/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/ |
H A D | modhash.c | 84 boolean_t mwd_opt_k_set; /* key supplied */ 86 uintptr_t mwd_opt_k; /* key */ 298 /* If the user specified a particular key, ignore others. */ 332 " <addr>::modhash -e [-ch] [-k key] [-v val] [-i index]\n\n" 343 "key, value, and/or hash index, or just the chain heads (-c). " 518 format_strhash(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument 522 (void) mdb_snprintf(keystr, keystrlen, "%?p ", key); 524 (void) mdb_readstr(keystr + len, keystrlen - len, (uintptr_t)key); 528 format_ptrhash(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument 532 (void) mdb_snprintf(keystr, keystrlen, "%?p ", key); 539 format_idhash(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument 545 format_default(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument [all...] |
/illumos-gate/usr/src/cmd/mdb/common/modules/stmf_sbd/ |
H A D | stmf_sbd.c | 248 " -k if specified, only prints key information\n" 340 sbd_pgr_key_t key; local 345 if (mdb_vread(&key, sizeof (sbd_pgr_key_t), addr) == -1) { 349 wsp->walk_addr = (uintptr_t)key.pgr_key_next; 350 return (wsp->walk_callback(addr, &key, wsp->walk_cbdata)); 354 stmf_sbd_pgr_key_cb(uintptr_t addr, const sbd_pgr_key_t *key, argument 364 mdb_printf("\tRegistered key: 0x%016llx\n", key->pgr_key); 367 key->pgr_key_flags); 368 mdb_printf("\tpgr_key_it: %?-p\n", key 474 sbd_pgr_key_t key; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/autofs/ |
H A D | autod_mount.c | 68 char *key, 101 err = getmapent(key, mapname, &ml, stack, &stkptr, &iswildcard, 104 mapents = parse_entry(key, mapname, mapopts, &ml, 224 path, key); 256 root, next_subdir, key); 66 do_mount1( char *mapname, char *key, char *subdir, char *mapopts, char *path, uint_t isdirect, uid_t uid, action_list **alpp, int flags) argument
|
/illumos-gate/usr/src/cmd/rmt/ |
H A D | rmt.c | 129 static char key; variable 146 case OPEN: key = 'O'; break; 147 case CLOSE: key = 'C'; break; 148 case ERROR: key = 'E'; break; 209 while (read(0, &key, 1) == 1) { 210 switch (key) { 230 DEBUG3("rmtd: %c %s %s\n", key, op, count); 233 if (key == 'i') { 286 DEBUG1("rmtd: %c\n", key); 287 if (key [all...] |
/illumos-gate/usr/src/cmd/rmvolmgr/ |
H A D | rmvolmgr.c | 80 const char *key, dbus_bool_t is_removed, dbus_bool_t is_added); 447 rmm_property_modified(LibHalContext *ctx, const char *udi, const char *key, argument 455 if (strcmp(key, "volume.is_mounted") != 0) { 458 is_mounted = libhal_device_get_property_bool(hal_ctx, udi, key, NULL);
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | udb.c | 137 DBT key; local 146 memset(&key, '\0', sizeof(key)); 186 /* build actual database key */ 218 key.data = keybuf; 219 key.size = keylen; 224 i = (*up->udb_dbp->seq)(up->udb_dbp, &key, &info, R_CURSOR); 237 (errno = dbc->c_get(dbc, &key, 257 (int) key.size, (char *) key 603 DBT key, info; local 844 char *key; local [all...] |
/illumos-gate/usr/src/cmd/abi/spectrans/spec2map/ |
H A D | xlator.c | 276 char *key = Keywords[token-FIRST_TOKEN].key; local 279 seterrline(Curline, meta_info.mi_filename, key, value); 282 "take_kvpair called. ext_cnt=%d token=%d key=%s value=%s", 283 meta_info.mi_ext_cnt, token, key, value); 439 "\tThis is a programmer error: %s", key);
|
/illumos-gate/usr/src/cmd/avs/dscfg/ |
H A D | dscfg.c | 191 gettext("update parser config rc %d key %s\n"), 207 char *key; local 224 key = strtok(buff, ":"); 225 if (!key) { 228 p = &buff[strlen(key)+2]; 235 rc = cfg_put_cstring(cfg, key, p, strlen(p)); 238 gettext("update text config failed rc %d key %s"), 317 char key[CFG_MAX_KEY]; local 368 (void) snprintf(key, 369 sizeof (key), " [all...] |
/illumos-gate/usr/src/cmd/avs/rdc/ |
