Home
last modified time | relevance | path

Searched full:pkey (Results 1 – 25 of 120) sorted by relevance

12345

/titanic_54/usr/src/lib/libsqlite/src/
H A Dhash.c62 if( pH->copyKey && elem->pKey ){ in sqliteHashClear()
63 sqliteFree(elem->pKey); in sqliteHashClear()
74 static int intHash(const void *pKey, int nKey){ in intHash() argument
85 static int ptrHash(const void *pKey, int nKey){
86 uptr x = Addr(pKey);
99 static int strHash(const void *pKey, int nKey){ in strHash() argument
100 return sqliteHashNoCase((const char*)pKey, nKey); in strHash()
110 static int binHash(const void *pKey, int nKey){ in binHash() argument
112 const char *z = (const char *)pKey; in binHash()
182 int h = (*xHash)(elem->pKey, elem->nKey) & (new_size-1); in rehash()
[all …]
H A Dbtree_rb.c53 * ROLLBACK_INSERT -> Need to insert (pKey, pData) into table iTab.
54 * ROLLBACK_DELETE -> Need to delete the record (pKey) into table iTab.
62 void *pKey; member
125 void *pKey; member
139 const void *pKey,
693 static int memRbtreeKeyCompare(RbtCursor* pCur, const void *pKey, int nKey, in memRbtreeKeyCompare() argument
704 *pRes = key_compare(pCur->pNode->pKey, pCur->pNode->nKey-nIgnore, in memRbtreeKeyCompare()
705 pKey, nKey); in memRbtreeKeyCompare()
741 * Insert a new record into the Rbtree. The key is given by (pKey,nKey)
750 const void *pKey, in memRbtreeInsert() argument
[all …]
H A Dhash.h56 void *pKey; int nKey; /* Key associated with this element */ member
62 ** SQLITE_HASH_INT nKey is used as the key and pKey is ignored.
64 ** SQLITE_HASH_POINTER pKey is used as the key and nKey is ignored.
66 ** SQLITE_HASH_STRING pKey points to a string that is nKey bytes long
70 ** SQLITE_HASH_BINARY pKey points to binary data nKey bytes long.
85 void *sqliteHashInsert(Hash*, const void *pKey, int nKey, void *pData);
86 void *sqliteHashFind(const Hash*, const void *pKey, int nKey);
104 #define sqliteHashKey(E) ((E)->pKey)
H A Dbtree.h74 int (*Moveto)(BtCursor*, const void *pKey, int nKey, int *pRes);
76 int (*Insert)(BtCursor*, const void *pKey, int nKey,
84 int (*KeyCompare)(BtCursor*, const void *pKey, int nKey,
124 #define sqliteBtreeMoveto(pCur, pKey, nKey, pRes)\ argument
125 (btCOps(pCur)->Moveto(pCur, pKey, nKey, pRes))
127 #define sqliteBtreeInsert(pCur, pKey, nKey, pData, nData) \ argument
128 (btCOps(pCur)->Insert(pCur, pKey, nKey, pData, nData))
136 #define sqliteBtreeKeyCompare(pCur, pKey, nKey, nIgnore, pRes)\ argument
137 (btCOps(pCur)->KeyCompare(pCur, pKey, nKey, nIgnore, pRes))
H A Dattach.c29 void sqliteAttach(Parse *pParse, Token *pFilename, Token *pDbname, Token *pKey){ in sqliteAttach() argument
102 if( pKey && pKey->z && pKey->n ){ in sqliteAttach()
103 sqliteSetNString(&zKey, pKey->z, pKey->n, 0); in sqliteAttach()
/titanic_54/usr/src/uts/common/io/ib/ibtl/
H A Dibtl_hca.c874 * Search for a Full pkey. Use the pkey at index 0 if not found.
887 "FULL PKEY 0x%x found, pkey_ix is %d", in ibtl_set_default_pkey_ix()
894 "to find a default PKEY in the table, using PKey 0x%x", in ibtl_set_default_pkey_ix()
1327 * pkey - The input PKey value, whose index we are interested in.
1329 * pkey_ix - The PKey index returned for the specified PKey.
1333 * Returns the PKey Index for the specified PKey, the device as specified
1338 ib_pkey_t pkey, uint16_t *pkey_ix) in ibtl_pkey2index() argument
1345 hca_devp, port_num, pkey); in ibtl_pkey2index()
1349 if ((pkey == IB_PKEY_INVALID_FULL) || in ibtl_pkey2index()
1350 (pkey == IB_PKEY_INVALID_LIMITED)) in ibtl_pkey2index()
[all …]
/titanic_54/usr/src/common/net/wanboot/
H A Dp12misc.c224 * pkey - Entry which potentially has attributes to be freed.
