/illumos-gate/usr/src/uts/common/sys/ |
H A D | kbtrans.h | 152 * When a key is pressed or released, the hardware module should 153 * call kbtrans, passing the key number and its new 158 extern void kbtrans_streams_key(struct kbtrans *, kbtrans_key_t key,
|
H A D | mhd.h | 67 uchar_t key[MHIOC_RESV_KEY_SIZE]; member in struct:mhioc_resv_key 95 mhioc_resv_key_t key; member in struct:mhioc_resv_desc
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb5.h | 138 krb5_keyblock *key); 141 krb5_keyblock **key); 153 krb5_keyblock *key, 158 krb5_keyblock *key,
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_compat.h | 69 old_krb5_encrypted_keyblock key; member in struct:_old_krb5_db_entry 73 krb5_kvno mkvno; /* master encryption key vno */
|
/illumos-gate/usr/src/uts/sun4u/serengeti/sys/ |
H A D | sgsbbc_iosram.h | 61 * size of the IOSRAM key 67 char key[KEY_SIZE]; /* Key value as defined above */ member in struct:iosram_key
|
/illumos-gate/usr/src/lib/libc/port/locale/ |
H A D | collatefile.h | 104 int32_t key; member in struct:collate_subst
|
/illumos-gate/usr/src/cmd/lvm/rpc.metamedd/ |
H A D | med_hash.h | 35 void *key; member in struct:item_t
|
/illumos-gate/usr/src/lib/print/libprint/common/ |
H A D | ns_bsd_addr.c | 176 value_to_string(const char *key, void *value) argument 180 if ((key != NULL) && (value != NULL)) { 181 if (strcmp(key, NS_KEY_BSDADDR) == 0) { 183 } else if ((strcmp(key, NS_KEY_ALL) == 0) || 184 (strcmp(key, NS_KEY_GROUP) == 0)) { 186 } else if (strcmp(key, NS_KEY_LIST) == 0) { 198 string_to_value(const char *key, char *string) argument 202 if ((key != NULL) && (string != NULL) && (string[0] != NULL)) { 203 if (strcmp(key, NS_KEY_BSDADDR) == 0) { 205 } else if ((strcmp(key, NS_KEY_AL [all...] |
/illumos-gate/usr/src/cmd/avs/dsw/ |
H A D | iiboot.c | 313 char key[CFG_MAX_KEY], buf[CFG_MAX_BUF], sn[CFG_MAX_BUF]; local 341 (void) snprintf(key, CFG_MAX_KEY, "ii.set%d", setno); 342 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0) { 382 if (cfg_put_cstring(cfg, key, NULL, 0) < 0) { 558 char key[CFG_MAX_KEY]; local 588 (void) snprintf(key, sizeof (key), "ii.set%d", setnumber); 589 rc = cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF); 605 (void) snprintf(key, sizeof (key), "i [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 43 KMF_KEY_HANDLE key; local 52 gettext("A key label must be specified \n")); 60 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE)); 70 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE)); 114 KMF_KEY_HANDLE key; local 128 gettext("A key label must be specified \n")); 164 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE)); 174 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE)); 217 gettext("Warning: can not reveal the key value " 218 "for a sensitive or non-extractable key 259 KMF_KEY_HANDLE key; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/ |
H A D | dup_avl.c | 132 fragment_t key; local 147 key.fr_pfn = fragno; 148 dup = avl_find(&dup_frags, (void *)&key, &where); 405 claimant_t key; local 408 key.cl_inode = ino; 409 key.cl_lfn = lfn; 410 claimant = avl_find(&dup->fr_claimants, &key, &where); 444 claimant_t key; local 447 key.cl_inode = ino; 448 key [all...] |
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 116 * Add privacy headers appropriate for the specified key. 154 * received frame. The specified key should be correct but 230 aes_ccm_encrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, argument 246 crkey.ck_data = (char *)key; 283 aes_ccm_decrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, argument 299 crkey.ck_data = (char *)key; 425 ccmp_encrypt(struct ieee80211_key *key, mblk_t *mp, int hdrlen) argument 437 ccmp_init(wh, key->wk_keytsc, data_len, b0, aad); 447 key->wk_key, key 456 ccmp_decrypt(struct ieee80211_key *key, uint64_t pn, mblk_t *mp, int hdrlen) argument [all...] |
/illumos-gate/usr/src/lib/nsswitch/files/common/ |
H A D | bootparams_getbyname.c | 53 return (_nss_files_XY_bootparams(be, argp, argp->key.name)); 85 * filter not useful here since the key 139 if (strcasecmp(args->key.name, host) != 0) {
