/illumos-gate/usr/src/common/net/wanboot/ |
H A D | bootconf.c | 88 * B_FALSE - error (return code in handle->bc_error_code, line number 89 * on which the error occurred in handle->bc_error_pos) 92 parse_bootconf(bc_handle_t *handle, const char *bootconf) argument 99 handle->bc_error_code = BC_E_ACCESS; 104 handle->bc_error_code = BC_E_NVLIST; 114 ++(handle->bc_error_pos); 120 handle->bc_error_code = BC_E_IOERR; 123 handle->bc_error_code = BC_E_TOO_LONG; 158 handle->bc_error_code = BC_E_SYNTAX; 199 handle 276 valid_encryption(bc_handle_t *handle, boolean_t *is_encrypted) argument 311 valid_signature(bc_handle_t *handle, boolean_t *is_signed) argument 346 valid_client_authentication(bc_handle_t *handle, boolean_t *is_authenticated) argument 380 valid_server_authentication(bc_handle_t *handle, boolean_t *is_authenticated) argument 414 valid_root_server(bc_handle_t *handle, boolean_t *is_https) argument 460 valid_boot_logger(bc_handle_t *handle, boolean_t *is_https) argument 495 validate_bootconf(bc_handle_t *handle) argument 560 bootconf_end(bc_handle_t *handle) argument 573 bootconf_init(bc_handle_t *handle, const char *bootconf) argument 612 bootconf_get(bc_handle_t *handle, const char *name) argument [all...] |
/illumos-gate/usr/src/lib/abi/apptrace/common/ |
H A D | abienv.c | 143 void *handle; local 157 if ((handle = dlopen(name, RTLD_LAZY)) == NULL) { 175 lp->l_handle = handle;
|
/illumos-gate/usr/src/lib/cfgadm_plugins/fp/common/ |
H A D | cfga_fp.c | 55 HBA_HANDLE handle; local 137 &handle, &portIndex, &portAttrs, errstring)) == 140 flags, errstring, handle, portAttrs); 141 HBA_CloseAdapter(handle);
|
/illumos-gate/usr/src/cmd/picl/plugins/sun4u/cherrystone/psvcplugin/ |
H A D | psvcplugin.c | 67 extern struct handle { struct
|
/illumos-gate/usr/src/cmd/picl/plugins/sun4u/littleneck/psvcplugin/ |
H A D | psvcplugin.c | 64 extern struct handle { struct
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/ickey/ |
H A D | ickey.c | 51 * The key's handle is the name by which a user knows the key (i.e. the 57 const char *handle; member in struct:keylist 147 if (strcmp(keylist[i].handle, type) == 0) 251 gettext("Enter %s key: "), k->handle); 284 (void) fprintf(stderr, "%s ", keylist[i].handle);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | driver_wifi.c | 39 wpa_driver_wifi_get_bssid(dladm_handle_t handle, datalink_id_t linkid, argument 46 status = dladm_wlan_get_linkattr(handle, linkid, &attr); 74 wpa_driver_wifi_get_ssid(dladm_handle_t handle, datalink_id_t linkid, argument 82 status = dladm_wlan_get_linkattr(handle, linkid, &attr); 101 wpa_driver_wifi_set_wpa_ie(dladm_handle_t handle, datalink_id_t linkid, argument 107 status = dladm_wlan_wpa_set_ie(handle, linkid, wpa_ie, wpa_ie_len); 126 wpa_driver_wifi_set_wpa(dladm_handle_t handle, datalink_id_t linkid, argument 133 if (!enabled && wpa_driver_wifi_set_wpa_ie(handle, linkid, NULL, 0) < 0) 136 status = dladm_wlan_wpa_set_wpa(handle, linkid, enabled); 142 wpa_driver_wifi_del_key(dladm_handle_t handle, datalink_id_ argument 191 wpa_driver_wifi_set_key(dladm_handle_t handle, datalink_id_t linkid, wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx, uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len) argument 250 wpa_driver_wifi_disassociate(dladm_handle_t handle, datalink_id_t linkid, int reason_code) argument 283 wpa_driver_wifi_associate(dladm_handle_t handle, datalink_id_t linkid, const char *bssid, uint8_t *wpa_ie, uint32_t wpa_ie_len) argument 318 wpa_driver_wifi_scan(dladm_handle_t handle, datalink_id_t linkid) argument 350 wpa_driver_wifi_get_scan_results(dladm_handle_t handle, datalink_id_t linkid, dladm_wlan_ess_t *results, uint32_t max_size) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | 6to4relay.c | 49 static dladm_handle_t handle; variable 72 status = dladm_iptun_get6to4relay(handle, &rr_addr); 187 if ((status = dladm_open(&handle)) != DLADM_STATUS_OK) { 189 "dladm handle: %s\n"), dladm_status2str(status, errstr)); 249 status = dladm_iptun_get6to4relay(handle, ¤t_addr); 260 status = dladm_iptun_set6to4relay(handle, &new_addr); 289 status = dladm_iptun_get6to4relay(handle, &rr_addr); 307 status = dladm_iptun_set6to4relay(handle, &rr_addr);