230 sunw_evp_pkey_free(EVP_PKEY *pkey) in sunw_evp_pkey_free() argument
232 if (pkey != NULL) { in sunw_evp_pkey_free()
233 if (pkey->attributes != NULL) { in sunw_evp_pkey_free()
234 sk_X509_ATTRIBUTE_pop_free(pkey->attributes, in sunw_evp_pkey_free()
236 pkey->attributes = NULL; in sunw_evp_pkey_free()
238 EVP_PKEY_free(pkey); in sunw_evp_pkey_free()
249 * pkey - Points to a private key to set the keyidstr in.
262 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, in sunw_set_localkeyid() argument
278 if (pkey != NULL) { in sunw_set_localkeyid()
[all …]
H A Dp12auxpars.c151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs);
158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
172 * pkey - Points to location pointing to the private key returned.
209 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument
222 if (pkey) in sunw_PKCS12_parse()
223 *pkey = NULL; in sunw_PKCS12_parse()
265 name_str, pkey, cert, ca); in sunw_PKCS12_parse()
273 if (pkey && *pkey) { in sunw_PKCS12_parse()
274 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse()
301 * pkey - Points to location pointing to the private key returned.
[all …]
H A Dp12access.c97 * pkey - EVP_PKEY formatted private key
104 sunw_use_pkey(SSL_CTX *ctx, EVP_PKEY *pkey) in sunw_use_pkey() argument
107 if (ctx == NULL || pkey == NULL) { in sunw_use_pkey()
112 if (SSL_CTX_use_PrivateKey(ctx, pkey) != 1) { in sunw_use_pkey()
250 EVP_PKEY *pkey = NULL; in sunw_p12_use_keyfile() local
262 ret = p12_doparse(p12, passwd, DO_UNMATCHING, &pkey, NULL, in sunw_p12_use_keyfile()
264 if (ret > 0 && pkey != NULL) { in sunw_p12_use_keyfile()
265 if (sunw_use_pkey(ctx, pkey) != 1) { in sunw_p12_use_keyfile()
281 if (ret == -1 && pkey != NULL) { in sunw_p12_use_keyfile()
282 sunw_evp_pkey_free(pkey); in sunw_p12_use_keyfile()
[all …]
H A Dauxutil.c292 * pkey - Points at a location where the address of the matching private
303 * A pkey structure has a stack of attributes.
319 * A pointer to cert and/or pkey which matches the name or keyid is stored
328 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, argument
344 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL;
401 if (pkey != NULL && kl != NULL) {
403 * Looking for pkey to match a cert? If so, assume that
412 if (pkey != NULL)
413 *pkey = sk_EVP_PKEY_delete(kl, k);
428 if (pkey != NULL)
[all …]
H A Dp12aux.h119 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
132 * pkey - Points to location pointing to the private key returned.
180 * pkey - Points to stack of private keys.
239 * pkey - Entry which potentially has attributes to be freed.
253 * pkey - Points to a private key to set the keyidstr in.
274 * pkey - Points to a private key to set the keyidstr in.
296 * pkey - Points to a private key to get the keyid from
326 * - Pointer to receive address of first matching pkey found.
361 * - Pointer to receive address of first matching pkey found.
405 * pkey - Points to a private key.
/titanic_54/usr/src/lib/libpkg/common/
H A Dp12lib.c226 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
240 * pkey - Points to location pointing to the private key returned.
