/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | getpwnam.c | 39 "passwd.byname", argp->key.name, 0)); 50 if (argp->key.uid > MAXUID) 52 (void) snprintf(uidstr, 12, "%u", argp->key.uid);
|
H A D | nis_common.c | 150 _nss_nis_ypmatch(domain, map, key, valp, vallenp, ypstatusp) 153 const char *key; 168 (grrr)key, (int)strlen(key), valp, vallenp, 0); 186 _nss_nis_ypmatch_rsvdport(domain, map, key, valp, vallenp, ypstatusp) 189 const char *key; 204 (grrr)key, strlen(key), valp, vallenp, 0); 217 _nss_nis_lookup(be, args, netdb, map, key, ypstatusp) 222 const char *key; [all...] |
H A D | getnetent.c | 50 argp->key.name, 0)); 63 if (nettoa((int)argp->key.netaddr.net, addrstr, 16, &pnull) != 0)
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Memoize/ |
H A D | Expire.pm | 52 my ($self, $key, $value) = @_; 57 $self->{C}{$key} = $header . $value; 105 my ($self, $key, $data, @header) = @_; 106 $self->{C}{$key} = _make_header(@header) . $data; 255 already, it will invoke C<< C->EXISTS(key) >>. C<key> is the normalized 256 function argument. MyExpirePolicy::EXISTS should return 0 if the key 263 cached value by invoking C<< C->FETCH(key) >>. MyExpirePolicy::FETCH should 266 cache by calling C<< C->STORE(key, value) >>. 280 my ($cache, $key) [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | ac.c | 54 "private-key", 55 "public-key" 58 /* These specifications are needed for key-pair generation; the caller 103 /* A single key. */ 107 gcry_ac_key_type_t type; /* Type of the key. */ 110 /* A key pair. */ 1456 /* Initialize a key from a given data set. */ 1460 _gcry_ac_key_init (gcry_ac_key_t *key, gcry_ac_handle_t handle, 1488 *key = key_new; 1500 /* Generates a new key pai 1454 _gcry_ac_key_init(gcry_ac_key_t *key, gcry_ac_handle_t handle, gcry_ac_key_type_t type, gcry_ac_data_t data) argument 1688 gcry_ac_key_t key; local 1713 _gcry_ac_key_destroy(gcry_ac_key_t key) argument 1749 _gcry_ac_key_data_get(gcry_ac_key_t key) argument 1758 _gcry_ac_key_test(gcry_ac_handle_t handle, gcry_ac_key_t key) argument 1783 _gcry_ac_key_get_nbits(gcry_ac_handle_t handle, gcry_ac_key_t key, unsigned int *nbits) argument 1819 _gcry_ac_key_get_grip(gcry_ac_handle_t handle, gcry_ac_key_t key, unsigned char *key_grip) argument 1862 _gcry_ac_data_encrypt(gcry_ac_handle_t handle, unsigned int flags, gcry_ac_key_t key, gcry_mpi_t data_plain, gcry_ac_data_t *data_encrypted) argument 1939 _gcry_ac_data_decrypt(gcry_ac_handle_t handle, unsigned int flags, gcry_ac_key_t key, gcry_mpi_t *data_plain, gcry_ac_data_t data_encrypted) argument 2015 _gcry_ac_data_sign(gcry_ac_handle_t handle, gcry_ac_key_t key, gcry_mpi_t data, gcry_ac_data_t *data_signature) argument 2089 _gcry_ac_data_verify(gcry_ac_handle_t