Searched refs:key (Results 526 - 550 of 892) sorted by relevance

<<21222324252627282930>>

/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Dblowfish.c30 * key "abcdefghijklmnopqrstuvwxyz";
51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen);
469 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument
499 ((byte*)&data)[0] = key[j];
500 ((byte*)&data)[1] = key[(j+1)%keylen];
501 ((byte*)&data)[2] = key[(j+2)%keylen];
502 ((byte*)&data)[3] = key[(j+3)%keylen];
504 ((byte*)&data)[3] = key[j];
505 ((byte*)&data)[2] = key[(j+1)%keylen];
506 ((byte*)&data)[1] = key[(
563 bf_setkey(void *context, const byte *key, unsigned keylen) argument
[all...]
H A Ddes.c43 * encryption context with a key.
45 * A DES key is 64bit wide but only 56bits of the key are used. The remaining
52 * After initializing a context with a key you could use this context to
60 * unsigned char key[8];
66 * * Fill 'key' and 'plaintext' with some data *
70 * des_setkey(context, key);
170 static int is_weak_key ( const byte *key );
480 * rawkey: 8 Bytes of key data
575 * Fill a DES context with subkeys calculated from a 64bit key
580 des_setkey(struct _des_ctx *ctx, const byte * key) argument
794 do_tripledes_setkey( void *context, const byte *key, unsigned keylen ) argument
836 do_des_setkey(void *context, const byte *key, unsigned keylen) argument
[all...]
H A Dcast5.c27 * 128-bit key = 01 23 45 67 12 34 56 78 23 45 67 89 34 56 78 9A
31 * 80-bit key = 01 23 45 67 12 34 56 78 23 45
36 * 40-bit key = 01 23 45 67 12
53 static gcry_err_code_t cast_setkey (void *c, const byte *key, unsigned keylen);
518 do_cast_setkey( CAST5_context *c, const byte *key, unsigned keylen ) argument
540 x[0] = key[0] << 24 | key[1] << 16 | key[2] << 8 | key[3];
541 x[1] = key[
562 cast_setkey(void *context, const byte *key, unsigned keylen ) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/db/btree/
H A Dbt_search.c66 * Search a btree for a key.
72 __bam_search(dbc, key, flags, stop, recnop, exactp)
74 const DBT *key;
157 __bam_cmp(dbp, key, h, indx, t->bt_compare)) == 0) {
170 * key and may be zero or a last + O_INDX index.
195 * a parent page for the key). Decrement the base by 1 if it's
H A Dbt_put.c79 __bam_iitem(dbc, hp, indxp, key, data, op, flags)
83 DBT *key, *data;
150 * partial record. If either of the key or data items won't fit on
153 bigkey = LF_ISSET(BI_NEWKEY) && key->size > t->bt_ovflsize;
160 /* If BI_NEWKEY is set we're adding a new key and data pair. */
164 needed += BKEYDATA_PSIZE(key->size);
171 * We're either overwriting the data item of a key/data pair
219 * 1. Append a new key/data pair.
220 * 2. Insert a new key/data pair.
228 case DB_AFTER: /* 1. Append a new key/dat
[all...]
