Searched refs:key (Results 401 - 425 of 1341) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/uts/common/fs/zfs/sys/
H A Dzap.h115 * First word of key (which must be an array of uint64) is
214 int zap_lookup_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key,
217 int zap_prefetch_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key,
235 int zap_add(objset_t *ds, uint64_t zapobj, const char *key,
238 int zap_add_uint64(objset_t *ds, uint64_t zapobj, const uint64_t *key,
252 int zap_update_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key,
265 int zap_length_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key,
277 int zap_remove_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key,
317 int zap_increment_int(objset_t *os, uint64_t obj, uint64_t key, int64_t delta,
320 /* Here the key i
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftEC.c61 if (ecc_ctx->key != NULL) {
62 soft_cleanup_object(ecc_ctx->key);
63 free(ecc_ctx->key);
72 soft_free_ecprivkey(ECPrivateKey *key) argument
74 soft_free_ecparams(&key->ecParams, B_FALSE);
79 SECITEM_FreeItem(&key->version, B_FALSE);
80 free(key);
126 * into the corresponding key object.
129 soft_genECkey_set_attribute(soft_object_t *key, biginteger_t *bi, argument
136 dst = OBJ_PRI_EC_VALUE(key);
470 soft_object_t *key = ecc_ctx->key; local
535 soft_object_t *key = ecc_ctx->key; local
[all...]
/illumos-gate/usr/src/cmd/fs.d/nfs/nfslog/
H A Ddbtab.c57 * file handle key length NFS_FHMAXDATA
91 static void debug_print_key(FILE *fp, char *str1, char *str2, char *key,
94 char *key, int ksize, char *data, int dsize);
142 * it comes to manipulating records with the same key, or using multiple keys,
150 * and secondary key for each file/link.
151 * The primary key is the pair (inode,gen) which can be obtained
153 * the full file handle and the secondary key (dfh-key,name)
155 * The secondary key is the pair (dfh-key,nam
221 datum key, data; local
386 debug_print_key(FILE *fp, char *str1, char *str2, char *key, int ksize) argument
435 debug_print_key_and_data(FILE *fp, char *str1, char *str2, char *key, int ksize, char *data, int dsize) argument
464 datum key, data; local
517 datum key, data; local
574 datum key; local
1677 datum key; local
1809 datum key; local
[all...]
/illumos-gate/usr/src/lib/nsswitch/dns/common/
H A Dgethostent.c145 he = _gethostbyname(&argp->h_errno, argp->key.name);
209 if (IN6_IS_ADDR_V4MAPPED((struct in6_addr *)argp->key.hostaddr.addr)) {
213 (void) memcpy(addrp, &argp->key.hostaddr.addr[12], addrlen);
215 addrp = (void *)argp->key.hostaddr.addr;
216 addrlen = argp->key.hostaddr.len;
217 af = argp->key.hostaddr.type;
227 ret = ent2str(he, a, argp->key.hostaddr.type);
229 ret = ent2result(he, a, argp->key.hostaddr.type);
/illumos-gate/usr/src/lib/nsswitch/nis/common/
H A Dether_addr.c56 argp->key.name, 0));
66 uchar_t *e = argp->key.ether;
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaCrypt.c46 meta_object_t *key; local
55 rv = meta_handle2object(hKey, &key);
61 rv = meta_operation_init_defer(CKF_ENCRYPT, session, pMechanism, key);
63 OBJRELEASE(key);
172 meta_object_t *key; local
181 rv = meta_handle2object(hKey, &key);
187 rv = meta_operation_init_defer(CKF_DECRYPT, session, pMechanism, key);
189 OBJRELEASE(key);
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c120 des_setparity_g(des_block *key) argument
122 des_setparity((char *)key);
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/
H A DClientMsgManager.java64 // Create the key.
66 String key = makeClassKey(keyName, version);
72 classTable.put(headerClass, key);
135 // Create the key for the hashtable.
/illumos-gate/usr/src/lib/libgen/common/
H A Dbgets.c83 static thread_key_t key = THR_ONCE_KEY; local
84 char *stop = _get_stop(&key);
H A Dbufsplit.c81 static thread_key_t key = THR_ONCE_KEY; local
82 char **bsplitchar = _get_bsplitchar(&key);
/illumos-gate/usr/src/lib/libnisdb/
H A Dnisdb_mt.cc42 __nisdb_tsd_destroy(void *key) { argument
44 nisdb_tsd_t *tsd = (nisdb_tsd_t *)key;
72 /* Can't store key */
/illumos-gate/usr/src/lib/libc/port/sys/
H A Dshmsys.c85 shmget(key_t key, size_t size, int shmflg) argument
87 return (syscall(SYS_shmsys, SHMGET, key, size, shmflg));
/illumos-gate/usr/src/lib/libcmd/common/
H A Dpids.c59 key(void* handle, Sffmt_t* fp, const char* arg, char** ps, Sflong_t* pn) function
117 sfkeyprintf(sfstdout, format, format, key, NiL);
/illumos-gate/usr/src/cmd/print/lpset/
H A Dlpset.c90 "[-a key=value] [-d key] (printer)\n"),
272 char *p, *key = NULL, *value = NULL; local
274 key = *(changes++);
276 for (p = key; ((p != NULL) && (*p != NULL)); p++)
287 if ((key != NULL) && (key[0] != NULL)) {
289 (ns_get_value(key, printer_obj) == NULL) &&
293 key);
296 (void) ns_set_value_from_string(key, valu
[all...]
