/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | svcauthdes.c | 83 #define HASH(key) ((key) & (authdes_cachesz - 1)) 91 des_block key; /* conversation key */ member in struct:authdes_cache_entry 181 cred->adc_fullname.key.key.high = (uint32_t)*ixdr++; 182 cred->adc_fullname.key.key.low = (uint32_t)*ixdr++; 199 verf.adv_xtimestamp.key.high = (uint32_t)*ixdr++; 200 verf.adv_xtimestamp.key [all...] |
/illumos-gate/usr/src/uts/common/io/ |
H A D | pci_intr_lib.c | 1217 pci_match_class_val(uint32_t key, pci_class_val_t *rec_p, int nrec, argument 1224 (key & rec_p->class_mask))
|
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsi_login.c | 992 char *key = (char *)iscsiAuthClientGetKeyName(keytype); local 993 int key_length = key ? strlen(key) : 0; 1000 * add the key/value pairs the auth code wants to 1008 * actually fill in the key 1010 (void) strncpy(&data[pdu_length], key, 1157 * skip any NULs separating each text key=value pair 1229 * any key we don't recognize either goes 1237 char *key = local 1241 if ((key) [all...] |
/illumos-gate/usr/src/uts/common/sys/scsi/impl/ |
H A D | services.h | 41 int key; member in struct:scsi_key_strings
|
/illumos-gate/usr/src/lib/krb5/kadm5/ |
H A D | kadm_rpc.h | 145 krb5_keyblock key; member in struct:chrand_ret
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_input.c | 65 struct ieee80211_key *key; local 293 key = ieee80211_crypto_decap(ic, mp, hdrspace); 294 if (key == NULL) { 302 key = NULL; 331 if (key != NULL && !ieee80211_crypto_demic(ic, key, mp, 0)) { 360 * Only shared key auth frames with a challenge 381 key = ieee80211_crypto_decap(ic, mp, hdrspace); 382 if (key == NULL) { 588 * Allocate challenge text for use by shared-key authenticatio [all...] |
/illumos-gate/usr/src/uts/sun4u/serengeti/io/ |
H A D | sgsbbc_iosram.c | 148 master_iosram->tunnel->tunnel_keys[i].key = 0; 224 int i, key; local 262 key = iosram_convert_key(toc->iosram_keys[i].key); 263 if ((key > 0) && (key < SBBC_MAX_KEYS)) { 264 tunnel = &new_tunnel->tunnel_keys[key]; 265 tunnel->key = key; 282 SGSBBC_DBG_ALL("%d: key 370 iosram_read(int key, uint32_t offset, caddr_t buf, uint32_t size) argument 376 iosram_write(int key, uint32_t offset, caddr_t buf, uint32_t size) argument 383 iosram_rw(int key, uint32_t offset, caddr_t buf, uint32_t size, int flag) argument 472 iosram_size(int key) argument [all...] |
/illumos-gate/usr/src/uts/common/sys/lvm/ |
H A D | md_rename.h | 124 key_t key; member in struct:md_rename_transaction::md_rename_txn_unit_state
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | mhd.h | 67 uchar_t key[MHIOC_RESV_KEY_SIZE]; member in struct:mhioc_resv_key 95 mhioc_resv_key_t key; member in struct:mhioc_resv_desc
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | skein_mod.c | 682 * mechanism and key. 686 crypto_key_t *key) 692 if (key->ck_format != CRYPTO_KEY_RAW) 698 SKEIN_OP(ctx, InitExt, ctx->sc_digest_bitlen, 0, key->ck_data, 699 CRYPTO_BITS2BYTES(key->ck_length)); 713 * digest. The key must be in raw format. 717 crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, 731 error = skein_mac_ctx_build(SKEIN_CTX(ctx), mechanism, key); 756 crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, 768 error = skein_mac_ctx_build(&skein_ctx, mechanism, key); 685 skein_mac_ctx_build(skein_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key) argument 716 skein_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 754 skein_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 795 skein_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/uts/common/io/sfxge/common/ |
H A D | ef10_rx.c | 329 __in_ecount(n) uint8_t *key, 359 RSS_CONTEXT_SET_KEY_IN_TOEPLITZ_KEY), key, n); local 448 * indirection table and key to be modified. 522 __in_ecount(n) uint8_t *key, 533 enp->en_rss_context, key, n)) != 0) 326 efx_mcdi_rss_context_set_key( __in efx_nic_t *enp, __in uint32_t rss_context, __in_ecount(n) uint8_t *key, __in size_t n) argument 520 ef10_rx_scale_key_set( __in efx_nic_t *enp, __in_ecount(n) uint8_t *key, __in size_t n) argument
