/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getether.c | 128 if (_ldap_filter_name(hostname, argp->key.name, sizeof (hostname)) != 0) 166 uchar_t *e = argp->key.ether;
|
H A D | getkeyent.c | 69 char *keytype = (char *)argp->key.pkey.keytype; 105 * key is actually missing or no permission to read it. 107 * clients have read permission to the secret key. So, 109 * missing secret key. 175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname))
|
H A D | ldap_common.h | 113 * a key and a key length field. 118 char *key; member in struct:_nss_ldap_list_entry 212 const char *key);
|
H A D | gethostent.c | 276 if (_ldap_filter_name(hostname, argp->key.name, sizeof (hostname)) != 0) 384 if ((argp->key.hostaddr.type != AF_INET) || 385 (argp->key.hostaddr.len != sizeof (addr))) 388 (void) memcpy(&addr, argp->key.hostaddr.addr, sizeof (addr));
|
H A D | getnetmasks.c | 122 if (_ldap_filter_name(netnumber, argp->key.name, sizeof (netnumber))
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/ |
H A D | Makefile.com | 36 key.o \
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | decr_mgr.c | 123 ctx->key = key_handle; 139 ctx->key = 0;
|
H A D | encr_mgr.c | 122 ctx->key = key_handle; 138 ctx->key = 0;
|
/osnet-11/usr/src/tools/onbld/Scm/ |
H A D | WorkSpace.py | 300 def __getitem__(self, key): 301 return self._active[key] 303 def __setitem__(self, key, value): 304 self._active[key] = value 306 def __delitem__(self, key): 307 del self._active[key] 516 ltip = sorted(localctxs or headctxs, key=lambda x: x.rev())[-1] 554 return sorted(ptips, key=lambda x: x.rev(), reverse=True)[0]
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | cast5.c | 23 * 128-bit key = 01 23 45 67 12 34 56 78 23 45 67 89 34 56 78 9A 27 * 80-bit key = 01 23 45 67 12 34 56 78 23 45 32 * 40-bit key = 01 23 45 67 12 53 static gcry_err_code_t cast_setkey (void *c, const byte *key, unsigned keylen); 471 byte key[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, local 477 cast_setkey( &c, key, 16 ); 563 do_cast_setkey( CAST5_context *c, const byte *key, unsigned keylen ) argument 585 x[0] = key[0] << 24 | key[1] << 16 | key[ 607 cast_setkey(void *context, const byte *key, unsigned keylen ) argument [all...] |
H A D | des.c | 39 * encryption context with a key. 41 * A DES key is 64bit wide but only 56bits of the key are used. The remaining 48 * After initializing a context with a key you could use this context to 56 * unsigned char key[8]; 62 * * Fill 'key' and 'plaintext' with some data * 66 * des_setkey(context, key); 171 static int is_weak_key ( const byte *key ); 486 * rawkey: 8 Bytes of key data 581 * Fill a DES context with subkeys calculated from a 64bit key 586 des_setkey(struct _des_ctx *ctx, const byte * key) argument 840 byte key[8] = local 897 struct { byte key[24]; byte plain[8]; byte cipher[8]; } testdata[] = { member in struct:__anon502 1011 do_tripledes_setkey( void *context, const byte *key, unsigned keylen ) argument 1075 do_des_setkey(void *context, const byte *key, unsigned keylen) argument [all...] |
H A D | rfc2268.c | 193 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument 219 S[i] = key[i]; 226 /* Phase 2 - reduce effective key size to "bits". This was not 243 /* Make the expanded key, endian independent. */ 251 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument 253 return setkey_core (context, key, keylen, 1);
|
H A D | blowfish.c | 26 * key "abcdefghijklmnopqrstuvwxyz"; 51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen); 497 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument 527 ((byte*)&data)[0] = key[j]; 528 ((byte*)&data)[1] = key[(j+1)%keylen]; 529 ((byte*)&data)[2] = key[(j+2)%keylen]; 530 ((byte*)&data)[3] = key[(j+3)%keylen]; 532 ((byte*)&data)[3] = key[j]; 533 ((byte*)&data)[2] = key[(j+1)%keylen]; 534 ((byte*)&data)[1] = key[( 591 bf_setkey(void *context, const byte *key, unsigned keylen) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/db/btree/ |
