Searched defs:key (Results 476 - 500 of 889) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/
H A Dmodhash.c84 boolean_t mwd_opt_k_set; /* key supplied */
86 uintptr_t mwd_opt_k; /* key */
298 /* If the user specified a particular key, ignore others. */
332 " <addr>::modhash -e [-ch] [-k key] [-v val] [-i index]\n\n"
343 "key, value, and/or hash index, or just the chain heads (-c). "
518 format_strhash(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument
522 (void) mdb_snprintf(keystr, keystrlen, "%?p ", key);
524 (void) mdb_readstr(keystr + len, keystrlen - len, (uintptr_t)key);
528 format_ptrhash(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument
532 (void) mdb_snprintf(keystr, keystrlen, "%?p ", key);
539 format_idhash(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument
545 format_default(const mod_hash_key_t key, char *keystr, size_t keystrlen) argument
[all...]
/illumos-gate/usr/src/cmd/mdb/common/modules/stmf_sbd/
H A Dstmf_sbd.c248 " -k if specified, only prints key information\n"
340 sbd_pgr_key_t key; local
345 if (mdb_vread(&key, sizeof (sbd_pgr_key_t), addr) == -1) {
349 wsp->walk_addr = (uintptr_t)key.pgr_key_next;
350 return (wsp->walk_callback(addr, &key, wsp->walk_cbdata));
354 stmf_sbd_pgr_key_cb(uintptr_t addr, const sbd_pgr_key_t *key, argument
364 mdb_printf("\tRegistered key: 0x%016llx\n", key->pgr_key);
367 key->pgr_key_flags);
368 mdb_printf("\tpgr_key_it: %?-p\n", key
474 sbd_pgr_key_t key; local
[all...]
/illumos-gate/usr/src/cmd/fs.d/autofs/
H A Dautod_mount.c68 char *key,
101 err = getmapent(key, mapname, &ml, stack, &stkptr, &iswildcard,
104 mapents = parse_entry(key, mapname, mapopts, &ml,
224 path, key);
256 root, next_subdir, key);
66 do_mount1( char *mapname, char *key, char *subdir, char *mapopts, char *path, uint_t isdirect, uid_t uid, action_list **alpp, int flags) argument
/illumos-gate/usr/src/cmd/rmt/
H A Drmt.c129 static char key; variable
146 case OPEN: key = 'O'; break;
147 case CLOSE: key = 'C'; break;
148 case ERROR: key = 'E'; break;
209 while (read(0, &key, 1) == 1) {
210 switch (key) {
230 DEBUG3("rmtd: %c %s %s\n", key, op, count);
233 if (key == 'i') {
286 DEBUG1("rmtd: %c\n", key);
287 if (key
[all...]
/illumos-gate/usr/src/cmd/rmvolmgr/
H A Drmvolmgr.c80 const char *key, dbus_bool_t is_removed, dbus_bool_t is_added);
447 rmm_property_modified(LibHalContext *ctx, const char *udi, const char *key, argument
455 if (strcmp(key, "volume.is_mounted") != 0) {
458 is_mounted = libhal_device_get_property_bool(hal_ctx, udi, key, NULL);
/illumos-gate/usr/src/cmd/sendmail/src/
H A Dudb.c137 DBT key; local
146 memset(&key, '\0', sizeof(key));
186 /* build actual database key */
218 key.data = keybuf;
219 key.size = keylen;
224 i = (*up->udb_dbp->seq)(up->udb_dbp, &key, &info, R_CURSOR);
237 (errno = dbc->c_get(dbc, &key,
257 (int) key.size, (char *) key
603 DBT key, info; local
844 char *key; local
[all...]
/illumos-gate/usr/src/cmd/abi/spectrans/spec2map/
H A Dxlator.c276 char *key = Keywords[token-FIRST_TOKEN].key; local
279 seterrline(Curline, meta_info.mi_filename, key, value);
282 "take_kvpair called. ext_cnt=%d token=%d key=%s value=%s",
283 meta_info.mi_ext_cnt, token, key, value);
439 "\tThis is a programmer error: %s", key);
/illumos-gate/usr/src/cmd/avs/dscfg/
H A Ddscfg.c191 gettext("update parser config rc %d key %s\n"),
207 char *key; local
224 key = strtok(buff, ":");
225 if (!key) {
228 p = &buff[strlen(key)+2];
235 rc = cfg_put_cstring(cfg, key, p, strlen(p));
238 gettext("update text config failed rc %d key %s"),
317 char key[CFG_MAX_KEY]; local
368 (void) snprintf(key,
369 sizeof (key), "
[all...]
