/illumos-gate/usr/src/common/net/wanboot/crypt/ |
H A D | des3_test.c | 33 * key and verifies the result against the cipher value. Then decrypts 37 * Each key in gk[] should pass the keycheck and every key in bk[] should 50 char key[DES_KEY_SIZE * 2]; member in struct:test_data 112 unsigned char key[DES3_KEY_SIZE]; local 131 getxdata(key, td[i].key, DES_KEY_SIZE); 132 bcopy(key, &key[8], DES_KEY_SIZE); /* K1=K2=K3 for test */ 133 bcopy(key, 169 unsigned char key[DES_KEY_SIZE * 3]; local [all...] |
H A D | hmac_sha1.c | 34 HMACHashKey(uchar_t *hashedKey, const uchar_t *key, size_t klen) argument 39 SHA1Update(&keyContext, key, klen); 44 HMACInit(SHA1_CTX *sha1Context, const uchar_t *key, size_t klen) argument 52 HMACHashKey(hashedKey, key, klen); 56 keyptr = key; 75 HMACFinal(SHA1_CTX *sha1Context, const uchar_t *key, size_t klen, argument 84 HMACHashKey(hashedKey, key, klen); 88 keyptr = key;
|
/illumos-gate/usr/src/cmd/ypcmd/revnetgroup/ |
H A D | table.c | 40 * Generate the key into the table using the first two letters 65 store(table, key, datum) 67 char *key; 73 index = tablekey(key); 77 new->key = key; 85 lookup(table, key) 87 char *key; 91 cur = table[tablekey(key)]; 92 while (cur && strcmp(cur->key, ke [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_set.c | 38 void *key; member in struct:_g_set_elt 65 int g_set_entry_add(g_set_elt *s, void *key, void *value) argument 72 first->key = key; 81 int g_set_entry_delete(g_set_elt *s, void *key) argument 86 if ((*p)->key == key) { 98 int g_set_entry_get(g_set_elt *s, void *key, void **value) argument 103 if (p->key == key) { [all...] |
H A D | util_seqnum.c | 34 kg_make_seq_num(context, key, direction, seqnum, cksum, buf) 36 krb5_keyblock *key; 48 if (key->enctype == ENCTYPE_ARCFOUR_HMAC ) { 54 return kg_arcfour_docrypt (context, key, 0, 66 return(kg_encrypt(context, key, KG_USAGE_SEQ, cksum, plain, buf, 8)); 69 krb5_error_code kg_get_seq_num(context, key, cksum, buf, direction, seqnum) 71 krb5_keyblock *key; 80 if (key->enctype == ENCTYPE_ARCFOUR_HMAC) { 81 code = kg_arcfour_docrypt (context, key, 0, 86 code = kg_decrypt(context, key, KG_USAGE_SE [all...] |
/illumos-gate/usr/src/test/util-tests/tests/libnvpair_json/ |
H A D | json_05_strings.ksh | 29 "":"blank key",\ 30 " ":"whitespace key",\ 31 "\ttab\t":"tab key",\ 49 add_string "" "blank key"; 50 add_string " " "whitespace key"; 51 add_string " tab " "tab key";
|
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/ |
H A D | disp5.c | 47 long key; local 53 getmessage (m, S_CHILD_DONE, &key, &status, &err); 54 syslog(LOG_DEBUG, "s_child_done(%d, %d, %d)", key, status, err); 57 if ((Exec_Table[i]->key == key) && (Exec_Table[i]->md == md)) { 62 key, md, ep);
|
/illumos-gate/usr/src/cmd/sendmail/db/hash/ |
H A D | hash_func.c | 77 __ham_func2(key, len) 78 const void *key; 85 k = key; 108 __ham_func3(key, len) 109 const void *key; 120 k = key; 155 __ham_func4(key, len) 156 const void *key; 169 k = key; 212 __ham_func5(key, le [all...] |
/illumos-gate/usr/src/cmd/sendmail/db/hsearch/ |
H A D | hsearch.c | 87 DBT key, val; local 93 memset(&key, 0, sizeof(key)); 95 key.data = item.key; 96 key.size = strlen(item.key) + 1; 104 * Try and add the key to the database. If we fail because 105 * the key already exists, return the existing key [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/ |
H A D | hashset.h | 45 extern const void *h_get(const HASHSET h, void *key); 46 extern const void *h_put(HASHSET h, const void *key); 47 extern const void *h_delete(HASHSET h, const void *key);
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/ |
H A D | hash_func.c | 61 * Assume that we've already split the bucket to which this key hashes, 71 hash1(key, len) 72 const void *key; 79 k = (u_int8_t *)key; 93 hash2(key, len) 94 const void *key; 100 k = (u_int8_t *)key; 121 hash3(key, len) 122 const void *key; 131 k = (u_int8_t *)key; [all...] |
H A D | hsearch.c | 75 DBT key, val; local 80 key.data = (u_char *)item.key; 81 key.size = strlen(item.key) + 1; 86 status = (dbp->put)(dbp, &key, &val, R_NOOVERWRITE); 91 status = (dbp->get)(dbp, &key, &val, 0); 97 retval.key = item.key;
