Searched refs:key (Results 751 - 775 of 892) sorted by relevance

<<313233343536

/osnet-11/usr/src/lib/libipsecutil/common/
H A Dipsec_util.c362 * Dump a key, any salt and bitlen.
363 * The key is made up of a stream of bits. If the algorithm requires a salt
364 * value, this will also be part of the dumped key. The last "saltbits" of the
365 * key string, reading left to right will be the salt value. To make it easier
366 * to see which bits make up the key, the salt value is enclosed in []'s.
368 * the SAs, including the key to a file. When this is the case, the []'s are
501 if (fputs(dgettext(TEXT_DOMAIN, "Generic key id"),
968 { D_KEY, "key" },
1338 return (dgettext(TEXT_DOMAIN, "unsupported AH key size"));
1341 "unsupported ESP encryption key siz
2174 print_key(FILE *file, char *prefix, struct sadb_key *key) argument
2925 save_key(struct sadb_key *key, FILE *ofile) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/src/
H A Dparseaddr.c1510 syserr("554 5.3.0 rewrite: missing key for map %s",
1779 ** key -- the key to look up.
1787 ** NULL -- if there was no data for the given key.
1791 map_lookup(smap, key, argvect, pstat, e)
1793 char key[];
1814 smap->s_name, key);
1820 stripquotes(key);
1825 xputs(sm_debug_file(), key); local
1835 replac = (*map->map_class->map_lookup)(map, key, argvec
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Pod/
H A DSelect.pm602 my ($key, $val) = (lc $_, $opts{$_});
603 $key =~ s/^(?=\w)/-/;
604 $key =~ /^-se[cl]/ and $key = '-sections';
605 #! $key eq '-range' and $key .= 's';
606 ($key => $val);
/osnet-11/usr/src/lib/lvm/libmeta/common/
H A Dmeta_set.c1882 * return drivename get by key
1888 mdkey_t key,
1910 * Get the devid associated with the key.
1918 devidp = meta_getdidbykey(MD_LOCAL_SET, sideno, key, ep);
1920 devidp = meta_getdidbykey(MD_LOCAL_SET, sideno+SKEW, key, ep);
1927 dnp = meta_getdnp_bydevid(sp, sideno, devidp, key, ep);
1934 dnp->side_names_key = key;
1952 nm = meta_getnmbykey(MD_LOCAL_SET, sideno, key, ep);
1954 nm = meta_getnmbykey(MD_LOCAL_SET, sideno+SKEW, key,
1982 dnp->side_names_key = key;
1885 metadrivename_withdrkey( mdsetname_t *sp, side_t sideno, mdkey_t key, int flags, md_error_t *ep ) argument
[all...]
H A Dmeta_sp.c1850 mdkey_t key; local
1914 if ((key = meta_init_make_device(&sp,
1926 MD_SIDEWILD, key, NULL, &mnum,
1931 (void) del_self_name(sp, key, ep);
2201 /* populate the key in the name_p structure */
2210 getmyside(sp, ep), didnp->key, ep)) == NULL)
3527 mp->un_key = compnp->key;
3685 * Fill in the key and the start block. Note that the start
3689 msp->compnamep->key = mp->un_key;
4922 /* metakeyname does not fill in the key
[all...]
H A Dmeta_raid.c692 /* populate the key in the name_p structure */
699 didnp->key, ep)) == NULL)
1245 mdc->un_orig_key = colnp->key;
1669 /* store name in namespace, allocate new key */
1691 params.new_key = newnp->key;
1786 del_dev, NULL, NULL, &colnp->key, ep)) != NULL) {
2219 mdc->un_orig_key = colnp->key;
2784 mdkey_t key; local
2843 compnp->dev, NULL, NULL, &key, ep)) == NULL) {
2866 ctd_name, mydev[i], key, pnam
[all...]
H A Dmeta_stripe.c116 params.new_key = newnp->key;
781 /* populate the key in the name_p structure */
790 getmyside(sp, ep), didnp->key, ep)) == NULL)
897 /* populate the key in the name_p structure */
906 getmyside(sp, ep), didnp->key, ep)) == NULL) {
1441 new_comp->un_key = np->key;
2042 mdc->un_key = compnp->key;
2541 mdkey_t key; local
2605 &key, ep)) == NULL) {
2629 key, pnam
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dcipher.c224 dummy_setkey (void *c, const unsigned char *key, unsigned int keylen)
227 (void)key;
598 /* Return the standard length of the key for the cipher algorithm with
601 the key is not known. */
616 log_bug ("cipher %d w/o key length\n", algorithm);
628 if the algorithm is not available or the length of the key is not
873 /* Set the key to be used for the encryption context C to KEY with
876 cipher_setkey (gcry_cipher_hd_t c, byte *key, unsigned int keylen)
880 ret = (*c->cipher->setkey) (&c->context.c, key, keylen);
1603 _gcry_cipher_setkey (gcry_cipher_hd_t hd, const void *key, size_
223 dummy_setkey(void *c, const unsigned char *key, unsigned int keylen) argument
874 cipher_setkey(gcry_cipher_hd_t c, byte *key, unsigned int keylen) argument
1601 _gcry_cipher_setkey(gcry_cipher_hd_t hd, const void *key, size_t keylen) argument
[all...]
/osnet-11/usr/src/lib/rad/pyrad/common/
H A Dclient.py853 non-empty set of key-value pairs.
855 An object pattern requires neither a domain nor a non-empty set of key-value
871 a list of key name/value tuples
885 self._sortedkeys = sorted(kvs, key = lambda kv: kv[0])
927 constituent domain and key/value pairs.
929 Format: <domain>:[<key>=<value>,]...[<key>=<value>]
955 raise Exception("Bad key/value: %s" % i)
976 for key, value in self._sortedkeys:
