/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_digest.c | 69 * sid: provider session id. 95 crypto_digest_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 114 KCF_WRAP_DIGEST_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, NULL, 190 * sid: provider session id. 209 crypto_digest_init_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 230 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 246 KCF_WRAP_DIGEST_OPS_PARAMS(¶ms, KCF_OP_INIT, sid,
|
H A D | kcf_keys.c | 40 crypto_key_generate(crypto_provider_t provider, crypto_session_id_t sid, argument 61 rv = KCF_PROV_KEY_GENERATE(real_provider, sid, 65 KCF_WRAP_KEY_OPS_PARAMS(¶ms, KCF_OP_KEY_GENERATE, sid, 77 crypto_key_generate_pair(crypto_provider_t provider, crypto_session_id_t sid, argument 100 rv = KCF_PROV_KEY_GENERATE_PAIR(real_provider, sid, mech, 106 sid, mech, pub_attrs, pub_count, pub_handle, pri_attrs, 118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, argument 140 rv = KCF_PROV_KEY_WRAP(real_provider, sid, mech, wrapping_key, 144 KCF_WRAP_KEY_OPS_PARAMS(¶ms, KCF_OP_KEY_WRAP, sid, mech, 157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, argument 198 crypto_key_derive(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *base_key, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *new_key, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_mac.c | 95 crypto_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 115 KCF_WRAP_MAC_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, key, 219 crypto_mac_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 239 KCF_WRAP_MAC_OPS_PARAMS(¶ms, KCF_OP_MAC_VERIFY_ATOMIC, sid, mech, 340 * sid: provider session id. 371 crypto_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 393 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 409 KCF_WRAP_MAC_OPS_PARAMS(¶ms, KCF_OP_INIT, sid, mech, key,
|
H A D | kcf_sign.c | 46 crypto_sign_init_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 74 KCF_WRAP_SIGN_OPS_PARAMS(¶ms, KCF_OP_INIT, sid, mech, 227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 247 KCF_WRAP_SIGN_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, 347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 367 KCF_WRAP_SIGN_OPS_PARAMS(¶ms, KCF_OP_SIGN_RECOVER_ATOMIC, sid, mech, 387 crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, 408 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 414 KCF_WRAP_SIGN_OPS_PARAMS(¶ms, KCF_OP_SIGN_RECOVER_INIT, sid, mec 386 crypto_sign_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_verify.c | 46 crypto_verify_init_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 74 KCF_WRAP_VERIFY_OPS_PARAMS(¶ms, KCF_OP_INIT, sid, mech, 229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 249 KCF_WRAP_VERIFY_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, 350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 370 sid, mech, key, data, signature, tmpl); 389 crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, 410 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 417 sid, mec 388 crypto_verify_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_cipher.c | 70 * sid: session id 105 crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 134 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 198 KCF_WRAP_ENCRYPT_OPS_PARAMS(¶ms, KCF_OP_INIT, sid, 202 KCF_WRAP_DECRYPT_OPS_PARAMS(¶ms, KCF_OP_INIT, sid, 289 * sid: session id 318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 339 KCF_WRAP_ENCRYPT_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, key, 430 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, argument 435 return (crypto_cipher_init_prov(pd, sid, mec 599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 712 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
