/illumos-gate/usr/src/uts/sun4v/io/n2rng/ |
H A D | n2rng_kcf.c | 129 /* handle info common to logical and hardware provider */ 153 /* handle hardware provider specific fields */ 185 /* Unregister provider without checking result */ 198 DBG0(n2rng, DKCF, "n2rng_kcf: Crypto provider already " 205 DBG0(n2rng, DKCF, "n2rng_kcf: Crypto provider " 227 DBG0(n2rng, DKCF, "n2rng_kcf: Crypto provider already " 232 DBG0(n2rng, DKCF, "n2rng_kcf: Crypto provider " 398 * So there are no failure conditions to report, and this provider is 403 n2rng_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 410 n2rng_random_number(crypto_provider_handle_t provider, argument [all...] |
/illumos-gate/usr/src/cmd/dtrace/test/tst/common/pid/ |
H A D | tst.provregex4.ksh | 30 # when a regex in the provider name matches both USDT probes and pid probes 71 provider pyramid {
|
/illumos-gate/usr/src/cmd/dtrace/test/tst/common/usdt/ |
H A D | tst.dlclose1.ksh | 81 provider test_prov {
|
H A D | tst.dlclose3.ksh | 30 # cause existing pid provider probes to become invalid. 81 provider test_prov {
|
H A D | tst.dlclose2.ksh | 76 provider test_prov {
|
/illumos-gate/usr/src/lib/udapl/udapl_tavor/common/ |
H A D | dapl_ia_query.c | 137 ia_ptr->header.provider->device_name, 185 * provider perspective. dat_registry will return success
|
H A D | dapl_ia_util.c | 68 dapl_ia_alloc(DAT_PROVIDER * provider, DAPL_HCA * hca_ptr) argument 84 ia_ptr->header.provider = provider;
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dprov.c | 30 * This file implements a "dummy" cryptographic provider. It is implemented 36 * This driver implements a KEF provider with the following capabilities: 52 * - provider management 57 * entry points, the driver specifies the software provider to 60 * User management: we implement a PKCS#11 style provider which supports: 64 * with the provider management entry points. 114 #define D_MGMT 0x00000800 /* provider management entry points */ 199 * CSPI information (entry points, provider info, etc.) 1070 * the CSPI greatly since the provider does not have to associate 1120 * Object attributes are passed to the provider usin 1910 dprov_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 2053 dprov_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 2219 dprov_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2253 dprov_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2443 dprov_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2585 dprov_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2754 dprov_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2839 dprov_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2974 dprov_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3061 dprov_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3333 dprov_encrypt_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *encrypt_mech, crypto_key_t *encrypt_key, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_spi_ctx_template_t encr_ctx_template, crypto_spi_ctx_template_t mac_ctx_template, crypto_req_handle_t req) argument 3500 dprov_mac_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_mechanism_t *decrypt_mech, crypto_key_t *decrypt_key, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_spi_ctx_template_t mac_ctx_template, crypto_spi_ctx_template_t decr_ctx_template, crypto_req_handle_t req) argument 3547 dprov_mac_verify_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_mechanism_t *decrypt_mech, crypto_key_t *decrypt_key, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_spi_ctx_template_t mac_ctx_template, crypto_spi_ctx_template_t decr_ctx_template, crypto_req_handle_t req) argument 3598 dprov_seed_random(crypto_provider_handle_t provider, crypto_session_id_t sid, uchar_t *buf, size_t len, uint_t entropy_est, uint32_t flags, crypto_req_handle_t req) argument 3621 dprov_generate_random(crypto_provider_handle_t provider, crypto_session_id_t sid, uchar_t *buf, size_t len, crypto_req_handle_t req) argument 3647 dprov_session_open(crypto_provider_handle_t provider, crypto_session_id_t *session_id, crypto_req_handle_t req) argument 3669 dprov_session_close(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_req_handle_t req) argument 3691 dprov_session_login(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_user_type_t user_type, char *pin, size_t pin_len, crypto_req_handle_t req) argument 3714 dprov_session_logout(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_req_handle_t req) argument 3740 dprov_object_create(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *object, crypto_req_handle_t req) argument 3766 dprov_object_copy(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_object_id_t object, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *new_object, crypto_req_handle_t req) argument 3792 dprov_object_destroy(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_object_id_t object, crypto_req_handle_t req) argument 3817 dprov_object_get_size(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_object_id_t object, size_t *size, crypto_req_handle_t req) argument 3842 dprov_object_get_attribute_value(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_object_id_t object, crypto_object_attribute_t *template, uint_t attribute_count, crypto_req_handle_t req) argument 3868 dprov_object_set_attribute_value(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_object_id_t object, crypto_object_attribute_t *template, uint_t attribute_count, crypto_req_handle_t req) argument 3894 dprov_object_find_init(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_object_attribute_t *template, uint_t attribute_count, void **provider_private, crypto_req_handle_t req) argument 3920 dprov_object_find(crypto_provider_handle_t provider, void *provider_private, crypto_object_id_t *objects, uint_t max_object_count, uint_t *object_count, crypto_req_handle_t req) argument 3946 dprov_object_find_final(crypto_provider_handle_t provider, void *provider_private, crypto_req_handle_t req) argument 3974 dprov_key_generate(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *object, crypto_req_handle_t req) argument 4000 dprov_key_generate_pair(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *public_key_template, uint_t public_key_attribute_count, crypto_object_attribute_t *private_key_template, uint_t private_key_attribute_count, crypto_object_id_t *public_key, crypto_object_id_t *private_key, crypto_req_handle_t req) argument 4032 dprov_key_wrap(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len_ptr, crypto_req_handle_t req) argument 4059 dprov_key_unwrap(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len_ptr, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *key, crypto_req_handle_t req) argument 4087 dprov_key_derive(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *base_key, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_id_t *key, crypto_req_handle_t req) argument 4117 dprov_ext_info(crypto_provider_handle_t provider, crypto_provider_ext_info_t *ext_info, crypto_req_handle_t req) argument 4139 dprov_init_token(crypto_provider_handle_t provider, char *pin, size_t pin_len, char *label, crypto_req_handle_t req) argument 4161 dprov_init_pin(crypto_provider_handle_t provider, crypto_session_id_t session_id, char *pin, size_t pin_len, crypto_req_handle_t req) argument 4184 dprov_set_pin(crypto_provider_handle_t provider, crypto_session_id_t session_id, char *old_pin, size_t old_pin_len, char *new_pin, size_t new_pin_len, crypto_req_handle_t req) argument 4712 dprov_copyin_mechanism(crypto_provider_handle_t provider, crypto_mechanism_t *umech, crypto_mechanism_t *kmech, int *out_error, int mode) argument 4806 dprov_copyout_mechanism(crypto_provider_handle_t provider, crypto_mechanism_t *kmech, crypto_mechanism_t *umech, int *out_error, int mode) argument 4828 dprov_free_mechanism(crypto_provider_handle_t provider, crypto_mechanism_t *mech) argument 4908 dprov_nostore_key_generate(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_attribute_t *out_template, uint_t out_attribute_count, crypto_req_handle_t req) argument 4936 dprov_nostore_key_generate_pair(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_object_attribute_t *public_key_template, uint_t public_key_attribute_count, crypto_object_attribute_t *private_key_template, uint_t private_key_attribute_count, crypto_object_attribute_t *out_public_key_template, uint_t out_public_key_attribute_count, crypto_object_attribute_t *out_private_key_template, uint_t out_private_key_attribute_count, crypto_req_handle_t req) argument 4972 dprov_nostore_key_derive(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *base_key, crypto_object_attribute_t *template, uint_t attribute_count, crypto_object_attribute_t *out_template, uint_t out_attribute_count, crypto_req_handle_t req) argument [all...] |
H A D | dca.c | 163 * CSPI information (entry points, provider info, etc.) 166 /* Mechanisms for the symmetric cipher provider */ 180 /* Mechanisms for the asymmetric cipher provider */ 352 /* Operations for the symmetric cipher provider */ 370 /* Operations for the asymmetric cipher provider */ 388 /* Provider information for the symmetric cipher provider */ 402 /* Provider information for the asymmetric cipher provider */ 3675 dca_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 3856 dca_encrypt_atomic(crypto_provider_handle_t provider, argument 3862 dca_t *softc = (dca_t *)provider; 4079 dca_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4251 dca_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4353 dca_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4506 dca_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4606 dca_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4644 dca_generate_random(crypto_provider_handle_t provider, crypto_session_id_t session_id, uchar_t *buf, size_t len, crypto_req_handle_t req) argument [all...] |
