Searched refs:key (Results 626 - 650 of 892) sorted by relevance

<<21222324252627282930>>

/osnet-11/usr/src/lib/libc/port/gen/
H A Dcrypt.c929 unlocked_setkey(const char *key) argument
935 C[i] = key[PC1_C[i]-1];
936 D[i] = key[PC1_D[i]-1];
1151 setkey(const char *key) argument
1156 unlocked_setkey(key);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ExtUtils/
H A DMakeMaker.pm108 while( my($key, $val) = each %$att ) {
109 my $sig = $Att_Sigs{$key};
111 warn "WARNING: $key is not a known parameter.\n";
123 warn "WARNING: $key takes a $takes not a $has.\n".
347 my($key);
439 my $key;
440 for $key (@Prepend_parent) {
441 next unless defined $self->{PARENT}{$key};
444 next if defined $self->{ARGS}{$key} and
445 $self->{ARGS}{$key} e
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Tie/
H A DFile.pm26 for my $key (keys %opts) {
27 unless ($good_opt{$key}) {
28 croak("$pack: Unrecognized option '$key'\n");
30 my $okey = $key;
31 if ($key =~ s/^-+//) {
32 $opts{$key} = delete $opts{$okey};
1167 for my $key (keys %{$self->{deferred}}) {
1168 $max = $key if $key > $max;
1486 # $k is the hash key o
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Drijndael.c68 int decryption_prepared; /* The decryption key schedule is available. */
71 /* The key as passed to the padlock engine. */
93 /* Perform the key setup. */
95 do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen) argument
145 memcpy (ctx->padlock_key, key, keylen);
167 /* Nothing to do as we support only hardware key generation for
176 k[i >> 2][i & 3] = key[i];
185 /* Copy values into round key array. */
201 /* While not enough round key material calculated calculate
232 /* Copy values into round key arra
256 rijndael_setkey(void *context, const byte *key, const unsigned keylen) argument
937 const unsigned char key[16]; member in struct:tv
[all...]
H A Dserpent.c41 /* Serpent key, provided by the user. If the original key is shorter
45 /* The key schedule consists of 33 128 bit subkeys. */
579 /* Convert the user provided key KEY of KEY_LENGTH bytes into the
582 serpent_key_prepare (const byte *key, unsigned int key_length, argument
587 /* Copy key. */
588 memcpy (key_prepared, key, key_length);
607 serpent_subkeys_generate (serpent_key_t key, serpent_subkeys_t subkeys) argument
614 /* Initialize with key values. */
616 w[i - 8] = key[
665 serpent_setkey_internal(serpent_context_t *context, const byte *key, unsigned int key_length) argument
677 serpent_setkey(void *ctx, const byte *key, unsigned int key_length) argument
853 unsigned char key[32]; member in struct:test
[all...]
H A Dpubkey.c50 /* This is the list of the default public-key ciphers included in
118 fips_signal_error ("using dummy public key function");
127 fips_signal_error ("using dummy public key function");
140 fips_signal_error ("using dummy public key function");
153 fips_signal_error ("using dummy public key function");
165 fips_signal_error ("using dummy public key function");
180 fips_signal_error ("using dummy public key function");
189 fips_signal_error ("using dummy public key function");
333 /* Map the public key algorithm whose ID is contained in ALGORITHM to
440 * Return the number of public key materia
2015 gcry_mpi_t *key = NULL; local
2329 gcry_pk_get_nbits(gcry_sexp_t key) argument
2367 gcry_pk_get_keygrip(gcry_sexp_t key, unsigned char *array) argument
[all...]
H A Dcamellia.c35 /* key constants */
442 * Stuff related to the Camellia key schedule
447 void camellia_setup128(const unsigned char *key, u32 *subkey) argument
458 kll = GETU32(key );
459 klr = GETU32(key + 4);
460 krl = GETU32(key + 8);
461 krr = GETU32(key + 12);
559 /* key XOR is end of F-function */
658 void camellia_setup256(const unsigned char *key, u32 *subkey) argument
660 u32 kll,klr,krl,krr; /* left half of key */
944 camellia_setup192(const unsigned char *key, u32 *subkey) argument
[all...]
H A Dmd.c849 prepare_macpads (gcry_md_hd_t hd, const unsigned char *key, size_t keylen) argument
864 gcry_md_hash_buffer (algo, helpkey, key, keylen);
865 key = helpkey;
873 memcpy ( ipad, key, keylen );
874 memcpy ( opad, key, keylen );
911 gcry_md_setkey (gcry_md_hd_t hd, const void *key, size_t keylen) argument
919 rc = prepare_macpads (hd, key, keylen);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Safe/t/
H A Dopcode.pl39 my ($key, $desc, $check, $flags, $args) = split(/\t+/, $_, 5);
43 die qq[Opcode "$key" duplicates $seen{$key}\n] if $seen{$key};
44 $seen{$desc} = qq[description of opcode "$key"];
45 $seen{$key} = qq[opcode "$key"];
47 push(@ops, $key);
48 $opnum{$key} = $#ops;
49 $desc{$key}
[all...]
