/illumos-gate/usr/src/uts/common/fs/zfs/sys/ |
H A D | zap.h | 115 * First word of key (which must be an array of uint64) is 214 int zap_lookup_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key, 217 int zap_prefetch_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key, 235 int zap_add(objset_t *ds, uint64_t zapobj, const char *key, 238 int zap_add_uint64(objset_t *ds, uint64_t zapobj, const uint64_t *key, 252 int zap_update_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key, 265 int zap_length_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key, 277 int zap_remove_uint64(objset_t *os, uint64_t zapobj, const uint64_t *key, 317 int zap_increment_int(objset_t *os, uint64_t obj, uint64_t key, int64_t delta, 320 /* Here the key i [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softEC.c | 61 if (ecc_ctx->key != NULL) { 62 soft_cleanup_object(ecc_ctx->key); 63 free(ecc_ctx->key); 72 soft_free_ecprivkey(ECPrivateKey *key) argument 74 soft_free_ecparams(&key->ecParams, B_FALSE); 79 SECITEM_FreeItem(&key->version, B_FALSE); 80 free(key); 126 * into the corresponding key object. 129 soft_genECkey_set_attribute(soft_object_t *key, biginteger_t *bi, argument 136 dst = OBJ_PRI_EC_VALUE(key); 470 soft_object_t *key = ecc_ctx->key; local 535 soft_object_t *key = ecc_ctx->key; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/nfslog/ |
H A D | dbtab.c | 57 * file handle key length NFS_FHMAXDATA 91 static void debug_print_key(FILE *fp, char *str1, char *str2, char *key, 94 char *key, int ksize, char *data, int dsize); 142 * it comes to manipulating records with the same key, or using multiple keys, 150 * and secondary key for each file/link. 151 * The primary key is the pair (inode,gen) which can be obtained 153 * the full file handle and the secondary key (dfh-key,name) 155 * The secondary key is the pair (dfh-key,nam 221 datum key, data; local 386 debug_print_key(FILE *fp, char *str1, char *str2, char *key, int ksize) argument 435 debug_print_key_and_data(FILE *fp, char *str1, char *str2, char *key, int ksize, char *data, int dsize) argument 464 datum key, data; local 517 datum key, data; local 574 datum key; local 1677 datum key; local 1809 datum key; local [all...] |
/illumos-gate/usr/src/lib/nsswitch/dns/common/ |
H A D | gethostent.c | 145 he = _gethostbyname(&argp->h_errno, argp->key.name); 209 if (IN6_IS_ADDR_V4MAPPED((struct in6_addr *)argp->key.hostaddr.addr)) { 213 (void) memcpy(addrp, &argp->key.hostaddr.addr[12], addrlen); 215 addrp = (void *)argp->key.hostaddr.addr; 216 addrlen = argp->key.hostaddr.len; 217 af = argp->key.hostaddr.type; 227 ret = ent2str(he, a, argp->key.hostaddr.type); 229 ret = ent2result(he, a, argp->key.hostaddr.type);
|
/illumos-gate/usr/src/lib/nsswitch/nis/common/ |
H A D | ether_addr.c | 56 argp->key.name, 0)); 66 uchar_t *e = argp->key.ether;
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaCrypt.c | 46 meta_object_t *key; local 55 rv = meta_handle2object(hKey, &key); 61 rv = meta_operation_init_defer(CKF_ENCRYPT, session, pMechanism, key); 63 OBJRELEASE(key); 172 meta_object_t *key; local 181 rv = meta_handle2object(hKey, &key); 187 rv = meta_operation_init_defer(CKF_DECRYPT, session, pMechanism, key); 189 OBJRELEASE(key);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 120 des_setparity_g(des_block *key) argument 122 des_setparity((char *)key);
|
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | ClientMsgManager.java | 64 // Create the key. 66 String key = makeClassKey(keyName, version); 72 classTable.put(headerClass, key); 135 // Create the key for the hashtable.
