/illumos-gate/usr/src/uts/common/io/scsi/adapters/scsi_vhci/fops/ |
H A D | tape.c | 186 uint8_t skey, asc, ascq; local 188 skey = scsi_sense_key(sense); 192 if (skey == KEY_ABORTED_COMMAND && 197 if (skey == KEY_NOT_READY &&
|
H A D | tpgs.c | 147 uint8_t *sns, skey, asc, ascq; local 151 skey = scsi_sense_key(sns); 154 if (skey == KEY_UNIT_ATTENTION) { 167 } else if (skey == KEY_NOT_READY) { 193 "ASCQ:%x", skey, asc, ascq); 435 uint8_t skey, asc, ascq; local 437 skey = scsi_sense_key(sense); 441 if ((skey == KEY_UNIT_ATTENTION) && 447 " sense:%x\n", skey, asc, ascq, rval)); 448 } else if ((skey [all...] |
H A D | asym_sun.c | 228 uint8_t *sns, skey, asc, ascq; local 321 skey = scsi_sense_key(sns); 324 if (skey == KEY_UNIT_ATTENTION) { 329 } else if ((skey == KEY_NOT_READY) && 350 "ASCQ:%x", skey, asc, ascq); 514 uint8_t skey, asc, ascq; local 516 skey = scsi_sense_key(sense); 520 if (skey == KEY_NOT_READY) { 538 " sense key:%x, ASC: %x, ASCQ:%x\n", skey, asc, ascq));
|
/illumos-gate/usr/src/lib/nsswitch/ldap/common/ |
H A D | getkeyent.c | 73 char *buffer, *pkey, *skey; local 123 skey = *skey_array + keytypelen; 126 len = strlen(pkey) + strlen(skey) + 2; 137 (void) snprintf(buffer, len, "%s:%s", pkey, skey);
|
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | key_call_uid.c | 159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, argument 174 arg.st_priv_key.keybuf3_val = (char *)skey; 201 (void) memcpy(&tmp.st_priv_key, skey, 208 (void) memcpy(&tmp.st_pub_key, skey,
|
H A D | dhkeys.c | 110 char *skey; local 116 if ((skey = malloc(skeylen)) == NULL) { 120 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { 123 if (skey[0]) { 126 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, 155 free(skey);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 241 char *skey, /* Our private key */ 249 MINT *sk = mp_xtom(skey); 240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
|
/illumos-gate/usr/src/uts/common/io/sfxge/common/ |
H A D | ef10_vpd.c | 187 efx_vpd_keyword_t skey; local 233 enp->en_arch.ef10.ena_svpd_length, &stag, &skey, 239 if (stag == dtag && skey == dkey) {
|
H A D | siena_vpd.c | 292 efx_vpd_keyword_t skey; local 338 enp->en_u.siena.enu_svpd_length, &stag, &skey, 344 if (stag == dtag && skey == dkey) {
|
/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 169 char *skey, /* out */ 176 if (! pkey || ! skey || ! pass) 180 __gen_dhkeys(pkey, skey, pass); 188 (*dlfp)(pkey, skey, pass); /* void */ 168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument
|
H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 206 if (skey && extract_secret(p, skey, passwd)) 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 289 if (skey && extract_secret(p, skey, passwd)) 329 getsecretkey(const char *netname, char *skey, const char *passwd) argument 331 return (getsecretkey_g(netname, KEYSIZE, 0, skey, HEXKEYBYTES+1, 427 char *skey, /* out */ 487 if (skey 422 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 628 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 402 Session_Key skey; local 429 skey.type = SK_DES; 430 skey.length = 8; 431 skey.data = session_key->contents; 432 encrypt_session_key(&skey); 470 skey.type = SK_DES; 471 skey.length = 8; 472 skey.data = session_key->contents; 473 encrypt_session_key(&skey);
|
/illumos-gate/usr/src/uts/common/io/scsi/adapters/scsi_vhci/ |
H A D | scsi_vhci_tpgs.c | 58 uint8_t *sns, skey, asc, ascq; local 130 skey = scsi_sense_key(sns); 134 if ((skey == KEY_UNIT_ATTENTION) && 141 " sense:%x\n", skey, asc, ascq, ss)); 142 } else if ((skey == KEY_ILLEGAL_REQUEST) && 148 " sense:%x\n", skey, asc, ascq, ss)); 149 } else if ((skey == KEY_ILLEGAL_REQUEST) && 155 " sense:%x\n", skey, asc, ascq, rval)); 166 skey, asc, ascq));
|
H A D | scsi_vhci.c | 2582 uint8_t *sns, skey; local 2620 skey = scsi_sense_key(sns); 2621 if ((skey == KEY_UNIT_ATTENTION) || 2622 (skey == KEY_NOT_READY)) { 2667 } else if (skey == KEY_ILLEGAL_REQUEST) 3162 uint8_t *sns, skey, asc, ascq; local 3229 skey = scsi_sense_key(sns); 3236 skey, asc, ascq)); 7001 uint8_t *sns, skey, asc, ascq; local 7005 skey 7370 uint8_t *sns, skey; local [all...] |