/osnet-11/usr/src/cmd/sendmail/libsm/
H A Dldap.c287 ** SM_LDAP_SEARCH_M -- initiate multi-key LDAP search
294 ** argv -- key vector of substitutions in LDAP filter
321 char *key; local
329 key = argv[0];
332 key = argv[q[1] - '0'];
333 if (key == NULL)
338 key = "";
343 key = NULL;
346 key = argv[0];
351 "%.*s%s", (int) (q - p), p, key);
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IPC/SysV/
H A DMsg.pm74 my($key,$val);
75 $ds->$key($val)
76 while(($key,$val) = each %arg);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/NDBM_File/
H A DNDBM_File.pm98 =head2 C<ndbm store returned -1, errno 22, key "..." at ...>
100 This warning is emmitted when you try to store a key or a value that
108 key, plus the length of its associated value, may not exceed 1008
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/ODBM_File/
H A DODBM_File.pm98 =head2 C<odbm store returned -1, errno 22, key "..." at ...>
100 This warning is emmitted when you try to store a key or a value that
108 key, plus the length of its associated value, may not exceed 1008
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/SDBM_File/
H A DSDBM_File.pm101 =head2 C<sdbm store returned -1, errno 22, key "..." at ...>
103 This warning is emmitted when you try to store a key or a value that
111 key, plus the length of its associated value, may not exceed 1008
/osnet-11/usr/src/lib/libast/common/cdt/
H A Ddtlist.c42 reg Void_t *key, *k; local
137 { key = (type&DT_MATCH) ? obj : _DTKEY(obj,ky,sz);
140 if(_DTCMP(dt,key,k,disc,cmpf,sz) == 0)
/osnet-11/usr/src/lib/libtsnet/common/
H A Dtsol_getrhent.c65 arg.key.hostaddr.addr = (const char *)addrp;
66 arg.key.hostaddr.len = len;
67 arg.key.hostaddr.type = af;
111 /* No key, no stayopen */
/osnet-11/usr/src/lib/nsswitch/compat/common/
H A Dgetgrent.c123 return (strcmp(g->gr_name, argp->key.name) == 0);
143 return (g->gr_gid == argp->key.gid);
153 if (argp->key.gid > MAXUID)
H A Dgetpwent.c140 return (strcmp(p->pw_name, argp->key.name) == 0);
160 return (p->pw_uid == argp->key.uid);
170 if (argp->key.uid > MAXUID)
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetprotoent.c232 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0)
270 _F_GETPROTOBYNUMBER, argp->key.number);
275 _F_GETPROTOBYNUMBER_SSD, argp->key.number);
/osnet-11/usr/src/lib/nsswitch/nis/common/
H A Dgetgrent.c48 "group.byname", argp->key.name, 0));
59 if (argp->key.gid > MAXUID)
61 (void) snprintf(gidstr, 12, "%d", argp->key.gid);
/osnet-11/usr/src/lib/pyzfs/common/
H A Duserspace.py116 key = (isgroup, domain, rid)
119 v = acct[key]
124 acct[key] = v
/osnet-11/usr/src/lib/udapl/udapl_tavor/tavor/
H A Ddapl_tavor_ibtf_qp.c802 DAPL_HASH_KEY key; local
807 key = qp_num;
809 "srq_insert_ep:%p %p %llx\n", srq_ptr, htable, key);
810 return (dapls_hash_insert(htable, key, ep_ptr));
820 DAPL_HASH_KEY key; local
827 key = qp_num;
829 retval = dapls_hash_remove(htable, key, (DAPL_HASH_DATA *)&epp);
832 "srq_remove_ep(%d): %p %llx\n", retval, htable, key);
843 DAPL_HASH_KEY key; local
850 key
[all...]
/osnet-11/usr/src/lib/libdladm/common/
H A Dlibdlaggr.c685 uint16_t key, uint32_t nports, dladm_aggr_port_attr_db_t *ports,
700 iocp->lc_key = key;
738 uint16_t key = 0; local
749 key = attr.lg_key;
792 key, j, ports, attr.lg_aggr_mode, attr.lg_policy, attr.lg_mac_fixed,
1123 datalink_id_t linkid, uint16_t key, uint32_t nports,
1140 u64 = key;
1233 dladm_aggr_create(dladm_handle_t handle, const char *name, uint16_t key, argument
1246 if (key != 0 && key > AGGR_MAX_KE
684 i_dladm_aggr_create_sys(dladm_handle_t handle, datalink_id_t linkid, uint16_t key, uint32_t nports, dladm_aggr_port_attr_db_t *ports, aggr_mode_t aggr_mode, uint32_t policy, boolean_t mac_addr_fixed, const uchar_t *mac_addr, aggr_lacp_mode_t lacp_mode, aggr_lacp_timer_t lacp_timer, boolean_t force) argument
1122 dladm_aggr_persist_aggr_conf(dladm_handle_t handle, const char *link, datalink_id_t linkid, uint16_t key, uint32_t nports, dladm_aggr_port_attr_db_t *ports, aggr_mode_t aggr_mode, uint32_t policy, boolean_t mac_addr_fixed, const uchar_t *mac_addr, aggr_lacp_mode_t lacp_mode, aggr_lacp_timer_t lacp_timer, boolean_t force) argument
1642 uint16_t key; member in struct:i_walk_key_state_s
1651 uint16_t key; local
1673 dladm_key2linkid(dladm_handle_t handle, uint16_t key, datalink_id_t *linkidp, uint32_t flags) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_xdr.c36 krb5_encode_princ_dbkey(krb5_context context, krb5_data *key, argument
44 key->length = strlen(princ_name)+1;
45 key->data = princ_name;
51 krb5_free_princ_dbkey(krb5_context context, krb5_data *key) argument
53 (void) krb5_free_data_contents(context, key);
/osnet-11/usr/src/lib/libldap5/sources/ldap/ssldap/
H A Dldapsinit.c52 #include <key.h>
789 * called during SSL client auth. when server wants our cert and key.