H A D | sndrboot.c | 537 char key[CFG_MAX_KEY]; local 561 bzero(&key, sizeof (key)); 563 (void) sprintf(key, "sndr.set%d.options", no_id[setid]); 564 if (cfg_put_options(cfg, CFG_SEC_CONF, key, "setid", buf) < 0) 595 char key[CFG_MAX_KEY]; local 630 bzero(&key, sizeof (key)); 631 (void) snprintf(key, sizeof (key), "snd 676 char key[CFG_MAX_KEY]; local [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | import.c | 77 "key(s) in %s\n"), ncerts, nkeys, outfile); 234 "key(s) in %s\n"), ncerts, nkeys, filename); 561 "key(s) in %s\n"), ncerts, nkeys, filename); 620 KMF_KEY_HANDLE key; local 643 &key, sizeof (key)); 687 kmf_free_kmf_key(kmfhandle, &key); 691 gettext("Failed to load key from file (%s)\n"), 852 case 'K': /* output key file name */ 966 * Allow for raw key dat [all...] |
H A D | signcsr.c | 208 KMF_KEY_HANDLE *key, KMF_OID *sigoid, KMF_DATA *outdata) 216 &key->kstype, sizeof (KMF_KEYSTORE_TYPE)); 219 key, sizeof (KMF_KEY_HANDLE_ATTR)); 302 * Find the signing key. 331 "Error finding CA signing key\n")); 413 * Find the signing key. 456 gettext("Failed to find signing key\n")); 460 * If we found the key, now we can sign the cert. 673 (void) fprintf(stderr, gettext("The signing key label " 726 /* Need to get password for private key acces 207 pk_sign_cert(KMF_HANDLE_T handle, KMF_X509_CERTIFICATE *cert, KMF_KEY_HANDLE *key, KMF_OID *sigoid, KMF_DATA *outdata) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/ |
H A D | dup_avl.c | 132 fragment_t key; local 147 key.fr_pfn = fragno; 148 dup = avl_find(&dup_frags, (void *)&key, &where); 405 claimant_t key; local 408 key.cl_inode = ino; 409 key.cl_lfn = lfn; 410 claimant = avl_find(&dup->fr_claimants, &key, &where); 444 claimant_t key; local 447 key.cl_inode = ino; 448 key [all...] |
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | hald.c | 146 const char *key, gboolean added, gboolean removed, 150 device_send_signal_property_modified (device, key, removed, added); 155 /*hal_callout_property (device, key)*/; 145 gdl_property_changed(HalDeviceStore *store, HalDevice *device, const char *key, gboolean added, gboolean removed, gpointer user_data) argument
|
H A D | hald_runner.c | 67 rprd_foreach (gpointer key, argument 265 add_env(DBusMessageIter *iter, const gchar *key, const gchar *value) { argument 267 env = g_strdup_printf ("%s=%s", key, value);
|
/illumos-gate/usr/src/cmd/svc/configd/ |
H A D | object.c | 57 tx_cmd_compare(const void *key, const void *elem_arg) argument 61 return (strcmp((const char *)key, elem->tx_prop));
|
/illumos-gate/usr/src/cmd/latencytop/common/ |
H A D | table.c | 58 * key is of type "char *" and value is of type "lt_match_t *". 469 genscript(void *key, lt_dmacro_t *dmacro, GString *str) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 173 * krb5_free_cred_contents zeros out the session key, and then frees 405 * Delete a key's derived key list 408 cleanup_dk_list(krb5_context context, krb5_keyblock *key) argument 410 krb5_dk_node *dn = key->dk_list; 430 key->dk_list = NULL; 435 krb5_free_keyblock_contents(krb5_context context, register krb5_keyblock *key) argument 437 if (key->contents) { 438 (void) memset(key->contents, 0, key [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | aes.c | 299 * Initialize key schedules for AES 302 init_keysched(crypto_key_t *key, void *newbie) argument 307 switch (key->ck_format) { 309 if (key->ck_length < AES_MINBITS || 310 key->ck_length > AES_MAXBITS) { 314 /* key length must be either 128, 192, or 256 */ 315 if ((key->ck_length & 63) != 0) 322 aes_init_keysched(key->ck_data, key->ck_length, newbie); 338 crypto_key_t *key, crypto_spi_ctx_template_ 337 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 344 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 356 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req, boolean_t is_encrypt_init) argument 959 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1089 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1255 aes_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument 1314 aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, boolean_t is_encrypt_init) argument 