H A D | bt_cursor.c | 77 * Test to see if two cursors could point to duplicates of the same key, 79 * in both cases. In the case of off-page duplicates, the key indices 81 * the duplicate page number must not be set, and the key index offsets 188 * If a cursor deleted a btree key, perform the actual deletion. 345 __bam_c_get(dbc, key, data, flags) 347 DBT *key, *data; 362 key, data, flags, cp->pgno != PGNO_INVALID)) != 0) 376 flags == DB_SET || flags == DB_SET_RANGE ? key : NULL, NULL, flags); 452 if ((ret = __bam_c_search(dbc, cp, key, flags, &exact)) != 0) 478 if ((ret = __bam_c_search(dbc, cp, key, flag [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | aead.h | 78 krb5int_c_iov_decrypt_stream(const struct krb5_keytypes *ktp, krb5_key key,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 267 * \param key name under which the configuraion is stored. 271 * cache. Existing configuration under the same key is 279 const char *key, krb5_data *data) 285 ret = build_conf_principals(context, id, principal, key, &cred); 313 * \param key name under which the configuraion is stored. 323 const char *key, krb5_data *data) 331 ret = build_conf_principals(context, id, principal, key, &mcred); 277 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument 321 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument
|
/osnet-11/usr/src/grub/grub2/include/grub/zfs/ |
H A D | zfs.h | 145 extern grub_crypto_cipher_handle_t (*grub_zfs_load_key) (const struct grub_zfs_key *key,
|
/osnet-11/usr/src/cmd/sendmail/db/include/ |
H A D | db_auto.h | 106 DBT key; member in struct:_db_debug_args
|
/osnet-11/usr/src/lib/libast/common/string/ |
H A D | strgid.c | 83 disc.key = offsetof(Id_t, name);
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | getgrnam_r.c | 81 arg.key.name = name; 97 arg.key.gid = gid; 110 arg.key.gid = gid; 143 arg.key.name = name; 191 /* No key to fill in */ 208 /* No key to fill in */
|
/osnet-11/usr/src/lib/nsswitch/ad/common/ |
H A D | getspent.c | 86 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0)
|
/osnet-11/usr/src/lib/rpcsec_gss/ |
H A D | svc_rpcsec_gss.c | 83 uint_t key; member in struct:_svc_rpc_gss_data 672 call_res.ctx_handle.length = sizeof (client_data->key); 673 call_res.ctx_handle.value = (char *)&client_data->key; 1180 static uint_t key = 1; local 1220 * The client context handle is a 32-bit key (unsigned int). 1221 * The key is incremented until there is no duplicate for it. 1224 client_data->key = key++; 1225 if (find_client(client_data->key) == NULL) { 1251 int index = (client_data->key 1277 uint_t key = *(uint_t *)ctx_handle->value; local [all...] |
/osnet-11/usr/src/lib/libshadowfs/common/ |
H A D | shadow_hash.c | 87 ulong_t (*compute)(const void *key), 121 shadow_hash_strhash(const void *key) argument 126 for (p = key; *p != '\0'; p++) { 85 shadow_hash_create(size_t linkoffs, const void *(*convert)(const void *elem), ulong_t (*compute)(const void *key), int (*compare)(const void *lkey, const void *rkey)) argument
|
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | sortctrl.c | 24 static int read_next_token(char **s, LDAPsortkey **key); 230 static int read_next_token(char **s, LDAPsortkey **key) argument 348 *key = new_key;
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/recno/ |
H A D | rec_get.c | 55 * key: key to find 60 * RET_ERROR, RET_SUCCESS and RET_SPECIAL if the key not found. 63 __rec_get(dbp, key, data, flags) 65 const DBT *key; 83 if (flags || (nrec = *(recno_t *)key->data) == 0) {
|