/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 929 unlocked_setkey(const char *key) argument 935 C[i] = key[PC1_C[i]-1]; 936 D[i] = key[PC1_D[i]-1]; 1151 setkey(const char *key) argument 1156 unlocked_setkey(key);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ExtUtils/ |
H A D | MakeMaker.pm | 108 while( my($key, $val) = each %$att ) { 109 my $sig = $Att_Sigs{$key}; 111 warn "WARNING: $key is not a known parameter.\n"; 123 warn "WARNING: $key takes a $takes not a $has.\n". 347 my($key); 439 my $key; 440 for $key (@Prepend_parent) { 441 next unless defined $self->{PARENT}{$key}; 444 next if defined $self->{ARGS}{$key} and 445 $self->{ARGS}{$key} e [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Tie/ |
H A D | File.pm | 26 for my $key (keys %opts) { 27 unless ($good_opt{$key}) { 28 croak("$pack: Unrecognized option '$key'\n"); 30 my $okey = $key; 31 if ($key =~ s/^-+//) { 32 $opts{$key} = delete $opts{$okey}; 1167 for my $key (keys %{$self->{deferred}}) { 1168 $max = $key if $key > $max; 1486 # $k is the hash key o [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | rijndael.c | 68 int decryption_prepared; /* The decryption key schedule is available. */ 71 /* The key as passed to the padlock engine. */ 93 /* Perform the key setup. */ 95 do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen) argument 145 memcpy (ctx->padlock_key, key, keylen); 167 /* Nothing to do as we support only hardware key generation for 176 k[i >> 2][i & 3] = key[i]; 185 /* Copy values into round key array. */ 201 /* While not enough round key material calculated calculate 232 /* Copy values into round key arra 256 rijndael_setkey(void *context, const byte *key, const unsigned keylen) argument 937 const unsigned char key[16]; member in struct:tv [all...] |
H A D | serpent.c | 41 /* Serpent key, provided by the user. If the original key is shorter 45 /* The key schedule consists of 33 128 bit subkeys. */ 579 /* Convert the user provided key KEY of KEY_LENGTH bytes into the 582 serpent_key_prepare (const byte *key, unsigned int key_length, argument 587 /* Copy key. */ 588 memcpy (key_prepared, key, key_length); 607 serpent_subkeys_generate (serpent_key_t key, serpent_subkeys_t subkeys) argument 614 /* Initialize with key values. */ 616 w[i - 8] = key[ 665 serpent_setkey_internal(serpent_context_t *context, const byte *key, unsigned int key_length) argument 677 serpent_setkey(void *ctx, const byte *key, unsigned int key_length) argument 853 unsigned char key[32]; member in struct:test [all...] |
H A D | pubkey.c | 50 /* This is the list of the default public-key ciphers included in 118 fips_signal_error ("using dummy public key function"); 127 fips_signal_error ("using dummy public key function"); 140 fips_signal_error ("using dummy public key function"); 153 fips_signal_error ("using dummy public key function"); 165 fips_signal_error ("using dummy public key function"); 180 fips_signal_error ("using dummy public key function"); 189 fips_signal_error ("using dummy public key function"); 333 /* Map the public key algorithm whose ID is contained in ALGORITHM to 440 * Return the number of public key materia 2015 gcry_mpi_t *key = NULL; local 2329 gcry_pk_get_nbits(gcry_sexp_t key) argument 2367 gcry_pk_get_keygrip(gcry_sexp_t key, unsigned char *array) argument [all...] |
H A D | camellia.c | 35 /* key constants */ 442 * Stuff related to the Camellia key schedule 447 void camellia_setup128(const unsigned char *key, u32 *subkey) argument 458 kll = GETU32(key ); 459 klr = GETU32(key + 4); 460 krl = GETU32(key + 8); 461 krr = GETU32(key + 12); 559 /* key XOR is end of F-function */ 658 void camellia_setup256(const unsigned char *key, u32 *subkey) argument 660 u32 kll,klr,krl,krr; /* left half of key */ 944 camellia_setup192(const unsigned char *key, u32 *subkey) argument [all...] |
H A D | md.c | 849 prepare_macpads (gcry_md_hd_t hd, const unsigned char *key, size_t keylen) argument 864 gcry_md_hash_buffer (algo, helpkey, key, keylen); 865 key = helpkey; 873 memcpy ( ipad, key, keylen ); 874 memcpy ( opad, key, keylen ); 911 gcry_md_setkey (gcry_md_hd_t hd, const void *key, size_t keylen) argument 919 rc = prepare_macpads (hd, key, keylen);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Safe/t/ |
H A D | opcode.pl | 39 my ($key, $desc, $check, $flags, $args) = split(/\t+/, $_, 5); 43 die qq[Opcode "$key" duplicates $seen{$key}\n] if $seen{$key}; 44 $seen{$desc} = qq[description of opcode "$key"]; 45 $seen{$key} = qq[opcode "$key"]; 47 push(@ops, $key); 48 $opnum{$key} = $#ops; 49 $desc{$key} [all...] |