|
H A D | efx_rx.c | 63 __in_ecount(n) uint8_t *key, 365 __in_ecount(n) uint8_t *key, 374 if ((rc = erxop->erxo_scale_key_set(enp, key, n)) != 0) 592 /* The RSS key and indirection table are writable. */ 759 __in_ecount(n) uint8_t *key, 769 /* Write Toeplitz IPv4 hash key */ 774 oword.eo_u8[offset - 1] = key[byte++]; 780 /* Verify Toeplitz IPv4 hash key */ 785 if (oword.eo_u8[offset - 1] != key[byte++]) { 796 /* Write Toeplitz IPv6 hash key 363 efx_rx_scale_key_set( __in efx_nic_t *enp, __in_ecount(n) uint8_t *key, __in size_t n) argument 757 siena_rx_scale_key_set( __in efx_nic_t *enp, __in_ecount(n) uint8_t *key, __in size_t n) argument [all...] |
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | fsys_jfs.c | 61 isinxt (s64 key, s64 offset, s64 len) argument 63 return (key >= offset) ? (key < offset + len ? 1 : 0) : 0; 108 s64 key; local 114 key = (((inum >> L2INOSPERIAG) << L2INOSPERIAG) + 4096) >> jfs.l2bsize; 120 if (isinxt (key, offset, lengthXAD (xad))) { 121 devread ((addressXAD (xad) + key - offset) << jfs.bdlog,
|
/illumos-gate/usr/src/boot/sys/boot/efi/boot1/ |
H A D | boot1.c | 738 EFI_INPUT_KEY key; local 742 status = systab->ConIn->ReadKeyStroke(systab->ConIn, &key); 745 status = systab->ConIn->ReadKeyStroke(systab->ConIn, &key); 747 return (key.UnicodeChar);
|
/illumos-gate/usr/src/lib/nsswitch/nis/common/ |
H A D | getnetgrent.c | 660 * Generate a key for a netgroup.byXXXX NIS map 663 makekey(key, name, domain) 664 char *key; 668 while (*key++ = *name++) 670 *(key-1) = '.'; 671 while (*key++ = *domain++) 676 makekey_lc(key, name, domain) 677 char *key; 689 *key++ = c; 691 *key 726 char *key; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaUtil.c | 38 CK_MECHANISM *pMechanism, meta_object_t *key) 99 session->init.key = key; 111 CK_MECHANISM *pMechanism, meta_object_t *key) 148 &mech, key); 231 rv = meta_object_get_clone(key, slotnum, init_session, 328 CK_MECHANISM *pMechanism, meta_object_t *key) 361 key); 405 rv = meta_object_get_clone(key, softtoken_slot_num, 550 session->init.key); 37 meta_operation_init_defer(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument 110 meta_operation_init(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument 327 meta_operation_init_softtoken(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystore.c | 169 * it can use it to generate encryption key as needed for 391 * the key itself. 490 * Unpack the key itself. 504 * key_dest: the key attribute will be unpacked and save in key_dest 511 * FALSE for key (use key_dest) 558 * object key (the third part) in a keystore format. 755 * Pack the object key (the third part) from the soft_object_t 1317 * Unpack the object key in keystore format (the third part) 1969 * key: output argument which contains the address of the 1970 * pointer to encryption key i 1988 soft_gen_crypt_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata) argument 2113 soft_gen_hmac_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata) argument [all...] |
H A D | softRSA.c | 42 soft_rsa_encrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len, argument 55 rv = soft_get_public_value(key, CKA_PUBLIC_EXPONENT, expo, 61 rv = soft_get_private_value(key, CKA_PRIVATE_EXPONENT, expo, 68 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len); 88 soft_rsa_decrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len, argument 108 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len); 113 rv = soft_get_private_value(key, CKA_PRIME_1, prime1, &prime1_len); 116 rv = soft_rsa_encrypt(key, in, in_len, out, 0); 123 rv = soft_get_private_value(key, CKA_PRIME_2, prime2, &prime2_len); 126 rv = soft_rsa_encrypt(key, i 246 soft_object_t *key = rsa_ctx->key; local 336 soft_object_t *key = rsa_ctx->key; local 530 soft_object_t *key = rsa_ctx->key; local 647 soft_object_t *key = rsa_ctx->key; local 747 soft_genRSAkey_set_attribute(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *buf, uint32_t buflen, boolean_t public) argument 983 soft_object_t *key = rsa_ctx->key; local 1098 soft_object_t *key = rsa_ctx->key; local 1182 soft_object_t *key = rsa_ctx->key; local [all...] |