|
/illumos-gate/usr/src/lib/libgen/common/ |
H A D | bgets.c | 83 static thread_key_t key = THR_ONCE_KEY; local 84 char *stop = _get_stop(&key);
|
H A D | bufsplit.c | 81 static thread_key_t key = THR_ONCE_KEY; local 82 char **bsplitchar = _get_bsplitchar(&key);
|
/illumos-gate/usr/src/lib/libnisdb/ |
H A D | nisdb_mt.cc | 42 __nisdb_tsd_destroy(void *key) { argument 44 nisdb_tsd_t *tsd = (nisdb_tsd_t *)key; 72 /* Can't store key */
|
/illumos-gate/usr/src/lib/libc/port/sys/ |
H A D | shmsys.c | 85 shmget(key_t key, size_t size, int shmflg) argument 87 return (syscall(SYS_shmsys, SHMGET, key, size, shmflg));
|
/illumos-gate/usr/src/lib/libcmd/common/ |
H A D | pids.c | 59 key(void* handle, Sffmt_t* fp, const char* arg, char** ps, Sflong_t* pn) function 117 sfkeyprintf(sfstdout, format, format, key, NiL);
|
/illumos-gate/usr/src/cmd/print/lpset/ |
H A D | lpset.c | 90 "[-a key=value] [-d key] (printer)\n"), 272 char *p, *key = NULL, *value = NULL; local 274 key = *(changes++); 276 for (p = key; ((p != NULL) && (*p != NULL)); p++) 287 if ((key != NULL) && (key[0] != NULL)) { 289 (ns_get_value(key, printer_obj) == NULL) && 293 key); 296 (void) ns_set_value_from_string(key, valu [all...] |
/illumos-gate/usr/src/cmd/getent/ |
H A D | dogetnetmask.c | 42 putnetmask(const struct in_addr key, const struct in_addr netmask, FILE *fp) argument 48 net.s_addr = ntohl(key.s_addr);
|
/illumos-gate/usr/src/cmd/stat/arcstat/ |
H A D | arcstat.pl | 218 foreach my $key (keys %cur) { 219 next if $key =~ /class/; 220 if (defined $prev{$key}) { 221 $d{$key} = $cur{$key} - $prev{$key}; 223 $d{$key} = $cur{$key};
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/keyhash_provider/ |
H A D | k5_kmd5des.c | 60 krb5_const krb5_keyblock *key, 74 if (key->length != MIT_DES_KEYSIZE) 121 bcopy(key->contents, xorkey, sizeof(xorkey)); 130 newkey.enctype = key->enctype; 155 krb5_const krb5_keyblock *key, 173 if (key->length != MIT_DES_KEYSIZE) 188 /* create and schedule the encryption key */ 189 (void) bcopy(key->contents, xorkey, sizeof(xorkey)); 200 newkey.enctype = key->enctype; 59 k5_md5des_hash(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_data *output) argument 154 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
|
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_sign.c | 77 * Compute HMAC-MD5 of packet data, using the stored MAC key. 87 crypto_data_t key; local 136 key.cd_format = CRYPTO_DATA_RAW; 137 key.cd_offset = 0; 138 key.cd_length = vcp->vc_mackeylen; 139 key.cd_miscdata = 0; 140 key.cd_raw.iov_base = (char *)vcp->vc_mackey; 141 key.cd_raw.iov_len = vcp->vc_mackeylen; 142 status = crypto_digest_update(crypto_ctx, &key, 0); 211 * Signing is required, but we have no key ye [all...] |
/illumos-gate/usr/src/uts/sun4u/serengeti/sys/ |
H A D | sgsbbc_iosram_priv.h | 80 #define INVALID_KEY(tunnel, x) (tunnel->tunnel_keys[(x)].key == 0) 98 int key; member in struct:tunnel_key
|
/illumos-gate/usr/src/uts/sun4u/opl/sys/scfd/ |
H A D | scfdscpif.h | 34 typedef uint32_t mkey_t; /* Data type for mailbox key */ 81 int scf_mb_flush(target_id_t target_id, uint32_t key, mflush_type_t flush_type); 83 int scf_mb_ctrl(target_id_t target_id, uint32_t key, uint32_t op, void *arg);
|
/illumos-gate/usr/src/lib/libnisdb/yptol/ |
H A D | map_conv.c | 151 datum key; local 208 for (key = dbm_firstkey(dbm), next_print = PRINT_FREQ, entry_count = 1; 209 NULL != key.dptr; key = dbm_nextkey(dbm), entry_count ++) { 212 if (0 == key.dsize) { 214 "Zero length key ignored in %s %s", map_name, domain); 219 if (is_special_key(&key)) 223 value = dbm_fetch(dbm, key); 226 if (SUCCESS != write_to_dit(map_name, domain, key, value,
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.h | 41 // Verify the ctx using the key and compare it against signature/siglen 42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen); 58 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
|
/illumos-gate/usr/src/boot/sys/boot/i386/common/ |
H A D | edd.h | 68 uint16_t key; member in struct:edd_device_path_v3 85 uint16_t key; member in struct:edd_device_path_v4
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 75 krb5_keyblock key; local 79 memset(&key, 0, sizeof (krb5_keyblock)); 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 91 entry.key = key; 100 krb5_free_keyblock_contents(ctx, &key); 116 * constructing the salt in the string-to-key function. 117 * where kvno is the key version number of the set of service principal 119 * where flags is the set of conditions that affects the key table entries 126 * where password is the password that will be used to derive the key fo 274 kt_remove_by_key(krb5_context ctx, char *key, uint_t type) argument [all...] |
/illumos-gate/usr/src/cmd/abi/appcert/scripts/ |
H A D | symreport.pl | 629 my ($key, $lib2, $app2, $sym2); 636 foreach $key (keys(%libapp)) { 637 ($lib2, $app2) = split(/\|/, $key); 642 foreach $key (keys(%libapp_private)) { 643 ($lib2, $app2) = split(/\|/, $key); 648 while (($key, $val) = each(%libsym_private)) { 649 ($lib2, $sym2) = split(/\|/, $key); 794 my (@pub, @priv, $lib2, $sym2, $text, $key); 799 foreach $key (keys(%$sym_public)) { 800 next unless (index($key, [all...] |