Searched defs:key (Results 401 - 425 of 889) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/tools/ctf/cvt/
H A Dhash.c106 hash_add(hash_t *hash, void *key) argument
108 int bucket = hash->h_hashfn(hash->h_nbuckets, key);
110 list_add(&hash->h_buckets[bucket], key);
133 hash_remove(hash_t *hash, void *key) argument
135 int bucket = hash->h_hashfn(hash->h_nbuckets, key);
137 (void) list_remove(&hash->h_buckets[bucket], key,
142 hash_match(hash_t *hash, void *key, int (*fun)(void *, void *), argument
145 int bucket = hash->h_hashfn(hash->h_nbuckets, key);
166 hash_find_iter(hash_t *hash, void *key, int (*fun)(void *, void *), argument
169 int bucket = hash->h_hashfn(hash->h_nbuckets, key);
194 hash_find(hash_t *hash, void *key, void **value) argument
[all...]
/illumos-gate/usr/src/tools/protocmp/
H A Dprotodir.c263 elem key; local
299 * we build a key.
303 (void) strcpy(key.name, src);
304 key.arch = e->arch;
305 if ((p = find_elem(list, &key, NO_FOLLOW_LINK)) == NULL) {
/illumos-gate/usr/src/ucblib/libdbm/
H A Ddbm.c128 forder(datum key) argument
132 hash = calchash(key);
143 fetch(datum key) argument
148 dbm_access(calchash(key));
153 if (cmpdatum(key, item) == 0) {
163 delete(datum key) argument
170 dbm_access(calchash(key));
175 if (cmpdatum(key, item) == 0) {
187 store(datum key, datum dat) argument
201 dbm_access(calchash(key));
276 nextkey(datum key) argument
[all...]
/illumos-gate/usr/src/uts/common/avs/ns/sdbc/
H A Dsafestore_ram.c205 ss_ram_getvdir(const ss_vdirkey_t *key, ss_vdir_t *vdir) argument
210 if ((key == NULL) || (vdir == NULL))
213 switch (key->vk_type) {
326 ss_ram_getcdir(const ss_cdirkey_t *key, ss_cdir_t *cdir) argument
331 if ((key == NULL) || (cdir == NULL))
334 switch (key->ck_type) {
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_cipher.c59 * CRYPTO_INVALID_KEY: bogus 'key' argument.
76 * key: pointer to a crypto_key_t structure.
78 * encryption or decryption with the 'mech' using 'key'.
90 * When possible and applicable, will internally use the pre-expanded key
106 crypto_mechanism_t *mech, crypto_key_t *key,
120 error = kcf_get_hardware_provider(mech->cm_type, key,
124 error = kcf_get_hardware_provider(mech->cm_type, key,
149 &lmech, key, tmpl, KCF_SWFP_RHNDL(crq));
154 &lmech, key, tmpl, KCF_SWFP_RHNDL(crq));
163 key
105 crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument
229 crypto_cipher_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument
318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument
430 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
445 crypto_encrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument
712 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
727 crypto_decrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
/illumos-gate/usr/src/uts/common/crypto/core/
H A Dkcf_prov_lib.c283 crypto_key_t *key; local
297 key = kmem_alloc(len, kmflag);
298 if (key == NULL)
300 k_attrs = (crypto_object_attribute_t *)(void *)((caddr_t)key +
314 key->ck_format = CRYPTO_KEY_ATTR_LIST;
315 key->ck_count = count;
316 key->ck_attrs = k_attrs;
317 *out_key = key;
540 * in the key.
543 crypto_get_key_attr(crypto_key_t *key, crypto_attr_type_ argument
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Darcfour.c201 crypto_key_t *key, crypto_spi_ctx_template_t template,
209 if (key->ck_format != CRYPTO_KEY_RAW)
212 if (key->ck_length < ARCFOUR_MIN_KEY_BITS ||
213 key->ck_length > ARCFOUR_MAX_KEY_BITS) {
218 * Allocate an RC4 key stream.
224 arcfour_key_init(keystream, key->ck_data,
225 CRYPTO_BITS2BYTES(key->ck_length));
253 ARCFour_key *key; local
259 key = ctx->cc_opstate;
261 key
200 rc4_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
496 rc4_crypt_atomic(crypto_provider_handle_t handle, crypto_session_id_t session, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
535 crypto_arcfour_crypt(ARCFour_key *key, uchar_t *in, crypto_data_t *out, int length) argument
[all...]
H A Dblowfish.c238 * Initialize key schedules for blowfish
241 init_keysched(crypto_key_t *key, void *keysched) argument
246 switch (key->ck_format) {
248 if (key->ck_length < BLOWFISH_MINBITS ||
249 key->ck_length > BLOWFISH_MAXBITS) {
257 blowfish_init_keysched(key->ck_data, key->ck_length, keysched);
276 crypto_key_t *key, crypto_spi_ctx_template_t template,
286 if (key->ck_format != CRYPTO_KEY_RAW) {
310 key, kmfla
275 blowfish_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
594 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
681 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
771 blowfish_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument
826 blowfish_common_init_ctx(blowfish_ctx_t *blowfish_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument
[all...]
