Searched defs:key (Results 276 - 300 of 889) sorted by relevance

<<11121314151617181920>>

/illumos-gate/usr/src/tools/protocmp/
H A Dlist.c140 find_elem(elem_list *list, elem *key, int flag) argument
144 for (e = list->list[hash(key->name) % list->num_of_buckets]; e;
146 if (!name_compare(e, key))
163 find_elem_isa(elem_list *list, elem *key, int flag) argument
168 orig_arch = key->arch;
169 key->arch = P_ISA;
170 e = find_elem(list, key, flag);
171 key->arch = orig_arch;
181 find_elem_mach(elem_list *list, elem *key, int flag) argument
185 for (e = list->list[hash(key
[all...]
/illumos-gate/usr/src/uts/common/crypto/api/
H A Dkcf_digest.c418 * Performs a digest update on the specified key. Note that there is
422 crypto_digest_key_prov(crypto_context_t context, crypto_key_t *key, argument
441 error = KCF_PROV_DIGEST_KEY(pd, ctx, key, NULL);
445 ctx->cc_session, NULL, key, NULL, NULL);
H A Dkcf_keys.c120 crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len,
141 key, wrapped_key, wrapped_key_len, KCF_SWFP_RHNDL(crq));
145 NULL, 0, key, NULL, 0, NULL, wrapping_key, wrapped_key,
160 crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key,
182 count, key, KCF_SWFP_RHNDL(crq));
186 attrs, count, key, NULL, 0, NULL, unwrapping_key,
118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_call_req_t *crq) argument
157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, crypto_call_req_t *crq) argument
H A Dkcf_mac.c59 * CRYPTO_INVALID_KEY: bogus 'key' argument.
72 * key: pointer to a crypto_key_t structure.
76 * MAC with the 'mech' using 'key'. 'tmpl' is created by
83 * 'mech', using * the key 'key', on the specified provider with
96 crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key,
107 rv = kcf_get_hardware_provider(mech->cm_type, key,
115 KCF_WRAP_MAC_OPS_PARAMS(&params, KCF_OP_ATOMIC, sid, mech, key,
130 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac,
143 if ((pd = kcf_get_mech_provider(mech->cm_type, key,
95 crypto_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
129 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
219 crypto_mac_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
253 crypto_mac_verify(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument
371 crypto_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
434 crypto_mac_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_sign.c47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl,
59 rv = kcf_get_hardware_provider(mech->cm_type, key,
75 key, NULL, NULL, tmpl);
91 crypto_sign_init(crypto_mechanism_t *mech, crypto_key_t *key, argument
103 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error,
114 * freeing this tmpl and create a new one for the key and new SW
129 error = crypto_sign_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl,
228 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data,
240 rv = kcf_get_hardware_provider(mech->cm_type, key,
248 key, dat
46 crypto_sign_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
257 sign_sr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument
338 crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
377 crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
386 crypto_sign_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
H A Dkcf_verify.c47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl,
59 rv = kcf_get_hardware_provider(mech->cm_type, key,
75 key, NULL, NULL, tmpl);
92 crypto_verify_init(crypto_mechanism_t *mech, crypto_key_t *key, argument
104 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error,
115 * freeing this tmpl and create a new one for the key and new SW
130 error = crypto_verify_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl,
230 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data,
242 rv = kcf_get_hardware_provider(mech->cm_type, key,
250 key, dat
46 crypto_verify_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
259 verify_vr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument
341 crypto_verify(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument
350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument
379 crypto_verify_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument
388 crypto_verify_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument
[all...]
