapping(&argp->key.gid, NULL, 0, 146 if (update_buffer(be, argp, winname, windomain, argp->key.gid) < 0)
|
/illumos-gate/usr/src/lib/nsswitch/files/common/ |
H A D | getauthattr.c | 43 return (_nss_files_XY_all(be, argp, 1, argp->key.name,
|
/illumos-gate/usr/src/lib/nsswitch/mdns/common/ |
H A D | gethostent.c | 51 hname = (char *)qdata.argp->key.name; 73 if ((argp->key.hostaddr.type != AF_INET) || 74 (argp->key.hostaddr.len != sizeof (addr))) 77 (void) memcpy(&addr, argp->key.hostaddr.addr, sizeof (addr));
|
/illumos-gate/usr/src/lib/nsswitch/nis/common/ |
H A D | getauthattr.c | 40 argp, 0, NIS_MAP_AUTHATTR, argp->key.name, 0));
|
H A D | getauuser.c | 40 argp, 1, NIS_MAP_AUDITUSER, argp->key.name, 0));
|
H A D | getprofattr.c | 40 argp, 1, NIS_MAP_PROFATTR, argp->key.name, 0));
|
H A D | getuserattr.c | 40 argp, 1, NIS_MAP_USERATTR, argp->key.name, 0));
|
H A D | netmasks.c | 53 argp->key.name, 0));
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaDigest.c | 121 * Unlike the other crypto functions, we didn't get the key object 124 * not be the slot containing the key -- if the key is extractible we can 132 meta_object_t *key; local 138 rv = meta_handle2object(hKey, &key); 144 /* meta_do_operation() will clone the key, if needed. */ 145 rv = meta_do_operation(CKF_DIGEST, MODE_UPDATE_WITHKEY, session, key, 148 OBJRELEASE(key);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 43 * as an octet string and stores it in the corresponding key object. 46 soft_genDHkey_set_attribute(soft_object_t *key, CK_ATTRIBUTE_TYPE type, argument 58 dst = OBJ_PUB_DH_VALUE(key); 60 dst = OBJ_PRI_DH_VALUE(key); 64 dst = OBJ_PRI_DH_PRIME(key); 68 dst = OBJ_PRI_DH_BASE(key); 75 /* Copy the attribute in the key object. */ 147 /* Inputs to DH key pair generation. */ 156 /* Outputs from DH key pair generation. */ 209 uchar_t key[MAX_KEY_ATTR_BUFLE local 252 (void) memcpy(OBJ_SEC_VALUE(secretkey), key, keylen); local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | lucid_context.c | 50 gss_krb5_lucid_key_t *key); 215 /* gctx->proto == 0 ==> rfc1964-style key information 220 /* Copy key */ 228 session key or a subkey) */ 266 /* Allocate storage for the key data */ 281 gss_krb5_lucid_key_t *key) 283 if (key) { 284 if (key->data && key->length) { 285 memset(key 280 free_lucid_key_data( gss_krb5_lucid_key_t *key) argument [all...] |
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | SLPUtils.c | 542 const char *key, *val; member in struct:prop_entry 554 ((slp_prop_entry_t *)a)->key, 555 ((slp_prop_entry_t *)b)->key)); 573 if (!(pe->key = strdup(pcName))) { 580 free((void *) pe->key); 593 free((void *) pe->key); 608 pe->key = pcName; 629 pe->key = strdup(SLP_CONFIG_ISBROADCASTONLY); 634 pe->key = strdup(SLP_CONFIG_MULTICASTTTL); 639 pe->key [all...] |
/illumos-gate/usr/src/lib/libxcurses/src/libc/xcurses/ |
H A D | keypad.c | 48 * Add a function key string to the decode tree. 49 * Return -1 on error, else the length of the key sequence. 79 node->key = 0; 81 /* Find node to insert function key sequence into the tree. */ 97 node->key = 0; 117 node->key = 0; 120 node->key = code; 138 * Initialise the function key decode tree. 161 * When true for a given window, then multibyte function key processing
|
