/illumos-gate/usr/src/tools/protocmp/ |
H A D | list.c | 140 find_elem(elem_list *list, elem *key, int flag) argument 144 for (e = list->list[hash(key->name) % list->num_of_buckets]; e; 146 if (!name_compare(e, key)) 163 find_elem_isa(elem_list *list, elem *key, int flag) argument 168 orig_arch = key->arch; 169 key->arch = P_ISA; 170 e = find_elem(list, key, flag); 171 key->arch = orig_arch; 181 find_elem_mach(elem_list *list, elem *key, int flag) argument 185 for (e = list->list[hash(key [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_digest.c | 418 * Performs a digest update on the specified key. Note that there is 422 crypto_digest_key_prov(crypto_context_t context, crypto_key_t *key, argument 441 error = KCF_PROV_DIGEST_KEY(pd, ctx, key, NULL); 445 ctx->cc_session, NULL, key, NULL, NULL);
|
H A D | kcf_keys.c | 120 crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, 141 key, wrapped_key, wrapped_key_len, KCF_SWFP_RHNDL(crq)); 145 NULL, 0, key, NULL, 0, NULL, wrapping_key, wrapped_key, 160 crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, 182 count, key, KCF_SWFP_RHNDL(crq)); 186 attrs, count, key, NULL, 0, NULL, unwrapping_key, 118 crypto_key_wrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *wrapping_key, crypto_object_id_t *key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_call_req_t *crq) argument 157 crypto_key_unwrap(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *unwrapping_key, uchar_t *wrapped_key, size_t *wrapped_key_len, crypto_object_attribute_t *attrs, uint_t count, crypto_object_id_t *key, crypto_call_req_t *crq) argument
|
H A D | kcf_mac.c | 59 * CRYPTO_INVALID_KEY: bogus 'key' argument. 72 * key: pointer to a crypto_key_t structure. 76 * MAC with the 'mech' using 'key'. 'tmpl' is created by 83 * 'mech', using * the key 'key', on the specified provider with 96 crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, 107 rv = kcf_get_hardware_provider(mech->cm_type, key, 115 KCF_WRAP_MAC_OPS_PARAMS(¶ms, KCF_OP_ATOMIC, sid, mech, key, 130 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, 143 if ((pd = kcf_get_mech_provider(mech->cm_type, key, 95 crypto_mac_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 129 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 219 crypto_mac_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 253 crypto_mac_verify(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac, crypto_call_req_t *crq) argument 371 crypto_mac_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_spi_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 434 crypto_mac_init(crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_sign.c | 47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, 59 rv = kcf_get_hardware_provider(mech->cm_type, key, 75 key, NULL, NULL, tmpl); 91 crypto_sign_init(crypto_mechanism_t *mech, crypto_key_t *key, argument 103 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error, 114 * freeing this tmpl and create a new one for the key and new SW 129 error = crypto_sign_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl, 228 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, 240 rv = kcf_get_hardware_provider(mech->cm_type, key, 248 key, dat 46 crypto_sign_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 227 crypto_sign_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 257 sign_sr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument 338 crypto_sign(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 347 crypto_sign_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 377 crypto_sign_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 386 crypto_sign_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
