/illumos-gate/usr/src/tools/ctf/cvt/ |
H A D | hash.c | 106 hash_add(hash_t *hash, void *key) argument 108 int bucket = hash->h_hashfn(hash->h_nbuckets, key); 110 list_add(&hash->h_buckets[bucket], key); 133 hash_remove(hash_t *hash, void *key) argument 135 int bucket = hash->h_hashfn(hash->h_nbuckets, key); 137 (void) list_remove(&hash->h_buckets[bucket], key, 142 hash_match(hash_t *hash, void *key, int (*fun)(void *, void *), argument 145 int bucket = hash->h_hashfn(hash->h_nbuckets, key); 166 hash_find_iter(hash_t *hash, void *key, int (*fun)(void *, void *), argument 169 int bucket = hash->h_hashfn(hash->h_nbuckets, key); 194 hash_find(hash_t *hash, void *key, void **value) argument [all...] |
/illumos-gate/usr/src/tools/protocmp/ |
H A D | protodir.c | 263 elem key; local 299 * we build a key. 303 (void) strcpy(key.name, src); 304 key.arch = e->arch; 305 if ((p = find_elem(list, &key, NO_FOLLOW_LINK)) == NULL) {
|
/illumos-gate/usr/src/ucblib/libdbm/ |
H A D | dbm.c | 128 forder(datum key) argument 132 hash = calchash(key); 143 fetch(datum key) argument 148 dbm_access(calchash(key)); 153 if (cmpdatum(key, item) == 0) { 163 delete(datum key) argument 170 dbm_access(calchash(key)); 175 if (cmpdatum(key, item) == 0) { 187 store(datum key, datum dat) argument 201 dbm_access(calchash(key)); 276 nextkey(datum key) argument [all...] |
/illumos-gate/usr/src/uts/common/avs/ns/sdbc/ |
H A D | safestore_ram.c | 205 ss_ram_getvdir(const ss_vdirkey_t *key, ss_vdir_t *vdir) argument 210 if ((key == NULL) || (vdir == NULL)) 213 switch (key->vk_type) { 326 ss_ram_getcdir(const ss_cdirkey_t *key, ss_cdir_t *cdir) argument 331 if ((key == NULL) || (cdir == NULL)) 334 switch (key->ck_type) {
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_cipher.c | 59 * CRYPTO_INVALID_KEY: bogus 'key' argument. 76 * key: pointer to a crypto_key_t structure. 78 * encryption or decryption with the 'mech' using 'key'. 90 * When possible and applicable, will internally use the pre-expanded key 106 crypto_mechanism_t *mech, crypto_key_t *key, 120 error = kcf_get_hardware_provider(mech->cm_type, key, 124 error = kcf_get_hardware_provider(mech->cm_type, key, 149 &lmech, key, tmpl, KCF_SWFP_RHNDL(crq)); 154 &lmech, key, tmpl, KCF_SWFP_RHNDL(crq)); 163 key 105 crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument 229 crypto_cipher_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq, crypto_func_group_t func) argument 318 crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 354 crypto_encrypt(crypto_mechanism_t *mech, crypto_data_t *plaintext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *ciphertext, crypto_call_req_t *crq) argument 430 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 445 crypto_encrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 599 crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 636 crypto_decrypt(crypto_mechanism_t *mech, crypto_data_t *ciphertext, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *plaintext, crypto_call_req_t *crq) argument 712 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 727 crypto_decrypt_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_prov_lib.c | 283 crypto_key_t *key; local 297 key = kmem_alloc(len, kmflag); 298 if (key == NULL) 300 k_attrs = (crypto_object_attribute_t *)(void *)((caddr_t)key + 314 key->ck_format = CRYPTO_KEY_ATTR_LIST; 315 key->ck_count = count; 316 key->ck_attrs = k_attrs; 317 *out_key = key; 540 * in the key. 543 crypto_get_key_attr(crypto_key_t *key, crypto_attr_type_ argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | arcfour.c | 201 crypto_key_t *key, crypto_spi_ctx_template_t template, 209 if (key->ck_format != CRYPTO_KEY_RAW) 212 if (key->ck_length < ARCFOUR_MIN_KEY_BITS || 213 key->ck_length > ARCFOUR_MAX_KEY_BITS) { 218 * Allocate an RC4 key stream. 224 arcfour_key_init(keystream, key->ck_data, 225 CRYPTO_BITS2BYTES(key->ck_length)); 253 ARCFour_key *key; local 259 key = ctx->cc_opstate; 261 key 200 rc4_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 496 rc4_crypt_atomic(crypto_provider_handle_t handle, crypto_session_id_t session, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 535 crypto_arcfour_crypt(ARCFour_key *key, uchar_t *in, crypto_data_t *out, int length) argument [all...] |
