Searched refs:key (Results 501 - 525 of 892) sorted by relevance

<<21222324252627282930>>

/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetether.c128 if (_ldap_filter_name(hostname, argp->key.name, sizeof (hostname)) != 0)
166 uchar_t *e = argp->key.ether;
H A Dgetkeyent.c69 char *keytype = (char *)argp->key.pkey.keytype;
105 * key is actually missing or no permission to read it.
107 * clients have read permission to the secret key. So,
109 * missing secret key.
175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname))
H A Dldap_common.h113 * a key and a key length field.
118 char *key; member in struct:_nss_ldap_list_entry
212 const char *key);
H A Dgethostent.c276 if (_ldap_filter_name(hostname, argp->key.name, sizeof (hostname)) != 0)
384 if ((argp->key.hostaddr.type != AF_INET) ||
385 (argp->key.hostaddr.len != sizeof (addr)))
388 (void) memcpy(&addr, argp->key.hostaddr.addr, sizeof (addr));
H A Dgetnetmasks.c122 if (_ldap_filter_name(netnumber, argp->key.name, sizeof (netnumber))
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/
H A DMakefile.com36 key.o \
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Ddecr_mgr.c123 ctx->key = key_handle;
139 ctx->key = 0;
H A Dencr_mgr.c122 ctx->key = key_handle;
138 ctx->key = 0;
/osnet-11/usr/src/tools/onbld/Scm/
H A DWorkSpace.py300 def __getitem__(self, key):
301 return self._active[key]
303 def __setitem__(self, key, value):
304 self._active[key] = value
306 def __delitem__(self, key):
307 del self._active[key]
516 ltip = sorted(localctxs or headctxs, key=lambda x: x.rev())[-1]
554 return sorted(ptips, key=lambda x: x.rev(), reverse=True)[0]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dcast5.c23 * 128-bit key = 01 23 45 67 12 34 56 78 23 45 67 89 34 56 78 9A
27 * 80-bit key = 01 23 45 67 12 34 56 78 23 45
32 * 40-bit key = 01 23 45 67 12
53 static gcry_err_code_t cast_setkey (void *c, const byte *key, unsigned keylen);
471 byte key[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, local
477 cast_setkey( &c, key, 16 );
563 do_cast_setkey( CAST5_context *c, const byte *key, unsigned keylen ) argument
585 x[0] = key[0] << 24 | key[1] << 16 | key[
607 cast_setkey(void *context, const byte *key, unsigned keylen ) argument
[all...]
H A Ddes.c39 * encryption context with a key.
41 * A DES key is 64bit wide but only 56bits of the key are used. The remaining
48 * After initializing a context with a key you could use this context to
56 * unsigned char key[8];
62 * * Fill 'key' and 'plaintext' with some data *
66 * des_setkey(context, key);
171 static int is_weak_key ( const byte *key );
486 * rawkey: 8 Bytes of key data
581 * Fill a DES context with subkeys calculated from a 64bit key
586 des_setkey(struct _des_ctx *ctx, const byte * key) argument
840 byte key[8] = local
897 struct { byte key[24]; byte plain[8]; byte cipher[8]; } testdata[] = { member in struct:__anon502
1011 do_tripledes_setkey( void *context, const byte *key, unsigned keylen ) argument
1075 do_des_setkey(void *context, const byte *key, unsigned keylen) argument
[all...]
H A Drfc2268.c193 setkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2) argument
219 S[i] = key[i];
226 /* Phase 2 - reduce effective key size to "bits". This was not
243 /* Make the expanded key, endian independent. */
251 do_setkey (void *context, const unsigned char *key, unsigned int keylen) argument
253 return setkey_core (context, key, keylen, 1);
H A Dblowfish.c26 * key "abcdefghijklmnopqrstuvwxyz";
51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen);
497 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument
527 ((byte*)&data)[0] = key[j];
528 ((byte*)&data)[1] = key[(j+1)%keylen];
529 ((byte*)&data)[2] = key[(j+2)%keylen];