handle, gcry_ac_key_t key, gcry_mpi_t data, gcry_ac_data_t data_signature) argument 2726 ac_es_dencode_prepare_pkcs_v1_5(gcry_ac_handle_t handle, gcry_ac_key_t key, void *opts, void *opts_em) argument 2749 ac_ssa_dencode_prepare_pkcs_v1_5(gcry_ac_handle_t handle, gcry_ac_key_t key, void *opts, void *opts_em) argument 2815 ac_dencode_prepare(gcry_ac_handle_t handle, gcry_ac_key_t key, void *opts, ac_scheme_t scheme, void **opts_em) argument 2880 _gcry_ac_data_encrypt_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_message, gcry_ac_io_t *io_cipher) argument 2972 _gcry_ac_data_decrypt_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_cipher, gcry_ac_io_t *io_message) argument 3088 _gcry_ac_data_sign_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_message, gcry_ac_io_t *io_signature) argument 3181 _gcry_ac_data_verify_scheme(gcry_ac_handle_t handle, gcry_ac_scheme_t scheme_id, unsigned int flags, void *opts, gcry_ac_key_t key, gcry_ac_io_t *io_message, gcry_ac_io_t *io_signature) argument [all...] |
H A D | arcfour.c | 75 do_arcfour_setkey (void *context, const byte *key, unsigned int keylen) argument 100 karr[i] = key[i%keylen]; 115 arcfour_setkey ( void *context, const byte *key, unsigned int keylen ) argument 118 gcry_err_code_t rc = do_arcfour_setkey (ctx, key, keylen );
|
H A D | hmac-tests.c | 45 API. (DATA,DATALEN) is the data to be MACed, (KEY,KEYLEN) the key 51 const void *key, size_t keylen, 62 if (_gcry_md_setkey (hd, key, keylen)) 100 unsigned char key[128]; local 105 key[i] = i; 108 key, 64, 118 key[i] = j++; 121 key, 20, 129 key[i] = j++; 132 key, 10 49 check_one(int algo, const void *data, size_t datalen, const void *key, size_t keylen, const void *expect, size_t expectlen) argument 167 const char * const key; member in struct:__anon515 281 const char * const key; member in struct:__anon516 423 const char * const key; member in struct:__anon517 549 const char * const key; member in struct:__anon518 [all...] |
/osnet-11/usr/src/lib/libsocket/inet/ |
H A D | getservent_r.c | 89 * brethren who can search on 1-1/2 key. If they pass a NULL 95 arg.key.serv.proto = NULL;
|
/osnet-11/usr/src/cmd/sendmail/include/sm/ |
H A D | sem.h | 17 /* key for semaphores */ 53 # define sm_sem_start(key, nsem, semflg, owner) 0
|
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Bin/ |
H A D | guess.d | 49 key = copyin(self->buf, arg0); 50 keys[pos] = *(char *)key;
|
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Misc/ |
H A D | guess.d | 49 key = copyin(self->buf, arg0); 50 keys[pos] = *(char *)key;
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/DBM_Filter/ |
H A D | int32.pm | 39 that uses a C int as either the key and/or value in the DBM file.
