/illumos-gate/usr/src/cmd/mdb/common/modules/mr_sas/ |
H A D | mr_sas.c | 137 int rv = DCMD_OK; local 203 return (rv);
|
/illumos-gate/usr/src/cmd/modload/ |
H A D | rem_drv.c | 273 int rv = DI_WALK_CONTINUE; local 278 rv = devfs_walk_minor_nodes(path, 282 return (rv);
|
/illumos-gate/usr/src/cmd/expr/ |
H A D | compile.c | 146 int rv; local 190 if ((rv = regcomp(®_comp.r_stp, instr, regcomp_flags)) != 0) { 191 regerrno = map_errnos(rv); /* Convert regcomp error */ 207 if ((rv = regcomp(®_comp.r_adv, instrp, regcomp_flags)) != 0) { 208 regerrno = map_errnos(rv); /* Convert regcomp error */ 287 int rv; local 298 rv = dhl_doit(str, &(((struct regex_comp *) ep)->r_adv), 0); 300 return (rv); 312 int rv; local 327 if ((rv [all...] |
/illumos-gate/usr/src/cmd/fm/fmd/common/ |
H A D | fmd_scheme.c | 62 int rv = 1; local 72 rv = mp->mod_vers != NULL && 77 return (rv); 85 int rv = 1; local 95 rv = mp->mod_vers != NULL && 100 return (rv ? FMD_OBJ_STATE_STILL_PRESENT : FMD_OBJ_STATE_REPLACED); 108 int rv = 1; local 117 rv = mp->mod_error != 0; 121 return (rv ? FMD_SERVICE_STATE_UNUSABLE : FMD_SERVICE_STATE_OK); 129 int rv local [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 360 int rv; local 531 if ((rv = kmf_initialize(&kmfhandle, NULL, NULL)) != KMF_OK) { 537 rv = genkey_nss(kmfhandle, tokenname, dir, prefix, 540 rv = genkey_file(kmfhandle, keyAlg, keylen, dir, outkey, 543 rv = genkey_pkcs11(kmfhandle, tokenname, keylabel, keyAlg, 548 if (rv != KMF_OK) 549 display_error(kmfhandle, rv, 556 if (rv != KMF_OK)
|
H A D | genkeypair.c | 320 int rv; local 425 if ((rv = kmf_initialize(&kmfhandle, NULL, NULL)) != KMF_OK) { 461 rv = PK_ERR_USAGE; 473 rv = PK_ERR_USAGE; 482 rv = PK_ERR_USAGE; 500 rv = genkeypair_nss(kmfhandle, 505 rv = genkeypair_pkcs11(kmfhandle, 510 rv = genkeypair_file(kmfhandle, keyAlg, keylen, 514 if (rv != KMF_OK) 515 display_error(kmfhandle, rv, [all...] |
H A D | setpin.c | 46 int rv = 0; local 55 rv = configure_nss(handle, dir, prefix); 56 if (rv != KMF_OK) 57 return (rv); 69 if ((rv = get_pin(gettext("Enter current token passphrase " 76 if ((rv = get_pin(gettext("Create new passphrase:"), gettext( 78 if (rv == CKR_PIN_INCORRECT) 102 rv = kmf_set_token_pin(handle, numattrs, setpinattrs); 109 return (rv); 119 CK_RV rv local 238 int rv; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | demand.c | 223 int c, rv; local 225 rv = 0; 233 rv = 1; 257 return rv;
|
/illumos-gate/usr/src/cmd/hotplugd/ |
H A D | hotplugd.c | 192 boolean_t rv = B_FALSE; local 196 rv = priv_isfullset(privset); 201 return (rv);
|
H A D | hotplugd_impl.c | 70 int rv; local 82 if ((rv = getinfo(path, connection, 0, &root)) != 0) { 84 dprintf("changestate: getinfo() failed (%s)\n", strerror(rv)); 85 return (rv); 100 if ((rv = rcm_resources(root, &rsrcs)) != 0) { 104 return (rv); 109 ((rv = rcm_offline(rsrcs, flags, root)) != 0)) { 115 return (rv); 132 rv = 0; 134 rv 171 int rv; local [all...] |
/illumos-gate/usr/src/cmd/lms/heci/ |
H A D | HECIUnix.cpp | 219 int rv = 0; local 225 rv = read(_fd, (void*)buffer, len); 226 if (rv < 0) { 229 fprintf(stderr, "read failed with status %d %d\n", rv, error); 234 fprintf(stderr, "read succeded with result %d\n", rv); 237 return rv; 242 int rv = 0; local 254 rv = write(_fd, (void *)buffer, len); 255 if (rv < 0) { 258 fprintf(stderr,"write failed with status %d %d\n", rv, erro [all...] |
/illumos-gate/usr/src/cmd/truss/ |