277 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument
290 if (pkey) in sunw_PKCS12_parse()
291 *pkey = NULL; in sunw_PKCS12_parse()
333 name_str, pkey, cert, ca); in sunw_PKCS12_parse()
341 if (pkey && *pkey) { in sunw_PKCS12_parse()
342 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse()
392 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) in sunw_PEM_contents()
418 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, NULL, NULL, in sunw_PEM_contents()
[all …]
/titanic_54/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c799 readAltFormatPrivateKey(KMF_DATA *filedata, EVP_PKEY **pkey) in readAltFormatPrivateKey() argument
814 *pkey = NULL; in readAltFormatPrivateKey()
905 *pkey = ImportRawRSAKey(&rsa); in readAltFormatPrivateKey()
958 EVP_PKEY *pkey = NULL; in openssl_load_key() local
977 pkey = d2i_PrivateKey_bio(keyfile, NULL); in openssl_load_key()
978 if (pkey == NULL) { in openssl_load_key()
987 &pkey); in openssl_load_key()
993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL); in openssl_load_key()
994 if (pkey == NULL) { in openssl_load_key()
1011 &derdata, &pkey); in openssl_load_key()
[all …]
/titanic_54/usr/src/lib/libnsl/key/
H A Dpublickey.c148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_nis() argument
195 if (pkey) { in getkeys_nis()
202 (void) strcpy(pkey, keyval); in getkeys_nis()
228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_files() argument
276 if (pkey) { in getkeys_files()
285 (void) strcpy(pkey, mval); in getkeys_files()
310 __getpublickey_cached(char *netname, char *pkey, int *from_cache) in __getpublickey_cached() argument
312 return (__getpublickey_cached_g(netname, KEYSIZE, 0, pkey, in __getpublickey_cached()
317 getpublickey(const char *netname, char *pkey) in getpublickey() argument
319 return (__getpublickey_cached((char *)netname, pkey, (int *)0)); in getpublickey()
[all …]
/titanic_54/usr/src/uts/common/io/ib/ibnex/
H A Dibnex_hca.c302 * port=x,pkey=y,protocol=ip,<wanboot options>
304 * ibport@<Port#>,<pkey>,<service name>
305 * where pkey = 0 for port communication service nodes
318 ib_pkey_t pkey; in ibnex_config_obp_args() local
344 devname, &pkey, &port_num) != IBNEX_SUCCESS) { in ibnex_config_obp_args()
382 rval = ibnex_get_dip_from_guid(port_guid, index, pkey, &cdip); in ibnex_config_obp_args()
390 if (pkey == port_attr->pa_pkey_tbl[ii].pt_pkey) { in ibnex_config_obp_args()
392 index, IBNEX_VPPA_COMMSVC_NODE, pkey, &rval, in ibnex_config_obp_args()
408 * Parses the device node name and extracts "PKEY" and "port#"
413 char *devname, ib_pkey_t *pkey, uint8_t *port) in ibnex_prom_devname_to_pkey_n_portnum() argument
[all …]
/titanic_54/usr/src/cmd/ibd_upgrade/
H A Dibd_upgrade.sh40 pkey=
56 pkey=0x$2
121 # per partition; consequently device names have non zero pkey)
131 -o "$pkey" = "0x0" -o "$pkey" = "0x" ]; then
151 do_cmd "dladm create-part -f -l $2 -P $pkey $partition_name"
/titanic_54/usr/src/uts/common/io/ib/clients/eoib/
H A Deib_ibt.c207 * changed, we'll reset the affected channels to the new pkey. in eib_ibt_link_mod()
235 "eib_ibt_link_mod: pkey has changed for vnic(s), " in eib_ibt_link_mod()
330 eib_ibt_modify_chan_pkey(eib_t *ss, eib_chan_t *chan, ib_pkey_t pkey) in eib_ibt_modify_chan_pkey() argument
333 * Make sure the channel pkey and index are set to what we need in eib_ibt_modify_chan_pkey()
335 return (eib_ibt_chan_pkey(ss, chan, pkey, B_TRUE, NULL)); in eib_ibt_modify_chan_pkey()
717 * We already have the vhub pkey recorded in our eib_chan_t. in eib_ibt_reset_partitions()
718 * We only need to make sure our pkey index still matches it. in eib_ibt_reset_partitions()
808 "pkey=0x%x) failed, ret=%d", in eib_ibt_chan_pkey()
814 * If the pkey and the pkey index we have already matches the in eib_ibt_chan_pkey()
831 * Otherwise, if we're asked only to test if the pkey index in eib_ibt_chan_pkey()
[all …]
/titanic_54/usr/src/lib/libnsl/rpc/
H A Dauth_des.c106 netobj pkey; in authdes_seccreate() local
116 pkey.n_bytes = (char *)pkey_data; in authdes_seccreate()
117 pkey.n_len = (uint_t)strlen((char *)pkey_data) + 1; in authdes_seccreate()
118 return (authdes_pk_seccreate(servername, &pkey, win, timehost, in authdes_seccreate()
129 authdes_pk_seccreate(const char *servername, netobj *pkey, uint_t window, in authdes_pk_seccreate() argument
156 (void) memcpy(ad->ad_pkey, pkey->n_bytes, pkey->n_len); in authdes_pk_seccreate()
406 netobj pkey; in authdes_refresh() local
422 pkey.n_bytes = (char *)(ad->ad_pkey); in authdes_refresh()
423 pkey.n_len = (uint_t)strlen((char *)ad->ad_pkey) + 1; in authdes_refresh()
424 if (key_encryptsession_pk(ad->ad_servername, &pkey, &ad->ad_xkey) < 0) { in authdes_refresh()
H A Dkey_call.c611 * both, of skey or pkey may have zero length. If both lengths are
615 * Stores the specified netname/pkey/skey triplet in the keyserv.