/illumos-gate/usr/src/uts/common/os/ |
H A D | procset.c | 785 pid_t sid; local 804 sid = pp->p_sessp->s_sid; 806 return (sid);
|
/illumos-gate/usr/src/uts/common/syscall/ |
H A D | signotify.c | 98 u_longlong_t sid; local 110 sid = get_sigid(cp, (caddr_t)sn_id); 118 if (snqp->sn_snid == sid) { 165 ((signotifyq_t *)sqp)->sn_snid = sid; 178 sid = get_sigid(cp, (caddr_t)sn_id); 199 if (snqp->sn_snid != sid) {
|
/illumos-gate/usr/src/uts/common/io/hxge/ |
H A D | hpi_vir.c | 206 hpi_fzc_sid_set(hpi_handle_t handle, fzc_sid_t sid) argument 210 if (!LDG_VALID(sid.ldg)) { 212 " hpi_fzc_sid_set Invalid Input: ldg <0x%x>", sid.ldg)); 213 return (HPI_FAILURE | HPI_VIR_LDG_INVALID(sid.ldg)); 216 if (!SID_VECTOR_VALID(sid.vector)) { 219 sid.vector)); 221 return (HPI_FAILURE | HPI_VIR_SID_VEC_INVALID(sid.vector)); 225 sd.bits.data = sid.vector; 226 HXGE_REG_WR32(handle, SID + LDG_SID_OFFSET(sid.ldg), sd.value);
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | strlog.h | 52 short sid; member in struct:log_ctl 127 * STRLOG(mid,sid,level,flags,fmt,args) should be used for those trace
|
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/emlxs/ |
H A D | emlxs_ip.c | 188 uint32_t sid; local 231 sid = ndlp->nlp_DID; 244 sid = cmd->un.ulpWord[4] & 0x00ffffff; 271 ubp->ub_frame.s_id = sid;
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | lsalib.c | 115 lsa_lookup_sid(smb_sid_t *sid, smb_account_t *info) argument 119 if (!smb_sid_isvalid(sid)) 122 status = lsa_lookup_sid_builtin(sid, info); 124 status = smb_sam_lookup_sid(sid, info); 126 status = lsa_lookup_sid_domain(sid, info); 465 struct mslsa_sid *sid; local 480 sid = accounts.info[i].sid; 482 if (lsar_open_account(domain_handle, sid, 489 free(accounts.info[i].sid); 510 lsa_lookup_sid_builtin(smb_sid_t *sid, smb_account_t *ainfo) argument 547 lsa_lookup_sid_domain(smb_sid_t *sid, smb_account_t *ainfo) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_nt_transact_security.c | 285 smb_encode_sid(mbuf_chain_t *mbc, smb_sid_t *sid) argument 290 sid->sid_revision, sid->sid_subauthcnt); 294 sid->sid_authority[i]); 297 for (i = 0; i < sid->sid_subauthcnt; i++) { 299 sid->sid_subauth[i]); 450 smb_sid_t *sid; local 468 sid = kmem_alloc(sidlen, KM_SLEEP); 470 sid->sid_revision = revision; 471 sid [all...] |
H A D | smb_sd.c | 197 smb_sid_t *sid; local 222 sid = sd->sd_owner; 223 if (!smb_sid_isvalid(sid)) 227 idm_stat = smb_idmap_getid(sid, &fs_sd->sd_uid, &idtype); 235 sid = sd->sd_group; 236 if (!smb_sid_isvalid(sid)) 240 idm_stat = smb_idmap_getid(sid, &fs_sd->sd_gid, &idtype); 288 smb_sid_t *sid; local 299 SMB_IDMAP_USER, &sid); 306 sd->sd_owner = sid; [all...] |
/illumos-gate/usr/src/cmd/smbsrv/smbd/ |
H A D | smbd_logon.c | 95 char *sid; local 117 sid = NT_NULL_SIDSTR; 126 sid = sidbuf; 170 event->adt_smbd_session.sid = sid;
|
/illumos-gate/usr/src/common/smbsrv/ |