H A D | kcf_verify.c | 47 crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, 59 rv = kcf_get_hardware_provider(mech->cm_type, key, 75 key, NULL, NULL, tmpl); 92 crypto_verify_init(crypto_mechanism_t *mech, crypto_key_t *key, argument 104 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error, 115 * freeing this tmpl and create a new one for the key and new SW 130 error = crypto_verify_init_prov(pd, pd->pd_sid, mech, key, spi_ctx_tmpl, 230 crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, 242 rv = kcf_get_hardware_provider(mech->cm_type, key, 250 key, dat 46 crypto_verify_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument 229 crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 259 verify_vr_atomic_common(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq, crypto_func_group_t fg) argument 341 crypto_verify(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, crypto_call_req_t *crq) argument 350 crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 379 crypto_verify_recover(crypto_mechanism_t *mech, crypto_key_t *key, crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data, crypto_call_req_t *crq) argument 388 crypto_verify_recover_init_prov(crypto_provider_t provider, crypto_session_id_t sid, crypto_mechanism_t *mech, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_context_t *ctxp, crypto_call_req_t *crq) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dca_dsa.c | 53 crypto_key_t *key, int kmflag, int mode); 383 crypto_key_t *key, int kmflag, int mode) 405 if ((attr = dca_get_key_attr(key)) == NULL) { 406 DBG(NULL, DWARN, "dca_dsainit: key attributes missing"); 412 if (dca_attr_lookup_uint8_array(attr, key->ck_count, CKA_PRIME, 414 DBG(NULL, DWARN, "dca_dsainit: prime key value not present"); 420 if (dca_attr_lookup_uint8_array(attr, key->ck_count, CKA_SUBPRIME, 422 DBG(NULL, DWARN, "dca_dsainit: subprime key value not present"); 428 if (dca_attr_lookup_uint8_array(attr, key->ck_count, CKA_BASE, 430 DBG(NULL, DWARN, "dca_dsainit: base key valu 382 dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, int mode) argument 542 dca_dsaatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *sig, int kmflag, crypto_req_handle_t req, int mode) argument [all...] |
/illumos-gate/usr/src/uts/common/inet/ipf/ |
H A D | ip_lookup.c | 610 iplookupiterkey_t key; local 612 key.ilik_key = type; 614 if (key.ilik_unstr.ilik_ival != IPFGENITER_LOOKUP) 617 switch (key.ilik_unstr.ilik_type) 620 fr_htable_iterderef((u_int)key.ilik_unstr.ilik_otype, 621 (int)key.ilik_unstr.ilik_unit, data, ifs); 624 ip_pool_iterderef((u_int)key.ilik_unstr.ilik_otype, 625 (int)key.ilik_unstr.ilik_unit, data, ifs);
|
/illumos-gate/usr/src/lib/udapl/libdat/common/ |
H A D | dat_dictionary.c | 54 DAT_PROVIDER_INFO key; member in struct:DAT_DICTIONARY_NODE 258 IN const DAT_PROVIDER_INFO *key, 269 if (DAT_SUCCESS == dat_dictionary_search(p_dictionary, key, NULL)) { 274 dat_status = dat_dictionary_key_dup(key, &cur_node->key); 304 IN const DAT_PROVIDER_INFO *key, 317 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key, 318 key)) { 376 IN const DAT_PROVIDER_INFO *key, 390 if (DAT_TRUE == dat_dictionary_key_is_equal(&cur_node->key, 255 dat_dictionary_insert( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY entry, IN const DAT_PROVIDER_INFO *key, IN DAT_DICTIONARY_DATA data) argument 302 dat_dictionary_search( IN DAT_DICTIONARY *p_dictionary, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument 373 dat_dictionary_remove( IN DAT_DICTIONARY *p_dictionary, IN DAT_DICTIONARY_ENTRY *p_entry, IN const DAT_PROVIDER_INFO *key, OUT DAT_DICTIONARY_DATA *p_data) argument [all...] |
/illumos-gate/usr/src/uts/common/io/ |
H A D | sad_conf.c | 46 * Unfortunately, it's not possible to hash by a different key or to easily 75 sad_hash_alg(void *hash_data, mod_hash_key_t key) argument 77 struct apcommon *apc = (struct apcommon *)key; 139 sad_hash_free_value(mod_hash_key_t key, mod_hash_val_t *val, void *arg) argument
|
/illumos-gate/usr/src/uts/common/ipp/ipgpc/ |
