/titanic_41/usr/src/uts/common/io/scsi/adapters/scsi_vhci/fops/ |
H A D | tpgs.c | 147 uint8_t *sns, skey, asc, ascq; in std_process_cmplt_pkt() local 151 skey = scsi_sense_key(sns); in std_process_cmplt_pkt() 154 if (skey == KEY_UNIT_ATTENTION) { in std_process_cmplt_pkt() 167 } else if (skey == KEY_NOT_READY) { in std_process_cmplt_pkt() 193 "ASCQ:%x", skey, asc, ascq); in std_process_cmplt_pkt() 435 uint8_t skey, asc, ascq; in std_analyze_sense() local 437 skey = scsi_sense_key(sense); in std_analyze_sense() 441 if ((skey == KEY_UNIT_ATTENTION) && in std_analyze_sense() 447 " sense:%x\n", skey, asc, ascq, rval)); in std_analyze_sense() 448 } else if ((skey == KEY_NOT_READY) && in std_analyze_sense() [all …]
|
H A D | asym_sun.c | 228 uint8_t *sns, skey, asc, ascq; in purple_path_activate() local 321 skey = scsi_sense_key(sns); in purple_path_activate() 324 if (skey == KEY_UNIT_ATTENTION) { in purple_path_activate() 329 } else if ((skey == KEY_NOT_READY) && in purple_path_activate() 350 "ASCQ:%x", skey, asc, ascq); in purple_path_activate() 514 uint8_t skey, asc, ascq; in purple_analyze_sense() local 516 skey = scsi_sense_key(sense); in purple_analyze_sense() 520 if (skey == KEY_NOT_READY) { in purple_analyze_sense() 538 " sense key:%x, ASC: %x, ASCQ:%x\n", skey, asc, ascq)); in purple_analyze_sense()
|
H A D | tape.c | 186 uint8_t skey, asc, ascq; in tape_analyze_sense() local 188 skey = scsi_sense_key(sense); in tape_analyze_sense() 192 if (skey == KEY_ABORTED_COMMAND && in tape_analyze_sense() 197 if (skey == KEY_NOT_READY && in tape_analyze_sense()
|
/titanic_41/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_nis() argument 206 if (skey && extract_secret(p, skey, passwd)) in getkeys_nis() 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_files() argument 289 if (skey && extract_secret(p, skey, passwd)) in getkeys_files() 329 getsecretkey(const char *netname, char *skey, const char *passwd) in getsecretkey() argument 331 return (getsecretkey_g(netname, KEYSIZE, 0, skey, HEXKEYBYTES+1, in getsecretkey() 427 char *skey, /* out */ in getkeys_ldap_g() argument 487 if (skey && extract_secret(p, skey, passwd)) in getkeys_ldap_g() 632 char *skey, /* out */ in getsecretkey_g() argument 642 if (!netname || !skey || !skeylen) in getsecretkey_g() [all …]
|
H A D | gen_dhkeys.c | 169 char *skey, /* out */ in __gen_dhkeys_g() argument 176 if (! pkey || ! skey || ! pass) in __gen_dhkeys_g() 180 __gen_dhkeys(pkey, skey, pass); in __gen_dhkeys_g() 188 (*dlfp)(pkey, skey, pass); /* void */ in __gen_dhkeys_g()
|
/titanic_41/usr/src/lib/libnisdb/yptol/ |
H A D | dit_access_utils.c | 1015 char *skey, *str, *sipkey; in singleReadFromDIT() local 1036 if ((skey = am(myself, key->dsize + 1)) == 0) { in singleReadFromDIT() 1040 (void) memcpy(skey, key->dptr, key->dsize); in singleReadFromDIT() 1055 if (verifyIndexMatch(t, 0, 0, N2LKEY, skey) == 0 || in singleReadFromDIT() 1056 verifyIndexMatch(t, 0, 0, N2LIPKEY, skey) == 0) in singleReadFromDIT() 1073 myself, *statP, skey, t->dbId, map); in singleReadFromDIT() 1089 myself, skey, t->dbId, map, in singleReadFromDIT() 1116 myself, nr, skey, t->dbId, map, in singleReadFromDIT() 1132 *statP, skey, in singleReadFromDIT() 1141 if ((rc = verifyKey(skey, &rv_result[i])) in singleReadFromDIT() [all …]
|
/titanic_41/usr/src/lib/fm/libdiskstatus/common/ |