|
H A D | if_mpadm.c | 77 ipmp_handle_t handle; local 116 if ((retval = ipmp_open(&handle)) != IPMP_SUCCESS) 117 die("cannot create ipmp handle: %s\n", ipmp_errmsg(retval)); 119 (*ofuncp)(ifname, handle); 121 ipmp_close(handle); 148 do_offline(const char *ifname, ipmp_handle_t handle) argument 156 if ((retval = ipmp_offline(handle, ifname, 1)) != IPMP_SUCCESS) 179 undo_offline(const char *ifname, ipmp_handle_t handle) argument 206 if ((retval = ipmp_undo_offline(handle, ifname)) != IPMP_SUCCESS) {
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ |
H A D | ksslcfg_delete.c | 109 scf_handle_t *handle; local 113 handle = scf_handle_create(SCF_VERSION); 114 if (handle == NULL) { 122 if (scf_handle_bind(handle) == -1) { 130 if ((scope = scf_scope_create(handle)) == NULL) { 138 if ((svc = scf_service_create(handle)) == NULL) { 146 if (scf_handle_get_scope(handle, SCF_SCOPE_LOCAL, scope) == -1) { 168 instance = scf_instance_create(handle); 228 if (scf_walk_fmri(handle, 1, (char **)&SERVICE_NAME, 251 (void) scf_handle_unbind(handle); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_rpcsec.c | 88 char *handle, *line; local 122 handle = getxdr_hex(handle_len); 124 sprintf(line, " handle: length = %d, data = [%s]", 125 handle_len, handle); 313 /* skip the handle */ 366 char *handle, *token, *line; local 379 handle = getxdr_hex(handle_len); 381 sprintf(line, " handle: length = %d, data = [%s]", 382 handle_len, handle);
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | setpin.c | 43 setpin_nss(KMF_HANDLE_T handle, argument 55 rv = configure_nss(handle, dir, prefix); 102 rv = kmf_set_token_pin(handle, numattrs, setpinattrs); 113 setpin_pkcs11(KMF_HANDLE_T handle, char *token_spec, boolean_t souser) argument 219 rv = kmf_set_token_pin(handle, numattr, attrlist); 245 KMF_HANDLE_T handle; local 296 if ((rv = kmf_initialize(&handle, NULL, NULL)) != KMF_OK) 310 rv = setpin_pkcs11(handle, token_spec, souser); 313 rv = setpin_nss(handle, token_spec, dir, prefix); 321 (void) kmf_finalize(handle); [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | main.c | 208 set_object_policy(TSS_HOBJECT handle, TSS_FLAG mode, char *prompt, argument 214 ret = Tspi_GetPolicyObject(handle, TSS_POLICY_USAGE, &hPolicy);
|
/illumos-gate/usr/src/cmd/fs.d/udfs/fstyp/ |
H A D | fstyp.c | 60 int fstyp_mod_init(int fd, off_t offset, fstyp_mod_handle_t *handle); 61 void fstyp_mod_fini(fstyp_mod_handle_t handle); 62 int fstyp_mod_ident(fstyp_mod_handle_t handle); 63 int fstyp_mod_get_attr(fstyp_mod_handle_t handle, nvlist_t **attrp); 64 int fstyp_mod_dump(fstyp_mod_handle_t handle, FILE *fout, FILE *ferr); 68 fstyp_mod_init(int fd, off_t offset, fstyp_mod_handle_t *handle) argument 70 fstyp_udfs_t *h = (fstyp_udfs_t *)handle; 86 *handle = (fstyp_mod_handle_t)h; 91 fstyp_mod_fini(fstyp_mod_handle_t handle) argument 93 fstyp_udfs_t *h = (fstyp_udfs_t *)handle; 104 fstyp_mod_ident(fstyp_mod_handle_t handle) argument 112 fstyp_mod_get_attr(fstyp_mod_handle_t handle, nvlist_t **attrp) argument 133 fstyp_mod_dump(fstyp_mod_handle_t handle, FILE *fout, FILE *ferr) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kadm5_create.c | 55 add_admin_old_princ(void *handle, krb5_context context, 58 add_admin_sname_princ(void *handle, krb5_context context, 61 add_admin_princ(void *handle, krb5_context context, 64 static int add_admin_princs(void *handle, krb5_context context, char *realm); 119 void *handle; local 128 &handle))) { 133 retval = add_admin_princs(handle, context, params->realm); 135 kadm5_destroy(handle); 188 static int add_admin_princs(void *handle, krb5_context context, char *realm) argument 201 if ((ret = add_admin_old_princ(handle, contex 267 add_admin_princ(void *handle, krb5_context context, krb5_principal principal, int attrs, int lifetime) argument 380 add_admin_old_princ(void *handle, krb5_context context, char *name, char *realm, int attrs, int lifetime) argument 397 add_admin_sname_princ(void *handle, krb5_context context, char *sname, int attrs, int lifetime) argument [all...] |