/illumos-gate/usr/src/uts/common/crypto/io/
H A Ddca_dsa.c53 crypto_key_t *key, int kmflag, int mode);
383 crypto_key_t *key, int kmflag, int mode)
405 if ((attr = dca_get_key_attr(key)) == NULL) {
406 DBG(NULL, DWARN, "dca_dsainit: key attributes missing");
412 if (dca_attr_lookup_uint8_array(attr, key->ck_count, CKA_PRIME,
414 DBG(NULL, DWARN, "dca_dsainit: prime key value not present");
420 if (dca_attr_lookup_uint8_array(attr, key->ck_count, CKA_SUBPRIME,
422 DBG(NULL, DWARN, "dca_dsainit: subprime key value not present");
428 if (dca_attr_lookup_uint8_array(attr, key->ck_count, CKA_BASE,
430 DBG(NULL, DWARN, "dca_dsainit: base key valu
382 dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, int mode) argument
542 dca_dsaatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *sig, int kmflag, crypto_req_handle_t req, int mode) argument
[all...]
/illumos-gate/usr/src/uts/common/inet/ipf/
H A Dip_lookup.c610 iplookupiterkey_t key; local
612 key.ilik_key = type;
614 if (key.ilik_unstr.ilik_ival != IPFGENITER_LOOKUP)
617 switch (key.ilik_unstr.ilik_type)
620 fr_htable_iterderef((u_int)key.ilik_unstr.ilik_otype,
621 (int)key.ilik_unstr.ilik_unit, data, ifs);
624 ip_pool_iterderef((u_int)key.ilik_unstr.ilik_otype,
625 (int)key.ilik_unstr.ilik_unit, data, ifs);
/illumos-gate/usr/src/lib/udapl/libdat/common/
H A Ddat_dictionary.c54 DAT_PROVIDER_INFO key; member in struct:DAT_DICTIONARY_NODE
258 IN const DAT_PROVIDER_INFO *key,
269 if (DAT_SUCCESS == dat_dictionary_search(p_dictionary, key, NULL)) {
274 dat_status = dat_dictionary_key_dup(key, &cur_node->key);
304 IN const DAT_PROVIDER_INFO *key,
317 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key,
318 key)) {
376 IN const DAT_PROVIDER_INFO *key,
390 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key,
255 dat_dictionary_insert( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY entry, IN const DAT_PROVIDER_INFO *key, IN DAT_DICTIONARY_DATA data) argument
302 dat_dictionary_search( IN DAT_DICTIONARY *p_dictionary, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument
373 dat_dictionary_remove( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY *p_entry, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument
[all...]
/illumos-gate/usr/src/uts/common/io/
H A Dsad_conf.c46 * Unfortunately, it's not possible to hash by a different key or to easily
75 sad_hash_alg(void *hash_data, mod_hash_key_t key) argument
77 struct apcommon *apc = (struct apcommon *)key;
139 sad_hash_free_value(mod_hash_key_t key, mod_hash_val_t *val, void *arg) argument
/illumos-gate/usr/src/uts/common/ipp/ipgpc/
H A Dtrie.c76 * 1 a mismatch occured between the insert key and the value at the node
77 * 2 the insert key specifies a shorter key than the one at the node
78 * 3 the insert key specifies a longer key than the one at the node
83 * and a "key" in this example is actaully some value of key_len n that
85 * For example: key = 1011 with key_len = 8, would actaully be the key:mask
110 * inserting key 11101111 would results in the following split
206 * t_insert(tid, id, key, mas
216 t_insert(trie_id_t *tid, key_t id, uint32_t key, uint32_t mask) argument
330 t_insert6(trie_id_t *tid, key_t id, in6_addr_t key, in6_addr_t mask) argument
399 t_traverse_delete(node_t **in_node, uint8_t pos, key_t id, uint32_t key, uint32_t mask, trie_id_t **tid) argument
602 t_remove(trie_id_t *tid, key_t id, uint32_t key, uint32_t mask) argument
627 t_remove6(trie_id_t *tid, key_t id, in6_addr_t key, in6_addr_t mask) argument
702 t_retrieve(trie_id_t *tid, uint32_t key, ht_match_t *fid_table) argument
779 t_retrieve6(trie_id_t *tid, in6_addr_t key, ht_match_t *fid_table) argument
[all...]