H A D | ds_scsi.c | 340 uint_t skey, asc, ascq; in load_modepages() local 365 &headers, &skey, &asc, &ascq)) == 0) { in load_modepages() 390 } else if (SCSI_INVALID_OPCODE(skey, asc, ascq)) { in load_modepages() 397 &headers, &skey, &asc, &ascq); in load_modepages() 462 "ASC=0x%x ASCQ=0x%x)\n", skey, asc, ascq); in load_modepages() 767 uint_t skey, asc, ascq; in load_ie_modepage() local 777 MODEPAGE_INFO_EXCPT_LEN, &sip->si_hdrs, &skey, &asc, in load_ie_modepage() 782 MODEPAGE_INFO_EXCPT_LEN, &junk_hdrs, &skey, &asc, &ascq); in load_ie_modepage() 787 "ASC=0x%x ASCQ=0x%x)", skey, asc, ascq); in load_ie_modepage() 835 uint_t skey, asc, ascq; in scsi_enable_ie() local [all …]
|
/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth-skey.c | 49 struct skey skey; in skey_query() local 51 if (skeychallenge(&skey, authctxt->user, challenge) == -1) in skey_query()
|
H A D | Makefile | 54 auth-skey.o \
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 402 Session_Key skey; in kerberos5_reply() local 429 skey.type = SK_DES; in kerberos5_reply() 430 skey.length = 8; in kerberos5_reply() 431 skey.data = session_key->contents; in kerberos5_reply() 432 encrypt_session_key(&skey); in kerberos5_reply() 470 skey.type = SK_DES; in kerberos5_reply() 471 skey.length = 8; in kerberos5_reply() 472 skey.data = session_key->contents; in kerberos5_reply() 473 encrypt_session_key(&skey); in kerberos5_reply()
|
/titanic_41/usr/src/lib/nsswitch/ldap/common/ |
H A D | getkeyent.c | 73 char *buffer, *pkey, *skey; in _nss_ldap_key2str() local 123 skey = *skey_array + keytypelen; in _nss_ldap_key2str() 126 len = strlen(pkey) + strlen(skey) + 2; in _nss_ldap_key2str() 137 (void) snprintf(buffer, len, "%s:%s", pkey, skey); in _nss_ldap_key2str()
|
/titanic_41/usr/src/uts/common/io/scsi/adapters/scsi_vhci/ |
H A D | scsi_vhci_tpgs.c | 58 uint8_t *sns, skey, asc, ascq; in vhci_tpgs_set_target_groups() local 130 skey = scsi_sense_key(sns); in vhci_tpgs_set_target_groups() 134 if ((skey == KEY_UNIT_ATTENTION) && in vhci_tpgs_set_target_groups() 141 " sense:%x\n", skey, asc, ascq, ss)); in vhci_tpgs_set_target_groups() 142 } else if ((skey == KEY_ILLEGAL_REQUEST) && in vhci_tpgs_set_target_groups() 148 " sense:%x\n", skey, asc, ascq, ss)); in vhci_tpgs_set_target_groups() 149 } else if ((skey == KEY_ILLEGAL_REQUEST) && in vhci_tpgs_set_target_groups() 155 " sense:%x\n", skey, asc, ascq, rval)); in vhci_tpgs_set_target_groups() 166 skey, asc, ascq)); in vhci_tpgs_set_target_groups()
|
H A D | scsi_vhci.c | 2582 uint8_t *sns, skey; in vhci_do_prout() local 2620 skey = scsi_sense_key(sns); in vhci_do_prout() 2621 if ((skey == KEY_UNIT_ATTENTION) || in vhci_do_prout() 2622 (skey == KEY_NOT_READY)) { in vhci_do_prout() 2667 } else if (skey == KEY_ILLEGAL_REQUEST) in vhci_do_prout() 3162 uint8_t *sns, skey, asc, ascq; in vhci_intr() local 3229 skey = scsi_sense_key(sns); in vhci_intr() 3236 skey, asc, ascq)); in vhci_intr() 7001 uint8_t *sns, skey, asc, ascq; in vhci_failover() local 7005 skey = scsi_sense_key(sns); in vhci_failover() [all …]
|
/titanic_41/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 110 char *skey; in get_and_set_seckey() local 116 if ((skey = malloc(skeylen)) == NULL) { in get_and_set_seckey() 120 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { in get_and_set_seckey() 123 if (skey[0]) { in get_and_set_seckey() 126 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, in get_and_set_seckey() 155 free(skey); in get_and_set_seckey()
|
H A D | key_call_uid.c | 159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, in key_setnet_g_uid() argument 174 arg.st_priv_key.keybuf3_val = (char *)skey; in key_setnet_g_uid() 201 (void) memcpy(&tmp.st_priv_key, skey, in key_setnet_g_uid() 208 (void) memcpy(&tmp.st_pub_key, skey, in key_setnet_g_uid()
