Searched refs:key (Results 326 - 350 of 892) sorted by relevance

<<11121314151617181920>>

/osnet-11/usr/src/lib/nsswitch/nis/common/
H A Dgetpwnam.c39 "passwd.byname", argp->key.name, 0));
50 if (argp->key.uid > MAXUID)
52 (void) snprintf(uidstr, 12, "%u", argp->key.uid);
H A Dnis_common.c150 _nss_nis_ypmatch(domain, map, key, valp, vallenp, ypstatusp)
153 const char *key;
168 (grrr)key, (int)strlen(key), valp, vallenp, 0);
186 _nss_nis_ypmatch_rsvdport(domain, map, key, valp, vallenp, ypstatusp)
189 const char *key;
204 (grrr)key, strlen(key), valp, vallenp, 0);
217 _nss_nis_lookup(be, args, netdb, map, key, ypstatusp)
222 const char *key;
[all...]
H A Dgetnetent.c50 argp->key.name, 0));
63 if (nettoa((int)argp->key.netaddr.net, addrstr, 16, &pnull) != 0)
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Memoize/
H A DExpire.pm52 my ($self, $key, $value) = @_;
57 $self->{C}{$key} = $header . $value;
105 my ($self, $key, $data, @header) = @_;
106 $self->{C}{$key} = _make_header(@header) . $data;
255 already, it will invoke C<< C->EXISTS(key) >>. C<key> is the normalized
256 function argument. MyExpirePolicy::EXISTS should return 0 if the key
263 cached value by invoking C<< C->FETCH(key) >>. MyExpirePolicy::FETCH should
266 cache by calling C<< C->STORE(key, value) >>.
280 my ($cache, $key)
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dac.c54 "private-key",
55 "public-key"
58 /* These specifications are needed for key-pair generation; the caller
103 /* A single key. */
107 gcry_ac_key_type_t type; /* Type of the key. */
110 /* A key pair. */
1456 /* Initialize a key from a given data set. */
1460 _gcry_ac_key_init (gcry_ac_key_t *key, gcry_ac_handle_t handle,
1488 *key = key_new;
1500 /* Generates a new key pai
1454 _gcry_ac_key_init(gcry_ac_key_t *key, gcry_ac_handle_t handle, gcry_ac_key_type_t type, gcry_ac_data_t data) argument
1688 gcry_ac_key_t key; local
1713 _gcry_ac_key_destroy(gcry_ac_key_t key) argument
1749 _gcry_ac_key_data_get(gcry_ac_key_t key) argument
1758 _gcry_ac_key_test(gcry_ac_handle_t handle, gcry_ac_key_t key) argument
1783 _gcry_ac_key_get_nbits(gcry_ac_handle_t handle, gcry_ac_key_t key, unsigned int *nbits) argument
1819 _gcry_ac_key_get_grip(gcry_ac_handle_t handle, gcry_ac_key_t key, unsigned char *key_grip) argument
1862 _gcry_ac_data_encrypt(gcry_ac_handle_t handle, unsigned int flags, gcry_ac_key_t key, gcry_mpi_t data_plain, gcry_ac_data_t *data_encrypted) argument
1939 _gcry_ac_data_decrypt(gcry_ac_handle_t handle, unsigned int flags, gcry_ac_key_t key, gcry_mpi_t *data_plain, gcry_ac_data_t data_encrypted) argument
2015 _gcry_ac_data_sign(gcry_ac_handle_t handle, gcry_ac_key_t key, gcry_mpi_t data, gcry_ac_data_t *data_signature) argument
2089 _gcry_ac_data_verify(gcry_ac_handle_t handle, gcry_ac_key_t key, gcry_mpi_t data, gcry_ac_data_t data_signature) argument
2726 ac_es_dencode_prepare_pkcs_v1_5(gcry_ac_handle_t handle, gcry_ac_key_t key, void *opts, void *opts_em) argument
2749 ac_ssa_dencode_prepare_pkcs_v1_5(gcry_ac_handle_t handle, gcry_ac_key_t key, void *opts, void *opts_em) argument
2815 ac_dencode_prepare(gcry_ac_handle_t handle, gcry_ac_key_t key, void *opts, ac_scheme_t scheme, void **opts_em) argument
2880 _gcry_ac_data_encrypt_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_message, gcry_ac_io_t *io_cipher) argument
2972 _gcry_ac_data_decrypt_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_cipher, gcry_ac_io_t *io_message) argument
3088 _gcry_ac_data_sign_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_message, gcry_ac_io_t *io_signature) argument
3181 _gcry_ac_data_verify_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_message, gcry_ac_io_t *io_signature) argument
[all...]
H A Darcfour.c75 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument
100 karr[i] = key[i%keylen];
115 arcfour_setkey ( void *context, const byte *key, unsigned int keylen ) argument
118 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
H A Dhmac-tests.c45 API. (DATA,DATALEN) is the data to be MACed, (KEY,KEYLEN) the key
51 const void *key, size_t keylen,
62 if (_gcry_md_setkey (hd, key, keylen))
100 unsigned char key[128]; local
105 key[i] = i;
108 key, 64,
118 key[i] = j++;
121 key, 20,
129 key[i] = j++;
132 key, 10
49 check_one(int algo, const void *data, size_t datalen, const void *key, size_t keylen, const void *expect, size_t expectlen) argument
167 const char * const key; member in struct:__anon515
281 const char * const key; member in struct:__anon516
423 const char * const key; member in struct:__anon517
549 const char * const key; member in struct:__anon518
[all...]
/osnet-11/usr/src/lib/libsocket/inet/
H A Dgetservent_r.c89 * brethren who can search on 1-1/2 key. If they pass a NULL