1431 aes_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1453 aes_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | dca_rsa.c | 81 /* Extracting the key attributes is now done in dca_rsainit(). */ 388 * Setup either a public or a private RSA key for subsequent uses 392 crypto_key_t *key, int kmflag) 436 if ((attr = dca_get_key_attr(key)) == NULL) { 437 DBG(NULL, DWARN, "dca_rsainit: key attributes missing"); 442 if (dca_find_attribute(attr, key->ck_count, CKA_PUBLIC_EXPONENT)) 446 * RSA public key has only public exponent. RSA private key must have 448 * Thus, the existance of a private exponent indicates a private key. 450 if (dca_find_attribute(attr, key 391 dca_rsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument 630 dca_rsaatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument [all...] |
H A D | sha1_mod.c | 82 #define PROV_SHA1_DIGEST_KEY(ctx, key, len, digest) { \ 84 SHA1Update(ctx, key, len); \ 789 * SHA1 HMAC is: SHA1(key XOR opad, SHA1(key XOR ipad, text)) 794 * - for inner context: SHA1(key XOR ipad) 795 * - for outer context: SHA1(key XOR opad) 826 /* XOR key with ipad (0x36) and opad (0x5c) */ 845 crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, 849 uint_t keylen_in_bytes = CRYPTO_BITS2BYTES(key->ck_length); 855 /* Add support for key b 844 sha1_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1051 sha1_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1171 sha1_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1365 sha1_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
H A D | sha2_mod.c | 80 #define PROV_SHA2_DIGEST_KEY(mech, ctx, key, len, digest) { \ 82 SHA2Update(ctx, key, len); \ 851 * SHA2 HMAC is: SHA2(key XOR opad, SHA2(key XOR ipad, text)) 856 * - for inner context: SHA2(key XOR ipad) 857 * - for outer context: SHA2(key XOR opad) 896 /* XOR key with ipad (0x36) and opad (0x5c) */ 916 crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, 920 uint_t keylen_in_bytes = CRYPTO_BITS2BYTES(key->ck_length); 944 if (key 915 sha2_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1157 sha2_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1299 sha2_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1519 sha2_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/uts/common/inet/kssl/ |
H A D | ksslimpl.h | 71 * Structure to support using a non-extractable key in 80 crypto_key_t key; member in struct:kssl_session_info_s 109 crypto_key_t *ke_private_key; /* instance's private key */
|
/illumos-gate/usr/src/uts/common/io/cxgbe/t4nex/ |
H A D | t4_l2t.c | 278 arp_hash(const uint32_t *key, int ifindex) argument 280 return (jhash_2words(*key, ifindex, 0) & L2T_HASH_MASK); 284 ipv6_hash(const uint32_t *key, int ifindex) argument 286 uint32_t xor = key[0] ^ key[1] ^ key[2] ^ key[3];
|
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_netbios_cache.c | 49 static void smb_netbios_cache_key(char *key, unsigned char *name, 146 nb_key_t key; local 161 smb_netbios_cache_key(key, name->name, name->scope); 162 item = ht_find_item(smb_netbios_cache, key); 200 nb_key_t key; local 203 smb_netbios_cache_key(key, name->name, name->scope); 204 item = ht_find_item(smb_netbios_cache, key); 233 nb_key_t key; local 241 smb_netbios_cache_key(key, name->name, name->scope); 242 item = ht_find_item(smb_netbios_cache, key); 308 nb_key_t key; local 816 smb_netbios_cache_key(char *key, unsigned char *name, unsigned char *scope) argument [all...] |
/illumos-gate/usr/src/uts/common/io/comstar/port/fcoet/ |
H A D | fcoet.c | 117 fcoet_sol_oxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg); 119 fcoet_unsol_rxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg); 1005 fcoet_sol_oxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg) argument 1016 fcoet_unsol_rxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg) argument 1027 fcoet_modhash_find_cb(mod_hash_key_t key, mod_hash_val_t val) argument
|