/titanic_41/usr/src/uts/common/sys/ |
H A D | pppt_ic_if.h | 327 uint64_t session_id, 335 uint64_t session_id, 345 uint64_t session_id, 351 uint64_t session_id, 359 uint64_t session_id, 373 uint64_t session_id,
|
H A D | stmf.h | 387 struct stmf_scsi_session *ss, uint64_t session_id, void *itl_handle); 390 struct stmf_scsi_session *ss, uint64_t session_id, void **itl_handle_retp);
|
/titanic_41/usr/src/uts/common/crypto/io/ |
H A D | crypto.c | 2608 crypto_session_id_t session_id; in cipher_init() local 2640 session_id = STRUCT_FGET(encrypt_init, ei_session); in cipher_init() 2642 if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) { in cipher_init() 2746 crypto_session_id_t session_id; in cipher() local 2793 session_id = STRUCT_FGET(encrypt, ce_session); in cipher() 2795 if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) { in cipher() 2905 crypto_session_id_t session_id; in cipher_update() local 2953 session_id = STRUCT_FGET(encrypt_update, eu_session); in cipher_update() 2955 if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) { in cipher_update() 3062 crypto_session_id_t session_id; in common_final() local [all …]
|
H A D | dprov.c | 2054 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dprov_digest_atomic() argument 2220 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dprov_mac_atomic() argument 2244 mechanism, data, key, mac, NULL, session_id, KM_SLEEP); in dprov_mac_atomic() 2254 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dprov_mac_verify_atomic() argument 2279 mechanism, data, key, mac, NULL, session_id, KM_SLEEP); in dprov_mac_verify_atomic() 2444 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dprov_encrypt_atomic() argument 2467 req, mechanism, key, plaintext, ciphertext, NULL, session_id, in dprov_encrypt_atomic() 2586 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dprov_decrypt_atomic() argument 2609 req, mechanism, key, plaintext, ciphertext, NULL, session_id, in dprov_decrypt_atomic() 2755 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dprov_sign_atomic() argument [all …]
|
H A D | dca.c | 3874 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dca_encrypt_atomic() argument 3894 error = dca_3desatomic(provider, session_id, mechanism, key, in dca_encrypt_atomic() 3899 error = dca_3desatomic(provider, session_id, mechanism, key, in dca_encrypt_atomic() 3905 error = dca_rsaatomic(provider, session_id, mechanism, key, in dca_encrypt_atomic() 4109 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dca_decrypt_atomic() argument 4129 error = dca_3desatomic(provider, session_id, mechanism, key, in dca_decrypt_atomic() 4134 error = dca_3desatomic(provider, session_id, mechanism, key, in dca_decrypt_atomic() 4140 error = dca_rsaatomic(provider, session_id, mechanism, key, in dca_decrypt_atomic() 4293 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in dca_sign_atomic() argument 4309 error = dca_rsaatomic(provider, session_id, mechanism, key, in dca_sign_atomic() [all …]
|
H A D | aes.c | 960 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in aes_encrypt_atomic() argument 1090 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in aes_decrypt_atomic() argument 1432 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in aes_mac_atomic() argument 1448 return (aes_encrypt_atomic(provider, session_id, &gcm_mech, in aes_mac_atomic() 1454 crypto_session_id_t session_id, crypto_mechanism_t *mechanism, in aes_mac_verify_atomic() argument 1470 return (aes_decrypt_atomic(provider, session_id, &gcm_mech, in aes_mac_verify_atomic()
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | kexdhc.c | 135 if (kex->session_id == NULL) { in kexdh_client() 137 kex->session_id = xmalloc(kex->session_id_len); in kexdh_client() 138 memcpy(kex->session_id, hash, kex->session_id_len); in kexdh_client()
|
H A D | kexdhs.c | 117 if (kex->session_id == NULL) { in kexdh_server() 119 kex->session_id = xmalloc(kex->session_id_len); in kexdh_server() 120 memcpy(kex->session_id, hash, kex->session_id_len); in kexdh_server()
|
H A D | mpaux.c | 29 compute_session_id(u_char session_id[16], in compute_session_id() 45 MD5_Final(session_id, &md); in compute_session_id()
|
H A D | kexgexs.c | 162 if (kex->session_id == NULL) { in kexgex_server() 164 kex->session_id = xmalloc(kex->session_id_len); in kexgex_server() 165 memcpy(kex->session_id, hash, kex->session_id_len); in kexgex_server()
|
