Searched defs:key (Results 126 - 150 of 889) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/uts/common/io/kbtrans/
H A Dusb_keytables.c426 0, /* no alternate abort key F1 on sparc */
428 58, /* alternate abort key F1 */
433 225, /* new abort key Left Shift */
434 229, /* alternate new abort key Right Shift */
435 72, /* new abort key Pause */
462 kbtrans_keycode_usb2pc(int key) argument
464 ASSERT(key >= 0 && key <= 255);
465 return (keytab_usb2pc[key]);
/illumos-gate/usr/src/cmd/lp/lib/papi/
H A Dppd.c41 process_line(char *line, char **key, char **value, char **comment) argument
45 *key = &line[1];
54 * *key: value/comment
56 * *key value/comment: data
66 * *key value/comment: data
102 char *key = NULL, *value = NULL, *text = NULL; local
104 /* we want *key...: "value" */
114 process_line(line, &key, &value, &text);
116 if ((strcasecmp(key, "PageSize") == 0) ||
117 (strcasecmp(key, "InputSlo
[all...]
/illumos-gate/usr/src/uts/common/sys/
H A Dnetlb.h49 * speed or style of loopback implemented), and a key value, used in the
80 char key[16]; member in struct:_lb_property_t
/illumos-gate/usr/src/lib/smbsrv/libfksmbsrv/common/
H A Dfksmb_sign_pkcs.c106 * Start PKCS#11 session, load the key.
110 uint8_t *key, size_t key_len)
120 key, key_len, &hkey);
109 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech, uint8_t *key, size_t key_len) argument
/illumos-gate/usr/src/cmd/mandoc/
H A Dtbl_layout.c34 enum tbl_cellt key; member in struct:tbl_phrase
226 c = keys[i].key;
H A Dtbl_opts.c38 int key; member in struct:tbl_phrase
65 arg(struct tbl_node *tbl, int ln, const char *p, int *pos, int key) argument
81 switch (key) {
106 tbl->parse, ln, *pos, keys[key].name);
110 keys[key].name, want, len);
168 if (keys[i].key)
169 tbl->opts.opts |= keys[i].key;
/illumos-gate/usr/src/lib/nsswitch/user/common/
H A Dgetprinter.c45 char *key = NULL; local
55 if ((key = strpbrk(value, "\n\t ")) != NULL)
56 *key = NULL;
66 key = "all";
68 key = "use";
71 namelist, key);
104 * filter not useful here since the key
119 namelen = strlen(args->key.name);
153 if ((strncmp(p, args->key.name, namelen) == 0) &&
232 return (_nss_user_XY_printers(be, argp, argp->key
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_md5.c363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
406 CK_BYTE *key = attr->pValue; local
409 k_ipad[i] = key[i] ^ 0x36;
410 k_opad[i] = key[i] ^ 0x5C;
507 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);
H A Dmech_sha.c96 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj);
137 CK_BYTE *key = attr->pValue; local
140 k_ipad[i] = key[i] ^ 0x36;
141 k_opad[i] = key[i] ^ 0x5C;
237 rc = sign_mgr_init(sess, &hmac_ctx, &ctx->mech, FALSE, ctx->key);
H A Dsign_mgr.c35 CK_OBJECT_HANDLE key)
52 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
80 // must be a PRIVATE key
113 // must be a PRIVATE key operation
211 ctx->key = key;
228 ctx->key = 0;
31 sign_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
H A Dverify_mgr.c35 CK_OBJECT_HANDLE key)
52 // key usage restrictions
54 rc = object_mgr_find_in_map1(sess->hContext, key, &key_obj);
58 // is key allowed to verify signatures?
