Searched refs:key (Results 801 - 825 of 892) sorted by relevance

<<313233343536

/osnet-11/usr/src/cmd/perl/5.8.4/distrib/
H A Dtoke.c5013 int key = tmp; local
5036 if (key == KEY_my)
5044 if (key == KEY_format) {
5086 else if (!have_name && *s != '{' && key == KEY_sub)
5102 if (key == KEY_my)
6055 S_new_constant(pTHX_ char *s, STRLEN len, const char *key, SV *sv, SV *pv, argument
6068 why2 = strEQ(key,"charnames")
6089 cvp = hv_fetch(table, key, strlen(key), FALSE);
6092 why2 = key;
[all...]
H A Dop.c217 PADOFFSET key; local
223 key = p - PL_threadsv_names;
225 svp = av_fetch(thr->threadsv, key, FALSE);
230 av_store(thr->threadsv, key, sv);
274 return key;
6596 char *key = NULL; local
6607 key = SvPV(sv, keylen);
6608 lexname = newSVpvn_share(key,
6627 key = SvPV(*svp, keylen);
6628 indsvp = hv_fetch(GvHV(*fields), key,
6657 char *key; local
[all...]
H A Ddoio.c1917 key_t key; local
1920 key = (key_t)SvNVx(*++mark);
1928 return msgget(key, flags);
1932 return semget(key, n, flags);
1936 return shmget(key, n, flags);
H A Dmg.c350 Perl_mg_copy(pTHX_ SV *sv, SV *nsv, const char *key, I32 klen) argument
357 count += CALL_FPTR(vtbl->svt_copy)(aTHX_ sv, mg, nsv, key, klen);
364 toLOWER(mg->mg_type), key, klen);
1552 Perl_magic_nextpack(pTHX_ SV *sv, MAGIC *mg, SV *key) argument
1555 const char *meth = SvOK(key) ? "NEXTKEY" : "FIRSTKEY";
1563 if (SvOK(key))
1564 PUSHs(key);
1568 sv_setsv(key, *PL_stack_sp--);
1591 SV *key; local
1596 key
[all...]
/osnet-11/usr/src/lib/libpp/common/
H A Dpplib.h255 char* probe; /* ppdefault probe key */ \
352 struct ppkeyarg* key; /* keyword formals table */ \
356 #define formkeys args.key /* formal keyword argument list */
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_util.c368 unsigned char *key,
382 j += (sbox[i] + key[i % keylen]);
835 * and reports a valid version number and key (UUID), return
365 rand_hash( unsigned char *data, size_t datalen, unsigned char *key, size_t keylen) argument
/osnet-11/usr/src/lib/libiscsit/common/
H A Dlibiscsit.c62 #define PROPERR(lst, key, value) { \
64 (void) nvlist_add_string(lst, key, value); \
300 * is key = property, value = error string.
593 * is key = property, value = error string.
1357 * that failed. The format for errorlist is key = property,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dauthdata.c611 const krb5_keyblock *key,
677 key,
607 krb5int_authdata_verify(krb5_context kcontext, krb5_authdata_context context, krb5_flags usage, const krb5_auth_context *auth_context, const krb5_keyblock *key, const krb5_ap_req *ap_req) argument
H A Dget_in_tkt.c66 key_proc is called to fill in the key to be used for decryption.
279 krb5_keyblock * key,
290 if (key)
291 decrypt_key = key;
313 if (!key && decrypt_key)
320 * contribution key. This routine confirms that the session key is of the
322 * preauth code because the session key cannot be verified until the AS reply
380 krb5_set_error_message(context, ret, "Reply has wrong form of session key "
1826 * armor key
274 decrypt_as_reply(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, krb5_keyblock * key, git_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/normal/
H A Dcharset.c1204 for (i = 0; grub_unicode_bidi_pairs[i].key; i++)
1205 if (grub_unicode_bidi_pairs[i].key == in)
/osnet-11/usr/src/cmd/sendmail/db/hash/
H A Dhash_rec.c141 __ham_putitem(pagep, &argp->key,
149 argp->ndx, &argp->key, &argp->data);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Class/
H A DStruct.pm339 Furthermore, if the class is hash-based, the key of each element is
413 With one or two arguments, the first argument is a key specifying
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/
H A DNEXT.pm447 fully qualified method name as its key and a reference to an array containing
453 fully qualified method name as its key and the method's scalar-context return values as its value.
/osnet-11/usr/src/lib/lvm/libmeta/common/
H A Dmeta_set_hst.c124 nm.key = MD_KEYWILD;
171 if (nm.key == MD_KEYWILD)
175 * Okay we have a valid key
179 otherside, nm.key, &drvnm, NULL, NULL, ep);
192 if (add_name(sp, sideno, nm.key, MD_HOTSPARES,
230 if (add_name(sp, sideno, nm.key, dname, mnum,