/illumos-gate/usr/src/cmd/avs/rdc/
H A Dsndrboot.c537 char key[CFG_MAX_KEY]; local
561 bzero(&key, sizeof (key));
563 (void) sprintf(key, "sndr.set%d.options", no_id[setid]);
564 if (cfg_put_options(cfg, CFG_SEC_CONF, key, "setid", buf) < 0)
595 char key[CFG_MAX_KEY]; local
630 bzero(&key, sizeof (key));
631 (void) snprintf(key, sizeof (key), "snd
676 char key[CFG_MAX_KEY]; local
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dimport.c77 "key(s) in %s\n"), ncerts, nkeys, outfile);
234 "key(s) in %s\n"), ncerts, nkeys, filename);
561 "key(s) in %s\n"), ncerts, nkeys, filename);
620 KMF_KEY_HANDLE key; local
643 &key, sizeof (key));
687 kmf_free_kmf_key(kmfhandle, &key);
691 gettext("Failed to load key from file (%s)\n"),
852 case 'K': /* output key file name */
966 * Allow for raw key dat
[all...]
H A Dsigncsr.c208 KMF_KEY_HANDLE *key, KMF_OID *sigoid, KMF_DATA *outdata)
216 &key->kstype, sizeof (KMF_KEYSTORE_TYPE));
219 key, sizeof (KMF_KEY_HANDLE_ATTR));
302 * Find the signing key.
331 "Error finding CA signing key\n"));
413 * Find the signing key.
456 gettext("Failed to find signing key\n"));
460 * If we found the key, now we can sign the cert.
673 (void) fprintf(stderr, gettext("The signing key label "
726 /* Need to get password for private key acces
207 pk_sign_cert(KMF_HANDLE_T handle, KMF_X509_CERTIFICATE *cert, KMF_KEY_HANDLE *key, KMF_OID *sigoid, KMF_DATA *outdata) argument
[all...]
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/
H A Ddup_avl.c132 fragment_t key; local
147 key.fr_pfn = fragno;
148 dup = avl_find(&dup_frags, (void *)&key, &where);
405 claimant_t key; local
408 key.cl_inode = ino;
409 key.cl_lfn = lfn;
410 claimant = avl_find(&dup->fr_claimants, &key, &where);
444 claimant_t key; local
447 key.cl_inode = ino;
448 key
[all...]
/illumos-gate/usr/src/cmd/hal/hald/
H A Dhald.c146 const char *key, gboolean added, gboolean removed,
150 device_send_signal_property_modified (device, key, removed, added);
155 /*hal_callout_property (device, key)*/;
145 gdl_property_changed(HalDeviceStore *store, HalDevice *device, const char *key, gboolean added, gboolean removed, gpointer user_data) argument
H A Dhald_runner.c67 rprd_foreach (gpointer key, argument
265 add_env(DBusMessageIter *iter, const gchar *key, const gchar *value) { argument
267 env = g_strdup_printf ("%s=%s", key, value);
/illumos-gate/usr/src/cmd/svc/configd/
H A Dobject.c57 tx_cmd_compare(const void *key, const void *elem_arg) argument
61 return (strcmp((const char *)key, elem->tx_prop));
/illumos-gate/usr/src/cmd/latencytop/common/
H A Dtable.c58 * key is of type "char *" and value is of type "lt_match_t *".
469 genscript(void *key, lt_dmacro_t *dmacro, GString *str) argument
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dkfree.c173 * krb5_free_cred_contents zeros out the session key, and then frees
405 * Delete a key's derived key list
408 cleanup_dk_list(krb5_context context, krb5_keyblock *key) argument
410 krb5_dk_node *dn = key->dk_list;
430 key->dk_list = NULL;
435 krb5_free_keyblock_contents(krb5_context context, register krb5_keyblock *key) argument
437 if (key->contents) {
438 (void) memset(key->contents, 0, key
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Daes.c299 * Initialize key schedules for AES
302 init_keysched(crypto_key_t *key, void *newbie) argument
307 switch (key->ck_format) {
309 if (key->ck_length < AES_MINBITS ||
310 key->ck_length > AES_MAXBITS) {
314 /* key length must be either 128, 192, or 256 */
315 if ((key->ck_length & 63) != 0)
322 aes_init_keysched(key->ck_data, key->ck_length, newbie);
338 crypto_key_t *key, crypto_spi_ctx_template_
337 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
344 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
356 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req, boolean_t is_encrypt_init) argument
959 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1089 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1255 aes_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument
1314 aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, boolean_t is_encrypt_init) argument
1431 aes_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
1453 aes_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument
[all...]