196 ctx->key = key;
213 ctx->key = 0;
31 verify_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument
/illumos-gate/usr/src/lib/print/libprint/common/
H A Dnss_convert.c115 (void) strncat_escaped(buf, kvp->key, buflen, ESCAPE_CHARS);
142 *key = NULL, local
166 } else if (key != NULL)
167 (void) ns_set_value_from_string(key, buf,
171 key = NULL;
174 if (key == NULL) {
175 key = strdup(buf);
203 if (key != NULL)
204 (void) ns_set_value_from_string(key, buf, printer);
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/
H A Dtopo_string.c110 topo_strhash(const char *key) argument
115 for (p = key; *p != '\0'; p++) {
/illumos-gate/usr/src/lib/fm/topo/modules/common/pcibus/
H A Ddid_hash.c69 did_dnhash(di_node_t key) argument
81 key_divisor = sizeof (*key);
83 keyn = (uintptr_t)key;
130 did_hash_insert(topo_mod_t *mp, di_node_t key, did_t *new) argument
134 int idx = did_dnhash(key) % tab->dph_hashlen;
138 topo_mod_dprintf(tab->dph_mod, "Insert [key=%p] into %p, bucket %d\n",
139 key, (void *)tab, idx);
150 assert(assertchk->dp_src != key);
157 did_hash_lookup(topo_mod_t *mp, di_node_t key) argument
161 int idx = did_dnhash(key)
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c120 des_setparity_g(des_block *key) argument
122 des_setparity((char *)key);
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dk5_md5des.c49 k5_md5des_hash(krb5_context context, krb5_const krb5_keyblock *key, argument
62 if (key->length != 8)
76 xorkey.magic = key->magic;
77 xorkey.enctype = key->enctype;
78 xorkey.length = key->length;
79 xorkey.contents = (krb5_octet *)malloc(key->length);
83 (void) memcpy(xorkey.contents, key->contents, xorkey.length);
154 krb5_const krb5_keyblock *key,
171 if (key->length != 8)
186 /* create and the encryption key */
153 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dmk_req_ext.c47 creds is used to supply the credentials (ticket and session key) needed
280 krb5_generate_authenticator(krb5_context context, krb5_authenticator *authent, krb5_principal client, krb5_checksum *cksum, krb5_keyblock *key, krb5_ui_4 seq_number, krb5_authdata **authorization) argument
286 if (key) {
287 retval = krb5_copy_keyblock(context, key, &authent->subkey);
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dlucid_context.c50 gss_krb5_lucid_key_t *key);
215 /* gctx->proto == 0 ==> rfc1964-style key information
220 /* Copy key */
228 session key or a subkey) */
266 /* Allocate storage for the key data */
281 gss_krb5_lucid_key_t *key)
283 if (key) {
284 if (key->data && key->length) {
285 memset(key
280 free_lucid_key_data( gss_krb5_lucid_key_t *key) argument
[all...]
/illumos-gate/usr/src/lib/libresolv2/common/resolv/
H A Dres_update.c94 res_nupdate(res_state statp, ns_updrec *rrecp_in, ns_tsig_key *key) { argument
170 if (key != NULL)
171 n = res_nsendsigned(statp, packet, n, key,
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dconfig.c74 char *key; member in struct:configlist
95 char *p, *key; local
122 key = p;
171 result = _sasl_strdup(key,
173 [gctx->nconfiglist].key),
178 result = _sasl_strdup(key,
179 &(configlist[nconfiglist].key),
190 [gctx->nconfiglist].key);
239 if ((((struct configlist *)gctx->configlist))[i].key)
240 sasl_FREE(((struct configlist *)gctx->configlist)[i].key);
249 sasl_config_getstring(_sasl_global_context_t *gctx, const char *key, const char *def) argument
263 sasl_config_getstring(const char *key,const char *def) argument
277 sasl_config_getint(_sasl_global_context_t *gctx, const char *key,int def) argument
294 sasl_config_getswitch(_sasl_global_context_t *gctx,const char *key,int def) argument
[all...]
/illumos-gate/usr/src/lib/libcpc/common/
H A Dsubr.c175 * Insert a new key into the hash table.
177 * Returns 0 if key was unique and insert successful.
179 * Returns 1 if key was already in table and no insert took place.
184 __cpc_strhash_add(cpc_strhash_t *hash, char *key) argument
189 if (strcmp(p->str, key) == 0)
196 p->str = key;
/illumos-gate/usr/src/lib/libcrypt/common/
H A Ddes.c97 cbc_crypt(char *key, char *buf, size_t len, unsigned int mode, char *ivec) argument
104 err = common_crypt(key, buf, len, mode, &dp);
114 ecb_crypt(char *key, char *buf, size_t len, unsigned int mode) argument
120 ret = common_crypt(key, buf, len, mode, &dp);
129 common_crypt(char *key, char *buf, unsigned len, argument
143 COPY8(key, desp->des_key);
/illumos-gate/usr/src/lib/libgen/common/
H A Dpathfind.c103 static thread_key_t key = THR_ONCE_KEY; local
104 char *cpath = _get_cpath(&key);
/illumos-gate/usr/src/lib/libnsl/yp/
H A Dyp_enum.c59 * first key/value pair from the map data base. The returned key should be
67 char **key, /* return: key array */
68 int *keylen, /* return: bytes in key */
96 key, keylen, val, vallen);
120 char **key, /* return: key array */
121 int *keylen, /* return: bytes in key */
126 return (__yp_first_cflookup(domain, map, key, keyle
64 __yp_first_cflookup( char *domain, char *map, char **key, int *keylen, char **val, int *vallen, int hardlookup) argument
117 yp_first( char *domain, char *map, char **key, int *keylen, char **val, int *vallen) argument
[all...]
/illumos-gate/usr/src/lib/libpkg/common/
H A Dnhash.h40 void *key; member in struct:item_t

Completed in 123 milliseconds

1234567891011>>