1136 nm.key = MD_KEYWILD;
1146 if (nm.key == MD_KEYWILD)
1157 if (del_name(sp, sideno, nm.key, ep) == -1)
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftObject.h56 * Secret key Struct
122 rsa_pub_key_t rsa_pub_key; /* RSA public key */
123 dsa_pub_key_t dsa_pub_key; /* DSA public key */
124 dh_pub_key_t dh_pub_key; /* DH public key */
125 dh942_pub_key_t dh942_pub_key; /* DH9.42 public key */
126 ec_pub_key_t ec_pub_key; /* Elliptic Curve public key */
189 rsa_pri_key_t rsa_pri_key; /* RSA private key */
190 dsa_pri_key_t dsa_pri_key; /* DSA private key */
191 dh_pri_key_t dh_pri_key; /* DH private key */
192 dh942_pri_key_t dh942_pri_key; /* DH9.42 private key */
[all...]
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c160 return (gettext("key handle invalid"));
162 return (gettext("key size range"));
164 return (gettext("key type inconsistent"));
166 return (gettext("key not needed"));
168 return (gettext("key changed"));
170 return (gettext("key needed"));
172 return (gettext("key indigestible"));
174 return (gettext("key function not permitted"));
176 return (gettext("key not wrappable"));
178 return (gettext("key unextractabl
2260 pkinit_octetstring2key(krb5_context context, krb5_enctype etype, unsigned char *key, unsigned int dh_key_len, krb5_keyblock * key_block) argument
6884 print_pubkey(BIGNUM * key, char *msg) argument
[all...]
/osnet-11/usr/src/lib/libsldap/common/
H A Dns_connmgmt.c73 "libsldap: unable to allocate the TSD key for per-thread ldap error")
75 "libsldap: unable to allocate the TSD key for connection management")
137 ns_mtckey_cleanup(void *key) { argument
138 struct ldap_error *le = (struct ldap_error *)key;
2443 mywait.key = conn_user;
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Data/Dumper/
H A DDumper.pm68 pair => $Pair, # hash key/value separator: defaults to ' => '
347 my ($sortkeys, $keys, $key) = ("$s->{sortkeys}");
361 @$keys ? ($key = shift(@$keys), $val->{$key}) :
1047 $Data::Dumper::Pair = " : "; # specify hash key/value separator
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ExtUtils/
H A DConstant.pm961 foreach my $key (qw(default pre post def_pre def_post)) {
962 my $value = $orig->{$key};
963 $item->{$key} = $value if defined $value;
964 # warn "$key $value";
/osnet-11/usr/src/lib/librestart/common/
H A Dlibrestart.c436 restarter_get_str_short(restarter_str_t key) argument
441 if (key == restarter_str[i].str_key)
447 restarter_get_str_long(restarter_str_t key) argument
452 if (key == restarter_str[i].str_key)
/osnet-11/usr/src/lib/libdll/common/
H A Ddllscan.c502 scan->disc.key = offsetof(Uniq_t, name);
/osnet-11/usr/src/lib/efcode/engine/
H A Dinteractive.c524 key(env);
/osnet-11/usr/src/lib/fm/libdisklog/common/
H A Dlibdisklog.c1817 uint64_t key, asc, ascq; local
1820 if (libscsi_action_parse_sense(ap, &key, &asc, &ascq, NULL) != 0) {
1828 keystr = libscsi_sense_key_name(key);
1831 "SCSI status = 0x%x\nsense key = 0x%llx (%s)\n"
1833 libscsi_action_get_status(ap), key,
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c209 * was invalid UTF-8, which runs afoul of the arcfour string-to-key.
442 * Then update the active mkey list in case the new key has been activated
470 /* Null password means create with random key (new in 1.8). */
483 /* Record the master key VNO used to encrypt this entry's keys */
523 /* In all cases key and the principal data is set, let the database provider know */
1013 * Purpose: Check if a key appears in a list of keys, in order to
1019 * hist_keyblock (r) the key that hist_key_data is
1035 * Returns krb5 errors, KADM5_PASS_RESUSE if a key in
1036 * new_key_data is the same as a key in pw_hist_data, or 0.
1091 * mkey (r) master keyblock to decrypt key dat
1110 krb5_keyblock key; local
[all...]
/osnet-11/usr/src/lib/brand/solaris10/s10_brand/common/
H A Ds10_brand.c216 static thread_key_t key; local
221 /* Create the key. */
225 if (thr_keycreate(&key, mntfs_free_mntentbuf)) {
236 * The thread-specific datum for this key is the address of a struct
241 if (thr_getspecific(key, &tsd))
246 thr_setspecific(key, embufp)) {

Completed in 1031 milliseconds

<<313233343536