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getprofattr.c | 143 if (argp->key.name != NULL && *argp->key.name == '/' && 144 __get_default_prof(argp->key.name, argp) == NSS_SUCCESS) { 147 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0)
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/hash_provider/ |
H A D | hash_ef_generic.c | 52 krb5_keyblock *key, 89 inlen, key, 51 k5_ef_mac(krb5_context context, krb5_keyblock *key, krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | util_cksum.c | 217 krb5_key key, 235 code = krb5_c_crypto_length(context, key->keyblock.enctype, KRB5_CRYPTO_TYPE_CHECKSUM, &k5_checksumlen); 286 code = krb5_k_verify_checksum_iov(context, type, key, sign_usage, kiov, kiov_count, valid); 288 code = krb5_k_make_checksum_iov(context, type, key, sign_usage, kiov, kiov_count); 299 krb5_key key, 304 return checksum_iov_v3(context, type, rrc, key, 312 krb5_key key, 318 return checksum_iov_v3(context, type, rrc, key,
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IO/lib/IO/ |
H A D | Dir.pm | 110 my($dh,$key) = @_; 111 -e File::Spec->catfile(${*$dh}{io_dir_path}, $key); 115 my($dh,$key) = @_; 116 &lstat(File::Spec->catfile(${*$dh}{io_dir_path}, $key)); 120 my($dh,$key,$data) = @_; 122 my $file = File::Spec->catfile(${*$dh}{io_dir_path}, $key); 131 my($dh,$key) = @_; 137 my $file = File::Spec->catfile(${*$dh}{io_dir_path}, $key);
|
/osnet-11/usr/src/lib/libast/common/comp/ |
H A D | hsearch.c | 77 free(((Hash_t*)obj)->item.key); 129 if(!(o = (Hash_t*)dtmatch(Hashtab,item.key)) && action == ENTER &&
|
/osnet-11/usr/src/lib/libast/common/vmalloc/ |
H A D | vmmopen.c | 63 int key; /* identifying key */ member in struct:_user_s 291 Void_t* vmmset(Vmalloc_t* vm, int key, Void_t* data, int set) argument 293 Void_t* vmmset(vm, data, key, set) 295 int key; /* key of data to be set */ 304 if(u->key == key) 317 u->key = key; [all...] |
/osnet-11/usr/src/lib/nsswitch/files/common/ |
H A D | bootparams_getbyname.c | 50 return (_nss_files_XY_bootparams(be, argp, argp->key.name)); 82 * filter not useful here since the key 136 if (strcasecmp(args->key.name, host) != 0) {
|
H A D | getprojent.c | 42 return ((uint_t)argp->key.projid); 94 return (projid == argp->key.projid);
|
/osnet-11/usr/src/lib/libnsl/ |
H A D | Makefile | 141 $(RM) Makefile+ des/des_crypt.c+ des/des_soft.c+ key/xcrypt.c+ 149 < key/xcrypt.c > key/xcrypt.c+ 150 $(MV) key/xcrypt.c+ key/xcrypt.c 154 $(CHMOD) 444 Makefile des/des_crypt.c des/des_soft.c key/xcrypt.c
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | rd_cred.c | 187 krb5_key key; local 190 /* Get key */ 191 if ((key = auth_context->recv_subkey) == NULL) 192 key = auth_context->key; 206 * If decrypting with the first key we try fails, perhaps the 207 * credentials are stored in the session key so try decrypting with 210 if ((retval = krb5_rd_cred_basic(context, pcreddata, key, 213 auth_context->key,
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/btree/ |
H A D | btree.h | 112 * For the btree internal pages, the item is a key. BINTERNALs are {key, pgno} 113 * pairs, such that the key compares less than or equal to all of the records 121 u_int32_t ksize; /* key size */ 124 #define P_BIGKEY 0x02 /* overflow key */ 171 /* For the btree leaf pages, the item is a key and data pair. */ 173 u_int32_t ksize; /* size of key */ 186 /* Get the number of bytes in the user's key/data pair. */ 192 #define WR_BLEAF(p, key, data, flags) { \ 193 *(u_int32_t *)p = key 277 DBT key; /* B: Saved key, or key.data == NULL. */ member in struct:_cursor [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/term/efi/ |
H A D | console.c | 153 status = efi_call_2 (i->read_key_stroke, i, &keyex.key); 162 if (keyex.key.scan_code == 0) 164 grub_efi_char16_t c = keyex.key.unicode_char; 176 if ((mods & GRUB_TERM_CTRL) && keyex.key.unicode_char < 0x20) 181 else if (keyex.key.scan_code < ARRAY_SIZE (efi_codes)) 182 return efi_codes[keyex.key.scan_code] | mods;
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | atexit.c | 258 * because the thread may use the key's TSD further on in fini processing. 265 int key; local 268 for (key = 1; key < tsdm->tsdm_nused; key++) { 269 if ((func = tsdm->tsdm_destro[key]) != NULL && 272 tsdm->tsdm_destro[key] = NULL;
|