/osnet-11/usr/src/lib/libsqlite/src/ |
H A D | os.c | 197 ** structure has to include the process id as part of its key because 200 ** key because close() clears lock on all threads, not just the current 206 ** An instance of the following structure serves as the key used 208 ** that we have to include the process ID as part of the key. On some 228 struct lockKey key; /* The lookup key */ member in struct:lockInfo 234 ** An instance of the following structure serves as the key used 251 struct openKey key; /* The lookup key */ member in struct:openCnt 271 sqliteHashInsert(&lockHash, &pLock->key, sizeo [all...] |
/osnet-11/usr/src/lib/libc_db/common/ |
H A D | thread_db.c | 737 * a key, a pointer to the destructor function, and the cbdata pointer. 746 int key; local 808 for (key = 1; key < numkeys; key++) { 809 destructor = (PFrV)destructors[key]; 811 (*cb)(key, destructor, cbdata_p)) 824 for (key = 1; key < numkeys; key 2279 __td_thr_tsd(td_thrhandle_t *th_p, thread_key_t key, void **data_pp) argument [all...] |
/osnet-11/usr/src/cmd/ntfsprogs/ |
H A D | ntfsinfo.c | 1365 le32_to_cpu(entry->key.sii.security_id), 1367 le32_to_cpu(entry->key.sii.security_id)); 1371 (unsigned)le32_to_cpu(entry->key.sdh.hash)); 1374 le32_to_cpu(entry->key.sdh.security_id), 1376 le32_to_cpu(entry->key.sdh.security_id)); 1379 ntfs_guid_to_mbs(&entry->key.object_id, printable_GUID); 1384 le32_to_cpu(entry->key.reparse.reparse_tag)); 1387 le64_to_cpu(entry->key.reparse.file_id), 1389 le64_to_cpu(entry->key.reparse.file_id)); 1392 sid = ntfs_sid_to_mbs(&entry->key [all...] |
/osnet-11/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_mn_handlers.c | 1491 /* While loop continues until IOCNXTKEY_NM gives nm.key of KEYWILD */ 1506 if (nm.key == MD_KEYWILD) { 1512 * Okay we have a valid key 1516 d->msg_otherside, nm.key, &drvnm, NULL, NULL, &ep); 1531 if (add_name(sp, d->msg_sideno, nm.key, MD_HOTSPARES, 1573 if (add_name(sp, d->msg_sideno, nm.key, dname, mnum, 1625 nm.key = MD_KEYWILD; 1638 if (nm.key == MD_KEYWILD) { 1651 if (del_name(sp, d->msg_sideno, nm.key, &ep) == -1) { 1830 * This is to add a key t 2068 mdkey_t key; local [all...] |
H A D | meta_name.c | 1074 np->key = MD_KEYBAD; 2702 mdkey_t key, 2751 key, ep)) == NULL) 2755 sideno+SKEW, key, ep)) == NULL) 3114 mdkey_t key; local 3127 NULL, NULL, &key, ep)) == NULL) 3135 np->key = key; 3477 * set up hotspare pool name from key 3608 mdkey_t key; local 2698 meta_getdnp_bydevid( mdsetname_t *sp, side_t sideno, ddi_devid_t devidp, mdkey_t key, md_error_t *ep ) argument 3689 metakeyname( mdsetname_t **spp, mdkey_t key, int fast, md_error_t *ep ) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | camellia.c | 37 /* key constants */ 444 * Stuff related to the Camellia key schedule 449 void camellia_setup128(const unsigned char *key, u32 *subkey) argument 460 kll = GETU32(key ); 461 klr = GETU32(key + 4); 462 krl = GETU32(key + 8); 463 krr = GETU32(key + 12); 561 /* key XOR is end of F-function */ 660 void camellia_setup256(const unsigned char *key, u32 *subkey) argument 662 u32 kll,klr,krl,krr; /* left half of key */ 946 camellia_setup192(const unsigned char *key, u32 *subkey) argument [all...] |
H A D | seed.c | 262 /* Perform the key setup. 265 do_setkey (SEED_context *ctx, const byte *key, const unsigned keylen) 287 x1 = GETU32 (key); 288 x2 = GETU32 (key+4); 289 x3 = GETU32 (key+8); 290 x4 = GETU32 (key+12); 317 seed_setkey (void *context, const byte *key, const unsigned keylen) 321 int rc = do_setkey (ctx, key, keylen); 435 /* Test a single encryption and decryption with each key size. */ 263 do_setkey(SEED_context *ctx, const byte *key, const unsigned keylen) argument 315 seed_setkey(void *context, const byte *key, const unsigned keylen) argument
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Data/Dumper/ |
H A D | Dumper.xs | 526 char *key; 621 char *key; 624 key = SvPV(keysv, keylen); 625 svp = hv_fetch((HV*)ival, key, 635 key = SvPV(keysv, keylen); 661 if (quotekeys || needs_quote(key)) { 664 nlen = esc_q_utf8(aTHX_ retval, key, klen); 668 nticks = num_q(key, klen); 673 klen += esc_q(nkey+1, key, klen); 675 (void)Copy(key, nke [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Unicode/ |
