/osnet-11/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 63 * bits of key data, which amounts to 128 bytes. 66 * 144 bytes (128key + 16checksum) to accomadate all the 128 bytes 75 * Encrypt a secret key given passwd 76 * The secret key is passed and returned in hex notation. 85 char key[8]; local 96 (void) passwd2des(passwd, key); 99 err = cbc_crypt(key, buf, len, DES_ENCRYPT | DES_HW, ivec); 116 * Decrypt secret key using passwd 117 * The secret key is passed and returned in hex notation. 126 char key[ local 264 des_block key; local 376 des_block key; local 461 passwd2des_g( const char *pw, const char *mixin, int len, des_block *key, bool_t altalg) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/fs/zfs/ |
H A D | zfscrypt.c | 69 grub_uint64_t key[0]; member in struct:grub_zfs_wrap_key 79 struct grub_zfs_wrap_key *key; local 82 key = grub_malloc (sizeof (*key) + keylen); 83 if (!key) 85 key->is_passphrase = passphrase; 86 key->keylen = keylen; 87 grub_memcpy (key->key, key_in, keylen); 88 key 303 grub_zfs_load_key_real(const struct grub_zfs_key *key, grub_size_t keysize, grub_uint64_t salt, grub_uint64_t algo) argument [all...] |
/osnet-11/usr/src/cmd/hal/hald/ |
H A D | property.c | 38 char *key; member in struct:_HalProperty 58 g_free (prop->key); 74 hal_property_new_string (const char *key, const char *value) argument 83 prop->key = g_strdup (key); 94 key, prop->v.str_value)); 101 hal_property_new_int (const char *key, dbus_int32_t value) argument 108 prop->key = g_strdup (key); 115 hal_property_new_uint64 (const char *key, dbus_uint64_ argument 129 hal_property_new_bool(const char *key, dbus_bool_t value) argument 143 hal_property_new_double(const char *key, double value) argument 376 hal_property_new_strlist(const char *key) argument [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/SDBM_File/sdbm/ |
H A D | sdbm.c | 177 sdbm_fetch(register DBM *db, datum key) argument 179 if (db == NULL || bad(key)) 182 if (getpage(db, exhash(key))) 183 return getpair(db->pagbuf, key); 189 sdbm_exists(register DBM *db, datum key) argument 191 if (db == NULL || bad(key)) 194 if (getpage(db, exhash(key))) 195 return exipair(db->pagbuf, key); 201 sdbm_delete(register DBM *db, datum key) argument 203 if (db == NULL || bad(key)) 225 sdbm_store(register DBM *db, datum key, datum val, int flags) argument 515 datum key; local [all...] |
/osnet-11/usr/src/lib/libnisdb/ |
H A D | db_index_entry_c.x | 41 % Each entry contains the key, the hash value of key, and location 67 item *key; 84 % item *key; 94 % A copy of the key is made. New entry is added to head of list of 'n'. */ 97 %/* Destructor: deletes key and itself. Assumes that deletion of 99 % ~db_index_entry() {delete key; } 112 % key as those given. Returns in 'how_many' the number of entries in the 118 %/* Return pointer to index entry with same hash value, same key, 123 % with the same hashvalue, key an [all...] |
/osnet-11/usr/src/lib/libnsl/yp/ |
H A D | ypupd.c | 59 if (!xdr_yp_buf(xdrs, &objp->key)) 69 return (xdr_yp_buf(xdrs, &objp->key));
|
H A D | yp_update.c | 60 yp_update(char *domain, char *map, unsigned op, char *key, int keylen, argument 120 args.key.yp_buf_len = keylen; 121 args.key.yp_buf_val = key;
|
/osnet-11/usr/src/lib/libnwam/common/ |
H A D | libnwam_wlan.c | 32 * and key setting). 68 * Create/update security key for WLAN <essid, bssid>. 72 uint32_t secmode, uint_t keyslot, const char *key) 75 linkname, essid, bssid, secmode, keyslot, key, B_FALSE)); 71 nwam_wlan_set_key(const char *linkname, const char *essid, const char *bssid, uint32_t secmode, uint_t keyslot, const char *key) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gen_seqnum.c | 29 * We do this by getting a random key and encrypting something with it, 54 krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, krb5_ui_4 *seqno) argument 64 seed = key2data(*key);
|
H A D | kdc_rep_dc.c | 34 * Decrypt the encrypted portion of the KDC_REP message, using the key 41 krb5_kdc_rep_decrypt_proc(krb5_context context, const krb5_keyblock *key, krb5_const_pointer decryptarg, krb5_kdc_rep *dec_rep) argument 63 if ((retval = krb5_c_decrypt(context, key, usage, 0, &dec_rep->enc_part,