H A Ddca_3des.c316 crypto_key_t *key, crypto_data_t *input, crypto_data_t *output,
338 rv = dca_3desctxinit(&ctx, mechanism, key, kmflag, mode);
657 crypto_key_t *key, int kmflag, int flags)
713 if (key->ck_format != CRYPTO_KEY_RAW) {
715 "dca_3desctxinit: only raw crypto key type support with DES/3DES");
720 len = key->ck_length;
721 value = (uchar_t *)key->ck_data;
728 des_ctx->dr_ctx.key[i] = 0;
730 des_ctx->dr_ctx.key[i] <<= 8;
731 des_ctx->dr_ctx.key[
314 dca_3desatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument
656 dca_3desctxinit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, int flags) argument
[all...]
/illumos-gate/usr/src/uts/common/io/aggr/
H A Daggr_ctl.c141 aggr_ioc_info_new_grp(void *arg, datalink_id_t linkid, uint32_t key, argument
152 grp.lg_key = key;
/illumos-gate/usr/src/uts/common/io/drm/
H A Ddrm_agpsupport.c54 * to the key to get a handle.
321 uint_t key; local
332 key = (uintptr_t)entry->handle - DRM_AGP_KEY_OFFSET;
334 if (drm_agp_bind_memory(key, start, dev)) {
335 DRM_ERROR("drm_agp_bind: failed key=%x, start=0x%x, "
336 "agp_base=0x%lx", key, start, dev->agp->base);
456 drm_agp_bind_memory(unsigned int key, uint32_t start, drm_device_t *dev) argument
462 bind.agpb_key = key;
H A Ddrm_gem.c96 int key; local
98 key = obj->name % DRM_GEM_OBJIDR_HASHNODE;
99 list_add(entry, &head->next[key], NULL);
111 int key; local
112 key = name % DRM_GEM_OBJIDR_HASHNODE;
114 list_for_each(entry, &head->next[key]) {
126 int key; local
127 key = name % DRM_GEM_OBJIDR_HASHNODE;
128 list_for_each_safe(entry, temp, &head->next[key]) {
143 for (int key
[all...]
/illumos-gate/usr/src/lib/udapl/udapl_tavor/common/
H A Ddapl_hash.c57 DAPL_HASH_KEY key; member in struct:DAPL_HASH_ELEM
97 #define DAPL_DOHASH(key, hashsize) ((uint64_t)((key) % (hashsize)))
110 } else if (element->key == (DAPL_HASH_KEY) (in_key)) { \
131 * Rehash the key (used by add and lookup functions)
133 * Inputs: element element to rehash key
134 * key, datum datum for key head
140 DAPL_HASH_KEY key,
158 if (element->key
138 dapli_hash_rehash( DAPL_HASH_ELEM *element, DAPL_HASH_KEY key, void **datum, DAPL_HASH_ELEM ** head) argument
178 dapli_hash_add( DAPL_HASH_TABLEP p_table, DAPL_HASH_KEY key, void *datum, DAT_BOOLEAN allow_dup, DAT_BOOLEAN *report_dup) argument
288 dapl_hash_delete_element(DAPL_HASH_ELEM * element, DAPL_HASH_KEY key, DAPL_HASH_DATA *p_datum) argument
440 dapls_hash_insert( IN DAPL_HASH_TABLE *p_table, IN DAPL_HASH_KEY key, IN DAPL_HASH_DATA data) argument
474 dapls_hash_search( IN DAPL_HASH_TABLE *p_table, IN DAPL_HASH_KEY key, OUT DAPL_HASH_DATA *p_data) argument
506 dapls_hash_remove( IN DAPL_HASH_TABLE *p_table, IN DAPL_HASH_KEY key, OUT DAPL_HASH_DATA *p_data) argument
[all...]
/illumos-gate/usr/src/lib/udapl/udapl_tavor/tavor/
H A Ddapl_tavor_ibtf_qp.c801 DAPL_HASH_KEY key; local
806 key = qp_num;
808 "srq_insert_ep:%p %p %llx\n", srq_ptr, htable, key);
809 return (dapls_hash_insert(htable, key, ep_ptr));
819 DAPL_HASH_KEY key; local
826 key = qp_num;
828 retval = dapls_hash_remove(htable, key, (DAPL_HASH_DATA *)&epp);
831 "srq_remove_ep(%d): %p %llx\n", retval, htable, key);
842 DAPL_HASH_KEY key; local
849 key
[all...]
/illumos-gate/usr/src/test/libc-tests/tests/random/
H A Dchacha_tv.c17 * Test chacha20 key stream with known TVs.
