Searched refs:key (Results 501 - 525 of 1341) sorted by relevance

<<21222324252627282930>>

/illumos-gate/usr/src/uts/common/sys/
H A Dkbtrans.h152 * When a key is pressed or released, the hardware module should
153 * call kbtrans, passing the key number and its new
158 extern void kbtrans_streams_key(struct kbtrans *, kbtrans_key_t key,
H A Dmhd.h67 uchar_t key[MHIOC_RESV_KEY_SIZE]; member in struct:mhioc_resv_key
95 mhioc_resv_key_t key; member in struct:mhioc_resv_desc
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb5.h138 krb5_keyblock *key);
141 krb5_keyblock **key);
153 krb5_keyblock *key,
158 krb5_keyblock *key,
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_compat.h69 old_krb5_encrypted_keyblock key; member in struct:_old_krb5_db_entry
73 krb5_kvno mkvno; /* master encryption key vno */
/illumos-gate/usr/src/uts/sun4u/serengeti/sys/
H A Dsgsbbc_iosram.h61 * size of the IOSRAM key
67 char key[KEY_SIZE]; /* Key value as defined above */ member in struct:iosram_key
/illumos-gate/usr/src/lib/libc/port/locale/
H A Dcollatefile.h104 int32_t key; member in struct:collate_subst
/illumos-gate/usr/src/cmd/lvm/rpc.metamedd/
H A Dmed_hash.h35 void *key; member in struct:item_t
/illumos-gate/usr/src/lib/print/libprint/common/
H A Dns_bsd_addr.c176 value_to_string(const char *key, void *value) argument
180 if ((key != NULL) && (value != NULL)) {
181 if (strcmp(key, NS_KEY_BSDADDR) == 0) {
183 } else if ((strcmp(key, NS_KEY_ALL) == 0) ||
184 (strcmp(key, NS_KEY_GROUP) == 0)) {
186 } else if (strcmp(key, NS_KEY_LIST) == 0) {
198 string_to_value(const char *key, char *string) argument
202 if ((key != NULL) && (string != NULL) && (string[0] != NULL)) {
203 if (strcmp(key, NS_KEY_BSDADDR) == 0) {
205 } else if ((strcmp(key, NS_KEY_AL
[all...]
/illumos-gate/usr/src/cmd/avs/dsw/
H A Diiboot.c313 char key[CFG_MAX_KEY], buf[CFG_MAX_BUF], sn[CFG_MAX_BUF]; local
341 (void) snprintf(key, CFG_MAX_KEY, "ii.set%d", setno);
342 if (cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF) < 0) {
382 if (cfg_put_cstring(cfg, key, NULL, 0) < 0) {
558 char key[CFG_MAX_KEY]; local
588 (void) snprintf(key, sizeof (key), "ii.set%d", setnumber);
589 rc = cfg_get_cstring(cfg, key, buf, CFG_MAX_BUF);
605 (void) snprintf(key, sizeof (key), "i
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkey.c43 KMF_KEY_HANDLE key; local
52 gettext("A key label must be specified \n"));
60 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE));
70 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE));
114 KMF_KEY_HANDLE key; local
128 gettext("A key label must be specified \n"));
164 (void) memset(&key, 0, sizeof (KMF_KEY_HANDLE));
174 KMF_KEY_HANDLE_ATTR, &key, sizeof (KMF_KEY_HANDLE));
217 gettext("Warning: can not reveal the key value "
218 "for a sensitive or non-extractable key
259 KMF_KEY_HANDLE key; local
[all...]
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/
H A Ddup_avl.c132 fragment_t key; local
147 key.fr_pfn = fragno;
148 dup = avl_find(&dup_frags, (void *)&key, &where);
405 claimant_t key; local
408 key.cl_inode = ino;
409 key.cl_lfn = lfn;
410 claimant = avl_find(&dup->fr_claimants, &key, &where);
444 claimant_t key; local
447 key.cl_inode = ino;
448 key
[all...]
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto_ccmp.c116 * Add privacy headers appropriate for the specified key.
154 * received frame. The specified key should be correct but
230 aes_ccm_encrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, argument
246 crkey.ck_data = (char *)key;
283 aes_ccm_decrypt(CK_AES_CCM_PARAMS *cmparam, const uint8_t *key, int keylen, argument
299 crkey.ck_data = (char *)key;
425 ccmp_encrypt(struct ieee80211_key *key, mblk_t *mp, int hdrlen) argument
437 ccmp_init(wh, key->wk_keytsc, data_len, b0, aad);
447 key->wk_key, key
456 ccmp_decrypt(struct ieee80211_key *key, uint64_t pn, mblk_t *mp, int hdrlen) argument
[all...]
/illumos-gate/usr/src/lib/nsswitch/files/common/
H A Dbootparams_getbyname.c53 return (_nss_files_XY_bootparams(be, argp, argp->key.name));
85 * filter not useful here since the key