|
/osnet-11/usr/src/lib/nsswitch/files/common/ |
H A D | getservent.c | 44 keyp = argp->key.serv.serv.name; 52 if (argp->key.serv.proto == NULL) 71 if ((keyp = argp->key.serv.proto) == NULL) { 98 keyp = argp->key.serv.serv.name; 122 argp->key.serv.serv.name, check_name)); 156 if (s_port == argp->key.serv.serv.port) { 157 if ((keyp = argp->key.serv.proto) == NULL) 179 (void) snprintf(portstr, 12, "%d", ntohs(argp->key.serv.serv.port));
|
H A D | getspent.c | 35 const char *keyp = argp->key.name; 54 return (_nss_files_XY_all(be, argp, 0, argp->key.name, check_spnamp));
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | tsol_getrhent.c | 136 if (argp->key.hostaddr.addr == NULL || 137 (argp->key.hostaddr.type != AF_INET && 138 argp->key.hostaddr.type != AF_INET6)) 140 if (strchr(argp->key.hostaddr.addr, ':') != NULL) { 142 if (argp->key.hostaddr.type == AF_INET) 146 if (argp->key.hostaddr.type == AF_INET6) 155 argp->key.hostaddr.addr) < 0) 159 argp->key.hostaddr.addr) < 0)
|
/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | getprojent.c | 34 argp->key.name, 0)); 41 (void) snprintf(projstr, PROJNAME_MAX/2, "%ld", argp->key.projid);
|
H A D | getprotoent.c | 45 argp->key.name, 0)); 56 (void) sprintf(numstr, "%d", argp->key.number);
|
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSign.c | 46 meta_object_t *key; local 55 rv = meta_handle2object(hKey, &key); 61 rv = meta_operation_init(CKF_SIGN, session, pMechanism, key); 63 OBJRELEASE(key); 170 meta_object_t *key; local 179 rv = meta_handle2object(hKey, &key); 185 rv = meta_operation_init(CKF_SIGN_RECOVER, session, pMechanism, key); 187 OBJRELEASE(key);
|
H A D | metaVerify.c | 46 meta_object_t *key; local 55 rv = meta_handle2object(hKey, &key); 61 rv = meta_operation_init(CKF_VERIFY, session, pMechanism, key); 63 OBJRELEASE(key); 175 meta_object_t *key; local 184 rv = meta_handle2object(hKey, &key); 190 rv = meta_operation_init(CKF_VERIFY_RECOVER, session, pMechanism, key); 192 OBJRELEASE(key);
|
/osnet-11/usr/src/lib/libmp/common/ |
H A D | old_mp.c | 55 MINT *xtom(char *key) { return (mp_xtom(key)); } argument 57 char *mtox(MINT *key) { return (mp_mtox(key)); } argument
|
/osnet-11/usr/src/lib/libnisdb/yptol/ |
H A D | shim.h | 98 extern int shim_dbm_delete(DBM *db, datum key); 99 extern datum shim_dbm_fetch(DBM *db, datum key); 100 extern datum shim_dbm_fetch_noupdate(DBM *db, datum key); 105 extern int shim_dbm_store(DBM *db, datum key, datum content,
|
/osnet-11/usr/src/lib/libparted/common/libparted/fs/hfs/ |
H A D | advfs.h | 29 hfs_btree_search (HfsPrivateFile* b_tree_file, HfsPrivateGenericKey* key,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_srvtab.c | 190 best_entry.key.contents = 0; 192 ent.key.enctype = enctype; 418 unsigned char key[8]; local 436 if (fread(key, 1, sizeof(key), fp) != sizeof(key)) 450 ret_entry->key.enctype = ENCTYPE_DES_CBC_CRC; 451 ret_entry->key.magic = KV5M_KEYBLOCK; 452 ret_entry->key.length = sizeof(key); [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/recno/ |
H A D | rec_seq.c | 53 * key: key for positioning and return value 58 * RET_ERROR, RET_SUCCESS or RET_SPECIAL if there's no next key. 61 __rec_seq(dbp, key, data, flags) 63 DBT *key, *data; 81 if ((nrec = *(recno_t *)key->data) == 0) 125 status = __rec_ret(t, e, nrec, key, data);
|
/osnet-11/usr/src/cmd/hal/addons/network-devices/ |
H A D | cache.c | 37 device_remove_if_stale(gpointer key, gpointer value, gpointer user_data) argument 41 char *name = key; 89 char *key; local 97 (gpointer)&key, (gpointer)&val);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Tie/ |
H A D | Memoize.t | 14 my ($key, $dir) = @_; 15 open my $h, '<', File::Spec->catfile($dir, $key) or return; 19 sub exists { my ($key, $dir) = @_; return -f File::Spec->catfile($dir, $key) }
|
/osnet-11/usr/src/lib/libast/common/cdt/ |
H A D | dtrenew.c | 38 reg Void_t* key; local 72 key = _DTKEY(obj,disc->key,disc->size); 73 e->hash = _DTHSH(dt,key,disc,disc->size);
|