/osnet-11/usr/src/lib/libipsecutil/common/ |
H A D | ipsec_util.c | 362 * Dump a key, any salt and bitlen. 363 * The key is made up of a stream of bits. If the algorithm requires a salt 364 * value, this will also be part of the dumped key. The last "saltbits" of the 365 * key string, reading left to right will be the salt value. To make it easier 366 * to see which bits make up the key, the salt value is enclosed in []'s. 368 * the SAs, including the key to a file. When this is the case, the []'s are 501 if (fputs(dgettext(TEXT_DOMAIN, "Generic key id"), 968 { D_KEY, "key" }, 1338 return (dgettext(TEXT_DOMAIN, "unsupported AH key size")); 1341 "unsupported ESP encryption key siz 2174 print_key(FILE *file, char *prefix, struct sadb_key *key) argument 2925 save_key(struct sadb_key *key, FILE *ofile) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | parseaddr.c | 1510 syserr("554 5.3.0 rewrite: missing key for map %s", 1779 ** key -- the key to look up. 1787 ** NULL -- if there was no data for the given key. 1791 map_lookup(smap, key, argvect, pstat, e) 1793 char key[]; 1814 smap->s_name, key); 1820 stripquotes(key); 1825 xputs(sm_debug_file(), key); local 1835 replac = (*map->map_class->map_lookup)(map, key, argvec [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Pod/ |
H A D | Select.pm | 602 my ($key, $val) = (lc $_, $opts{$_}); 603 $key =~ s/^(?=\w)/-/; 604 $key =~ /^-se[cl]/ and $key = '-sections'; 605 #! $key eq '-range' and $key .= 's'; 606 ($key => $val);
|
/osnet-11/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_set.c | 1882 * return drivename get by key 1888 mdkey_t key, 1910 * Get the devid associated with the key. 1918 devidp = meta_getdidbykey(MD_LOCAL_SET, sideno, key, ep); 1920 devidp = meta_getdidbykey(MD_LOCAL_SET, sideno+SKEW, key, ep); 1927 dnp = meta_getdnp_bydevid(sp, sideno, devidp, key, ep); 1934 dnp->side_names_key = key; 1952 nm = meta_getnmbykey(MD_LOCAL_SET, sideno, key, ep); 1954 nm = meta_getnmbykey(MD_LOCAL_SET, sideno+SKEW, key, 1982 dnp->side_names_key = key; 1885 metadrivename_withdrkey( mdsetname_t *sp, side_t sideno, mdkey_t key, int flags, md_error_t *ep ) argument [all...] |
H A D | meta_sp.c | 1850 mdkey_t key; local 1914 if ((key = meta_init_make_device(&sp, 1926 MD_SIDEWILD, key, NULL, &mnum, 1931 (void) del_self_name(sp, key, ep); 2201 /* populate the key in the name_p structure */ 2210 getmyside(sp, ep), didnp->key, ep)) == NULL) 3527 mp->un_key = compnp->key; 3685 * Fill in the key and the start block. Note that the start 3689 msp->compnamep->key = mp->un_key; 4922 /* metakeyname does not fill in the key [all...] |
H A D | meta_raid.c | 692 /* populate the key in the name_p structure */ 699 didnp->key, ep)) == NULL) 1245 mdc->un_orig_key = colnp->key; 1669 /* store name in namespace, allocate new key */ 1691 params.new_key = newnp->key; 1786 del_dev, NULL, NULL, &colnp->key, ep)) != NULL) { 2219 mdc->un_orig_key = colnp->key; 2784 mdkey_t key; local 2843 compnp->dev, NULL, NULL, &key, ep)) == NULL) { 2866 ctd_name, mydev[i], key, pnam [all...] |
H A D | meta_stripe.c | 116 params.new_key = newnp->key; 781 /* populate the key in the name_p structure */ 790 getmyside(sp, ep), didnp->key, ep)) == NULL) 897 /* populate the key in the name_p structure */ 906 getmyside(sp, ep), didnp->key, ep)) == NULL) { 1441 new_comp->un_key = np->key; 2042 mdc->un_key = compnp->key; 2541 mdkey_t key; local 2605 &key, ep)) == NULL) { 2629 key, pnam [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | cipher.c | 224 dummy_setkey (void *c, const unsigned char *key, unsigned int keylen) 227 (void)key; 598 /* Return the standard length of the key for the cipher algorithm with 601 the key is not known. */ 616 log_bug ("cipher %d w/o key length\n", algorithm); 628 if the algorithm is not available or the length of the key is not 873 /* Set the key to be used for the encryption context C to KEY with 876 cipher_setkey (gcry_cipher_hd_t c, byte *key, unsigned int keylen) 880 ret = (*c->cipher->setkey) (&c->context.c, key, keylen); 1603 _gcry_cipher_setkey (gcry_cipher_hd_t hd, const void *key, size_ 223 dummy_setkey(void *c, const unsigned char *key, unsigned int keylen) argument 874 cipher_setkey(gcry_cipher_hd_t c, byte *key, unsigned int keylen) argument 1601 _gcry_cipher_setkey(gcry_cipher_hd_t hd, const void *key, size_t keylen) argument [all...] |
/osnet-11/usr/src/lib/rad/pyrad/common/ |
H A D | client.py | 853 non-empty set of key-value pairs. 855 An object pattern requires neither a domain nor a non-empty set of key-value 871 a list of key name/value tuples 885 self._sortedkeys = sorted(kvs, key = lambda kv: kv[0]) 927 constituent domain and key/value pairs. 929 Format: <domain>:[<key>=<value>,]...[<key>=<value>] 955 raise Exception("Bad key/value: %s" % i) 976 for key, value in self._sortedkeys: 977 if not key i [all...] |