/osnet-11/usr/src/lib/libsqlite/src/
H A Dos.c197 ** structure has to include the process id as part of its key because
200 ** key because close() clears lock on all threads, not just the current
206 ** An instance of the following structure serves as the key used
208 ** that we have to include the process ID as part of the key. On some
228 struct lockKey key; /* The lookup key */ member in struct:lockInfo
234 ** An instance of the following structure serves as the key used
251 struct openKey key; /* The lookup key */ member in struct:openCnt
271 sqliteHashInsert(&lockHash, &pLock->key, sizeo
[all...]
/osnet-11/usr/src/lib/libc_db/common/
H A Dthread_db.c737 * a key, a pointer to the destructor function, and the cbdata pointer.
746 int key; local
808 for (key = 1; key < numkeys; key++) {
809 destructor = (PFrV)destructors[key];
811 (*cb)(key, destructor, cbdata_p))
824 for (key = 1; key < numkeys; key
2279 __td_thr_tsd(td_thrhandle_t *th_p, thread_key_t key, void **data_pp) argument
[all...]
/osnet-11/usr/src/cmd/ntfsprogs/
H A Dntfsinfo.c1365 le32_to_cpu(entry->key.sii.security_id),
1367 le32_to_cpu(entry->key.sii.security_id));
1371 (unsigned)le32_to_cpu(entry->key.sdh.hash));
1374 le32_to_cpu(entry->key.sdh.security_id),
1376 le32_to_cpu(entry->key.sdh.security_id));
1379 ntfs_guid_to_mbs(&entry->key.object_id, printable_GUID);
1384 le32_to_cpu(entry->key.reparse.reparse_tag));
1387 le64_to_cpu(entry->key.reparse.file_id),
1389 le64_to_cpu(entry->key.reparse.file_id));
1392 sid = ntfs_sid_to_mbs(&entry->key
[all...]
/osnet-11/usr/src/lib/lvm/libmeta/common/
H A Dmeta_mn_handlers.c1491 /* While loop continues until IOCNXTKEY_NM gives nm.key of KEYWILD */
1506 if (nm.key == MD_KEYWILD) {
1512 * Okay we have a valid key
1516 d->msg_otherside, nm.key, &drvnm, NULL, NULL, &ep);
1531 if (add_name(sp, d->msg_sideno, nm.key, MD_HOTSPARES,
1573 if (add_name(sp, d->msg_sideno, nm.key, dname, mnum,
1625 nm.key = MD_KEYWILD;
1638 if (nm.key == MD_KEYWILD) {
1651 if (del_name(sp, d->msg_sideno, nm.key, &ep) == -1) {
1830 * This is to add a key t
2068 mdkey_t key; local
[all...]
H A Dmeta_name.c1074 np->key = MD_KEYBAD;
2702 mdkey_t key,
2751 key, ep)) == NULL)
2755 sideno+SKEW, key, ep)) == NULL)
3114 mdkey_t key; local
3127 NULL, NULL, &key, ep)) == NULL)
3135 np->key = key;
3477 * set up hotspare pool name from key
3608 mdkey_t key; local
2698 meta_getdnp_bydevid( mdsetname_t *sp, side_t sideno, ddi_devid_t devidp, mdkey_t key, md_error_t *ep ) argument
3689 metakeyname( mdsetname_t **spp, mdkey_t key, int fast, md_error_t *ep ) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Dcamellia.c37 /* key constants */
444 * Stuff related to the Camellia key schedule
449 void camellia_setup128(const unsigned char *key, u32 *subkey) argument
460 kll = GETU32(key );
461 klr = GETU32(key + 4);
462 krl = GETU32(key + 8);
463 krr = GETU32(key + 12);
561 /* key XOR is end of F-function */
660 void camellia_setup256(const unsigned char *key, u32 *subkey) argument
662 u32 kll,klr,krl,krr; /* left half of key */
946 camellia_setup192(const unsigned char *key, u32 *subkey) argument
[all...]
H A Dseed.c262 /* Perform the key setup.
265 do_setkey (SEED_context *ctx, const byte *key, const unsigned keylen)
287 x1 = GETU32 (key);
288 x2 = GETU32 (key+4);
289 x3 = GETU32 (key+8);
290 x4 = GETU32 (key+12);
317 seed_setkey (void *context, const byte *key, const unsigned keylen)
321 int rc = do_setkey (ctx, key, keylen);
435 /* Test a single encryption and decryption with each key size. */
263 do_setkey(SEED_context *ctx, const byte *key, const unsigned keylen) argument
315 seed_setkey(void *context, const byte *key, const unsigned keylen) argument
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Data/Dumper/
H A DDumper.xs526 char *key;
621 char *key;
624 key = SvPV(keysv, keylen);
625 svp = hv_fetch((HV*)ival, key,
635 key = SvPV(keysv, keylen);
661 if (quotekeys || needs_quote(key)) {
664 nlen = esc_q_utf8(aTHX_ retval, key, klen);
668 nticks = num_q(key, klen);
673 klen += esc_q(nkey+1, key, klen);
675 (void)Copy(key, nke
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Unicode/
H A DCollate.pm59 # A sort key: 16-bit weights
63 # Level separator in a sort key:
144 # The hash key 'ignored' is deleted at v 0.21.
