Searched defs:key (Results 501 - 525 of 889) sorted by relevance

<<21222324252627282930>>

/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dsvcauthdes.c83 #define HASH(key) ((key) & (authdes_cachesz - 1))
91 des_block key; /* conversation key */ member in struct:authdes_cache_entry
181 cred->adc_fullname.key.key.high = (uint32_t)*ixdr++;
182 cred->adc_fullname.key.key.low = (uint32_t)*ixdr++;
199 verf.adv_xtimestamp.key.high = (uint32_t)*ixdr++;
200 verf.adv_xtimestamp.key
[all...]
/illumos-gate/usr/src/uts/common/io/
H A Dpci_intr_lib.c1217 pci_match_class_val(uint32_t key, pci_class_val_t *rec_p, int nrec, argument
1224 (key & rec_p->class_mask))
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Discsi_login.c992 char *key = (char *)iscsiAuthClientGetKeyName(keytype); local
993 int key_length = key ? strlen(key) : 0;
1000 * add the key/value pairs the auth code wants to
1008 * actually fill in the key
1010 (void) strncpy(&data[pdu_length], key,
1157 * skip any NULs separating each text key=value pair
1229 * any key we don't recognize either goes
1237 char *key = local
1241 if ((key)
[all...]
/illumos-gate/usr/src/uts/common/sys/scsi/impl/
H A Dservices.h41 int key; member in struct:scsi_key_strings
/illumos-gate/usr/src/lib/krb5/kadm5/
H A Dkadm_rpc.h145 krb5_keyblock key; member in struct:chrand_ret
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_input.c65 struct ieee80211_key *key; local
293 key = ieee80211_crypto_decap(ic, mp, hdrspace);
294 if (key == NULL) {
302 key = NULL;
331 if (key != NULL && !ieee80211_crypto_demic(ic, key, mp, 0)) {
360 * Only shared key auth frames with a challenge
381 key = ieee80211_crypto_decap(ic, mp, hdrspace);
382 if (key == NULL) {
588 * Allocate challenge text for use by shared-key authenticatio
[all...]
/illumos-gate/usr/src/uts/sun4u/serengeti/io/
H A Dsgsbbc_iosram.c148 master_iosram->tunnel->tunnel_keys[i].key = 0;
224 int i, key; local
262 key = iosram_convert_key(toc->iosram_keys[i].key);
263 if ((key > 0) && (key < SBBC_MAX_KEYS)) {
264 tunnel = &new_tunnel->tunnel_keys[key];
265 tunnel->key = key;
282 SGSBBC_DBG_ALL("%d: key
370 iosram_read(int key, uint32_t offset, caddr_t buf, uint32_t size) argument
376 iosram_write(int key, uint32_t offset, caddr_t buf, uint32_t size) argument
383 iosram_rw(int key, uint32_t offset, caddr_t buf, uint32_t size, int flag) argument
472 iosram_size(int key) argument
[all...]
/illumos-gate/usr/src/uts/common/sys/lvm/
H A Dmd_rename.h124 key_t key; member in struct:md_rename_transaction::md_rename_txn_unit_state
/illumos-gate/usr/src/uts/common/sys/
H A Dmhd.h67 uchar_t key[MHIOC_RESV_KEY_SIZE]; member in struct:mhioc_resv_key
95 mhioc_resv_key_t key; member in struct:mhioc_resv_desc
/illumos-gate/usr/src/uts/common/crypto/io/
H A Dskein_mod.c682 * mechanism and key.
686 crypto_key_t *key)
692 if (key->ck_format != CRYPTO_KEY_RAW)
698 SKEIN_OP(ctx, InitExt, ctx->sc_digest_bitlen, 0, key->ck_data,
699 CRYPTO_BITS2BYTES(key->ck_length));
713 * digest. The key must be in raw format.
717 crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
731 error = skein_mac_ctx_build(SKEIN_CTX(ctx), mechanism, key);
756 crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac,
768 error = skein_mac_ctx_build(&skein_ctx, mechanism, key);
685 skein_mac_ctx_build(skein_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key) argument
716 skein_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
754 skein_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
795 skein_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument
[all...]
/illumos-gate/usr/src/uts/common/io/sfxge/common/
H A Def10_rx.c329 __in_ecount(n) uint8_t *key,
359 RSS_CONTEXT_SET_KEY_IN_TOEPLITZ_KEY), key, n); local
448 * indirection table and key to be modified.