H A Ddca_rsa.c81 /* Extracting the key attributes is now done in dca_rsainit(). */
388 * Setup either a public or a private RSA key for subsequent uses
392 crypto_key_t *key, int kmflag)
436 if ((attr = dca_get_key_attr(key)) == NULL) {
437 DBG(NULL, DWARN, "dca_rsainit: key attributes missing");
442 if (dca_find_attribute(attr, key->ck_count, CKA_PUBLIC_EXPONENT))
446 * RSA public key has only public exponent. RSA private key must have
448 * Thus, the existance of a private exponent indicates a private key.
450 if (dca_find_attribute(attr, key
391 dca_rsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument
630 dca_rsaatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument
[all...]
H A Dsha1_mod.c82 #define PROV_SHA1_DIGEST_KEY(ctx, key, len, digest) { \
84 SHA1Update(ctx, key, len); \
789 * SHA1 HMAC is: SHA1(key XOR opad, SHA1(key XOR ipad, text))
794 * - for inner context: SHA1(key XOR ipad)
795 * - for outer context: SHA1(key XOR opad)
826 /* XOR key with ipad (0x36) and opad (0x5c) */
845 crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
849 uint_t keylen_in_bytes = CRYPTO_BITS2BYTES(key->ck_length);
855 /* Add support for key b
844 sha1_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1051 sha1_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1171 sha1_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1365 sha1_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
H A Dsha2_mod.c80 #define PROV_SHA2_DIGEST_KEY(mech, ctx, key, len, digest) { \
82 SHA2Update(ctx, key, len); \
851 * SHA2 HMAC is: SHA2(key XOR opad, SHA2(key XOR ipad, text))
856 * - for inner context: SHA2(key XOR ipad)
857 * - for outer context: SHA2(key XOR opad)
896 /* XOR key with ipad (0x36) and opad (0x5c) */
916 crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
920 uint_t keylen_in_bytes = CRYPTO_BITS2BYTES(key->ck_length);
944 if (key
915 sha2_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1157 sha2_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1299 sha2_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
1519 sha2_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
/illumos-gate/usr/src/uts/common/inet/kssl/
H A Dksslimpl.h71 * Structure to support using a non-extractable key in
80 crypto_key_t key; member in struct:kssl_session_info_s
109 crypto_key_t *ke_private_key; /* instance's private key */
/illumos-gate/usr/src/uts/common/io/cxgbe/t4nex/
H A Dt4_l2t.c278 arp_hash(const uint32_t *key, int ifindex) argument
280 return (jhash_2words(*key, ifindex, 0) & L2T_HASH_MASK);
284 ipv6_hash(const uint32_t *key, int ifindex) argument
286 uint32_t xor = key[0] ^ key[1] ^ key[2] ^ key[3];
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/
H A Dsmbns_netbios_cache.c49 static void smb_netbios_cache_key(char *key, unsigned char *name,
146 nb_key_t key; local
161 smb_netbios_cache_key(key, name->name, name->scope);
162 item = ht_find_item(smb_netbios_cache, key);
200 nb_key_t key; local
203 smb_netbios_cache_key(key, name->name, name->scope);
204 item = ht_find_item(smb_netbios_cache, key);
233 nb_key_t key; local
241 smb_netbios_cache_key(key, name->name, name->scope);
242 item = ht_find_item(smb_netbios_cache, key);
308 nb_key_t key; local
816 smb_netbios_cache_key(char *key, unsigned char *name, unsigned char *scope) argument
[all...]
/illumos-gate/usr/src/uts/common/io/comstar/port/fcoet/
H A Dfcoet.c117 fcoet_sol_oxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg);
119 fcoet_unsol_rxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg);
1005 fcoet_sol_oxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg) argument
1016 fcoet_unsol_rxid_hash_empty(mod_hash_key_t key, mod_hash_val_t *val, void *arg) argument
1027 fcoet_modhash_find_cb(mod_hash_key_t key, mod_hash_val_t val) argument

Completed in 124 milliseconds

<<11121314151617181920>>