/illumos-gate/usr/src/uts/common/kiconv/kiconv_sc/
H A Dkiconv_cck_common.c292 * Search key in tbl[0] <= tbl[1] <= ... <= tbl[n-1]. Return 0 if not found.
296 kiconv_binsearch(uint32_t key, void *tbl, size_t nitems) argument
308 if (key < table[mid].key)
310 else if (key > table[mid].key)
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb_cpw.c71 /* Find last key version number */
111 krb5_keyblock key; local
180 /* there used to be code here to extract the old key, and derive
181 a new key from it. Now that there's a unified prng, that isn't
184 /* make new key */
186 &key)))
194 &key, NULL, kvno,
197 krb5_free_keyblock_contents(context, &key);
246 * Change random key for a krb5_db_entry
303 * Add random key fo
373 krb5_keyblock key; local
[all...]
H A Dkdb_default.c48 * If kvno is 0 get the key which is maxkvno for the princ and matches
71 /* Get the max key version */
143 krb5_def_store_mkey(context, keyfile, mname, key, master_pwd)
147 krb5_keyblock *key;
187 enctype = key->enctype;
190 (fwrite((krb5_pointer) &key->length,
191 sizeof(key->length), 1, kf) != 1) ||
192 (fwrite((krb5_pointer) key->contents,
193 sizeof(key->contents[0]), (unsigned) key
208 krb5_db_def_fetch_mkey( krb5_context context, krb5_principal mname, krb5_keyblock *key, int *kvno, char *db_args) argument
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_compat.h69 old_krb5_encrypted_keyblock key; member in struct:_old_krb5_db_entry
73 krb5_kvno mkvno; /* master encryption key vno */
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/
H A Dhash_bigkey.c46 * Big key/data handling for the hashing package.
80 * You need to do an insert and the key/data pair is greater than
88 __big_insert(hashp, pagep, key, val)
91 const DBT *key, *val;
97 key_data = (int8_t *)key->data;
98 key_size = key->size;
114 /* Move the key's data. */
116 /* Mark the page as to how much key & data is on this page. */
158 /* Get first page with big key/data. */
181 * Given a key, indicate
295 __get_bigkey(HTAB *hashp, PAGE16 *pagep, indx_t ndx, DBT *key) argument
[all...]
/illumos-gate/usr/src/lib/libast/common/path/
H A Dpathprobe.c110 char key[16]; local
138 pathkey(key, attr, lang, tool, proc);
141 strncopy(p, key, x - p);
189 strncopy(p, key, x - p);
H A Dpathtemp.c91 uint32_t key; member in struct:__anon2659
108 uint32_t key; local
152 tmp.key = (tmp.seed = (tmp.rng = dir ? (uint32_t)strtoul(dir, NiL, 0) : (uint32_t)1) != 0)? (uint32_t)0x63c63cd9L : 0;
301 if (!tmp.key)
302 tmp.key = (tmp.rng >> 16) | ((tmp.rng & 0xffff) << 16);
303 tmp.rng ^= tmp.key;
317 key = tmp.rng * tmp.key + tv.tv_nsec;
320 tmp.key = tmp.rng * key
[all...]
/illumos-gate/usr/src/uts/common/io/kbtrans/
H A Dkbtrans.c76 * key - scancode
80 * if it exists. If there is no raw callback, the key is translated.
87 kbtrans_key_t key,
91 "newstate=%d key=%d", state, key));
100 cb->kc_keypressed_raw(lower->kbtrans_upper, key);
103 cb->kc_keyreleased_raw(lower->kbtrans_upper, key);
110 * translate the scancode into a key.
112 kbtrans_translate(lower, cb, key, state);
121 * key
85 kbtrans_processkey(struct kbtrans_lower *lower, struct keyboard_callback *cb, kbtrans_key_t key, enum keystate state) argument
129 kbtrans_translate(struct kbtrans_lower *lower, struct keyboard_callback *cb, kbtrans_key_t key, enum keystate newstate) argument
[all...]