522 __in_ecount(n) uint8_t *key,
533 enp->en_rss_context, key, n)) != 0)
326 efx_mcdi_rss_context_set_key( __in efx_nic_t *enp, __in uint32_t rss_context, __in_ecount(n) uint8_t *key, __in size_t n) argument
520 ef10_rx_scale_key_set( __in efx_nic_t *enp, __in_ecount(n) uint8_t *key, __in size_t n) argument
H A Defx_rx.c63 __in_ecount(n) uint8_t *key,
365 __in_ecount(n) uint8_t *key,
374 if ((rc = erxop->erxo_scale_key_set(enp, key, n)) != 0)
592 /* The RSS key and indirection table are writable. */
759 __in_ecount(n) uint8_t *key,
769 /* Write Toeplitz IPv4 hash key */
774 oword.eo_u8[offset - 1] = key[byte++];
780 /* Verify Toeplitz IPv4 hash key */
785 if (oword.eo_u8[offset - 1] != key[byte++]) {
796 /* Write Toeplitz IPv6 hash key
363 efx_rx_scale_key_set( __in efx_nic_t *enp, __in_ecount(n) uint8_t *key, __in size_t n) argument
757 siena_rx_scale_key_set( __in efx_nic_t *enp, __in_ecount(n) uint8_t *key, __in size_t n) argument
[all...]
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dfsys_jfs.c61 isinxt (s64 key, s64 offset, s64 len) argument
63 return (key >= offset) ? (key < offset + len ? 1 : 0) : 0;
108 s64 key; local
114 key = (((inum >> L2INOSPERIAG) << L2INOSPERIAG) + 4096) >> jfs.l2bsize;
120 if (isinxt (key, offset, lengthXAD (xad))) {
121 devread ((addressXAD (xad) + key - offset) << jfs.bdlog,
/illumos-gate/usr/src/boot/sys/boot/efi/boot1/
H A Dboot1.c738 EFI_INPUT_KEY key; local
742 status = systab->ConIn->ReadKeyStroke(systab->ConIn, &key);
745 status = systab->ConIn->ReadKeyStroke(systab->ConIn, &key);
747 return (key.UnicodeChar);
/illumos-gate/usr/src/lib/nsswitch/nis/common/
H A Dgetnetgrent.c660 * Generate a key for a netgroup.byXXXX NIS map
663 makekey(key, name, domain)
664 char *key;
668 while (*key++ = *name++)
670 *(key-1) = '.';
671 while (*key++ = *domain++)
676 makekey_lc(key, name, domain)
677 char *key;
689 *key++ = c;
691 *key
726 char *key; local
[all...]
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaUtil.c38 CK_MECHANISM *pMechanism, meta_object_t *key)
99 session->init.key = key;
111 CK_MECHANISM *pMechanism, meta_object_t *key)
148 &mech, key);
231 rv = meta_object_get_clone(key, slotnum, init_session,
328 CK_MECHANISM *pMechanism, meta_object_t *key)
361 key);
405 rv = meta_object_get_clone(key, softtoken_slot_num,
550 session->init.key);
37 meta_operation_init_defer(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument
110 meta_operation_init(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument
327 meta_operation_init_softtoken(CK_FLAGS optype, meta_session_t *session, CK_MECHANISM *pMechanism, meta_object_t *key) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeystore.c169 * it can use it to generate encryption key as needed for
391 * the key itself.
490 * Unpack the key itself.
504 * key_dest: the key attribute will be unpacked and save in key_dest
511 * FALSE for key (use key_dest)
558 * object key (the third part) in a keystore format.
755 * Pack the object key (the third part) from the soft_object_t
1317 * Unpack the object key in keystore format (the third part)
1969 * key: output argument which contains the address of the
1970 * pointer to encryption key i
1988 soft_gen_crypt_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata) argument
2113 soft_gen_hmac_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata) argument
[all...]
H A DsoftRSA.c42 soft_rsa_encrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len, argument
55 rv = soft_get_public_value(key, CKA_PUBLIC_EXPONENT, expo,
61 rv = soft_get_private_value(key, CKA_PRIVATE_EXPONENT, expo,
68 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
88 soft_rsa_decrypt(soft_object_t *key, CK_BYTE_PTR in, uint32_t in_len, argument
108 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
113 rv = soft_get_private_value(key, CKA_PRIME_1, prime1, &prime1_len);
116 rv = soft_rsa_encrypt(key, in, in_len, out, 0);
123 rv = soft_get_private_value(key, CKA_PRIME_2, prime2, &prime2_len);
126 rv = soft_rsa_encrypt(key, i
246 soft_object_t *key = rsa_ctx->key; local
336 soft_object_t *key = rsa_ctx->key; local
530 soft_object_t *key = rsa_ctx->key; local
647 soft_object_t *key = rsa_ctx->key; local
747 soft_genRSAkey_set_attribute(soft_object_t *key, CK_ATTRIBUTE_TYPE type, uchar_t *buf, uint32_t buflen, boolean_t public) argument
983 soft_object_t *key = rsa_ctx->key; local
1098 soft_object_t *key = rsa_ctx->key; local
1182 soft_object_t *key = rsa_ctx->key; local
[all...]