H A D | trie.c | 76 * 1 a mismatch occured between the insert key and the value at the node 77 * 2 the insert key specifies a shorter key than the one at the node 78 * 3 the insert key specifies a longer key than the one at the node 83 * and a "key" in this example is actaully some value of key_len n that 85 * For example: key = 1011 with key_len = 8, would actaully be the key:mask 110 * inserting key 11101111 would results in the following split 206 * t_insert(tid, id, key, mas 216 t_insert(trie_id_t *tid, key_t id, uint32_t key, uint32_t mask) argument 330 t_insert6(trie_id_t *tid, key_t id, in6_addr_t key, in6_addr_t mask) argument 399 t_traverse_delete(node_t **in_node, uint8_t pos, key_t id, uint32_t key, uint32_t mask, trie_id_t **tid) argument 602 t_remove(trie_id_t *tid, key_t id, uint32_t key, uint32_t mask) argument 627 t_remove6(trie_id_t *tid, key_t id, in6_addr_t key, in6_addr_t mask) argument 702 t_retrieve(trie_id_t *tid, uint32_t key, ht_match_t *fid_table) argument 779 t_retrieve6(trie_id_t *tid, in6_addr_t key, ht_match_t *fid_table) argument [all...] |
/illumos-gate/usr/src/uts/common/kiconv/kiconv_sc/ |
H A D | kiconv_cck_common.c | 292 * Search key in tbl[0] <= tbl[1] <= ... <= tbl[n-1]. Return 0 if not found. 296 kiconv_binsearch(uint32_t key, void *tbl, size_t nitems) argument 308 if (key < table[mid].key) 310 else if (key > table[mid].key)
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb_cpw.c | 71 /* Find last key version number */ 111 krb5_keyblock key; local 180 /* there used to be code here to extract the old key, and derive 181 a new key from it. Now that there's a unified prng, that isn't 184 /* make new key */ 186 &key))) 194 &key, NULL, kvno, 197 krb5_free_keyblock_contents(context, &key); 246 * Change random key for a krb5_db_entry 303 * Add random key fo 373 krb5_keyblock key; local [all...] |
H A D | kdb_default.c | 48 * If kvno is 0 get the key which is maxkvno for the princ and matches 71 /* Get the max key version */ 143 krb5_def_store_mkey(context, keyfile, mname, key, master_pwd) 147 krb5_keyblock *key; 187 enctype = key->enctype; 190 (fwrite((krb5_pointer) &key->length, 191 sizeof(key->length), 1, kf) != 1) || 192 (fwrite((krb5_pointer) key->contents, 193 sizeof(key->contents[0]), (unsigned) key 208 krb5_db_def_fetch_mkey( krb5_context context, krb5_principal mname, krb5_keyblock *key, int *kvno, char *db_args) argument [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_compat.h | 69 old_krb5_encrypted_keyblock key; member in struct:_old_krb5_db_entry 73 krb5_kvno mkvno; /* master encryption key vno */
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/libdb2/hash/ |
H A D | hash_bigkey.c | 46 * Big key/data handling for the hashing package. 80 * You need to do an insert and the key/data pair is greater than 88 __big_insert(hashp, pagep, key, val) 91 const DBT *key, *val; 97 key_data = (int8_t *)key->data; 98 key_size = key->size; 114 /* Move the key's data. */ 116 /* Mark the page as to how much key & data is on this page. */ 158 /* Get first page with big key/data. */ 181 * Given a key, indicate 295 __get_bigkey(HTAB *hashp, PAGE16 *pagep, indx_t ndx, DBT *key) argument [all...] |
/illumos-gate/usr/src/lib/libast/common/path/ |
H A D | pathprobe.c | 110 char key[16]; local 138 pathkey(key, attr, lang, tool, proc); 141 strncopy(p, key, x - p); 189 strncopy(p, key, x - p);
|
H A D | pathtemp.c | 91 uint32_t key; member in struct:__anon2659 108 uint32_t key; local 152 tmp.key = (tmp.seed = (tmp.rng = dir ? (uint32_t)strtoul(dir, NiL, 0) : (uint32_t)1) != 0)? (uint32_t)0x63c63cd9L : 0; 301 if (!tmp.key) 302 tmp.key = (tmp.rng >> 16) | ((tmp.rng & 0xffff) << 16); 303 tmp.rng ^= tmp.key; 317 key = tmp.rng * tmp.key + tv.tv_nsec; 320 tmp.key = tmp.rng * key [all...] |
/illumos-gate/usr/src/uts/common/io/kbtrans/ |