/illumos-gate/usr/src/cmd/sh/ |
H A D | fault.c | 169 handle(i, sigval[i]); 215 handle(sig, SIG_DFL); 245 handle(sig, func) function 311 handle(i, sigval[i]); 315 * handle all the realtime signals 319 handle(i, done); 413 handle(sig, fault); 417 } else if (handle(sig, SIG_IGN)) {
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_keys.c | 42 crypto_object_id_t *handle, crypto_call_req_t *crq) 62 mech, attrs, count, handle, KCF_SWFP_RHNDL(crq)); 66 mech, attrs, count, handle, NULL, 0, NULL, NULL, NULL, 0); 40 crypto_key_generate(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *handle, crypto_call_req_t *crq) argument
|
/illumos-gate/usr/src/uts/common/inet/ipnet/ |
H A D | ipnet_bpf.c | 208 ipnet_bpf_getzone(uintptr_t handle, zoneid_t *zip) argument 212 ipnetif = (ipnetif_t *)handle; 219 ipnet_bpf_getdlt(uintptr_t handle, uint_t *dlp) argument
|
/illumos-gate/usr/src/lib/sun_sas/common/ |
H A D | Sun_sasScsiInquiry.c | 69 Sun_sasScsiInquiry(HBA_HANDLE handle, HBA_WWN portWWN, HBA_WWN targetPortWWN, argument 111 index = RetrieveIndex(handle); 114 log(LOG_DEBUG, ROUTINE, "Invalid handle %08lx", handle); 136 "HBA handle had NULL device path. \ 203 "%016llx on handle %08lx is not a Target", 204 wwnConversion(targetPortWWN.wwn), handle); 243 " %08lx for target %016llx on handle %08lx", 244 hba_lun, wwnConversion(targetPortWWN.wwn), handle); 251 "Port WWN %016llx on handle [all...] |
H A D | Sun_sasScsiReadCapacity.c | 66 Sun_sasScsiReadCapacity(HBA_HANDLE handle, HBA_WWN portWWN, argument 107 index = RetrieveIndex(handle); 110 log(LOG_DEBUG, ROUTINE, "Invalid handle %08lx", handle); 191 "%016llx on handle %08lx is not a Target", 192 wwnConversion(targetPortWWN.wwn), handle); 230 " %08lx for target %016llx on handle %08lx", 231 hba_lun, wwnConversion(targetPortWWN.wwn), handle); 239 "Port WWN %016llx on handle %08lx", 240 wwnConversion(targetPortWWN.wwn), handle); [all...] |
H A D | Sun_sasSendSMPPassThru.c | 86 Sun_sasSendSMPPassThru(HBA_HANDLE handle, HBA_WWN hbaPortWWN, argument 116 if ((hba_ptr = Retrieve_Sun_sasHandle(handle)) == NULL) { 117 log(LOG_DEBUG, ROUTINE, "Invalid handle %08lx", handle); 138 "HBA handle had NULL device path.\ 239 "handle %08lx", wwnConversion(hbaPortWWN.wwn), handle); 242 " domainPortWWN %016llx on handle %08lx", 243 wwnConversion(domainPortWWN.wwn), handle);
|
H A D | sun_sas.c | 32 * creates a handle each time Sun_sas_OpenAdapter() is called. 35 * open. This prevents a user from using an old handle that corresponds to 79 new_open_handle->handle = new_handle_index; 83 /* add new open handle struct to the open_handles list */ 101 * given a handle, returns the adapterIndex number. 103 * This functions checkes to see if the given handle corresponds to an open 107 RetrieveIndex(HBA_HANDLE handle) argument 114 open_handle_ptr = RetrieveOpenHandle(handle); 124 * Given a handle, returns the open_handle structure 129 RetrieveOpenHandle(HBA_HANDLE handle) argument 208 Retrieve_Sun_sasHandle(HBA_HANDLE handle) argument 316 getFirstAdapterPortWWN(HBA_HANDLE handle) argument [all...] |
/illumos-gate/usr/src/uts/common/io/bpf/ |
H A D | bpf_mac.c | 172 mac_bpf_getzone(uintptr_t handle, zoneid_t *zip) argument 177 mac_perim_enter_by_mh((mac_handle_t)handle, &mph); 178 error = dls_link_getzid(mac_name((mac_handle_t)handle), zip); 184 mac_bpf_getdlt(uintptr_t handle, uint_t *dltp) argument 186 *dltp = mac_nativetype((mac_handle_t)handle);
|
H A D | bpf_mod.c | 341 uintptr_t handle; local 345 handle = 0; 346 if (bp->bpl_what->bpr_open(name, &handle, zone) == 0) { 347 bp->bpl_what->bpr_close(handle); 361 if (bp->bpl_what->bpr_open(name, &handle, 363 bp->bpl_what->bpr_close(handle);
|
/illumos-gate/usr/src/uts/common/xen/public/io/ |
H A D | blkif.h | 104 blkif_vdev_t handle; /* only for read/write requests */ member in struct:blkif_request
|