H A D | blowfish.c | 238 * Initialize key schedules for blowfish 241 init_keysched(crypto_key_t *key, void *keysched) argument 246 switch (key->ck_format) { 248 if (key->ck_length < BLOWFISH_MINBITS || 249 key->ck_length > BLOWFISH_MAXBITS) { 257 blowfish_init_keysched(key->ck_data, key->ck_length, keysched); 276 crypto_key_t *key, crypto_spi_ctx_template_t template, 286 if (key->ck_format != CRYPTO_KEY_RAW) { 310 key, kmfla 275 blowfish_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 594 blowfish_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 681 blowfish_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 771 blowfish_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument 826 blowfish_common_init_ctx(blowfish_ctx_t *blowfish_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument [all...] |
H A D | dca_3des.c | 316 crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, 338 rv = dca_3desctxinit(&ctx, mechanism, key, kmflag, mode); 657 crypto_key_t *key, int kmflag, int flags) 713 if (key->ck_format != CRYPTO_KEY_RAW) { 715 "dca_3desctxinit: only raw crypto key type support with DES/3DES"); 720 len = key->ck_length; 721 value = (uchar_t *)key->ck_data; 728 des_ctx->dr_ctx.key[i] = 0; 730 des_ctx->dr_ctx.key[i] <<= 8; 731 des_ctx->dr_ctx.key[ 314 dca_3desatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument 656 dca_3desctxinit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, int flags) argument [all...] |
/illumos-gate/usr/src/uts/common/io/aggr/ |
H A D | aggr_ctl.c | 141 aggr_ioc_info_new_grp(void *arg, datalink_id_t linkid, uint32_t key, argument 152 grp.lg_key = key;
|
/illumos-gate/usr/src/uts/common/io/drm/ |
H A D | drm_agpsupport.c | 54 * to the key to get a handle. 321 uint_t key; local 332 key = (uintptr_t)entry->handle - DRM_AGP_KEY_OFFSET; 334 if (drm_agp_bind_memory(key, start, dev)) { 335 DRM_ERROR("drm_agp_bind: failed key=%x, start=0x%x, " 336 "agp_base=0x%lx", key, start, dev->agp->base); 456 drm_agp_bind_memory(unsigned int key, uint32_t start, drm_device_t *dev) argument 462 bind.agpb_key = key;
|
H A D | drm_gem.c | 96 int key; local 98 key = obj->name % DRM_GEM_OBJIDR_HASHNODE; 99 list_add(entry, &head->next[key], NULL); 111 int key; local 112 key = name % DRM_GEM_OBJIDR_HASHNODE; 114 list_for_each(entry, &head->next[key]) { 126 int key; local 127 key = name % DRM_GEM_OBJIDR_HASHNODE; 128 list_for_each_safe(entry, temp, &head->next[key]) { 143 for (int key [all...] |
/illumos-gate/usr/src/lib/udapl/udapl_tavor/common/ |
H A D | dapl_hash.c | 57 DAPL_HASH_KEY key; member in struct:DAPL_HASH_ELEM 97 #define DAPL_DOHASH(key, hashsize) ((uint64_t)((key) % (hashsize))) 110 } else if (element->key == (DAPL_HASH_KEY) (in_key)) { \ 131 * Rehash the key (used by add and lookup functions) 133 * Inputs: element element to rehash key 134 * key, datum datum for key head 140 DAPL_HASH_KEY key, 158 if (element->key 138 dapli_hash_rehash( DAPL_HASH_ELEM *element, DAPL_HASH_KEY key, void **datum, DAPL_HASH_ELEM ** head) argument 178 dapli_hash_add( DAPL_HASH_TABLEP p_table, DAPL_HASH_KEY key, void *datum, DAT_BOOLEAN allow_dup, DAT_BOOLEAN *report_dup) argument 288 dapl_hash_delete_element(DAPL_HASH_ELEM * element, DAPL_HASH_KEY key, DAPL_HASH_DATA *p_datum) argument 440 dapls_hash_insert( IN DAPL_HASH_TABLE *p_table, IN DAPL_HASH_KEY key, IN DAPL_HASH_DATA data) argument 474 dapls_hash_search( IN DAPL_HASH_TABLE *p_table, IN DAPL_HASH_KEY key, OUT DAPL_HASH_DATA *p_data) argument 506 dapls_hash_remove( IN DAPL_HASH_TABLE *p_table, IN DAPL_HASH_KEY key, OUT DAPL_HASH_DATA *p_data) argument [all...] |
/illumos-gate/usr/src/lib/udapl/udapl_tavor/tavor/ |
H A D | dapl_tavor_ibtf_qp.c | 801 DAPL_HASH_KEY key; local 806 key = qp_num; 808 "srq_insert_ep:%p %p %llx\n", srq_ptr, htable, key); 809 return (dapls_hash_insert(htable, key, ep_ptr)); 819 DAPL_HASH_KEY key; local 826 key = qp_num; 828 retval = dapls_hash_remove(htable, key, (DAPL_HASH_DATA *)&epp); 831 "srq_remove_ep(%d): %p %llx\n", retval, htable, key); 842 DAPL_HASH_KEY key; local 849 key [all...] |
