Searched refs:key (Results 1 - 25 of 536) sorted by path

1234567891011>>

/barrelfish-2018-10-04/doc/000-overview/
H A DOverview.tex480 key-value store which can also retain capabilities. Aside from the
/barrelfish-2018-10-04/doc/012-services/
H A DServices.tex380 services that provide key Barrelfish functionality, and services that
/barrelfish-2018-10-04/doc/014-bulk-transfer/
H A Dbulk-transfer.tex110 which they belong. The key difference here is that the these pbufs
432 slots within shared-pool. Following are the key elements of
/barrelfish-2018-10-04/include/arpa/
H A Dnameser.h271 struct dst_key *key; member in struct:ns_tcp_tsig_state
315 ns_t_key = 25, /*%< Security key. */
344 ns_t_tkey = 249, /*%< Transaction key */
385 ns_kt_rsa = 1, /*%< key type RSA/MD5 */
388 ns_kt_private = 254 /*%< Private key type starts with OID */
404 #define NS_KEY_TYPE_NO_KEY 0xC000 /*%< No key usable for either; no key */
413 #define NS_KEY_NAME_USER 0x0000 /*%< key is assoc. with user */
414 #define NS_KEY_NAME_ENTITY 0x0200 /*%< key is assoc. with entity eg host */
415 #define NS_KEY_NAME_ZONE 0x0100 /*%< key i
[all...]
/barrelfish-2018-10-04/include/collections/
H A Dhash_table.h48 uint64_t key; member in struct:_collections_hash_elem
66 void collections_hash_insert(collections_hash_table *t, uint64_t key, void *data);
67 void* collections_hash_find(collections_hash_table *t, uint64_t key);
68 void collections_hash_delete(collections_hash_table *t, uint64_t key);
71 void* collections_hash_traverse_next(collections_hash_table* t, uint64_t *key);
77 typedef int (*collections_hash_visitor_func)(uint64_t key, void *data, void *arg);
H A Dlist.h101 collections_list_predicate p, void *key);
104 void *key);
/barrelfish-2018-10-04/include/concurrent/
H A Dlinked_list.h23 void* key; member in struct:ll_element
41 bool ll_delete(struct ll_element *head, struct ll_element *tail, void* key);
46 bool ll_contains(struct ll_element *head, struct ll_element *tail, void* key);
/barrelfish-2018-10-04/include/dma/
H A Ddma_request.h94 } key; member in union:dma_req_setup::__anon66
/barrelfish-2018-10-04/include/hashtable/
H A Dhashtable.h27 const void* key; member in struct:_ht_entry
/barrelfish-2018-10-04/include/lwip2/lwip/apps/
H A Dsnmpv3.h79 u8_t *key); /* OUT - pointer to caller 16-octet buffer */
86 u8_t *key); /* OUT - pointer to caller 20-octet buffer */
/barrelfish-2018-10-04/include/lwip2/netif/ppp/
H A Dmppe.c97 * Set key, used by MSCHAP before mppe_init() is actually called by CCP so we
100 void mppe_set_key(ppp_pcb *pcb, ppp_mppe_state *state, u8_t *key) { argument
102 MEMCPY(state->master_key, key, MPPE_MAX_KEY_LEN);
126 PPPDEBUG(LOG_DEBUG, ("%s[%d]: unknown key length\n", debugstr,
134 /* Generate the initial session key. */
166 * Note that even though we have initialized the key table, we don't
H A Dmppe.h45 #define MPPE_MAX_KEY_LEN 16 /* largest key length (128-bit) */
154 u8_t keylen; /* key length in bytes */
165 void mppe_set_key(ppp_pcb *pcb, ppp_mppe_state *state, u8_t *key);
H A Dmultilink.c60 char *blinks_id; /* key for the list of links */
72 static int parse_num (char *str, const char *key, int *valp);
127 TDB_DATA key, pid, rec; local
187 /* Make the key for the list of links belonging to the bundle */
191 novm("bundle links key");
211 key.dptr = bundle_id;
212 key.dsize = p - bundle_id;
213 pid = tdb_fetch(pppdb, key);
277 TDB_DATA key; local
293 key
306 TDB_DATA key, rec; local
346 TDB_DATA key, rec; local
376 TDB_DATA key, rec, pp; local
[all...]
H A Dpppcrypt.c52 /* IN 56 bit DES key missing parity bits
53 * OUT 64 bit DES key with parity bits added
55 void pppcrypt_56_to_64_bit_key(u_char *key, u_char * des_key) { argument
56 des_key[0] = pppcrypt_get_7bits(key, 0);