/illumos-gate/usr/src/cmd/rmt/ |
H A D | rmt.c | 284 char skey; local 288 if (read(0, &skey, 1) != 1) 303 switch (skey) {
|
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 611 * both, of skey or pkey may have zero length. If both lengths are 615 * Stores the specified netname/pkey/skey triplet in the keyserv. 623 const char *skey, 640 arg.st_priv_key.keybuf3_val = (char *)skey; 664 (void) memcpy(&tmp.st_priv_key, skey, 671 (void) memcpy(&tmp.st_pub_key, skey, 697 key_setnet_g(const char *netname, const char *skey, keylen_t skeylen, argument 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, 708 key_setnet_g_ruid(const char *netname, const char *skey, keylen_t skeylen, argument 711 return (key_setnet_g_ext(netname, skey, skeyle 621 key_setnet_g_ext( const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, int use_ruid) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/common/ |
H A D | kcmd.c | 78 static krb5_keyblock *skey; variable 486 skey = block->key; 487 final_enctype = skey->enctype; 500 switch (skey->enctype) { 550 skey, enc_keyusage_i[i], 555 skey, enc_keyusage_o[i], 647 cc = krb5_c_decrypt(kcmd_context, skey, 764 cc = krb5_c_encrypt(kcmd_context, skey,
|
/illumos-gate/usr/src/lib/libnisdb/yptol/ |
H A D | dit_access_utils.c | 1015 char *skey, *str; local 1036 if ((skey = am(myself, key->dsize + 1)) == 0) { 1040 (void) memcpy(skey, key->dptr, key->dsize); 1055 if (verifyIndexMatch(t, 0, 0, N2LKEY, skey) == 0 || 1056 verifyIndexMatch(t, 0, 0, N2LIPKEY, skey) == 0) 1073 myself, *statP, skey, t->dbId, map); 1089 myself, skey, t->dbId, map, 1116 myself, nr, skey, t->dbId, map, 1132 *statP, skey, 1141 if ((rc = verifyKey(skey, 1217 char *dn = 0, *skey, *svalue, *str; local [all...] |
/illumos-gate/usr/src/lib/fm/libdiskstatus/common/ |
H A D | ds_scsi.c | 340 uint_t skey, asc, ascq; local 365 &headers, &skey, &asc, &ascq)) == 0) { 390 } else if (SCSI_INVALID_OPCODE(skey, asc, ascq)) { 397 &headers, &skey, &asc, &ascq); 462 "ASC=0x%x ASCQ=0x%x)\n", skey, asc, ascq); 767 uint_t skey, asc, ascq; local 777 MODEPAGE_INFO_EXCPT_LEN, &sip->si_hdrs, &skey, &asc, 782 MODEPAGE_INFO_EXCPT_LEN, &junk_hdrs, &skey, &asc, &ascq); 787 "ASC=0x%x ASCQ=0x%x)", skey, asc, ascq); 835 uint_t skey, as local 908 uint_t skey, asc, ascq; local 963 uint_t skey, asc, ascq; local 1154 uint_t skey, asc, ascq; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 799 configure_stream(int fd, krb5_keyblock *skey, int dir, krb5_data *ivec, argument 806 switch (skey->enctype) { 834 skey->enctype); 840 if (skey->enctype != ENCTYPE_ARCFOUR_HMAC && 841 skey->enctype != ENCTYPE_ARCFOUR_HMAC_EXP) 852 (void) memcpy(&setup_info.key, skey->contents, skey->length); 854 setup_info.keylen = skey->length;
|
H A D | in.telnetd.c | 544 Session_Key skey; local 754 skey.type = SK_DES; 755 skey.length = DES_BLOCKSIZE; 756 skey.data = session_key->contents; 757 encrypt_session_key(&skey, &encr_data.encrypt); 758 encrypt_session_key(&skey, &encr_data.decrypt);
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | setkey.c | 473 appendsecretkey3(struct mechentry *mp, uid_t uid, setkeyarg3 *skey) argument 480 if ((skey == NULL) || (mp == NULL)) { 483 if (skey->key.keybuf3_len == 0) { 515 if ((cp->secretkey = cpykeybuf3(&skey->key)) == NULL) { 532 storesecretkey3(uid_t uid, setkeyarg3 *skey) argument 536 if (skey == NULL) { 539 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) { 542 return (appendsecretkey3(mp, uid, skey)); 549 pk_setkey3(uid_t uid, setkeyarg3 *skey) argument 580 setkeyarg3 skey; local [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/impl/ |
H A D | scsi_subr.c | 1629 uint8_t skey; local 1633 skey = sdsp->ds_key; 1637 skey = ext_sensep->es_key; 1639 return (skey);
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_client.c | 3736 nfs4_sharedfh_t skey; local 3739 skey.sfh_fh = *fh; 3740 key = &skey;
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2546 EVP_PKEY *skey = NULL; local 2603 skey = X509_get_pubkey(signer); 2604 if (skey == NULL) { 2609 ret = OCSP_BASICRESP_verify(bs, skey, 0); 2624 if (skey != NULL) { 2625 EVP_PKEY_free(skey);
|