H A D | Collate.pm | 59 # A sort key: 16-bit weights 63 # Level separator in a sort key: 144 # The hash key 'ignored' is deleted at v 0.21. 145 # The hash key 'isShift' is deleted at v 0.23. 146 # The hash key 'combining' is deleted at v 0.24. 147 # The hash key 'entries' is deleted at v 0.30. 184 my $key = shift; # 'level' or 'backwards' 186 "Illegal level %d (in value for key '%s') lower than %d.", 187 $level, $key, MinLevel; 189 "Unsupported level %d (in value for key ' [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/fs/ |
H A D | hfsplus.c | 114 /* The on disk layout of a catalog key. */ 123 /* The on disk layout of an extent overflow file key. */ 180 /* Internal representation of a catalog key. */ 188 /* Internal representation of an extent overflow key. */ 298 struct grub_hfsplus_key_internal *key, 318 struct grub_hfsplus_extkey *key; 346 /* Set up the key to look for in the extent overflow file. */ 360 /* The extent overflow file has 8 extents right after the key. */ 361 key = (struct grub_hfsplus_extkey *) 363 extents = (struct grub_hfsplus_extent *) (key 316 struct grub_hfsplus_extkey *key; local 648 grub_hfsplus_btree_search(struct grub_hfsplus_btree *btree, struct grub_hfsplus_key_internal *key, int (*compare_keys) (struct grub_hfsplus_key *keya, struct grub_hfsplus_key_internal *keyb), struct grub_hfsplus_btnode **matchnode, grub_off_t *keyoffset) argument [all...] |
/osnet-11/usr/src/lib/nsswitch/compat/common/ |
H A D | compat_common.c | 499 const char *filter = argp->key.name; 831 * For lookups by identifier search key cannot be matched with 835 * But for lookups by name, search key is compared with the name 850 * we can simply extract the name from the search key 851 * (i.e. args->key.name). If not, then we must call 858 !netgr_in(be, instr + 2, args->key.name)) 897 * extract the name from the search key 898 * (i.e. args->key.name). If not, then we must call 904 if (strcmp(instr + 1, args->key.name) != 0) 1011 args->key [all...] |
/osnet-11/usr/src/lib/libparted/common/libparted/fs/hfs/ |
H A D | hfs.c | 771 HfsExtentKey key; local 841 key.key_length = sizeof(key) - 1; 842 key.type = HFS_DATA_FORK; 843 key.file_ID = PED_CPU_TO_BE32 (HFS_BAD_BLOCK_ID); 844 key.start = 0; 846 (HfsPrivateGenericKey*) &key, NULL, 0, &ref)) { 861 while (ret_key->type == key.type && ret_key->file_ID == key.file_ID) {
|
/osnet-11/usr/src/lib/libcommputil/common/ |
H A D | sdp.c | 588 * Adds key field to session or media section of SDP. 590 * k=<method>:<encryption key> 593 sdp_add_key(sdp_key_t **key, const char *method, const char *enckey) argument 597 if (key == NULL || method == NULL) 599 if (*key != NULL) 601 *key = calloc(1, sizeof (sdp_key_t)); 602 if (*key == NULL) 604 if ((ret = commp_add_str(&((*key)->k_method), method, 609 if ((ret = commp_add_str(&((*key)->k_enckey), enckey, 616 sdp_free_key(*key); [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ntlm.c | 165 * Calculate an NTLMv1 session key (16 bytes). 226 * Compute the session key 285 * Compute the session key 297 * it truncates the input key to 64 bytes rather than hashing it down 304 const uchar_t *key, size_t key_len, 308 uchar_t k_ipad[64]; /* inner padding - key XORd with ipad */ 309 uchar_t k_opad[64]; /* outer padding - key XORd with opad */ 312 /* if key is longer than 64 bytes use only the first 64 bytes */ 321 * where K is an n byte key 327 /* start out by storing key i 303 smbfs_HMACT64(uchar_t *digest, const uchar_t *key, size_t key_len, const uchar_t *data, size_t data_len) argument [all...] |
/osnet-11/usr/src/lib/libntfs/common/libntfs/ |
H A D | index.c | 278 fn = (FILE_NAME_ATTR *)&ie->key; 469 * Find a key in the index block. 480 static int ntfs_ie_lookup(const void *key, const int key_len, argument 507 * The last entry cannot contain a key. It can however contain 516 rc = ntfs_collate(icx->ni->vol, icx->cr, key, key_len, &ie->key, 525 * If @key collates before the key of the current entry, there 526 * is definitely no such key in this index but we might need to 627 * ntfs_index_lookup - find a key i 658 ntfs_index_lookup(const void *key, const int key_len, ntfs_index_context *icx) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | geli.c | 149 grub_uint64_t key[(dev->hash->mdlen + 7) / 8]; local 154 &tohash, sizeof (tohash), key); 158 return grub_cryptodisk_setkey (dev, (grub_uint8_t *) key, 421 grub_puts_ (N_("Attempting to decrypt master key...")); 481 /* Try to recover master key from each active keyslot. */ 518 /* Set the master key. */ 534 /* For a reason I don't know, the IV key is used in rekeying. */
|