/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | blowfish.c | 30 * key "abcdefghijklmnopqrstuvwxyz"; 51 static gcry_err_code_t bf_setkey (void *c, const byte *key, unsigned keylen); 469 do_bf_setkey (BLOWFISH_context *c, const byte *key, unsigned keylen) argument 499 ((byte*)&data)[0] = key[j]; 500 ((byte*)&data)[1] = key[(j+1)%keylen]; 501 ((byte*)&data)[2] = key[(j+2)%keylen]; 502 ((byte*)&data)[3] = key[(j+3)%keylen]; 504 ((byte*)&data)[3] = key[j]; 505 ((byte*)&data)[2] = key[(j+1)%keylen]; 506 ((byte*)&data)[1] = key[( 563 bf_setkey(void *context, const byte *key, unsigned keylen) argument [all...] |
H A D | des.c | 43 * encryption context with a key. 45 * A DES key is 64bit wide but only 56bits of the key are used. The remaining 52 * After initializing a context with a key you could use this context to 60 * unsigned char key[8]; 66 * * Fill 'key' and 'plaintext' with some data * 70 * des_setkey(context, key); 170 static int is_weak_key ( const byte *key ); 480 * rawkey: 8 Bytes of key data 575 * Fill a DES context with subkeys calculated from a 64bit key 580 des_setkey(struct _des_ctx *ctx, const byte * key) argument 794 do_tripledes_setkey( void *context, const byte *key, unsigned keylen ) argument 836 do_des_setkey(void *context, const byte *key, unsigned keylen) argument [all...] |
H A D | cast5.c | 27 * 128-bit key = 01 23 45 67 12 34 56 78 23 45 67 89 34 56 78 9A 31 * 80-bit key = 01 23 45 67 12 34 56 78 23 45 36 * 40-bit key = 01 23 45 67 12 53 static gcry_err_code_t cast_setkey (void *c, const byte *key, unsigned keylen); 518 do_cast_setkey( CAST5_context *c, const byte *key, unsigned keylen ) argument 540 x[0] = key[0] << 24 | key[1] << 16 | key[2] << 8 | key[3]; 541 x[1] = key[ 562 cast_setkey(void *context, const byte *key, unsigned keylen ) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/db/btree/ |
H A D | bt_search.c | 66 * Search a btree for a key. 72 __bam_search(dbc, key, flags, stop, recnop, exactp) 74 const DBT *key; 157 __bam_cmp(dbp, key, h, indx, t->bt_compare)) == 0) { 170 * key and may be zero or a last + O_INDX index. 195 * a parent page for the key). Decrement the base by 1 if it's
|
H A D | bt_put.c | 79 __bam_iitem(dbc, hp, indxp, key, data, op, flags) 83 DBT *key, *data; 150 * partial record. If either of the key or data items won't fit on 153 bigkey = LF_ISSET(BI_NEWKEY) && key->size > t->bt_ovflsize; 160 /* If BI_NEWKEY is set we're adding a new key and data pair. */ 164 needed += BKEYDATA_PSIZE(key->size); 171 * We're either overwriting the data item of a key/data pair 219 * 1. Append a new key/data pair. 220 * 2. Insert a new key/data pair. 228 case DB_AFTER: /* 1. Append a new key/dat [all...] |
/osnet-11/usr/src/cmd/sendmail/libsm/ |
H A D | ldap.c | 287 ** SM_LDAP_SEARCH_M -- initiate multi-key LDAP search 294 ** argv -- key vector of substitutions in LDAP filter 321 char *key; local 329 key = argv[0]; 332 key = argv[q[1] - '0']; 333 if (key == NULL) 338 key = ""; 343 key = NULL; 346 key = argv[0]; 351 "%.*s%s", (int) (q - p), p, key); [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IPC/SysV/ |
H A D | Msg.pm | 74 my($key,$val); 75 $ds->$key($val) 76 while(($key,$val) = each %arg);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/NDBM_File/ |
H A D | NDBM_File.pm | 98 =head2 C<ndbm store returned -1, errno 22, key "..." at ...> 100 This warning is emmitted when you try to store a key or a value that 108 key, plus the length of its associated value, may not exceed 1008