145 # The hash key 'isShift' is deleted at v 0.23.
146 # The hash key 'combining' is deleted at v 0.24.
147 # The hash key 'entries' is deleted at v 0.30.
184 my $key = shift; # 'level' or 'backwards'
186 "Illegal level %d (in value for key '%s') lower than %d.",
187 $level, $key, MinLevel;
189 "Unsupported level %d (in value for key '
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/fs/
H A Dhfsplus.c114 /* The on disk layout of a catalog key. */
123 /* The on disk layout of an extent overflow file key. */
180 /* Internal representation of a catalog key. */
188 /* Internal representation of an extent overflow key. */
298 struct grub_hfsplus_key_internal *key,
318 struct grub_hfsplus_extkey *key;
346 /* Set up the key to look for in the extent overflow file. */
360 /* The extent overflow file has 8 extents right after the key. */
361 key = (struct grub_hfsplus_extkey *)
363 extents = (struct grub_hfsplus_extent *) (key
316 struct grub_hfsplus_extkey *key; local
648 grub_hfsplus_btree_search(struct grub_hfsplus_btree *btree, struct grub_hfsplus_key_internal *key, int (*compare_keys) (struct grub_hfsplus_key *keya, struct grub_hfsplus_key_internal *keyb), struct grub_hfsplus_btnode **matchnode, grub_off_t *keyoffset) argument
[all...]
/osnet-11/usr/src/lib/nsswitch/compat/common/
H A Dcompat_common.c499 const char *filter = argp->key.name;
831 * For lookups by identifier search key cannot be matched with
835 * But for lookups by name, search key is compared with the name
850 * we can simply extract the name from the search key
851 * (i.e. args->key.name). If not, then we must call
858 !netgr_in(be, instr + 2, args->key.name))
897 * extract the name from the search key
898 * (i.e. args->key.name). If not, then we must call
904 if (strcmp(instr + 1, args->key.name) != 0)
1011 args->key
[all...]
/osnet-11/usr/src/lib/libparted/common/libparted/fs/hfs/
H A Dhfs.c771 HfsExtentKey key; local
841 key.key_length = sizeof(key) - 1;
842 key.type = HFS_DATA_FORK;
843 key.file_ID = PED_CPU_TO_BE32 (HFS_BAD_BLOCK_ID);
844 key.start = 0;
846 (HfsPrivateGenericKey*) &key, NULL, 0, &ref)) {
861 while (ret_key->type == key.type && ret_key->file_ID == key.file_ID) {
/osnet-11/usr/src/lib/libcommputil/common/
H A Dsdp.c588 * Adds key field to session or media section of SDP.
590 * k=<method>:<encryption key>
593 sdp_add_key(sdp_key_t **key, const char *method, const char *enckey) argument
597 if (key == NULL || method == NULL)
599 if (*key != NULL)
601 *key = calloc(1, sizeof (sdp_key_t));
602 if (*key == NULL)
604 if ((ret = commp_add_str(&((*key)->k_method), method,
609 if ((ret = commp_add_str(&((*key)->k_enckey), enckey,
616 sdp_free_key(*key);
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_ntlm.c165 * Calculate an NTLMv1 session key (16 bytes).
226 * Compute the session key
285 * Compute the session key
297 * it truncates the input key to 64 bytes rather than hashing it down
304 const uchar_t *key, size_t key_len,
308 uchar_t k_ipad[64]; /* inner padding - key XORd with ipad */
309 uchar_t k_opad[64]; /* outer padding - key XORd with opad */
312 /* if key is longer than 64 bytes use only the first 64 bytes */
321 * where K is an n byte key
327 /* start out by storing key i
303 smbfs_HMACT64(uchar_t *digest, const uchar_t *key, size_t key_len, const uchar_t *data, size_t data_len) argument
[all...]
/osnet-11/usr/src/lib/libntfs/common/libntfs/
H A Dindex.c278 fn = (FILE_NAME_ATTR *)&ie->key;
469 * Find a key in the index block.
480 static int ntfs_ie_lookup(const void *key, const int key_len, argument
507 * The last entry cannot contain a key. It can however contain
516 rc = ntfs_collate(icx->ni->vol, icx->cr, key, key_len, &ie->key,
525 * If @key collates before the key of the current entry, there
526 * is definitely no such key in this index but we might need to
627 * ntfs_index_lookup - find a key i
658 ntfs_index_lookup(const void *key, const int key_len, ntfs_index_context *icx) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Dgeli.c149 grub_uint64_t key[(dev->hash->mdlen + 7) / 8]; local
154 &tohash, sizeof (tohash), key);
158 return grub_cryptodisk_setkey (dev, (grub_uint8_t *) key,
421 grub_puts_ (N_("Attempting to decrypt master key..."));
481 /* Try to recover master key from each active keyslot. */
518 /* Set the master key. */
534 /* For a reason I don't know, the IV key is used in rekeying. */

Completed in 145 milliseconds

<<21222324252627282930>>