H A D | ipc.c | 112 int rv; local 115 rv = mutex_lock(&gps->ps_mutex0); 117 rv = mutex_lock(&gps->ps_mutex1); 121 if (rv != 0) { 125 errno = rv; 138 int rv; local 141 rv = mutex_unlock(&gps->ps_mutex0); 143 rv = mutex_unlock(&gps->ps_mutex1); 148 if (rv != 0) { 152 errno = rv; [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | derive.c | 143 krb5_error_code rv = 0; local 173 rv = krb5_derive_key(context, enc, key, 175 if (rv != 0) { 178 return (rv); 180 rv = add_derived_key(key, usage, DK_ENCR_KEY_BYTE, 183 if (rv != 0) { 186 return (rv); 212 rv = krb5_derive_key(context, enc, key, *d_hmac_key, &d1); 213 if (rv != 0) { 216 return (rv); [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 28 CK_RV rv; local 34 if ((rv = get_algo(key->enctype, algos)) != CKR_OK) { 57 if ((rv = C_CreateObject(session, template, 61 "k5_arcfour_decrypt: rv = 0x%x.", rv); 80 CK_RV rv; local 138 rv = C_DecryptInit(session, &mechanism, *kptr); 140 if (rv != CKR_OK) { 142 "k5_arcfour_decrypt: rv = 0x%x", rv); 197 CK_RV rv; local [all...] |
/illumos-gate/usr/src/uts/common/disp/ |
H A D | class.c | 87 int rv = 0; local 104 rv = EINVAL; 108 return (rv);
|
/illumos-gate/usr/src/tools/chk4ubin/ |
H A D | chk4ubin.c | 139 int rv = 1; local 191 rv = 0; 226 return (rv);
|
/illumos-gate/usr/src/tools/ctf/cvt/ |
H A D | strtab.c | 112 int rv; local 121 if ((rv = strncmp(buf, str, n)) != 0) 122 return (rv);
|
/illumos-gate/usr/src/tools/install.bin/ |
H A D | install.bin.c | 168 int rv = 0; local 216 rv = creatdir(ins_file); 217 if (rv) { 221 return (rv);
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_digest.c | 102 int rv; local 107 rv = kcf_get_hardware_provider(mech->cm_type, NULL, 111 if (rv != CRYPTO_SUCCESS) 112 return (rv); 118 rv = kcf_submit_request(real_provider, NULL, crq, ¶ms, B_FALSE); 122 return (rv);
|
H A D | kcf_keys.c | 47 int rv; local 52 rv = kcf_get_hardware_provider(mech->cm_type, NULL, 56 if (rv != CRYPTO_SUCCESS) 57 return (rv); 61 rv = KCF_PROV_KEY_GENERATE(real_provider, sid, 63 KCF_PROV_INCRSTATS(pd, rv); 67 rv = kcf_submit_request(real_provider, NULL, crq, 73 return (rv); 86 int rv; local 91 rv 126 int rv; local 166 int rv; local 206 int rv; local [all...] |
H A D | kcf_mac.c | 102 int rv; local 107 rv = kcf_get_hardware_provider(mech->cm_type, key, 111 if (rv != CRYPTO_SUCCESS) 112 return (rv); 117 rv = kcf_submit_request(real_provider, NULL, crq, ¶ms, B_FALSE); 121 return (rv); 226 int rv; local 231 rv = kcf_get_hardware_provider(mech->cm_type, key, 235 if (rv != CRYPTO_SUCCESS) 236 return (rv); 375 int rv; local 529 int rv; local 578 int rv; local [all...] |
H A D | kcf_sign.c | 50 int rv; local 59 rv = kcf_get_hardware_provider(mech->cm_type, key, 63 if (rv != CRYPTO_SUCCESS) 64 return (rv); 76 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, B_FALSE); 80 if ((rv == CRYPTO_SUCCESS) || (rv == CRYPTO_QUEUED)) 87 return (rv); 181 int rv; local 192 rv 207 int rv; local 235 int rv; local 355 int rv; local 390 int rv; local [all...] |
H A D | kcf_verify.c | 50 int rv; local 59 rv = kcf_get_hardware_provider(mech->cm_type, key, 63 if (rv != CRYPTO_SUCCESS) 64 return (rv); 76 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, B_FALSE); 80 if ((rv == CRYPTO_SUCCESS) || (rv == CRYPTO_QUEUED)) 87 return (rv); 183 int rv; local 194 rv 210 int rv; local 237 int rv; local 357 int rv; local 392 int rv; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_policy.c | 246 int rv; local 274 rv = kcf_policy_add_entry(new_desc); 275 if (rv != CRYPTO_SUCCESS) { 278 return (rv); 309 int rv; local 336 rv = kcf_policy_add_entry(new_desc); 337 if (rv != CRYPTO_SUCCESS) { 340 return (rv);
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dca_dsa.c | 63 int rv = CRYPTO_QUEUED; local 70 rv = CRYPTO_DATA_LEN_RANGE; 80 rv = CRYPTO_BUFFER_TOO_SMALL; 100 rv = err; 111 rv = CRYPTO_DEVICE_ERROR; 138 rv = dca_start(dca, reqp, MCR2, 1); 142 if (rv != CRYPTO_QUEUED && rv != CRYPTO_BUFFER_TOO_SMALL) 145 return (rv); 207 int rv local 390 int rv = CRYPTO_SUCCESS; local 548 int rv; local [all...] |