95 arg.key.serv.proto = NULL;
/osnet-11/usr/src/cmd/sendmail/include/sm/
H A Dsem.h17 /* key for semaphores */
53 # define sm_sem_start(key, nsem, semflg, owner) 0
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Bin/
H A Dguess.d49 key = copyin(self->buf, arg0);
50 keys[pos] = *(char *)key;
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Misc/
H A Dguess.d49 key = copyin(self->buf, arg0);
50 keys[pos] = *(char *)key;
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/DBM_Filter/
H A Dint32.pm39 that uses a C int as either the key and/or value in the DBM file.
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetprofattr.c143 if (argp->key.name != NULL && *argp->key.name == '/' &&
144 __get_default_prof(argp->key.name, argp) == NSS_SUCCESS) {
147 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0)
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/
H A Dhash_ef_generic.c52 krb5_keyblock *key,
89 inlen, key,
51 k5_ef_mac(krb5_context context, krb5_keyblock *key, krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dutil_cksum.c217 krb5_key key,
235 code = krb5_c_crypto_length(context, key->keyblock.enctype, KRB5_CRYPTO_TYPE_CHECKSUM, &k5_checksumlen);
286 code = krb5_k_verify_checksum_iov(context, type, key, sign_usage, kiov, kiov_count, valid);
288 code = krb5_k_make_checksum_iov(context, type, key, sign_usage, kiov, kiov_count);
299 krb5_key key,
304 return checksum_iov_v3(context, type, rrc, key,
312 krb5_key key,
318 return checksum_iov_v3(context, type, rrc, key,
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IO/lib/IO/
H A DDir.pm110 my($dh,$key) = @_;
111 -e File::Spec->catfile(${*$dh}{io_dir_path}, $key);
115 my($dh,$key) = @_;
116 &lstat(File::Spec->catfile(${*$dh}{io_dir_path}, $key));
120 my($dh,$key,$data) = @_;
122 my $file = File::Spec->catfile(${*$dh}{io_dir_path}, $key);
131 my($dh,$key) = @_;
137 my $file = File::Spec->catfile(${*$dh}{io_dir_path}, $key);
/osnet-11/usr/src/lib/libast/common/comp/
H A Dhsearch.c77 free(((Hash_t*)obj)->item.key);
129 if(!(o = (Hash_t*)dtmatch(Hashtab,item.key)) && action == ENTER &&
/osnet-11/usr/src/lib/libast/common/vmalloc/
H A Dvmmopen.c63 int key; /* identifying key */ member in struct:_user_s
291 Void_t* vmmset(Vmalloc_t* vm, int key, Void_t* data, int set) argument
293 Void_t* vmmset(vm, data, key, set)
295 int key; /* key of data to be set */
304 if(u->key == key)
317 u->key = key;
[all...]
/osnet-11/usr/src/lib/nsswitch/files/common/
H A Dbootparams_getbyname.c50 return (_nss_files_XY_bootparams(be, argp, argp->key.name));
82 * filter not useful here since the key
136 if (strcasecmp(args->key.name, host) != 0) {
H A Dgetprojent.c42 return ((uint_t)argp->key.projid);
94 return (projid == argp->key.projid);
/osnet-11/usr/src/lib/libnsl/
H A DMakefile141 $(RM) Makefile+ des/des_crypt.c+ des/des_soft.c+ key/xcrypt.c+
149 < key/xcrypt.c > key/xcrypt.c+
150 $(MV) key/xcrypt.c+ key/xcrypt.c
154 $(CHMOD) 444 Makefile des/des_crypt.c des/des_soft.c key/xcrypt.c
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drd_cred.c187 krb5_key key; local
190 /* Get key */
191 if ((key = auth_context->recv_subkey) == NULL)
192 key = auth_context->key;
206 * If decrypting with the first key we try fails, perhaps the
207 * credentials are stored in the session key so try decrypting with
210 if ((retval = krb5_rd_cred_basic(context, pcreddata, key,
213 auth_context->key,
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/btree/
H A Dbtree.h112 * For the btree internal pages, the item is a key. BINTERNALs are {key, pgno}
113 * pairs, such that the key compares less than or equal to all of the records
121 u_int32_t ksize; /* key size */
124 #define P_BIGKEY 0x02 /* overflow key */
171 /* For the btree leaf pages, the item is a key and data pair. */
173 u_int32_t ksize; /* size of key */
186 /* Get the number of bytes in the user's key/data pair. */
192 #define WR_BLEAF(p, key, data, flags) { \
193 *(u_int32_t *)p = key
277 DBT key; /* B: Saved key, or key.data == NULL. */ member in struct:_cursor
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/term/efi/
H A Dconsole.c153 status = efi_call_2 (i->read_key_stroke, i, &keyex.key);
162 if (keyex.key.scan_code == 0)
164 grub_efi_char16_t c = keyex.key.unicode_char;
176 if ((mods & GRUB_TERM_CTRL) && keyex.key.unicode_char < 0x20)
181 else if (keyex.key.scan_code < ARRAY_SIZE (efi_codes))
182 return efi_codes[keyex.key.scan_code] | mods;
/osnet-11/usr/src/lib/libc/port/gen/
H A Datexit.c258 * because the thread may use the key's TSD further on in fini processing.
265 int key; local
268 for (key = 1; key < tsdm->tsdm_nused; key++) {
269 if ((func = tsdm->tsdm_destro[key]) != NULL &&
272 tsdm->tsdm_destro[key] = NULL;

Completed in 102 milliseconds

<<11121314151617181920>>