H A DsoftSSL.c76 static uchar_t TLS_KEY_EXPANSION_LABEL[] = {"key expansion"};
79 static uchar_t TLS_CLIENT_KEY_LABEL[] = {"client write key"};
82 static uchar_t TLS_SERVER_KEY_LABEL[] = {"server write key"};
398 * . mech_p: key derivation mechanism. the mechanism parameter carries the
400 * . basekey_p: The pre-master secret key.
401 * . pTemplate & ulAttributeCount: Any extra attributes for the key to be
403 * . phKey: store for handle to the derived key.
462 /* Invalid pre-master key length. What else to return? */
584 * . mech_p: key derivation mechanism. the mechanism parameter carries the
586 * the specification of the key an
1023 soft_delete_derived_key(soft_session_t *sp, soft_object_t *key) argument
[all...]
/illumos-gate/usr/src/lib/print/libpapi-common/common/
H A Dattribute.c754 char *key, char **values)
766 if ((attr == NULL) || ((attr->name = strdup(key)) == NULL))
811 char *key, **values = NULL; local
818 key = ptr;
853 } else { /* boolean "[no]key" */
856 if (strncasecmp(key, "no", 2) == 0) {
857 key += 2;
865 result = _papiAttributeFromStrings(list, flags, key, values);
753 _papiAttributeFromStrings(papi_attribute_t ***list, int flags, char *key, char **values) argument
/illumos-gate/usr/src/lib/print/libprint/common/
H A Dnss_ldap.c202 * char **attrList - pointer to a list of attribute key values
545 /* get length of this key word */
1056 * key words that are not allowed.
1080 /* get length of this key word */
1084 /* check if the key word is allowed */
1108 attr[len] = '\0'; /* terminate the key */
1519 /* get length of this key word */
1652 /* get length of this key word */
2219 * The current list is updated to remove this key, and the new
2220 * key "valu
2254 char *key = NULL; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dwinreg_svc.c31 * of files. The top level keys are known as root keys and each key can
33 * the terms key and subkey are used interchangeably. Values, analogous
37 * which is analogous to a file system path. In the registry, the key
39 * in key or value names. Registry names are case-insensitive.
43 * The HKEY_LOCAL_MACHINE root key contains a subkey called System, and
242 winreg_subkey_t *key; local
244 if ((key = malloc(sizeof (winreg_subkey_t))) != NULL) {
245 bzero(key, sizeof (winreg_subkey_t));
246 (void) strlcpy(key->sk_name, subkey, MAXPATHLEN);
247 key
357 winreg_alloc_id(ndr_xa_t *mxa, const char *key) argument
399 winreg_subkey_t *key; local
489 winreg_subkey_t *key; local
539 winreg_subkey_t *key; local
568 winreg_subkey_t *key; local
817 winreg_subkey_t *key; local
[all...]
/illumos-gate/usr/src/lib/efcode/engine/
H A Denv.c98 * 'key?' - abort if stdin is not a tty.
118 forth_abort(env, "'key?' called in non-interactive mode");
122 * 'key' - abort if stdin is not a tty, will block on read if char not avail.
125 key(fcode_env_t *env) function
133 forth_abort(env, "'key' called in non-interactive mode");
842 ANSI(0x08d, 0, "key?", keyquestion);
843 ANSI(0x08e, 0, "key", key);
/illumos-gate/usr/src/lib/fm/libfmd_snmp/common/
H A Dproblem.c78 static sunFmProblem_data_t key; local
80 key.d_aci_uuid = uuid;
82 return (&key);
88 sunFmProblem_data_t *key, *data; local
90 key = problem_key_build(uuid);
93 data = uu_avl_find(problem_uuid_avl, key, NULL, NULL);
101 sunFmProblem_data_t *key, *data; local
104 key = problem_key_build(uuid);
107 (void) uu_avl_find(problem_uuid_avl, key, NULL, &idx);
/illumos-gate/usr/src/lib/fm/libfmnotify/common/
H A Dlibfmnotify.c335 nd_seq_search(char *key, char **list, uint_t nelem) argument
338 if (strcmp(key, list[i]) == 0)
478 const char *key[2]; local
491 key[0] = class;
492 key[1] = NULL;
493 if (fm_dc_key2code(dhp, key, buf, buflen) < 0) {
494 nd_error(nhdl, "fm_dc_key2code failed for %s", key[0]);

Completed in 137 milliseconds

<<21222324252627282930>>