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto.c66 * Default "null" key management routines.
73 *keyix = 0; /* use key index 0 for ucast key */
101 * Reset key state to an unused state. The crypto
102 * key allocation mechanism insures other state (e.g.
103 * key data) is properly setup before a key is used.
116 * Establish a relationship between the specified key and cipher
118 * Note that when a fixed key index is required it must be specified
121 * This must be the first call applied to a key; al
129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, struct ieee80211_key *key) argument
253 ieee80211_crypto_delkey_locked(ieee80211com_t *ic, struct ieee80211_key *key) argument
281 ieee80211_crypto_delkey(ieee80211com_t *ic, struct ieee80211_key *key) argument
313 ieee80211_crypto_setkey(ieee80211com_t *ic, struct ieee80211_key *key, const uint8_t *macaddr) argument
359 struct ieee80211_key *key; local
[all...]
/illumos-gate/usr/src/uts/sun4u/serengeti/sys/
H A Dsgsbbc_iosram_priv.h80 #define INVALID_KEY(tunnel, x) (tunnel->tunnel_keys[(x)].key == 0)
98 int key; member in struct:tunnel_key
/illumos-gate/usr/src/uts/sun4u/starcat/sys/
H A Diosramio.h66 extern int iosram_rd(uint32_t key, uint32_t off, uint32_t len, caddr_t dptr);
67 extern int iosram_wr(uint32_t key, uint32_t off, uint32_t len, caddr_t dptr);
68 extern int iosram_force_write(uint32_t key, uint32_t off, uint32_t len,
70 extern int iosram_get_flag(uint32_t key, uint8_t *data_valid,
72 extern int iosram_set_flag(uint32_t key, uint8_t data_valid,
75 extern int iosram_register(uint32_t key, void (*handler)(), void *arg);
76 extern int iosram_unregister(uint32_t key);
77 extern int iosram_ctrl(uint32_t key, uint32_t cmd, void *arg);
126 uint32_t key; /* IOSRAM chunk key */ member in struct:iosram_io
[all...]
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/
H A Ddisp4.c430 long key; local
435 getmessage (m, S_SEND_FAULT, &printerOrForm, &key, &alert_text);
437 (printerOrForm ? printerOrForm : "NULL"), key,
441 pps->exec->key != key || !pps->request) {
457 long key; local
462 getmessage(m, S_CLEAR_FAULT, &printerOrForm, &key, &alert_text);
464 (printerOrForm ? printerOrForm : "NULL"), key,
468 if (! (pps = search_pstatus(printerOrForm)) || ((key > 0) &&
469 ((!pps->exec) || pps->exec->key !
[all...]
/illumos-gate/usr/src/lib/libnisdb/yptol/
H A Dshim.c35 * NOTE : There is a major bug/feature in dbm. A key obtained by
38 * and the static strings pointed to by the key are destroyed. The
41 * key data in malloced memory. This is freed when map_ctrl is
116 shim_dbm_delete(DBM *db, datum key) argument
130 dbm_delete(map->ttl, key);
133 ret = dbm_delete(map->entries, key);
152 shim_dbm_fetch(DBM *db, datum key) argument
165 if (SUCCESS == update_entry_if_required(map, &key)) {
167 ret = dbm_fetch(map->entries, key);
171 ret = dbm_fetch(map->entries, key);
191 shim_dbm_fetch_noupdate(DBM *db, datum key) argument
454 shim_dbm_store(DBM *db, datum key, datum content, int store_mode) argument
565 datum key; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dinq_context.c209 krb5_keyblock *key; local
216 key = ctx->have_acceptor_subkey ? ctx->acceptor_subkey : ctx->subkey;
218 keyvalue.value = key->contents;
219 keyvalue.length = key->length;
231 key->enctype,

Completed in 137 milliseconds

<<11121314151617181920>>