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gen_subkey.c | 27 * Routine to automatically generate a subsession key based on an input key. 34 krb5_generate_subkey(krb5_context context, const krb5_keyblock *key, krb5_keyblock **subkey) argument 46 seed.length = key->length; 47 seed.data = key->contents; 58 if ((retval = krb5_c_make_random_key(context, key->enctype, *subkey))) {
|
/illumos-gate/usr/src/lib/libbc/inc/include/ |
H A D | search.h | 31 typedef struct entry { char *key, *data; } ENTRY; member in struct:entry
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | tfind.c | 48 typedef struct node { void *key; struct node *llink, *rlink; } NODE; member in struct:node 61 void *key = (char *)ky; local 66 int r = (*compar)(key, (*rootp)->key); /* T2: */
|
/illumos-gate/usr/src/common/crypto/arcfour/ |
H A D | arcfour.h | 45 void arcfour_key_init(ARCFour_key *key, uchar_t *keyval, int keyvallen); 46 void arcfour_crypt(ARCFour_key *key, uchar_t *in, uchar_t *out, size_t len); 50 void arcfour_crypt_aligned(ARCFour_key *key, size_t len, uchar_t *in, 55 void arcfour_crypt_asm(ARCFour_key *key, uchar_t *in, uchar_t *out, size_t len);
|
/illumos-gate/usr/src/uts/sun4v/sys/ |
H A D | vsw_fdb.h | 37 * Convert ethernet (mac) address to hash table key. 39 #define KEY_HASH(key, addr) \ 40 (key = ((((uint64_t)(addr)->ether_addr_octet[0]) << 40) | \ 47 #define VLAN_ID_KEY(key) ((mod_hash_key_t)(uintptr_t)(key))
|
/illumos-gate/usr/src/cmd/lp/lib/papi/ |
H A D | ppd.c | 41 process_line(char *line, char **key, char **value, char **comment) argument 45 *key = &line[1]; 54 * *key: value/comment 56 * *key value/comment: data 66 * *key value/comment: data 102 char *key = NULL, *value = NULL, *text = NULL; local 104 /* we want *key...: "value" */ 114 process_line(line, &key, &value, &text); 116 if ((strcasecmp(key, "PageSize") == 0) || 117 (strcasecmp(key, "InputSlo [all...] |
/illumos-gate/usr/src/uts/common/ipp/ipgpc/ |
H A D | table.c | 50 * ht_insert(taid, id, key) 53 * if key == taid->wildcard, the key is inserted as a wildcard 55 * returns DONTCARE_VALUE if key == wildcard, NORMAL_VALUE otherwise 58 ht_insert(table_id_t *taid, key_t id, int key) argument 65 if (key == taid->wildcard) { 71 x = ht_hash(key); 73 * insert if key matches and entry is being used or if entry is empty 75 if (((table[x].key == key) 126 ht_search(hash_table table, int key) argument 155 ht_retrieve(table_id_t *taid, int key, ht_match_t *fid_table) argument 198 ht_remove(table_id_t *taid, key_t id, int key) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | error_map.h | 18 * key: OM_uint32 26 OM_uint32 key; member in struct:gsserrmap__element 47 (*free_key)(e->key); 54 /* Returns pointer to linked-list entry, or null if key not found. */ 56 gsserrmap__find_node (struct gsserrmap__head *head, OM_uint32 key) argument 60 if (compare_OM_uint32 (key, e->key) == 0) 64 /* Returns pointer to value, or null if key not found. */ 66 gsserrmap_find (struct gsserrmap__head *head, OM_uint32 key) argument 68 struct gsserrmap__element *e = gsserrmap__find_node(head, key); 86 gsserrmap_replace_or_insert(struct gsserrmap__head *head, OM_uint32 key, char * new_value) argument [all...] |
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | device.c | 185 /** Merge all properties from source where the key starts with 212 const char *key; local 216 key = hal_property_get_key (p); 219 if (strncmp(key, source_namespace, source_ns_len) != 0) 223 key+source_ns_len); 228 target_type = hal_device_property_get_type (target, key); 230 hal_device_property_remove (target, key); 287 const char *key; local 290 key = hal_property_get_key (p); 294 if (strcmp (key, "inf 360 const char *key; local 459 hal_device_has_property(HalDevice *device, const char *key) argument 476 hal_device_property_find(HalDevice *device, const char *key) argument 494 hal_device_property_to_string(HalDevice *device, const char *key) argument 527 hal_device_property_get_type(HalDevice *device, const char *key) argument 543 hal_device_property_get_string(HalDevice *device, const char *key) argument 559 hal_device_property_get_as_string(HalDevice *device, const char *key, char *buf, size_t bufsize) argument 623 hal_device_property_get_int(HalDevice *device, const char *key) argument 639 hal_device_property_get_uint64(HalDevice *device, const char *key) argument 655 hal_device_property_get_bool(HalDevice *device, const