H A D | kexgexc.c | 186 if (kex->session_id == NULL) { in kexgex_client() 188 kex->session_id = xmalloc(kex->session_id_len); in kexgex_client() 189 memcpy(kex->session_id, hash, kex->session_id_len); in kexgex_client()
|
H A D | kexgsss.c | 195 if (kex->session_id == NULL) { in kexgss_server() 197 kex->session_id = xmalloc(kex->session_id_len); in kexgss_server() 198 (void) memcpy(kex->session_id, hash, kex->session_id_len); in kexgss_server()
|
H A D | kexgssc.c | 302 if (kex->session_id == NULL) { in kexgss_client() 304 kex->session_id = xmalloc(kex->session_id_len); in kexgss_client() 305 (void) memcpy(kex->session_id, hash, kex->session_id_len); in kexgss_client()
|
/titanic_41/usr/src/lib/libadt_jni/common/ |
H A D | adt_jni.c | 253 char *session_id; in Java_com_sun_audit_AuditSession_getSessionId() local 259 if (adt_get_session_id(state, &session_id)) { in Java_com_sun_audit_AuditSession_getSessionId() 260 return_val = (*env)->NewStringUTF(env, session_id); in Java_com_sun_audit_AuditSession_getSessionId() 261 free(session_id); in Java_com_sun_audit_AuditSession_getSessionId()
|
/titanic_41/usr/src/cmd/dcs/sparc/sun4u/ |
H A D | rdr_param_types.h | 76 unsigned long session_id; member 161 unsigned long session_id; member
|
H A D | remote_cfg.h | 162 unsigned long session_id; member 287 unsigned long session_id; member
|
/titanic_41/usr/src/uts/common/io/comstar/port/pppt/ |
H A D | pppt.h | 248 pppt_sess_t *pppt_sess_lookup_locked(uint64_t session_id, 252 pppt_sess_t *pppt_sess_lookup_by_id_locked(uint64_t session_id); 256 uint64_t session_id, stmf_status_t *statusp);
|
H A D | pppt.c | 849 pppt_sess_lookup_locked(uint64_t session_id, in pppt_sess_lookup_locked() argument 861 ps = pppt_sess_lookup_by_id_locked(session_id); in pppt_sess_lookup_locked() 903 pppt_sess_lookup_by_id_locked(uint64_t session_id) in pppt_sess_lookup_by_id_locked() argument 909 tmp_ps.ps_session_id = session_id; in pppt_sess_lookup_by_id_locked() 929 uint64_t session_id, stmf_status_t *statusp) in pppt_sess_lookup_create() argument 943 ps = pppt_sess_lookup_locked(session_id, lport_devid, rport); in pppt_sess_lookup_create() 988 ASSERT(ps->ps_session_id != session_id); in pppt_sess_lookup_create() 989 if (ps->ps_session_id > session_id) { in pppt_sess_lookup_create() 1015 ps->ps_session_id = session_id; in pppt_sess_lookup_create()
|
H A D | alua_ic_if.c | 689 uint64_t session_id, in stmf_ic_scsi_data_msg_alloc() argument 703 icsd->icsd_session_id = session_id; in stmf_ic_scsi_data_msg_alloc() 714 uint64_t session_id, in stmf_ic_scsi_data_xfer_done_msg_alloc() argument 727 icsx->icsx_session_id = session_id; in stmf_ic_scsi_data_xfer_done_msg_alloc() 736 uint64_t session_id, in stmf_ic_scsi_status_msg_alloc() argument 755 icss->icss_session_id = session_id; in stmf_ic_scsi_status_msg_alloc() 770 uint64_t session_id, in stmf_ic_r2t_msg_alloc() argument 783 icrt->icrt_session_id = session_id; in stmf_ic_r2t_msg_alloc()
|
/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth-rsa.c | 46 extern u_char session_id[16]; 98 MD5_Update(&md, session_id, 16); in auth_rsa_verify_response()
|
H A D | sshd.c | 212 u_char session_id[16]; variable 1875 compute_session_id(session_id, cookie, in do_ssh1_kex() 1883 session_key[i] ^= session_id[i]; in do_ssh1_kex() 1905 session_id[i] = session_key[i] ^ session_key[i + 16]; in do_ssh1_kex() 2040 session_id2 = kex->session_id; in do_ssh2_kex()
|
/titanic_41/usr/src/uts/sun4v/sys/ |
H A D | vdc.h | 170 dmsg.tag.vio_sid = vdc->session_id; \ 325 uint64_t session_id; /* common ID sent with all messages */ member
|
/titanic_41/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect1.c | 59 u_char session_id[16]; variable 123 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { in try_agent_authentication() 191 MD5_Update(&md, session_id, 16); in respond_to_rsa_challenge() 1022 compute_session_id(session_id, cookie, host_key->rsa->n, server_key->rsa->n); in ssh_kex() 1050 BN_add_word(key, session_key[i] ^ session_id[i]); in ssh_kex()
|
/titanic_41/usr/src/cmd/ssh/include/ |
H A D | kex.h | 135 u_char *session_id; member
|
/titanic_41/usr/src/lib/libbsm/common/ |
H A D | adt.c | 449 adt_set_asid(const adt_session_data_t *session_data, const au_asid_t session_id) in adt_set_asid() argument 459 session_id; in adt_set_asid() 953 au_asid_t session_id; in adt_get_session_id() local 962 length = 2 + (2 * sizeof (session_id)) + 1; in adt_get_session_id() 972 adt_get_asid(session_data, &session_id); in adt_get_session_id() 974 length = snprintf(*buff, length, "0x%X", (int)session_id); in adt_get_session_id()
|