/illumos-gate/usr/src/lib/libxcurses2/src/libc/xcurses/ |
H A D | keypad.c | 53 * Add a function key string to the decode tree. 54 * Return -1 on error, else the length of the key sequence. 81 node->key = 0; 83 /* Find node to insert function key sequence into the tree. */ 98 node->key = 0; 118 node->key = 0; 121 node->key = code; 140 * Initialise the function key decode tree. 162 * When true for a given window, then multibyte function key processing
|
/illumos-gate/usr/src/lib/libnsl/yp/ |
H A D | dbm.c | 125 forder(datum key) argument 129 hash = calchash(key); 140 fetch(datum key) argument 145 dbm_access(calchash(key)); 151 if (cmpdatum(key, item) == 0) { 161 delete(datum key) argument 168 dbm_access(calchash(key)); 173 if (cmpdatum(key, item) == 0) { 185 store(datum key, datum dat) argument 194 dbm_access(calchash(key)); 261 nextkey(datum key) argument [all...] |
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | nhash.h | 40 void *key; member in struct:item_t
|
/illumos-gate/usr/src/lib/libbc/inc/include/rpc/ |
H A D | auth_des.h | 43 * a conversation key and the window 47 des_block key; /* conversation key */ member in struct:authdes_fullname 79 * Both are encrypted using the conversation key. 90 * adv_timeverf is encrypted using the conversation key.
|
/illumos-gate/usr/src/cmd/vi/port/ |
H A D | ex_tty.c | 208 * overrides any arrow key, but only for hackers (=new tty driver). 267 * function key, it will (once the cursor movement is done) 270 kpboth(map1, map2, key, mapto, desc) 272 unsigned char *key, *mapto, *desc; 277 if (key == 0) 279 kpadd(map1, key, mapto, desc); 280 if (any(*key, "\b\n ")) 287 kpadd(map2, key, p, desc); 293 * key is the input sequence, mapto what it turns into, and desc is a 297 kpadd(struct maps *mapstr, unsigned char *key, unsigne argument [all...] |
/illumos-gate/usr/src/common/crypto/rsa/ |
H A D | rsa_impl.h | 38 #define RSA_MIN_KEY_LEN 256 /* RSA min key length in bits */ 39 #define RSA_MAX_KEY_LEN 4096 /* RSA max key length in bits */ 83 /* RSA key using BIGNUM representations */ 85 int size; /* key size in bits */ 99 /* RSA key using byte string representations, useful for parameter lists */ 129 #define rsa_sign(key, msg, len, sig) rsa_decrypt((key), (msg), (len), (sig)) 130 #define rsa_verify(key, msg, len, sig) rsa_encrypt((key), (msg), (len), (sig))
|
/illumos-gate/usr/src/head/arpa/ |
H A D | telnet.h | 337 #define ENCRYPT_ENC_KEYID 7 /* Negotiate encryption key */ 338 #define ENCRYPT_DEC_KEYID 8 /* Negotiate decryption key */ 423 /* A valid key has no "0" bytes */ 424 #define VALIDKEY(key) (key[0] | key[1] | key[2] | key[3] | \ 425 key[4] | key[ [all...] |
/illumos-gate/usr/src/head/ |
H A D | devmgmt.h | 130 * pid_t key Key used to reserve the device 135 pid_t key; member in struct:reservdev
|
/illumos-gate/usr/src/cmd/sendmail/db/db/ |
H A D | db_join.c | 62 * cursors in the curslist is used as the key into the primary and that 63 * key and data are returned. When no more items are left in the join 137 __db_join_put(dbc, key, data, flags) 139 DBT *key; 145 COMPQUIET(key, NULL); 163 __db_join_get(dbc, key, data, flags) 165 DBT *key, *data; 190 &jc->j_key, key, jc->j_init ? DB_CURRENT : DB_NEXT_DUP); 209 &jc->j_key, key, DB_GET_BOTH)) == DB_NOTFOUND) 233 &jc->j_key, key, DB_NEXT_DU [all...] |