815 SECKEYPrivateKey *key; local
831 if (( key = PK11_FindKeyByAnyCert( cert, (void *)ssip )) == NULL ) {
834 *errmsgp = dgettext(TEXT_DOMAIN, "bad key or key password");
840 *pRetKey = key;
869 * performs some basic checks on clientauth cert and key/password
873 * 2) check that public key in cert matches private key
881 SECKEYPrivateKey *key = NULL; local
[all...]
/osnet-11/usr/src/cmd/hal/hald/
H A Ddevice_info.c60 /** Max length of property key */
150 /** When merging, the key to store the value in */
271 * @param key Key of the property to compare
277 match_compare_property (HalDevice *d, const char *key, const char *right_side, dbus_int64_t *result) argument
284 if (!hal_device_has_property (d, key))
287 proptype = hal_device_property_get_type (d, key);
290 *result = (dbus_int64_t) strcmp (hal_device_property_get_string (d, key), right_side);
295 *result = ((dbus_int64_t) hal_device_property_get_int (d, key)) - strtoll (right_side, NULL, 0);
300 *result = ((dbus_int64_t) hal_device_property_get_uint64 (d, key)) - ((dbus_int64_t) strtoll (right_side, NULL, 0));
305 *result = (dbus_int64_t) ceil (hal_device_property_get_double (d, key)
332 const char *key; local
[all...]
/osnet-11/usr/src/lib/fm/libfmnotify/common/
H A Dlibfmnotify.c335 nd_seq_search(char *key, char **list, uint_t nelem) argument
338 if (strcmp(key, list[i]) == 0)
478 const char *key[2]; local
491 key[0] = class;
492 key[1] = NULL;
493 if (fm_dc_key2code(dhp, key, buf, buflen) < 0) {
494 nd_error(nhdl, "fm_dc_key2code failed for %s", key[0]);
/osnet-11/usr/src/lib/libbsm/common/
H A Daudit_scf.c438 * get_prop_str_singleval() - get the single-valued property key-val pair
526 * get_prop_str_multival() - get the multi-valued property key-val pairs.
527 * Each of the values is represented by single key-val pair, where key is the
1574 * do_setpgrp_scf() - set key-val pairs for the given property group. Attributes
1607 char *key; local
1611 while ((key = strtok_r(pgrp_att_rm_ptr, ";", &lasts)) != NULL) {
1613 _kva_free_value(pgrp_kva, key);
1627 /* detect key duplicates */
1633 if (strcmp(data_dup->key, dat
[all...]
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c1040 * The EC_POINT is to be used as the subject pub key.
1956 KMF_KEY_HANDLE *key; local
1966 key = kmf_get_attr_ptr(KMF_KEY_HANDLE_ATTR, attrlist, numattr);
1967 if (key == NULL || key->keyp == NULL)
1970 if (key->keyclass != KMF_ASYM_PUB &&
1971 key->keyclass != KMF_ASYM_PRI &&
1972 key->keyclass != KMF_SYMMETRIC)
1991 if (!key->israw && destroy)
1993 (CK_OBJECT_HANDLE)key
2213 KMF_KEY_HANDLE *key = NULL; local
2347 KMFPK11_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *algOID, KMF_DATA *ciphertext, KMF_DATA *output) argument
3859 create_generic_secret_key(KMF_HANDLE_T handle, int numattr, KMF_ATTRIBUTE *attrlist, CK_OBJECT_HANDLE *key) argument
4029 KMF_KEY_HANDLE *key; local
[all...]

Completed in 76 milliseconds

<<21222324252627282930>>