277 chacha_test(uint8_t *key, uint8_t keylen, uint8_t *iv, uint8_t *bl0, argument
287 chacha_keysetup(&ctx, key, keylen * 8, 0);
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/
H A Discsit_authclient.h65 auth_key_t key[AUTH_KEY_TYPE_MAX]; member in struct:iscsit_auth_key_block
/illumos-gate/usr/src/uts/common/os/
H A Dspace.c261 uint_t kcpc_key; /* TSD key for CPU performance counter context */
264 * storing and retrieving data by string key
286 space_store(char *key, uintptr_t ptr) argument
293 if (key == NULL) {
296 l = (size_t)strlen(key);
306 bcopy(key, s, l);
316 cmn_err(CE_WARN, "space_store: duplicate key %s", key);
320 cmn_err(CE_WARN, "space_store: no mem for key %s", key);
339 space_fetch(char *key) argument
356 space_free(char *key) argument
[all...]
/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dkey_call.c41 * key_encryptsession(agent, deskey, cr)-encrypt a session key to talk to agent
43 * key_gendes(deskey) - generate a secure des key
120 RPCLOG(1, "key status %d\n", res.status);
150 RPCLOG(1, "key status %d\n", res.status);
158 key_gendes(des_block *key) argument
161 return (key_call(KEY_GEN, xdr_void, NULL, xdr_des_block, (char *)key,
194 RPCLOG(1, "key status %d\n", kres.status);
218 RPCLOG(1, "key status %d\n", res.status);
311 RPCLOG(8, "key call: (%d) ok\n", procn);
/illumos-gate/usr/src/uts/common/io/ib/clients/rdsv3/
H A Drdma.c85 rdsv3_mr_tree_walk(struct avl_tree *root, uint32_t key, argument
91 mr = avl_find(root, &key, &where);
112 "RDS: destroy mr key is %x refcnt %u",
244 "RDS: get_mr mr 0x%p addr 0x%llx key 0x%x",
/illumos-gate/usr/src/uts/common/io/scsi/adapters/pmcs/
H A Dpmcs_sata.c68 uint8_t key = 0x05; /* illegal command */ local
477 key = 0x6;
490 rp[2] = key;
/illumos-gate/usr/src/uts/common/io/xge/hal/xgehal/
H A Dxgehal-mgmtaux.c29 #define __hal_aux_snprintf(retbuf, bufsize, fmt, key, value, retsize) \
31 retsize = xge_os_snprintf(retbuf, bufsize, fmt, key, \
35 #define __hal_aux_snprintf(retbuf, bufsize, fmt, key, value, retsize) \
37 retsize = xge_os_sprintf(retbuf, fmt, key, XGE_HAL_AUX_SEPA, value); \
47 #define __HAL_AUX_ENTRY(key, value, fmt) \
49 __hal_aux_snprintf(ptr, leftsize, "%s%c"fmt"\n", key, value, entrysize)
891 char key[XGE_OS_SPRINTF_STRLEN]; local
959 (void) xge_os_snprintf(key, sizeof(key), "ring%d_", channel->post_qid);
961 dest_addr = key
1171 char key[XGE_OS_SPRINTF_STRLEN]; local
1269 char key[XGE_OS_SPRINTF_STRLEN]; local
1569 char key[XGE_OS_SPRINTF_STRLEN]; local
[all...]
/illumos-gate/usr/src/uts/common/ipp/ipgpc/
H A Dclassifier.c366 int i, key; local
376 if (fid_table[i].key == 0) {
387 if ((key = item->key) == 0) {
390 if (ipgpc_fid_list[key].info <= 0) {
406 if (((~bestmask) & ipgpc_fid_list[key].insert_map)
416 if (item->match_map != ipgpc_fid_list[key].insert_map) {
423 ipgpc_fid_list[key].filter.priority;
425 ipgpc_fid_list[key].filter.precedence;
428 bestmatch = key;
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.h59 EVP_PKEY *key; member in struct:_pkinit_cred_info
/illumos-gate/usr/src/lib/libadm/common/
H A Ddevreserv.c72 * struct devlks Structure that defines locking information (key
487 * int appendlk(key, alias)
488 * int key
494 * key Key the device is being locked on
508 int key, /* Lock key */
515 lk.lk_key = key;
622 * int putlocks(newlist, key)
624 * int key
631 * key Th
507 appendlk( int key, char *alias) argument
643 putlocks( char **newlist, int key) argument
798 unreserv(int key, char *device) argument
901 devreserv( int key, char **rsvlst[]) argument
1034 devfree( int key, char *device) argument
[all...]
/illumos-gate/usr/src/lib/libast/common/vmalloc/
H A Dvmmopen.c63 int key; /* identifying key */ member in struct:_user_s
291 Void_t* vmmset(Vmalloc_t* vm, int key, Void_t* data, int set) argument
293 Void_t* vmmset(vm, data, key, set)
295 int key; /* key of data to be set */
304 if(u->key == key)
317 u->key = key;
[all...]

Completed in 136 milliseconds

<<11121314151617181920>>