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/ODBM_File/ |
H A D | ODBM_File.pm | 98 =head2 C<odbm store returned -1, errno 22, key "..." at ...> 100 This warning is emmitted when you try to store a key or a value that 108 key, plus the length of its associated value, may not exceed 1008
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/SDBM_File/ |
H A D | SDBM_File.pm | 101 =head2 C<sdbm store returned -1, errno 22, key "..." at ...> 103 This warning is emmitted when you try to store a key or a value that 111 key, plus the length of its associated value, may not exceed 1008
|
/osnet-11/usr/src/lib/libast/common/cdt/ |
H A D | dtlist.c | 42 reg Void_t *key, *k; local 137 { key = (type&DT_MATCH) ? obj : _DTKEY(obj,ky,sz); 140 if(_DTCMP(dt,key,k,disc,cmpf,sz) == 0)
|
/osnet-11/usr/src/lib/libtsnet/common/ |
H A D | tsol_getrhent.c | 65 arg.key.hostaddr.addr = (const char *)addrp; 66 arg.key.hostaddr.len = len; 67 arg.key.hostaddr.type = af; 111 /* No key, no stayopen */
|
/osnet-11/usr/src/lib/nsswitch/compat/common/ |
H A D | getgrent.c | 123 return (strcmp(g->gr_name, argp->key.name) == 0); 143 return (g->gr_gid == argp->key.gid); 153 if (argp->key.gid > MAXUID)
|
H A D | getpwent.c | 140 return (strcmp(p->pw_name, argp->key.name) == 0); 160 return (p->pw_uid == argp->key.uid); 170 if (argp->key.uid > MAXUID)
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getprotoent.c | 232 if (_ldap_filter_name(name, argp->key.name, sizeof (name)) != 0) 270 _F_GETPROTOBYNUMBER, argp->key.number); 275 _F_GETPROTOBYNUMBER_SSD, argp->key.number);
|
/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | getgrent.c | 48 "group.byname", argp->key.name, 0)); 59 if (argp->key.gid > MAXUID) 61 (void) snprintf(gidstr, 12, "%d", argp->key.gid);
|
/osnet-11/usr/src/lib/pyzfs/common/ |
H A D | userspace.py | 116 key = (isgroup, domain, rid) 119 v = acct[key] 124 acct[key] = v
|
/osnet-11/usr/src/lib/udapl/udapl_tavor/tavor/ |
H A D | dapl_tavor_ibtf_qp.c | 802 DAPL_HASH_KEY key; local 807 key = qp_num; 809 "srq_insert_ep:%p %p %llx\n", srq_ptr, htable, key); 810 return (dapls_hash_insert(htable, key, ep_ptr)); 820 DAPL_HASH_KEY key; local 827 key = qp_num; 829 retval = dapls_hash_remove(htable, key, (DAPL_HASH_DATA *)&epp); 832 "srq_remove_ep(%d): %p %llx\n", retval, htable, key); 843 DAPL_HASH_KEY key; local 850 key [all...] |
/osnet-11/usr/src/lib/libdladm/common/ |
H A D | libdlaggr.c | 685 uint16_t key, uint32_t nports, dladm_aggr_port_attr_db_t *ports, 700 iocp->lc_key = key; 738 uint16_t key = 0; local 749 key = attr.lg_key; 792 key, j, ports, attr.lg_aggr_mode, attr.lg_policy, attr.lg_mac_fixed, 1123 datalink_id_t linkid, uint16_t key, uint32_t nports, 1140 u64 = key; 1233 dladm_aggr_create(dladm_handle_t handle, const char *name, uint16_t key, argument 1246 if (key != 0 && key > AGGR_MAX_KE 684 i_dladm_aggr_create_sys(dladm_handle_t handle, datalink_id_t linkid, uint16_t key, uint32_t nports, dladm_aggr_port_attr_db_t *ports, aggr_mode_t aggr_mode, uint32_t policy, boolean_t mac_addr_fixed, const uchar_t *mac_addr, aggr_lacp_mode_t lacp_mode, aggr_lacp_timer_t lacp_timer, boolean_t force) argument 1122 dladm_aggr_persist_aggr_conf(dladm_handle_t handle, const char *link, datalink_id_t linkid, uint16_t key, uint32_t nports, dladm_aggr_port_attr_db_t *ports, aggr_mode_t aggr_mode, uint32_t policy, boolean_t mac_addr_fixed, const uchar_t *mac_addr, aggr_lacp_mode_t lacp_mode, aggr_lacp_timer_t lacp_timer, boolean_t force) argument 1642 uint16_t key; member in struct:i_walk_key_state_s 1651 uint16_t key; local 1673 dladm_key2linkid(dladm_handle_t handle, uint16_t key, datalink_id_t *linkidp, uint32_t flags) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_xdr.c | 36 krb5_encode_princ_dbkey(krb5_context context, krb5_data *key, argument 44 key->length = strlen(princ_name)+1; 45 key->data = princ_name; 51 krb5_free_princ_dbkey(krb5_context context, krb5_data *key) argument 53 (void) krb5_free_data_contents(context, key);
