/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/t/op/ |
H A D | hash.t | 34 # keys which don't contain \0 -- suitable for stashes 47 my @keys = get_keys(\%h2); 48 $h2{$_}++ for @keys; 50 scalar(@keys) . " colliding into the same bucket keys are triggerring rehash"); 60 my $keys = scalar keys %$hr; 61 my $bits = $keys ? log($keys)/log(2) : 0; 70 my @keys; [all...] |
H A D | utfhash.t | 13 # Two hashes one will all keys 8-bit possible (initially), other 50 # Check we have not got an spurious extra keys 51 is(join('',sort { ord $a <=> ord $b } keys %hash8),"\x7f\xff"); 52 is(join('',sort { ord $a <=> ord $b } keys %hashu),"\x7f\xff\x{1ff}"); 57 # Check we have not got an spurious extra keys 58 is(join('',sort { ord $a <=> ord $b } keys %hash8),"\x7f\xff\x{1ff}"); 72 is(join('',sort keys %hashu),"\x7f\xff"); 89 print "# Unicode hash keys and \\w\n"; 102 my $keys = scalar @u; 103 $keys [all...] |
H A D | each.t | 42 @keys = keys %h; 45 ok ($#keys == 29, "keys"); 51 if ($key eq $keys[$i] && $value eq $values[$i] 60 @keys = ('blurfl', keys(%h), 'dyick'); 61 ok ($#keys == 31, "added a key"); 64 keys %h = $size * 5; 67 keys [all...] |
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | ksslutil.c | 50 KMF_RAW_KEY_DATA *keys; local 55 keys = NULL; 68 &ncerts, &keys, &nkeys); 83 if (keys != NULL) { 85 kmf_free_raw_key(&keys[i]); 86 free(keys); 88 keys = NULL; 91 *rsa = keys; 97 * Parse a PEM file which should contain RSA private keys and 109 KMF_RAW_KEY_DATA *keys; local [all...] |
/opensolaris-onvv-gate/usr/src/lib/libcurses/screen/ |
H A D | newkey.c | 61 _KEY_MAP **keys, *key_info, local 68 (((keys = (_KEY_MAP **) malloc(sizeof (_KEY_MAP *) * 77 free(keys); 87 (void) memcpy((char *) keys, (char *) prev_keys, 89 keys[*numkeys] = key_info; 93 (void) memcpy((char *) keys, (char *) prev_keys, 95 (void) memcpy((char *) &(keys[*first + 1]), 98 keys[(*first)++] = key_info; 103 cur_term->_keys = keys;
|
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_nsl_tmpl.c | 40 * keys based on the DH common key given the ALGTYPE and KEYLEN. That 51 des_block keys[], int keynum) 54 MODULUS, keys, keynum); 50 __dl_gen_common_dhkeys(char *xpublic, char *xsecret, des_block keys[], int keynum) argument
|
H A D | dh_common.h | 49 char *xmodulus, des_block keys[], int keynum);
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/XS/APItest/t/ |
H A D | hash.t | 37 my @keys = (@testkeys, $utf8_for_258); 39 foreach (@keys) { 42 main_tests (\@keys, \@testkeys, ''); 44 foreach (@keys) { 47 main_tests (\@keys, \@testkeys, ' [utf8 hash]'); 63 my ($keys, $testkeys, $description) = @_; 72 main_test_inner ($key, $lckey, $unikey, $keys, $description); 77 main_test_inner ($key, $lckey, $unikey, $keys, 83 perform_test (\&test_absent, (chr 258), $keys, ''); 85 perform_test (\&test_fetch_absent, (chr 258), $keys, ''); [all...] |
/opensolaris-onvv-gate/usr/src/lib/libnisdb/ |
H A D | db_scheme_c.x | 77 db_key_desc keys<>; 95 % } keys; 101 %/* Accessor: return number of keys in scheme. */ 102 % int numkeys() { return keys.keys_len; } 105 % db_key_desc* keyloc () { return keys.keys_val; } 109 % keys.keys_len = 0; 110 % keys.keys_val = NULL; 121 %/* Destructor: delete all keys associated with scheme and scheme itself. */
|
H A D | db_scheme.cc | 44 keys.keys_len = 0; 45 keys.keys_val = NULL; 54 numkeys = this->keys.keys_len = orig->keys.keys_len; 55 db_key_desc * descols = this->keys.keys_val = new db_key_desc[numkeys]; 56 db_key_desc * srccols = orig->keys.keys_val; 94 keys.keys_len = 0; 95 keys.keys_val = NULL; 125 keys.keys_len = count; 126 db_key_desc * scols = keys [all...] |
H A D | ldap_scheme.c | 52 if (index >= s->keys.keys_len) { 55 myself, index, s->keys.keys_len-1); 60 s->keys.keys_val[index].column_number - 1; 110 s->keys.keys_len) { 115 s->keys.keys_len-1); 119 index = s->keys.keys_val[i].column_number - 1;
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/Memoize/t/ |
H A D | tiefeatures.t | 44 print ((join '', sort keys %s) eq 'xy' ? "ok 7\n" : "not ok 7\n"); 45 print ((join '', sort keys %l) eq '' ? "ok 8\n" : "not ok 8\n"); 48 print ((join '', sort keys %s) eq 'xy' ? "ok 9\n" : "not ok 9\n"); 49 print ((join '', sort keys %l) eq 'pq' ? "ok 10\n" : "not ok 10\n");
|
/opensolaris-onvv-gate/usr/src/cmd/print/lpget/ |
H A D | lpget.c | 73 display_value(ns_printer_t *printer, char *name, char **keys) argument 80 if (keys != NULL) { 81 while (*keys != NULL) { 82 char *string = ns_get_value_string(*keys, 84 rc += display_kvp(*keys, string); 85 keys++; 120 char **keys = NULL; local 141 keys = (char **)list_append((void **)keys, 164 (*printers)->name, keys); [all...] |
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/Errno/t/ |