/osnet-11/usr/src/lib/libpool/common/ |
H A D | pool_kernel.c | 665 remove_dead_elems(const void *key, void **value, void *cl) argument 667 pool_knl_elem_t *pke = (pool_knl_elem_t *)key; 687 find_dead_elems(const void *key, void **value, void *cl) argument 689 pool_knl_elem_t *pke = (pool_knl_elem_t *)key; 1250 build_result_set(const void *key, void **value, void *cl) argument 1253 pool_knl_elem_t *pke = (pool_knl_elem_t *)key; 1258 if (qo->classes & (1 << pool_elem_class((pool_elem_t *)key))) { 1299 (pool_knl_elem_t *)key); 1302 (pool_knl_elem_t *)key); 2210 pool_knl_elem_printf_cb(const void *key, voi argument 2253 pool_knl_elem_free_cb(const void *key, void **value, void *cl) argument [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ctx.c | 1025 * Get the transport level session key. 1029 smbfs_fh_getssnkey(int dev_fd, uchar_t *key, size_t len) argument 1034 if (ioctl(dev_fd, SMBIOC_GETSSNKEY, key) == -1)
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | ldap-int.h | 869 int ldap_memcache_result( LDAP *ld, int msgid, unsigned long key ); 870 int ldap_memcache_new( LDAP *ld, int msgid, unsigned long key,
|
/osnet-11/usr/src/lib/libnsl/ |
H A D | Makefile.com | 144 pics/%.o: ../key/%.c
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IO/lib/IO/Socket/ |
H A D | INET.pm | 302 optionally takes arguments, these arguments are in key-value pairs. 304 In addition to the key-value pairs accepted by L<IO::Socket>,
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IO/lib/IO/ |
H A D | Socket.pm | 334 optionally takes arguments, these arguments are in key-value pairs. 335 C<new> only looks for one key C<Domain> which tells new which domain
|
/osnet-11/usr/src/lib/pam_modules/unix_cred/ |
H A D | unix_cred.c | 583 kv_array->data[error - 1].key, 590 kv_array->data[error - 1].key,
|
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSession.c | 411 * If the operation did not need a key, try again. 423 * without the unnecessary key argument and this 566 session->init.key = meta_enc_key; 568 session->init.key = meta_auth_key;
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpm_specific.c | 142 /* TSP key handles */ 156 /* PKCS#11 key handles */ 299 char line[BUFSIZ], key[BUFSIZ], idstr[BUFSIZ]; local 324 if (sscanf(line, "%1024s %1024s", key, idstr) == 2) { 325 if (strcmp(key, keyname)) 346 char line[BUFSIZ], key[BUFSIZ], idstr[BUFSIZ]; local 372 if (sscanf(line, "%1024s %1024s", key, idstr) == 2) { 373 if (strcmp(key, keyname) == 0) { 501 /* Get the TCPA_PUBKEY blob from the key object. */ 520 free(pub_key.pubKey.key); [all...] |
/osnet-11/usr/src/lib/scsi/libscsi/common/ |
H A D | scsi_status.c | 218 { 0x20, 0x03, "access denied - invalid mgmt id key" }, 541 { 0x6f, 0x00, "copy protect key exchange failure authentication " 543 { 0x6f, 0x01, "copy protect key exchange failure key not present" }, 544 { 0x6f, 0x02, "copy protect key exchange failure key not established" }, 580 libscsi_sense_key_name(uint64_t key) argument 582 return (find_string(sensekey_strings, (int)key));
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | lsar_clnt.c | 417 lsar_lookup_names(mlsvc_handle_t *lsa_handle, void *key, smb_account_t *info) argument 432 char *name = (char *)key; 755 lsar_lookup_sids(mlsvc_handle_t *lsa_handle, void *key, smb_account_t *account) argument 759 smb_sid_t *sid = (smb_sid_t *)key;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | pac.c | 869 const krb5_keyblock *key, 876 ret = krb5int_c_mandatory_cksumtype(context, key->enctype, cksumtype); 1185 const krb5_keyblock *key, 1198 key, 866 k5_insert_checksum(krb5_context context, krb5_pac pac, krb5_ui_4 type, const krb5_keyblock *key, krb5_cksumtype *cksumtype) argument 1180 mspac_verify(krb5_context kcontext, krb5_authdata_context context, void *plugin_context, void *request_context, const krb5_auth_context *auth_context, const krb5_keyblock *key, const krb5_ap_req *req) argument
|
/osnet-11/usr/src/lib/libadr/common/ |
H A D | adr.c | 1108 * Searches an array for the specified key. Returns index or -1 if not found. 1112 adr_array_search(adr_data_t *array, const char *key, const char * const *path) argument 1118 if (strcmp(entry->d_data.string, key) == 0) 1125 adr_array_nsearch(adr_data_t *array, const char *key, size_t len, argument 1132 if (rad_strccmp(entry->d_data.string, key, len) == 0)
|
/osnet-11/usr/src/grub/grub2/include/grub/efi/ |
H A D | api.h | 1083 grub_efi_input_key_t *key); 1116 grub_efi_input_key_t key; member in struct:grub_efi_key_data 1129 grub_efi_key_data_t *key); 1139 grub_efi_key_data_t *key,
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Getopt/ |
H A D | Std.pm | 40 Hash keys will be x (where x is the switch name) with key values the value of
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ |
H A D | fields.pm | 298 fields::phash() also accepts a list of key-value pairs that will
|