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/ssldap/ |
H A D | ldapsinit.c | 52 #include <key.h> 789 * called during SSL client auth. when server wants our cert and key. 815 SECKEYPrivateKey *key; local 831 if (( key = PK11_FindKeyByAnyCert( cert, (void *)ssip )) == NULL ) { 834 *errmsgp = dgettext(TEXT_DOMAIN, "bad key or key password"); 840 *pRetKey = key; 869 * performs some basic checks on clientauth cert and key/password 873 * 2) check that public key in cert matches private key 881 SECKEYPrivateKey *key = NULL; local [all...] |
/osnet-11/usr/src/cmd/hal/hald/ |
H A D | device_info.c | 60 /** Max length of property key */ 150 /** When merging, the key to store the value in */ 271 * @param key Key of the property to compare 277 match_compare_property (HalDevice *d, const char *key, const char *right_side, dbus_int64_t *result) argument 284 if (!hal_device_has_property (d, key)) 287 proptype = hal_device_property_get_type (d, key); 290 *result = (dbus_int64_t) strcmp (hal_device_property_get_string (d, key), right_side); 295 *result = ((dbus_int64_t) hal_device_property_get_int (d, key)) - strtoll (right_side, NULL, 0); 300 *result = ((dbus_int64_t) hal_device_property_get_uint64 (d, key)) - ((dbus_int64_t) strtoll (right_side, NULL, 0)); 305 *result = (dbus_int64_t) ceil (hal_device_property_get_double (d, key) 332 const char *key; local [all...] |
/osnet-11/usr/src/lib/fm/libfmnotify/common/ |
H A D | libfmnotify.c | 335 nd_seq_search(char *key, char **list, uint_t nelem) argument 338 if (strcmp(key, list[i]) == 0) 478 const char *key[2]; local 491 key[0] = class; 492 key[1] = NULL; 493 if (fm_dc_key2code(dhp, key, buf, buflen) < 0) { 494 nd_error(nhdl, "fm_dc_key2code failed for %s", key[0]);
|
/osnet-11/usr/src/lib/libbsm/common/ |
H A D | audit_scf.c | 438 * get_prop_str_singleval() - get the single-valued property key-val pair 526 * get_prop_str_multival() - get the multi-valued property key-val pairs. 527 * Each of the values is represented by single key-val pair, where key is the 1574 * do_setpgrp_scf() - set key-val pairs for the given property group. Attributes 1607 char *key; local 1611 while ((key = strtok_r(pgrp_att_rm_ptr, ";", &lasts)) != NULL) { 1613 _kva_free_value(pgrp_kva, key); 1627 /* detect key duplicates */ 1633 if (strcmp(data_dup->key, dat [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 1040 * The EC_POINT is to be used as the subject pub key. 1956 KMF_KEY_HANDLE *key; local 1966 key = kmf_get_attr_ptr(KMF_KEY_HANDLE_ATTR, attrlist, numattr); 1967 if (key == NULL || key->keyp == NULL) 1970 if (key->keyclass != KMF_ASYM_PUB && 1971 key->keyclass != KMF_ASYM_PRI && 1972 key->keyclass != KMF_SYMMETRIC) 1991 if (!key->israw && destroy) 1993 (CK_OBJECT_HANDLE)key 2213 KMF_KEY_HANDLE *key = NULL; local 2347 KMFPK11_DecryptData(KMF_HANDLE_T handle, KMF_KEY_HANDLE *key, KMF_OID *algOID, KMF_DATA *ciphertext, KMF_DATA *output) argument 3859 create_generic_secret_key(KMF_HANDLE_T handle, int numattr, KMF_ATTRIBUTE *attrlist, CK_OBJECT_HANDLE *key) argument 4029 KMF_KEY_HANDLE *key; local [all...] |