/illumos-gate/usr/src/cmd/getent/
H A Ddogetnetmask.c42 putnetmask(const struct in_addr key, const struct in_addr netmask, FILE *fp) argument
48 net.s_addr = ntohl(key.s_addr);
/illumos-gate/usr/src/cmd/stat/arcstat/
H A Darcstat.pl218 foreach my $key (keys %cur) {
219 next if $key =~ /class/;
220 if (defined $prev{$key}) {
221 $d{$key} = $cur{$key} - $prev{$key};
223 $d{$key} = $cur{$key};
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/
H A Dk5_kmd5des.c60 krb5_const krb5_keyblock *key,
74 if (key->length != MIT_DES_KEYSIZE)
121 bcopy(key->contents, xorkey, sizeof(xorkey));
130 newkey.enctype = key->enctype;
155 krb5_const krb5_keyblock *key,
173 if (key->length != MIT_DES_KEYSIZE)
188 /* create and schedule the encryption key */
189 (void) bcopy(key->contents, xorkey, sizeof(xorkey));
200 newkey.enctype = key->enctype;
59 k5_md5des_hash(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument
154 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/
H A Dsmb_sign.c77 * Compute HMAC-MD5 of packet data, using the stored MAC key.
87 crypto_data_t key; local
136 key.cd_format = CRYPTO_DATA_RAW;
137 key.cd_offset = 0;
138 key.cd_length = vcp->vc_mackeylen;
139 key.cd_miscdata = 0;
140 key.cd_raw.iov_base = (char *)vcp->vc_mackey;
141 key.cd_raw.iov_len = vcp->vc_mackeylen;
142 status = crypto_digest_update(crypto_ctx, &key, 0);
211 * Signing is required, but we have no key ye
[all...]
/illumos-gate/usr/src/uts/sun4u/serengeti/sys/
H A Dsgsbbc_iosram_priv.h80 #define INVALID_KEY(tunnel, x) (tunnel->tunnel_keys[(x)].key == 0)
98 int key; member in struct:tunnel_key
/illumos-gate/usr/src/uts/sun4u/opl/sys/scfd/
H A Dscfdscpif.h34 typedef uint32_t mkey_t; /* Data type for mailbox key */
81 int scf_mb_flush(target_id_t target_id, uint32_t key, mflush_type_t flush_type);
83 int scf_mb_ctrl(target_id_t target_id, uint32_t key, uint32_t op, void *arg);
/illumos-gate/usr/src/lib/libnisdb/yptol/
H A Dmap_conv.c151 datum key; local
208 for (key = dbm_firstkey(dbm), next_print = PRINT_FREQ, entry_count = 1;
209 NULL != key.dptr; key = dbm_nextkey(dbm), entry_count ++) {
212 if (0 == key.dsize) {
214 "Zero length key ignored in %s %s", map_name, domain);
219 if (is_special_key(&key))
223 value = dbm_fetch(dbm, key);
226 if (SUCCESS != write_to_dit(map_name, domain, key, value,
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DCryptoAlg.h41 // Verify the ctx using the key and compare it against signature/siglen
42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
58 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
/illumos-gate/usr/src/boot/sys/boot/i386/common/
H A Dedd.h68 uint16_t key; member in struct:edd_device_path_v3
85 uint16_t key; member in struct:edd_device_path_v4
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_solaris.c75 krb5_keyblock key; local
79 memset(&key, 0, sizeof (krb5_keyblock));
88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
91 entry.key = key;
100 krb5_free_keyblock_contents(ctx, &key);
116 * constructing the salt in the string-to-key function.
117 * where kvno is the key version number of the set of service principal
119 * where flags is the set of conditions that affects the key table entries
126 * where password is the password that will be used to derive the key fo
274 kt_remove_by_key(krb5_context ctx, char *key, uint_t type) argument
[all...]
/illumos-gate/usr/src/cmd/abi/appcert/scripts/
H A Dsymreport.pl629 my ($key, $lib2, $app2, $sym2);
636 foreach $key (keys(%libapp)) {
637 ($lib2, $app2) = split(/\|/, $key);
642 foreach $key (keys(%libapp_private)) {
643 ($lib2, $app2) = split(/\|/, $key);
648 while (($key, $val) = each(%libsym_private)) {
649 ($lib2, $sym2) = split(/\|/, $key);
794 my (@pub, @priv, $lib2, $sym2, $text, $key);
799 foreach $key (keys(%$sym_public)) {
800 next unless (index($key,
[all...]

Completed in 78 milliseconds

<<11121314151617181920>>