977 if not key i
[all...]
/osnet-11/usr/src/lib/libpool/common/
H A Dpool_kernel.c665 remove_dead_elems(const void *key, void **value, void *cl) argument
667 pool_knl_elem_t *pke = (pool_knl_elem_t *)key;
687 find_dead_elems(const void *key, void **value, void *cl) argument
689 pool_knl_elem_t *pke = (pool_knl_elem_t *)key;
1250 build_result_set(const void *key, void **value, void *cl) argument
1253 pool_knl_elem_t *pke = (pool_knl_elem_t *)key;
1258 if (qo->classes & (1 << pool_elem_class((pool_elem_t *)key))) {
1299 (pool_knl_elem_t *)key);
1302 (pool_knl_elem_t *)key);
2210 pool_knl_elem_printf_cb(const void *key, voi argument
2253 pool_knl_elem_free_cb(const void *key, void **value, void *cl) argument
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_ctx.c1025 * Get the transport level session key.
1029 smbfs_fh_getssnkey(int dev_fd, uchar_t *key, size_t len) argument
1034 if (ioctl(dev_fd, SMBIOC_GETSSNKEY, key) == -1)
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dldap-int.h869 int ldap_memcache_result( LDAP *ld, int msgid, unsigned long key );
870 int ldap_memcache_new( LDAP *ld, int msgid, unsigned long key,
/osnet-11/usr/src/lib/libnsl/
H A DMakefile.com144 pics/%.o: ../key/%.c
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IO/lib/IO/Socket/
H A DINET.pm302 optionally takes arguments, these arguments are in key-value pairs.
304 In addition to the key-value pairs accepted by L<IO::Socket>,
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/IO/lib/IO/
H A DSocket.pm334 optionally takes arguments, these arguments are in key-value pairs.
335 C<new> only looks for one key C<Domain> which tells new which domain
/osnet-11/usr/src/lib/pam_modules/unix_cred/
H A Dunix_cred.c583 kv_array->data[error - 1].key,
590 kv_array->data[error - 1].key,
/osnet-11/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaSession.c411 * If the operation did not need a key, try again.
423 * without the unnecessary key argument and this
566 session->init.key = meta_enc_key;
568 session->init.key = meta_auth_key;
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dtpm_specific.c142 /* TSP key handles */
156 /* PKCS#11 key handles */
299 char line[BUFSIZ], key[BUFSIZ], idstr[BUFSIZ]; local
324 if (sscanf(line, "%1024s %1024s", key, idstr) == 2) {
325 if (strcmp(key, keyname))
346 char line[BUFSIZ], key[BUFSIZ], idstr[BUFSIZ]; local
372 if (sscanf(line, "%1024s %1024s", key, idstr) == 2) {
373 if (strcmp(key, keyname) == 0) {
501 /* Get the TCPA_PUBKEY blob from the key object. */
520 free(pub_key.pubKey.key);
[all...]
/osnet-11/usr/src/lib/scsi/libscsi/common/
H A Dscsi_status.c218 { 0x20, 0x03, "access denied - invalid mgmt id key" },
541 { 0x6f, 0x00, "copy protect key exchange failure authentication "
543 { 0x6f, 0x01, "copy protect key exchange failure key not present" },
544 { 0x6f, 0x02, "copy protect key exchange failure key not established" },
580 libscsi_sense_key_name(uint64_t key) argument
582 return (find_string(sensekey_strings, (int)key));
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dlsar_clnt.c417 lsar_lookup_names(mlsvc_handle_t *lsa_handle, void *key, smb_account_t *info) argument
432 char *name = (char *)key;
755 lsar_lookup_sids(mlsvc_handle_t *lsa_handle, void *key, smb_account_t *account) argument
759 smb_sid_t *sid = (smb_sid_t *)key;
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpac.c869 const krb5_keyblock *key,
876 ret = krb5int_c_mandatory_cksumtype(context, key->enctype, cksumtype);
1185 const krb5_keyblock *key,
1198 key,
866 k5_insert_checksum(krb5_context context, krb5_pac pac, krb5_ui_4 type, const krb5_keyblock *key, krb5_cksumtype *cksumtype) argument
1180 mspac_verify(krb5_context kcontext, krb5_authdata_context context, void *plugin_context, void *request_context, const krb5_auth_context *auth_context, const krb5_keyblock *key, const krb5_ap_req *req) argument
/osnet-11/usr/src/lib/libadr/common/
H A Dadr.c1108 * Searches an array for the specified key. Returns index or -1 if not found.
1112 adr_array_search(adr_data_t *array, const char *key, const char * const *path) argument
1118 if (strcmp(entry->d_data.string, key) == 0)
1125 adr_array_nsearch(adr_data_t *array, const char *key, size_t len, argument
1132 if (rad_strccmp(entry->d_data.string, key, len) == 0)
/osnet-11/usr/src/grub/grub2/include/grub/efi/
H A Dapi.h1083 grub_efi_input_key_t *key);
1116 grub_efi_input_key_t key; member in struct:grub_efi_key_data
1129 grub_efi_key_data_t *key);
1139 grub_efi_key_data_t *key,
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Getopt/
H A DStd.pm40 Hash keys will be x (where x is the switch name) with key values the value of
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/
H A Dfields.pm298 fields::phash() also accepts a list of key-value pairs that will

Completed in 128 milliseconds

<<313233343536