|
/titanic_41/usr/src/cmd/keyserv/ |
H A D | setkey.c | 473 appendsecretkey3(struct mechentry *mp, uid_t uid, setkeyarg3 *skey) in appendsecretkey3() argument 480 if ((skey == NULL) || (mp == NULL)) { in appendsecretkey3() 483 if (skey->key.keybuf3_len == 0) { in appendsecretkey3() 515 if ((cp->secretkey = cpykeybuf3(&skey->key)) == NULL) { in appendsecretkey3() 532 storesecretkey3(uid_t uid, setkeyarg3 *skey) in storesecretkey3() argument 536 if (skey == NULL) { in storesecretkey3() 539 if ((mp = getmechtype(skey->keylen, skey->algtype)) == NULL) { in storesecretkey3() 542 return (appendsecretkey3(mp, uid, skey)); in storesecretkey3() 549 pk_setkey3(uid_t uid, setkeyarg3 *skey) in pk_setkey3() argument 551 if (!storesecretkey3(uid, skey)) { in pk_setkey3() [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/common/ |
H A D | kcmd.c | 78 static krb5_keyblock *skey; variable 486 skey = block->key; in init_encrypt() 487 final_enctype = skey->enctype; in init_encrypt() 500 switch (skey->enctype) { in init_encrypt() 550 skey, enc_keyusage_i[i], in init_encrypt() 555 skey, enc_keyusage_o[i], in init_encrypt() 647 cc = krb5_c_decrypt(kcmd_context, skey, in desread() 764 cc = krb5_c_encrypt(kcmd_context, skey, in deswrite_compat()
|
/titanic_41/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 623 const char *skey, in key_setnet_g_ext() argument 640 arg.st_priv_key.keybuf3_val = (char *)skey; in key_setnet_g_ext() 664 (void) memcpy(&tmp.st_priv_key, skey, in key_setnet_g_ext() 671 (void) memcpy(&tmp.st_pub_key, skey, in key_setnet_g_ext() 697 key_setnet_g(const char *netname, const char *skey, keylen_t skeylen, in key_setnet_g() argument 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g() 708 key_setnet_g_ruid(const char *netname, const char *skey, keylen_t skeylen, in key_setnet_g_ruid() argument 711 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g_ruid()
|
/titanic_41/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 241 char *skey, /* Our private key */ in __generic_common_dhkeys() argument 249 MINT *sk = mp_xtom(skey); in __generic_common_dhkeys()
|
H A D | dh_common.h | 48 __generic_common_dhkeys(char *pkey, char *skey, int keylen,
|
/titanic_41/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | Parser.java | 265 Object skey = en.nextElement(); in mergeTablesWithOr() local 267 target.put(skey, source.get(skey)); in mergeTablesWithOr()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 799 configure_stream(int fd, krb5_keyblock *skey, int dir, krb5_data *ivec, in configure_stream() argument 806 switch (skey->enctype) { in configure_stream() 834 skey->enctype); in configure_stream() 840 if (skey->enctype != ENCTYPE_ARCFOUR_HMAC && in configure_stream() 841 skey->enctype != ENCTYPE_ARCFOUR_HMAC_EXP) in configure_stream() 852 (void) memcpy(&setup_info.key, skey->contents, skey->length); in configure_stream() 854 setup_info.keylen = skey->length; in configure_stream()
|
/titanic_41/usr/src/cmd/rmt/ |
H A D | rmt.c | 284 char skey; in main() local 288 if (read(0, &skey, 1) != 1) in main() 303 switch (skey) { in main()
|
/titanic_41/usr/src/lib/libsqlite/test/ |
H A D | btree2.test | 163 set skey [string range $key 0 $LM1] 164 if {[btree_move_to $::c5 $skey]==0} { 176 if {[btree_move_to $::c6 $skey]==0} {
|
/titanic_41/usr/src/uts/common/io/scsi/impl/ |
H A D | scsi_subr.c | 1629 uint8_t skey; in scsi_sense_key() local 1633 skey = sdsp->ds_key; in scsi_sense_key() 1637 skey = ext_sensep->es_key; in scsi_sense_key() 1639 return (skey); in scsi_sense_key()
|