char *key) argument 671 hal_device_property_get_double(HalDevice *device, const char *key) argument 687 hal_device_property_set_string(HalDevice *device, const char *key, const char *value) argument 723 hal_device_property_set_int(HalDevice *device, const char *key, dbus_int32_t value) argument 757 hal_device_property_set_uint64(HalDevice *device, const char *key, dbus_uint64_t value) argument 791 hal_device_property_set_bool(HalDevice *device, const char *key, dbus_bool_t value) argument 825 hal_device_property_set_double(HalDevice *device, const char *key, double value) argument 894 hal_device_property_remove(HalDevice *device, const char *key) argument 914 hal_device_property_set_attribute(HalDevice *device, const char *key, enum PropertyAttribute attr, gboolean val) argument 939 const char *key; local 983 char *key; member in struct:__anon610 1003 prop_changed_cb(HalDevice *device, const char *key, gboolean removed, gboolean added, gpointer user_data) argument 1036 hal_device_async_wait_property(HalDevice *device, const char *key, HalDeviceAsyncCallback callback, gpointer user_data, int timeout) argument 1086 hal_device_property_get_strlist(HalDevice *device, const char *key) argument 1103 hal_device_property_get_strlist_elem(HalDevice *device, const char *key, guint index) argument 1122 hal_device_property_strlist_append(HalDevice *device, const char *key, const char *value) argument 1154 hal_device_property_strlist_prepend(HalDevice *device, const char *key, const char *value) argument 1186 hal_device_property_strlist_remove_elem(HalDevice *device, const char *key, guint index) argument 1211 hal_device_property_strlist_clear(HalDevice *device, const char *key) argument 1244 hal_device_property_strlist_add(HalDevice *device, const char *key, const char *value) argument 1283 hal_device_property_strlist_remove(HalDevice *device, const char *key, const char *value) argument 1307 hal_device_property_strlist_is_empty(HalDevice *device, const char *key) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/aes/ |
H A D | aes_s2k.c | 49 krb5_keyblock *key) 85 * Dense key space, no parity bits or anything, so take a shortcut 86 * and use the key contents buffer for the generated bytes. 89 if (key->length != 16 && key->length != 32) 91 out.data = (char *) key->contents; 92 out.length = key->length; 94 err = krb5int_pbkdf2_hmac_sha1 (context, &out, iter_count, key->enctype, 103 * The derive key operation below will not work correctly 104 * if the input and output key pointer 44 krb5int_aes_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *params, krb5_keyblock *key) argument [all...] |
/illumos-gate/usr/src/cmd/getent/ |
H A D | dogetserv.c | 80 char key[BUFSIZ]; local 85 (void) strncpy(key, *list, sizeof (key)); 86 key[sizeof (key) - 1] = NULL; 88 if ((cp = strchr(key, '/')) != NULL) { 92 port = htons(atoi(key)); 96 sp = getservbyname(key, protocol);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/raw/ |
H A D | raw_decrypt.c | 41 const krb5_keyblock *key, krb5_keyusage usage, 47 return((*(enc->decrypt))(context, key, ivec, input, output)); 38 krb5_raw_decrypt(krb5_context context, const struct krb5_enc_provider *enc, const struct krb5_hash_provider *hash, const krb5_keyblock *key, krb5_keyusage usage, const krb5_data *ivec, const krb5_data *input, krb5_data *output) argument
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto.c | 66 * Default "null" key management routines. 73 *keyix = 0; /* use key index 0 for ucast key */ 101 * Reset key state to an unused state. The crypto 102 * key allocation mechanism insures other state (e.g. 103 * key data) is properly setup before a key is used. 116 * Establish a relationship between the specified key and cipher 118 * Note that when a fixed key index is required it must be specified 121 * This must be the first call applied to a key; al 129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, struct ieee80211_key *key) argument 253 ieee80211_crypto_delkey_locked(ieee80211com_t *ic, struct ieee80211_key *key) argument 281 ieee80211_crypto_delkey(ieee80211com_t *ic, struct ieee80211_key *key) argument 313 ieee80211_crypto_setkey(ieee80211com_t *ic, struct ieee80211_key *key, const uint8_t *macaddr) argument 359 struct ieee80211_key *key; local [all...] |