H A D | Errno.t | 37 $s1 = join(",",sort keys(%!)); 41 my @s1 = keys(%!); 49 print "# ",join(" ",map { "'$_'" } keys %s1),"\n"; 51 print "# ",join(" ",map { "'$_'" } keys %s2),"\n";
|
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | MICwrap.c | 44 * session keys). the message with the given qop and return 62 dh_key_set keys; local 83 /* Package the context session keys in a key_set for __make_token */ 84 keys.dh_key_set_len = cntx->no_keys; 85 keys.dh_key_set_val = cntx->keys; 100 * non serialized tok and the context keys. 102 if ((*minor = __make_token(token, message, &tok, &keys)) 132 dh_key_set keys; local 150 /* Package up the context session keys i 226 dh_key_set keys; local 317 dh_key_set keys; local [all...] |
H A D | context_establish.c | 164 dh_key_set keys; local 181 /* Package the context session keys into a key_set */ 182 keys.dh_key_set_len = ctx->no_keys; 183 keys.dh_key_set_val = ctx->keys; 186 return (__make_token(output, NULL, &token, &keys)); 251 * establish_session_keys: This routine decrypts the session keys supplied 252 * and uses those keys to verifiy the signature over the input token 257 dh_key_set_t keys, dh_signature_t sig, dh_token_t token) 267 * mechanism uses a cache of public keys, the 256 establish_session_keys(dh_context_t dhctx, const char *remote, dh_key_set_t keys, dh_signature_t sig, dh_token_t token) argument 595 dh_key_set keys, ukeys; /* encrypted and unencrypted keys */ local 804 dh_key_set keys; local [all...] |
H A D | crypto.c | 90 * of keys is odd 93 * If we have an even number of keys and additional encryption will be 104 __desN_crypt(des_block keys[], int keynum, char *buf, unsigned int len, argument 124 stat = cbc_crypt(keys[j].c, buf, len, m | flags, ivec); 138 * If we have an even number of keys then do an extra round of 142 stat = cbc_crypt(keys[0].c, buf, len, mode, ivec); 158 __dh_desN_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 166 if (keys->dh_key_set_len < 1) 180 stat = __desN_crypt(keys->dh_key_set_val, keys 194 __dh_des_crypt(gss_buffer_t buf, dh_key_set_t keys, cipher_mode_t cipher_mode) argument 228 MD5_verifier(gss_buffer_t tok, gss_buffer_t msg, cipher_proc signer, dh_key_set_t keys, dh_signature_t signature ) argument 364 __mk_sig(dh_qop_t qop, char *tok, long len, gss_buffer_t mesg, dh_key_set_t keys, dh_signature_t sig ) argument 403 __verify_sig(dh_token_t token, dh_qop_t qop, dh_key_set_t keys, dh_signature_t sig ) argument 504 __QOPSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output, int *conf_ret ) argument 557 __QOPUnSeal(dh_qop_t qop, gss_buffer_t input, int conf_req, dh_key_set_t keys, gss_buffer_t output ) argument [all...] |
H A D | crypto.h | 47 dh_key_set_t keys, cipher_mode_t mode); 49 cipher_proc signer, dh_key_set_t keys, dh_signature_t signature); 61 dh_key_set_t keys, gss_buffer_t output, int *conf_ret); 65 dh_key_set_t keys, gss_buffer_t output);
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/Text/ |
H A D | Abbrev.t | 18 my $r = join ':', sort keys %x; 40 my $s = join ':', sort keys %y; 44 $s = join ':', sort keys %$y; 50 $s = join ':', sort keys %y;
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/Hash/ |
H A D | Util.t | 108 is( keys %hash, 0, 'lock_keys() w/keyset shouldnt add new keys' ); 110 is( keys %hash, 1 ); 124 is( keys %hash, 3, 'lock_keys() w/keyset didnt add new keys' ); 168 is (scalar keys %hash, 0, "place holder isn't a key"); 170 is (scalar keys %hash, 1, "we now have a key"); 172 is (scalar keys %hash, 0, "now no key"); 177 is (scalar keys %hash, 1, "key again"); 179 is (scalar keys [all...] |
/opensolaris-onvv-gate/usr/src/cmd/krb5/kadmin/server/ |
H A D | misc.c | 43 * keepold (input) whether to preserve old keys 88 * keepold (input) whether to preserve old keys 108 krb5_keyblock **keys, int *n_keys) 118 keys, n_keys); 140 krb5_keyblock ** keys, int *n_keys) 149 return kadm5_randkey_principal(server_handle, princ, keys, n_keys); 103 randkey_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument 139 randkey_principal_wrapper(void *server_handle, krb5_principal princ, krb5_keyblock ** keys, int *n_keys) argument
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/B/t/ |
H A D | asmdata.t | 13 isnt( keys %insn_data, 0, '%insn_data exported and populated' ); 23 my $opname = (keys %insn_data)[rand @data];
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/List/Util/t/ |
H A D | tainted.t | 8 keys %Config; # Silence warning 30 my $key = (keys %ENV)[0];
|
/opensolaris-onvv-gate/usr/src/cmd/tnf/prex/ |
H A D | set.h | 64 boolean_t set_match(set_t * set_p, const char *name, const char *keys);
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/POSIX/t/ |
H A D | is.t | 66 foreach my $s (keys %classes) { 76 plan(tests => keys(%classes) * keys(%functions)); 85 foreach my $s (sort keys %classes) { 86 foreach my $f (sort keys %functions) {
|