/illumos-gate/usr/src/test/libc-tests/tests/random/ |
H A D | chacha_tv.c | 17 * Test chacha20 key stream with known TVs. 277 chacha_test(uint8_t *key, uint8_t keylen, uint8_t *iv, uint8_t *bl0, argument 287 chacha_keysetup(&ctx, key, keylen * 8, 0);
|
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_authclient.h | 65 auth_key_t key[AUTH_KEY_TYPE_MAX]; member in struct:iscsit_auth_key_block
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | space.c | 261 uint_t kcpc_key; /* TSD key for CPU performance counter context */ 264 * storing and retrieving data by string key 286 space_store(char *key, uintptr_t ptr) argument 293 if (key == NULL) { 296 l = (size_t)strlen(key); 306 bcopy(key, s, l); 316 cmn_err(CE_WARN, "space_store: duplicate key %s", key); 320 cmn_err(CE_WARN, "space_store: no mem for key %s", key); 339 space_fetch(char *key) argument 356 space_free(char *key) argument [all...] |
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | key_call.c | 41 * key_encryptsession(agent, deskey, cr)-encrypt a session key to talk to agent 43 * key_gendes(deskey) - generate a secure des key 120 RPCLOG(1, "key status %d\n", res.status); 150 RPCLOG(1, "key status %d\n", res.status); 158 key_gendes(des_block *key) argument 161 return (key_call(KEY_GEN, xdr_void, NULL, xdr_des_block, (char *)key, 194 RPCLOG(1, "key status %d\n", kres.status); 218 RPCLOG(1, "key status %d\n", res.status); 311 RPCLOG(8, "key call: (%d) ok\n", procn);
|
/illumos-gate/usr/src/uts/common/io/ib/clients/rdsv3/ |
H A D | rdma.c | 85 rdsv3_mr_tree_walk(struct avl_tree *root, uint32_t key, argument 91 mr = avl_find(root, &key, &where); 112 "RDS: destroy mr key is %x refcnt %u", 244 "RDS: get_mr mr 0x%p addr 0x%llx key 0x%x",
|
/illumos-gate/usr/src/uts/common/io/scsi/adapters/pmcs/ |
H A D | pmcs_sata.c | 68 uint8_t key = 0x05; /* illegal command */ local 477 key = 0x6; 490 rp[2] = key;
|
/illumos-gate/usr/src/uts/common/io/xge/hal/xgehal/ |
H A D | xgehal-mgmtaux.c | 29 #define __hal_aux_snprintf(retbuf, bufsize, fmt, key, value, retsize) \ 31 retsize = xge_os_snprintf(retbuf, bufsize, fmt, key, \ 35 #define __hal_aux_snprintf(retbuf, bufsize, fmt, key, value, retsize) \ 37 retsize = xge_os_sprintf(retbuf, fmt, key, XGE_HAL_AUX_SEPA, value); \ 47 #define __HAL_AUX_ENTRY(key, value, fmt) \ 49 __hal_aux_snprintf(ptr, leftsize, "%s%c"fmt"\n", key, value, entrysize) 891 char key[XGE_OS_SPRINTF_STRLEN]; local 959 (void) xge_os_snprintf(key, sizeof(key), "ring%d_", channel->post_qid); 961 dest_addr = key 1171 char key[XGE_OS_SPRINTF_STRLEN]; local 1269 char key[XGE_OS_SPRINTF_STRLEN]; local 1569 char key[XGE_OS_SPRINTF_STRLEN]; local [all...] |
/illumos-gate/usr/src/uts/common/ipp/ipgpc/ |
H A D | classifier.c | 366 int i, key; local 376 if (fid_table[i].key == 0) { 387 if ((key = item->key) == 0) { 390 if (ipgpc_fid_list[key].info <= 0) { 406 if (((~bestmask) & ipgpc_fid_list[key].insert_map) 416 if (item->match_map != ipgpc_fid_list[key].insert_map) { 423 ipgpc_fid_list[key].filter.priority; 425 ipgpc_fid_list[key].filter.precedence; 428 bestmatch = key; [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.h | 59 EVP_PKEY *key; member in struct:_pkinit_cred_info
|
/illumos-gate/usr/src/lib/libadm/common/ |
H A D | devreserv.c | 72 * struct devlks Structure that defines locking information (key 487 * int appendlk(key, alias) 488 * int key 494 * key Key the device is being locked on 508 int key, /* Lock key */ 515 lk.lk_key = key; 622 * int putlocks(newlist, key) 624 * int key 631 * key Th 507 appendlk( int key, char *alias) argument 643 putlocks( char **newlist, int key) argument 798 unreserv(int key, char *device) argument 901 devreserv( int key, char **rsvlst[]) argument 1034 devfree( int key, char *device) argument [all...] |
/illumos-gate/usr/src/lib/libast/common/vmalloc/ |
H A D | vmmopen.c | 63 int key; /* identifying key */ member in struct:_user_s 291 Void_t* vmmset(Vmalloc_t* vm, int key, Void_t* data, int set) argument 293 Void_t* vmmset(vm, data, key, set) 295 int key; /* key of data to be set */ 304 if(u->key == key) 317 u->key = key; [all...] |