H A D | softSSL.c | 76 static uchar_t TLS_KEY_EXPANSION_LABEL[] = {"key expansion"}; 79 static uchar_t TLS_CLIENT_KEY_LABEL[] = {"client write key"}; 82 static uchar_t TLS_SERVER_KEY_LABEL[] = {"server write key"}; 398 * . mech_p: key derivation mechanism. the mechanism parameter carries the 400 * . basekey_p: The pre-master secret key. 401 * . pTemplate & ulAttributeCount: Any extra attributes for the key to be 403 * . phKey: store for handle to the derived key. 462 /* Invalid pre-master key length. What else to return? */ 584 * . mech_p: key derivation mechanism. the mechanism parameter carries the 586 * the specification of the key an 1023 soft_delete_derived_key(soft_session_t *sp, soft_object_t *key) argument [all...] |
/illumos-gate/usr/src/lib/print/libpapi-common/common/ |
H A D | attribute.c | 754 char *key, char **values) 766 if ((attr == NULL) || ((attr->name = strdup(key)) == NULL)) 811 char *key, **values = NULL; local 818 key = ptr; 853 } else { /* boolean "[no]key" */ 856 if (strncasecmp(key, "no", 2) == 0) { 857 key += 2; 865 result = _papiAttributeFromStrings(list, flags, key, values); 753 _papiAttributeFromStrings(papi_attribute_t ***list, int flags, char *key, char **values) argument
|
/illumos-gate/usr/src/lib/print/libprint/common/ |
H A D | nss_ldap.c | 202 * char **attrList - pointer to a list of attribute key values 545 /* get length of this key word */ 1056 * key words that are not allowed. 1080 /* get length of this key word */ 1084 /* check if the key word is allowed */ 1108 attr[len] = '\0'; /* terminate the key */ 1519 /* get length of this key word */ 1652 /* get length of this key word */ 2219 * The current list is updated to remove this key, and the new 2220 * key "valu 2254 char *key = NULL; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | winreg_svc.c | 31 * of files. The top level keys are known as root keys and each key can 33 * the terms key and subkey are used interchangeably. Values, analogous 37 * which is analogous to a file system path. In the registry, the key 39 * in key or value names. Registry names are case-insensitive. 43 * The HKEY_LOCAL_MACHINE root key contains a subkey called System, and 242 winreg_subkey_t *key; local 244 if ((key = malloc(sizeof (winreg_subkey_t))) != NULL) { 245 bzero(key, sizeof (winreg_subkey_t)); 246 (void) strlcpy(key->sk_name, subkey, MAXPATHLEN); 247 key 357 winreg_alloc_id(ndr_xa_t *mxa, const char *key) argument 399 winreg_subkey_t *key; local 489 winreg_subkey_t *key; local 539 winreg_subkey_t *key; local 568 winreg_subkey_t *key; local 817 winreg_subkey_t *key; local [all...] |
/illumos-gate/usr/src/lib/efcode/engine/ |
H A D | env.c | 98 * 'key?' - abort if stdin is not a tty. 118 forth_abort(env, "'key?' called in non-interactive mode"); 122 * 'key' - abort if stdin is not a tty, will block on read if char not avail. 125 key(fcode_env_t *env) function 133 forth_abort(env, "'key' called in non-interactive mode"); 842 ANSI(0x08d, 0, "key?", keyquestion); 843 ANSI(0x08e, 0, "key", key);
|
/illumos-gate/usr/src/lib/fm/libfmd_snmp/common/ |
H A D | problem.c | 78 static sunFmProblem_data_t key; local 80 key.d_aci_uuid = uuid; 82 return (&key); 88 sunFmProblem_data_t *key, *data; local 90 key = problem_key_build(uuid); 93 data = uu_avl_find(problem_uuid_avl, key, NULL, NULL); 101 sunFmProblem_data_t *key, *data; local 104 key = problem_key_build(uuid); 107 (void) uu_avl_find(problem_uuid_avl, key, NULL, &idx);
|
/illumos-gate/usr/src/lib/fm/libfmnotify/common/ |
H A D | libfmnotify.c | 335 nd_seq_search(char *key, char **list, uint_t nelem) argument 338 if (strcmp(key, list[i]) == 0) 478 const char *key[2]; local 491 key[0] = class; 492 key[1] = NULL; 493 if (fm_dc_key2code(dhp, key, buf, buflen) < 0) { 494 nd_error(nhdl, "fm_dc_key2code failed for %s", key[0]);
|