|
/illumos-gate/usr/src/lib/nsswitch/nis/common/ |
H A D | getnetent.c | 50 argp->key.name, 0)); 63 if (nettoa((int)argp->key.netaddr.net, addrstr, 16, &pnull) != 0)
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/ |
H A D | weak_key.c | 69 * mit_des_is_weak_key: returns true iff key is a [semi-]weak des key. 71 * Requires: key has correct odd parity. 74 mit_des_is_weak_key(mit_des_cblock key) argument 80 if (!memcmp(weak_p++,key,sizeof(mit_des_cblock)))
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_ctxops.c | 52 * key: pointer to a crypto_key_t structure. 76 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, argument 108 error = KCF_PROV_CREATE_CTX_TEMPLATE(pd, &prov_mech, key,
|
H A D | kcf_keys.c | 120 crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, 141 key, wrapped_key, wrapped_key_len, KCF_SWFP_RHNDL(crq)); 145 NULL, 0, key, NULL, 0, NULL, wrapping_key, wrapped_key, 160 crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, 182 count, key, KCF_SWFP_RHNDL(crq)); 186 attrs, count, key, NULL, 0, NULL, unwrapping_key, 118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_call_req_t *crq) argument 157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, crypto_call_req_t *crq) argument
|
/illumos-gate/usr/src/uts/common/sys/idm/ |
H A D | idm_text.h | 36 * we can use case statements to handle a particular key-value pair 39 * We want to use a bitmask to keep track of negotiated key-value pairs 143 idm_lookup_kv_xlate(const char *key, int keylen); 146 idm_nvlist_add_keyvalue(nvlist_t *nvl, char *key, int keylen, char *value);
|
/illumos-gate/usr/src/lib/libast/common/comp/ |
H A D | hsearch.c | 77 free(((Hash_t*)obj)->item.key); 129 if(!(o = (Hash_t*)dtmatch(Hashtab,item.key)) && action == ENTER &&
|
/illumos-gate/usr/src/lib/libast/common/vmalloc/ |
H A D | vmmopen.c | 63 int key; /* identifying key */ member in struct:_user_s 291 Void_t* vmmset(Vmalloc_t* vm, int key, Void_t* data, int set) argument 293 Void_t* vmmset(vm, data, key, set) 295 int key; /* key of data to be set */ 304 if(u->key == key) 317 u->key = key; [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | smb_autohome.c | 304 * only used for key substitution, so that the caller sees the entry 397 char key[SMB_AUTOHOME_KEYSIZ]; local 402 (void) strlcpy(key, buf, SMB_AUTOHOME_KEYSIZ); 404 if ((tmp = strpbrk(key, " \t")) == NULL) 410 * Substitution characters are not allowed in the key. 412 if (strpbrk(key, "?&") != NULL) 415 if (strcmp(key, "*") == 0 && name != NULL) 416 (void) strlcpy(key, name, SMB_AUTOHOME_KEYSIZ); 418 (void) strsubst(buf, '?', *key); 425 (void) strlcpy(ampersand, key, bufsiz [all...] |
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 191 bcrypt(key, salt) 192 const char *key; 253 key_len = (uint8_t)(strlen(key) + (minor >= 'a' ? 1 : 0)); 261 key_len = strlen(key); 270 (uint8_t *)key, key_len); 272 Blowfish_expand0state(&state, (uint8_t *)key, key_len);
|
/illumos-gate/usr/src/lib/libsocket/inet/ |
H A D | ether_addr.c | 91 arg.key.name = host; 116 arg.key.ether = (void *)e; 160 * then do a match for the ether key) and happens for "nis" 166 * then do a match for the host key) and happens for "nis" 242 static thread_key_t key = THR_ONCE_KEY; local 249 if (thr_keycreate_once(&key, free) != 0) 251 eabuf = pthread_getspecific(key); 254 (void) thr_setspecific(key, eabuf);
|
/illumos-gate/usr/src/cmd/dtrace/test/cmd/scripts/ |
H A D | dtest.pl | 715 foreach $key (keys %results) { 716 my $passed = $results{$key}{"passed"}; 717 my $bypassed = $results{$key}{"bypassed"}; 718 my $failed = $results{$key}{"failed"}; 719 my $total = $results{$key}{"total"}; 721 logmsg("\n mode: " . $key . "\n");
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | etypes.c | 396 get_cipher_mech_type(krb5_context context, krb5_keyblock *key) argument 401 if (key == NULL) 406 if (kt->etype == key->enctype) { 419 get_hash_mech_type(krb5_context context, krb5_keyblock *key) argument 424 if (key == NULL) 429 if (kt->etype == key->enctype) {
|