625 const char *pkey, in key_setnet_g_ext() argument
646 arg.st_pub_key.keybuf3_val = (char *)pkey; in key_setnet_g_ext()
698 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g() argument
700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g()
709 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g_ruid() argument
711 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g_ruid()
716 key_get_conv(char *pkey, des_block *deskey) in key_get_conv() argument
720 if (!key_call((rpcproc_t)KEY_GET_CONV, xdr_keybuf, pkey, in key_get_conv()
[all …]
/titanic_54/usr/src/lib/nsswitch/ldap/common/
H A Dgetkeyent.c69 char *keytype = (char *)argp->key.pkey.keytype; in _nss_ldap_key2str()
73 char *buffer, *pkey, *skey; in _nss_ldap_key2str() local
98 pkey = *pkey_array + keytypelen; in _nss_ldap_key2str()
126 len = strlen(pkey) + strlen(skey) + 2; in _nss_ldap_key2str()
137 (void) snprintf(buffer, len, "%s:%s", pkey, skey); in _nss_ldap_key2str()
175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname)) in getkeys()
/titanic_54/usr/src/lib/gss_mechs/mech_dh/dh192/
H A Dfakensl.c44 int algtype, char *pkey, size_t pkeylen, int *cached) in __getpublickey_cached_g() argument
46 return (getpublickey(remotename, pkey)); in __getpublickey_cached_g()
53 int algtype, char *pkey, size_t pkeylen) in getpublickey_g() argument
55 return (getpublickey(remotename, pkey)); in getpublickey_g()
/titanic_54/usr/src/cmd/krb5/kadmin/dbutil/
H A Ddump.c613 krb5_key_data *pkey, *akey, nullkey; local
656 pkey = akey = (krb5_key_data *) NULL;
696 &pkey)) &&
709 if (!pkey && akey) {
710 pkey = akey;
724 (krb5_int32) pkey->key_data_length[0],
726 (krb5_int32) pkey->key_data_length[1],
729 (krb5_int32) pkey->key_data_type[0]);
730 for (i=0; i<pkey->key_data_length[0]; i++) {
731 fprintf(arg->ofile, "%02x", pkey->key_data_contents[0][i]);
[all …]
/titanic_54/usr/src/uts/common/io/ib/mgt/ibmf/
H A Dibmf_impl.c1824 /* get the pkey index for the specified pkey */ in ibmf_i_init_qp()
1841 "pkey index\n"); in ibmf_i_init_qp()
2397 "ibmf_i_alloc_qp() enter, clientp = %p, pkey = %x, qkey = %x \n", in ibmf_i_alloc_qp()
2402 * get the pkey index associated with this pkey if present in table in ibmf_i_alloc_qp()
2406 (void) sprintf(errmsg, "pkey not in table, pkey = %x", p_key); in ibmf_i_alloc_qp()
2680 /* get the pkey based on the pkey_ix */ in ibmf_i_query_qp()
2687 tnf_string, msg, "failed to get pkey from index", in ibmf_i_query_qp()
2697 "pkey = 0x%x, qkey = 0x%x, portnum = %d\n", in ibmf_i_query_qp()
2698 tnf_uint, qp_num, *qp_nump, tnf_uint, pkey, *p_keyp, in ibmf_i_query_qp()
2725 "ibmf_i_modify_qp() enter, qp_hdl = %p, flags = %x, pkey = 0x%x, " in ibmf_i_modify_qp()
[all …]
H A Dibmf.c40 #define IBMF_INVALID_PKEY(pkey) (((pkey) & 0x7FFF) == 0) argument
897 * Check the validity of the pkey and qkey in the posted packet in ibmf_msg_transport()
899 * For the alternate qps, the pkey and qkey should match the in ibmf_msg_transport()
900 * pkey and qkey maintained in the ibmf cached qp context in ibmf_msg_transport()
910 "PKey in packet not default PKey"); in ibmf_msg_transport()
931 (void) sprintf(errmsg, "PKey in packet does not match " in ibmf_msg_transport()
932 "PKey in the QP context"); in ibmf_msg_transport()
1091 tnf_uint, pkey, p_key, tnf_uint, qkey, q_key); in ibmf_alloc_qp()
1118 /* validate PKey */ in ibmf_alloc_qp()
1274 "pkey = 0x%x, qkey = 0x%x\n", tnf_uint, qp_num, *qp_num, in ibmf_query_qp()
[all …]
/titanic_54/usr/src/uts/common/sys/ib/clients/of/rdma/
H A Dib_addr.h72 uint16_t pkey) in ib_addr_set_pkey() argument
74 dev_addr->broadcast[8] = pkey >> 8; in ib_addr_set_pkey()
75 dev_addr->broadcast[9] = (unsigned char) pkey; in ib_addr_set_pkey()

12345