530 ((byte*)&data)[3] = key[(j+3)%keylen];
532 ((byte*)&data)[3] = key[j];
533 ((byte*)&data)[2] = key[(j+1)%keylen];
534 ((byte*)&data)[1] = key[(
591 bf_setkey(void *context, const byte *key, unsigned keylen) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/db/btree/
H A Dbt_cursor.c77 * Test to see if two cursors could point to duplicates of the same key,
79 * in both cases. In the case of off-page duplicates, the key indices
81 * the duplicate page number must not be set, and the key index offsets
188 * If a cursor deleted a btree key, perform the actual deletion.
345 __bam_c_get(dbc, key, data, flags)
347 DBT *key, *data;
362 key, data, flags, cp->pgno != PGNO_INVALID)) != 0)
376 flags == DB_SET || flags == DB_SET_RANGE ? key : NULL, NULL, flags);
452 if ((ret = __bam_c_search(dbc, cp, key, flags, &exact)) != 0)
478 if ((ret = __bam_c_search(dbc, cp, key, flag
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Daead.h78 krb5int_c_iov_decrypt_stream(const struct krb5_keytypes *ktp, krb5_key key,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dccfns.c267 * \param key name under which the configuraion is stored.
271 * cache. Existing configuration under the same key is
279 const char *key, krb5_data *data)
285 ret = build_conf_principals(context, id, principal, key, &cred);
313 * \param key name under which the configuraion is stored.
323 const char *key, krb5_data *data)
331 ret = build_conf_principals(context, id, principal, key, &mcred);
277 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument
321 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument
/osnet-11/usr/src/grub/grub2/include/grub/zfs/
H A Dzfs.h145 extern grub_crypto_cipher_handle_t (*grub_zfs_load_key) (const struct grub_zfs_key *key,
/osnet-11/usr/src/cmd/sendmail/db/include/
H A Ddb_auto.h106 DBT key; member in struct:_db_debug_args
/osnet-11/usr/src/lib/libast/common/string/
H A Dstrgid.c83 disc.key = offsetof(Id_t, name);
/osnet-11/usr/src/lib/libc/port/gen/
H A Dgetgrnam_r.c81 arg.key.name = name;
97 arg.key.gid = gid;
110 arg.key.gid = gid;
143 arg.key.name = name;
191 /* No key to fill in */
208 /* No key to fill in */
/osnet-11/usr/src/lib/nsswitch/ad/common/
H A Dgetspent.c86 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0)
/osnet-11/usr/src/lib/rpcsec_gss/
H A Dsvc_rpcsec_gss.c83 uint_t key; member in struct:_svc_rpc_gss_data
672 call_res.ctx_handle.length = sizeof (client_data->key);
673 call_res.ctx_handle.value = (char *)&client_data->key;
1180 static uint_t key = 1; local
1220 * The client context handle is a 32-bit key (unsigned int).
1221 * The key is incremented until there is no duplicate for it.
1224 client_data->key = key++;
1225 if (find_client(client_data->key) == NULL) {
1251 int index = (client_data->key
1277 uint_t key = *(uint_t *)ctx_handle->value; local
[all...]
/osnet-11/usr/src/lib/libshadowfs/common/
H A Dshadow_hash.c87 ulong_t (*compute)(const void *key),
121 shadow_hash_strhash(const void *key) argument
126 for (p = key; *p != '\0'; p++) {
85 shadow_hash_create(size_t linkoffs, const void *(*convert)(const void *elem), ulong_t (*compute)(const void *key), int (*compare)(const void *lkey, const void *rkey)) argument
/osnet-11/usr/src/lib/libldap4/common/
H A Dsortctrl.c24 static int read_next_token(char **s, LDAPsortkey **key);
230 static int read_next_token(char **s, LDAPsortkey **key) argument
348 *key = new_key;
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/libdb2/recno/
H A Drec_get.c55 * key: key to find
60 * RET_ERROR, RET_SUCCESS and RET_SPECIAL if the key not found.
63 __rec_get(dbp, key, data, flags)
65 const DBT *key;
83 if (flags || (nrec = *(recno_t *)key->data) == 0) {

Completed in 138 milliseconds

<<21222324252627282930>>