139 if (strcasecmp(args->key.name, host) != 0) {
/illumos-gate/usr/src/lib/nsswitch/nis/common/
H A Dgetnetent.c50 argp->key.name, 0));
63 if (nettoa((int)argp->key.netaddr.net, addrstr, 16, &pnull) != 0)
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/des/
H A Dweak_key.c69 * mit_des_is_weak_key: returns true iff key is a [semi-]weak des key.
71 * Requires: key has correct odd parity.
74 mit_des_is_weak_key(mit_des_cblock key) argument
80 if (!memcmp(weak_p++,key,sizeof(mit_des_cblock)))
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_ctxops.c52 * key: pointer to a crypto_key_t structure.
76 crypto_create_ctx_template(crypto_mechanism_t *mech, crypto_key_t *key, argument
108 error = KCF_PROV_CREATE_CTX_TEMPLATE(pd, &prov_mech, key,
H A Dkcf_keys.c120 crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len,
141 key, wrapped_key, wrapped_key_len, KCF_SWFP_RHNDL(crq));
145 NULL, 0, key, NULL, 0, NULL, wrapping_key, wrapped_key,
160 crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key,
182 count, key, KCF_SWFP_RHNDL(crq));
186 attrs, count, key, NULL, 0, NULL, unwrapping_key,
118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_call_req_t *crq) argument
157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, crypto_call_req_t *crq) argument
/illumos-gate/usr/src/uts/common/sys/idm/
H A Didm_text.h36 * we can use case statements to handle a particular key-value pair
39 * We want to use a bitmask to keep track of negotiated key-value pairs
143 idm_lookup_kv_xlate(const char *key, int keylen);
146 idm_nvlist_add_keyvalue(nvlist_t *nvl, char *key, int keylen, char *value);
/illumos-gate/usr/src/lib/libast/common/comp/
H A Dhsearch.c77 free(((Hash_t*)obj)->item.key);
129 if(!(o = (Hash_t*)dtmatch(Hashtab,item.key)) && action == ENTER &&
/illumos-gate/usr/src/lib/libast/common/vmalloc/
H A Dvmmopen.c63 int key; /* identifying key */ member in struct:_user_s
291 Void_t* vmmset(Vmalloc_t* vm, int key, Void_t* data, int set) argument
293 Void_t* vmmset(vm, data, key, set)
295 int key; /* key of data to be set */
304 if(u->key == key)
317 u->key = key;
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsmb_autohome.c304 * only used for key substitution, so that the caller sees the entry
397 char key[SMB_AUTOHOME_KEYSIZ]; local
402 (void) strlcpy(key, buf, SMB_AUTOHOME_KEYSIZ);
404 if ((tmp = strpbrk(key, " \t")) == NULL)
410 * Substitution characters are not allowed in the key.
412 if (strpbrk(key, "?&") != NULL)
415 if (strcmp(key, "*") == 0 && name != NULL)
416 (void) strlcpy(key, name, SMB_AUTOHOME_KEYSIZ);
418 (void) strsubst(buf, '?', *key);
425 (void) strlcpy(ampersand, key, bufsiz
[all...]
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c191 bcrypt(key, salt)
192 const char *key;
253 key_len = (uint8_t)(strlen(key) + (minor >= 'a' ? 1 : 0));
261 key_len = strlen(key);
270 (uint8_t *)key, key_len);
272 Blowfish_expand0state(&state, (uint8_t *)key, key_len);
/illumos-gate/usr/src/lib/libsocket/inet/
H A Dether_addr.c91 arg.key.name = host;
116 arg.key.ether = (void *)e;
160 * then do a match for the ether key) and happens for "nis"
166 * then do a match for the host key) and happens for "nis"
242 static thread_key_t key = THR_ONCE_KEY; local
249 if (thr_keycreate_once(&key, free) != 0)
251 eabuf = pthread_getspecific(key);
254 (void) thr_setspecific(key, eabuf);
/illumos-gate/usr/src/cmd/dtrace/test/cmd/scripts/
H A Ddtest.pl715 foreach $key (keys %results) {
716 my $passed = $results{$key}{"passed"};
717 my $bypassed = $results{$key}{"bypassed"};
718 my $failed = $results{$key}{"failed"};
719 my $total = $results{$key}{"total"};
721 logmsg("\n mode: " . $key . "\n");
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/
H A Detypes.c396 get_cipher_mech_type(krb5_context context, krb5_keyblock *key) argument
401 if (key == NULL)
406 if (kt->etype == key->enctype) {
419 get_hash_mech_type(krb5_context context, krb5_keyblock *key) argument
424 if (key == NULL)
429 if (kt->etype == key->enctype) {

Completed in 124 milliseconds

<<21222324252627282930>>