57 des_key[1] = pppcrypt_get_7bits(key, 7);
58 des_key[2] = pppcrypt_get_7bits(key, 14);
59 des_key[3] = pppcrypt_get_7bits(key, 21);
60 des_key[4] = pppcrypt_get_7bits(key, 28);
61 des_key[5] = pppcrypt_get_7bits(key, 35);
62 des_key[6] = pppcrypt_get_7bits(key, 4
[all...]
H A Dpppcrypt.h132 void pppcrypt_56_to_64_bit_key(u_char *key, u_char *des_key);
/barrelfish-2018-10-04/include/lwip2/netif/ppp/polarssl/
H A Darc4.c46 * ARC4 key schedule
48 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen ) argument
67 j = ( j + a + key[k] ) & 0xFF;
H A Darc4.h58 * \brief ARC4 key schedule
61 * \param key the secret key
62 * \param keylen length of the key
64 void arc4_setup( arc4_context *ctx, unsigned char *key, int keylen );
H A Ddes.c300 static void des_setkey( unsigned long SK[32], unsigned char key[8] )
305 GET_ULONG_BE( X, key, 0 );
306 GET_ULONG_BE( Y, key, 4 );
370 * DES key schedule (56-bit, encryption)
372 void des_setkey_enc( des_context *ctx, unsigned char key[8] )
374 des_setkey( ctx->sk, key );
378 * DES key schedule (56-bit, decryption)
380 void des_setkey_dec( des_context *ctx, unsigned char key[8] )
384 des_setkey( ctx->sk, key );
H A Ddes.h60 * \brief DES key schedule (56-bit, encryption)
63 * \param key 8-byte secret key
65 void des_setkey_enc( des_context *ctx, unsigned char key[8] );
68 * \brief DES key schedule (56-bit, decryption)
71 * \param key 8-byte secret key
73 void des_setkey_dec( des_context *ctx, unsigned char key[8] );
/barrelfish-2018-10-04/include/openssl/
H A Daes.h89 AES_KEY *key);
91 AES_KEY *key);
94 const AES_KEY *key);
96 const AES_KEY *key);
99 const AES_KEY *key, const int enc);
101 size_t length, const AES_KEY *key,
104 size_t length, const AES_KEY *key,
107 size_t length, const AES_KEY *key,
110 size_t length, const AES_KEY *key,
113 size_t length, const AES_KEY *key,
[all...]
H A Dblowfish.h108 void BF_set_key(BF_KEY *key, int len, const unsigned char *data);
110 void BF_encrypt(BF_LONG *data,const BF_KEY *key);
111 void BF_decrypt(BF_LONG *data,const BF_KEY *key);
114 const BF_KEY *key, int enc);
H A Dcamellia.h92 CAMELLIA_KEY *key);
95 const CAMELLIA_KEY *key);
97 const CAMELLIA_KEY *key);
100 const CAMELLIA_KEY *key, const int enc);
102 size_t length, const CAMELLIA_KEY *key,
105 size_t length, const CAMELLIA_KEY *key,
108 size_t length, const CAMELLIA_KEY *key,
111 size_t length, const CAMELLIA_KEY *key,
114 size_t length, const CAMELLIA_KEY *key,
117 size_t length, const CAMELLIA_KEY *key,
[all...]
H A Dcast.h83 int short_key; /* Use reduced rounds for short key */
87 void CAST_set_key(CAST_KEY *key, int len, const unsigned char *data);
88 void CAST_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAST_KEY *key,
90 void CAST_encrypt(CAST_LONG *data, const CAST_KEY *key);
91 void CAST_decrypt(CAST_LONG *data, const CAST_KEY *key);
H A Dcms.h157 const unsigned char *key, size_t keylen,
161 const unsigned char *key, size_t keylen,
165 const unsigned char *key, size_t keylen);
185 unsigned char *key, size_t keylen,
203 unsigned char *key, size_t keylen,
217 unsigned char *key, size_t keylen);
H A Ddes.h217 void DES_set_odd_parity(DES_cblock *key);
218 int DES_check_key_parity(const_DES_cblock *key);
219 int DES_is_weak_key(const_DES_cblock *key);
223 int DES_set_key(const_DES_cblock *key,DES_key_schedule *schedule);
224 int DES_key_sched(const_DES_cblock *key,DES_key_schedule *schedule);
225 int DES_set_key_checked(const_DES_cblock *key,DES_key_schedule *schedule);
226 void DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule);
227 void DES_string_to_key(const char *str,DES_cblock *key);
235 int DES_read_password(DES_cblock *key, const char *prompt, int verify);

Completed in 236 milliseconds

1234567891011>>