H A D | kbtrans.c | 76 * key - scancode 80 * if it exists. If there is no raw callback, the key is translated. 87 kbtrans_key_t key, 91 "newstate=%d key=%d", state, key)); 100 cb->kc_keypressed_raw(lower->kbtrans_upper, key); 103 cb->kc_keyreleased_raw(lower->kbtrans_upper, key); 110 * translate the scancode into a key. 112 kbtrans_translate(lower, cb, key, state); 121 * key 85 kbtrans_processkey(struct kbtrans_lower *lower, struct keyboard_callback *cb, kbtrans_key_t key, enum keystate state) argument 129 kbtrans_translate(struct kbtrans_lower *lower, struct keyboard_callback *cb, kbtrans_key_t key, enum keystate newstate) argument [all...] |
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto.c | 66 * Default "null" key management routines. 73 *keyix = 0; /* use key index 0 for ucast key */ 101 * Reset key state to an unused state. The crypto 102 * key allocation mechanism insures other state (e.g. 103 * key data) is properly setup before a key is used. 116 * Establish a relationship between the specified key and cipher 118 * Note that when a fixed key index is required it must be specified 121 * This must be the first call applied to a key; al 129 ieee80211_crypto_newkey(ieee80211com_t *ic, int cipher, int flags, struct ieee80211_key *key) argument 253 ieee80211_crypto_delkey_locked(ieee80211com_t *ic, struct ieee80211_key *key) argument 281 ieee80211_crypto_delkey(ieee80211com_t *ic, struct ieee80211_key *key) argument 313 ieee80211_crypto_setkey(ieee80211com_t *ic, struct ieee80211_key *key, const uint8_t *macaddr) argument 359 struct ieee80211_key *key; local [all...] |
/illumos-gate/usr/src/uts/sun4u/serengeti/sys/ |
H A D | sgsbbc_iosram_priv.h | 80 #define INVALID_KEY(tunnel, x) (tunnel->tunnel_keys[(x)].key == 0) 98 int key; member in struct:tunnel_key
|
/illumos-gate/usr/src/uts/sun4u/starcat/sys/ |
H A D | iosramio.h | 66 extern int iosram_rd(uint32_t key, uint32_t off, uint32_t len, caddr_t dptr); 67 extern int iosram_wr(uint32_t key, uint32_t off, uint32_t len, caddr_t dptr); 68 extern int iosram_force_write(uint32_t key, uint32_t off, uint32_t len, 70 extern int iosram_get_flag(uint32_t key, uint8_t *data_valid, 72 extern int iosram_set_flag(uint32_t key, uint8_t data_valid, 75 extern int iosram_register(uint32_t key, void (*handler)(), void *arg); 76 extern int iosram_unregister(uint32_t key); 77 extern int iosram_ctrl(uint32_t key, uint32_t cmd, void *arg); 126 uint32_t key; /* IOSRAM chunk key */ member in struct:iosram_io [all...] |
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/ |
H A D | disp4.c | 430 long key; local 435 getmessage (m, S_SEND_FAULT, &printerOrForm, &key, &alert_text); 437 (printerOrForm ? printerOrForm : "NULL"), key, 441 pps->exec->key != key || !pps->request) { 457 long key; local 462 getmessage(m, S_CLEAR_FAULT, &printerOrForm, &key, &alert_text); 464 (printerOrForm ? printerOrForm : "NULL"), key, 468 if (! (pps = search_pstatus(printerOrForm)) || ((key > 0) && 469 ((!pps->exec) || pps->exec->key ! [all...] |
/illumos-gate/usr/src/lib/libnisdb/yptol/ |
H A D | shim.c | 35 * NOTE : There is a major bug/feature in dbm. A key obtained by 38 * and the static strings pointed to by the key are destroyed. The 41 * key data in malloced memory. This is freed when map_ctrl is 116 shim_dbm_delete(DBM *db, datum key) argument 130 dbm_delete(map->ttl, key); 133 ret = dbm_delete(map->entries, key); 152 shim_dbm_fetch(DBM *db, datum key) argument 165 if (SUCCESS == update_entry_if_required(map, &key)) { 167 ret = dbm_fetch(map->entries, key); 171 ret = dbm_fetch(map->entries, key); 191 shim_dbm_fetch_noupdate(DBM *db, datum key) argument 454 shim_dbm_store(DBM *db, datum key, datum content, int store_mode) argument 565 datum key; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | inq_context.c | 209 krb5_keyblock *key; local 216 key = ctx->have_acceptor_subkey ? ctx->acceptor_subkey : ctx->subkey; 218 keyvalue.value = key->contents; 219 keyvalue.length = key->length; 231 key->enctype,
|