H A D | blowfish.c | 27 * Blowfish provider for the Kernel Cryptographic Framework (KCF) 60 * CSPI information (entry points, provider info, etc.) 262 * KCF software provider control entry points. 266 blowfish_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 272 * KCF software provider encrypt entry points. 594 blowfish_encrypt_atomic(crypto_provider_handle_t provider, argument 681 blowfish_decrypt_atomic(crypto_provider_handle_t provider, argument 767 * KCF software provider context template entry points. 771 blowfish_create_ctx_template(crypto_provider_handle_t provider, argument
|
H A D | skein_mod.c | 246 * KCF software provider control entry points. 250 skein_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 485 * KCF software provider digest entry points. 646 skein_digest_atomic(crypto_provider_handle_t provider, argument 754 skein_mac_atomic(crypto_provider_handle_t provider, argument 785 * KCF software provider context management entry points. 795 skein_create_ctx_template(crypto_provider_handle_t provider, argument
|
H A D | aes.c | 26 * AES provider for the Kernel Cryptographic Framework (KCF) 327 * KCF software provider control entry points. 331 aes_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 353 * KCF software provider encrypt entry points. 959 aes_encrypt_atomic(crypto_provider_handle_t provider, argument 1089 aes_decrypt_atomic(crypto_provider_handle_t provider, argument 1251 * KCF software provider context template entry points. 1255 aes_create_ctx_template(crypto_provider_handle_t provider, argument 1431 aes_mac_atomic(crypto_provider_handle_t provider, argument 1448 return (aes_encrypt_atomic(provider, session_i 1453 aes_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | ecc.c | 70 * CSPI information (entry points, provider info, etc.) 277 ecc_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 780 ecc_sign_atomic(crypto_provider_handle_t provider, argument 977 ecc_verify_atomic(crypto_provider_handle_t provider, argument 1038 ecc_nostore_key_generate_pair(crypto_provider_handle_t provider, argument 1170 ecc_nostore_key_derive(crypto_provider_handle_t provider, argument
|
H A D | md5_mod.c | 32 * Cryptographic Framework (KCF) as a software provider for the MD5 73 * CSPI information (entry points, provider info, etc.) 282 * KCF software provider control entry points. 286 md5_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 292 * KCF software provider digest entry points. 772 md5_digest_atomic(crypto_provider_handle_t provider, argument 843 * KCF software provider mac entry points. 1109 md5_mac_atomic(crypto_provider_handle_t provider, argument 1229 md5_mac_verify_atomic(crypto_provider_handle_t provider, argument 1419 * KCF software provider contex 1424 md5_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
H A D | sha1_mod.c | 44 * Cryptographic Framework (KCF) as a software provider for the SHA1 224 * KCF software provider control entry points. 228 sha1_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 234 * KCF software provider digest entry points. 715 sha1_digest_atomic(crypto_provider_handle_t provider, argument 787 * KCF software provider mac entry points. 1051 sha1_mac_atomic(crypto_provider_handle_t provider, argument 1171 sha1_mac_verify_atomic(crypto_provider_handle_t provider, argument 1360 * KCF software provider context management entry points. 1365 sha1_create_ctx_template(crypto_provider_handle_t provider, argument [all...] |
H A D | swrand.c | 27 * Software based random number provider for the Kernel Cryptographic 28 * Framework (KCF). This provider periodically collects unpredictable input 147 * CSPI information (entry points, provider info, etc.) 273 swrand_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 283 swrand_seed_random(crypto_provider_handle_t provider, crypto_session_id_t sid, argument 297 swrand_generate_random(crypto_provider_handle_t provider, argument
|
H A D | rsa.c | 27 * RSA provider for the Kernel Cryptographic Framework (KCF) 66 * CSPI information (entry points, provider info, etc.) 362 rsa_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 551 rsa_encrypt_atomic(crypto_provider_handle_t provider, argument 718 rsa_decrypt_atomic(crypto_provider_handle_t provider, argument 1214 rsa_sign_atomic(crypto_provider_handle_t provider, argument 1414 rsa_verify_atomic(crypto_provider_handle_t provider, argument 1542 rsa_verify_recover_atomic(crypto_provider_handle_t provider, argument