H A D | smb_sid.c | 47 smb_sid_isvalid(smb_sid_t *sid) argument 49 if (sid == NULL) 52 return ((sid->sid_revision == NT_SID_REVISION) && 53 (sid->sid_subauthcnt < NT_SID_SUBAUTH_MAX)); 59 * Returns the number of bytes required to hold the sid. 62 smb_sid_len(smb_sid_t *sid) argument 64 if (sid == NULL) 68 + (sid->sid_subauthcnt * sizeof (uint32_t))); 74 * Make a duplicate of the specified sid. The memory for the new sid 79 smb_sid_dup(smb_sid_t *sid) argument 106 smb_sid_t *sid; local 132 smb_sid_getrid(smb_sid_t *sid, uint32_t *rid) argument 151 smb_sid_split(smb_sid_t *sid, uint32_t *rid) argument 245 smb_sid_indomain(smb_sid_t *domain_sid, smb_sid_t *sid) argument 274 smb_sid_tostr(const smb_sid_t *sid, char *strsid) argument 319 smb_sid_t *sid; local 367 smb_sid_t *sid; local 440 smb_sid_t *sid; local 450 smb_sid_free(smb_sid_t *sid) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_acl.c | 385 smb_ace_wellknown_update(const char *sid, ace_t *zace) argument 388 char *sid; member in struct:__anon4366 400 if (strcmp(sid, map[i].sid) == 0) {
|
H A D | smb_sd.c | 282 smb_sid_t *sid; local 307 sid = sd->sd_owner; 308 if (!smb_sid_isvalid(sid)) 312 idm_stat = smb_idmap_getid(sid, &fs_sd->sd_uid, &idtype); 320 sid = sd->sd_group; 321 if (!smb_sid_isvalid(sid)) 325 idm_stat = smb_idmap_getid(sid, &fs_sd->sd_gid, &idtype); 373 smb_sid_t *sid; local 384 SMB_IDMAP_USER, &sid); 391 sd->sd_owner = sid; [all...] |
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_tape.c | 115 int sid, lun; local 137 sid = lun = -1; 141 scsi_find_sid_lun(sa, request->device.name, &sid, &lun); 142 if (ndmp_open_list_find(request->device.name, sid, lun) == 0 && 161 switch (ndmp_open_list_add(connection, adptnm, sid, lun, devid)) { 187 (void) ndmp_open_list_del(adptnm, sid, lun); 212 (void) ndmp_open_list_del(adptnm, sid, lun); 218 session->ns_tape.td_sid = sid; 1208 int sid, lun; local 1224 sid [all...] |
/illumos-gate/usr/src/cmd/sendmail/libsm/ |
H A D | ldap.c | 1167 int sid; local 1182 sid = ldap_search(lmap->ldap_ld, 1193 sid = ldap_search(lmap->ldap_ld, 1204 sid = ldap_url_parse(rl->lr_search, 1207 if (sid != 0) 1209 errno = sid + E_LDAPURLBASE; 1260 sid = ldap_search(lmap->ldap_ld, 1278 if (sid == -1) 1303 status = sm_ldap_results(lmap, sid, newflags, delim,
|
/illumos-gate/usr/src/cmd/idmap/idmapd/ |
H A D | directory_provider_nsswitch.c | 443 sid_t *sid; local 453 sid = sid_fromstr(buf); 454 if (sid == NULL) 457 sid_to_le(sid); 459 de = bin_list_dav(lvals, sid, 1, sid_len(sid)); 460 sid_free(sid);
|
/illumos-gate/usr/src/cmd/svc/startd/ |
H A D | protocol.c | 331 char *delegate_channel_name, *master_channel_name, *sid; local 350 (sid = strdup("svc.startd")) == NULL) { 380 if ((r = sysevent_evc_subscribe(master_channel, sid, EC_ALL, 392 "subscriber id %s : \n", fmri, master_channel_name, sid); 413 free(sid);
|
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_netlogon.c | 83 smb_sid_t *sid = NULL; local 96 if ((sid = smb_sid_fromstr(di.di_sid)) != NULL) 102 domain, sid); 106 smb_sid_free(sid); 339 * DWORD DomainSidSize; # domain sid length in bytes 340 * BYTE *DomainSid; # domain sid
|
/illumos-gate/usr/src/uts/sun4u/io/pci/ |
H A D | pci_ecc.c | 706 char sid[DIMM_SERIAL_ID_LEN] = ""; local 711 ret = cpu_get_mem_sid(ecc_err->ecc_unum, sid, 721 (ret == 0) ? sid : NULL, offset);
|
/illumos-gate/usr/src/uts/sun4u/os/ |
H A D | plat_ecc_dimm.c | 92 plat_get_mem_addr(char *unum, char *sid, uint64_t offset, uint64_t *addrp) argument 107 return (p2get_mem_addr(mcid, sid, offset, addrp));
|