|
H A D | md4_mod.c | 33 * Cryptographic Framework (KCF) as a software provider for the MD4 68 * CSPI information (entry points, provider info, etc.) 197 * KCF software provider control entry points. 201 md4_provider_status(crypto_provider_handle_t provider, uint_t *status) argument 207 * KCF software provider digest entry points. 687 md4_digest_atomic(crypto_provider_handle_t provider, argument
|
/illumos-gate/usr/src/lib/libdtrace/common/ |
H A D | sched.d | 29 #pragma D depends_on provider sched
|
/illumos-gate/usr/src/cmd/idmap/idmapd/ |
H A D | directory_provider_builtin.c | 256 } else if (uu_strcaseeq(a, "x-sun-provider")) { 257 const char *provider = "Builtin"; local 258 de = str_list_dav(val, &provider, 1);
|
/illumos-gate/usr/src/lib/libshell/common/scripts/ |
H A D | shnote.sh | 143 # rec.provider 154 printf "title=%q description=%q date=%q provider=%q providertoken=%q url=%q\n" \ 158 "${rec.provider}" \ 280 provider="opensolaris.pastebin.ca"
|
/illumos-gate/usr/src/cmd/listen/ |
H A D | nlps_serv.c | 106 char *provider; local 108 provider = getenv("PMTAG"); 109 sprintf(Altbasedir, "%s/%s/", ALTDIR, provider); 110 sprintf(Basedir, "%s/%s/", BASEDIR, provider);
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_miscapi.c | 72 * but there is an unloaded software provider, this routine will attempt 100 * We get a list of mech names which have a hardware provider by walking 103 * is not disabled for the provider. Note that the hint list contains only 204 * may be the case that the caller never uses a provider. 494 * If more than one provider is capable of key checking for the mechanism, 497 * discovered with more recent providers. If at least one provider is 525 /* First let the software provider check this key */ 581 crypto_key_check_prov(crypto_provider_t provider, crypto_mechanism_t *mech, argument 584 kcf_provider_desc_t *pd = provider; 611 * the specified mechanism provider descripto 878 crypto_release_provider(crypto_provider_t provider) argument [all...] |
H A D | kcf_dual.c | 43 static int crypto_mac_decrypt_common_prov(crypto_provider_t provider, 50 crypto_encrypt_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, argument 57 * First try to find a provider for the encryption mechanism, that 62 kcf_provider_desc_t *pd = provider; 85 * provider 168 * Performs a dual encrypt/mac atomic operation. The provider and session 179 * First try to find a provider for the encryption mechanism, that 216 * provider 261 * mac_ctx_tmpl, once it picks a MAC provider. 414 crypto_encrypt_mac_init_prov(crypto_provider_t provider, argument 1080 crypto_mac_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mac_mech, crypto_mechanism_t *decr_mech, crypto_dual_data_t *ct, crypto_key_t *mac_key, crypto_key_t *decr_key, crypto_ctx_template_t mac_tmpl, crypto_ctx_template_t decr_tmpl, crypto_data_t *mac, crypto_data_t *pt, crypto_call_req_t *crq) argument 1109 crypto_mac_verify_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mac_mech, crypto_mechanism_t *decr_mech, crypto_dual_data_t *ct, crypto_key_t *mac_key, crypto_key_t *decr_key, crypto_ctx_template_t mac_tmpl, crypto_ctx_template_t decr_tmpl, crypto_data_t *mac, crypto_data_t *pt, crypto_call_req_t *crq) argument 1388 crypto_mac_decrypt_common_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mac_mech, crypto_mechanism_t *decr_mech, crypto_dual_data_t *ct, crypto_key_t *mac_key, crypto_key_t *decr_key, crypto_ctx_template_t mac_tmpl, crypto_ctx_template_t decr_tmpl, crypto_data_t *mac, crypto_data_t *pt, crypto_call_req_t *crq, boolean_t do_verify) argument 1836 crypto_mac_decrypt_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mac_mech, crypto_mechanism_t *decr_mech, crypto_key_t *mac_key, crypto_key_t *decr_key, crypto_ctx_template_t mac_tmpl, crypto_ctx_template_t decr_tmpl, crypto_context_t *ctxp, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/lib/ |
H A D | nfs_tbind.c | 552 do_one(char *provider, NETSELDECL(proto), struct protob *protobp0, argument 564 if (provider) 565 sock = bind_to_provider(provider, protobp0->serv, &retaddr, 574 protobp0->serv, provider ? provider : proto); 1196 * provider. We close the stream anyway. 1536 * T_ORDREL is received from the provider. We 1638 bind_to_provider(char *provider, char *serv, struct netbuf **addr, argument 1654 strcmp(nconf->nc_device, provider) == 0) { 1662 syslog(LOG_ERR, "couldn't find netconfig entry for provider [all...] |