| /titanic_54/usr/src/lib/libsqlite/src/ |
| H A D | hash.c | 62 if( pH->copyKey && elem->pKey ){ in sqliteHashClear() 63 sqliteFree(elem->pKey); in sqliteHashClear() 74 static int intHash(const void *pKey, int nKey){ in intHash() argument 85 static int ptrHash(const void *pKey, int nKey){ 86 uptr x = Addr(pKey); 99 static int strHash(const void *pKey, int nKey){ in strHash() argument 100 return sqliteHashNoCase((const char*)pKey, nKey); in strHash() 110 static int binHash(const void *pKey, int nKey){ in binHash() argument 112 const char *z = (const char *)pKey; in binHash() 182 int h = (*xHash)(elem->pKey, elem->nKey) & (new_size-1); in rehash() [all …]
|
| H A D | btree_rb.c | 53 * ROLLBACK_INSERT -> Need to insert (pKey, pData) into table iTab. 54 * ROLLBACK_DELETE -> Need to delete the record (pKey) into table iTab. 62 void *pKey; member 125 void *pKey; member 139 const void *pKey, 693 static int memRbtreeKeyCompare(RbtCursor* pCur, const void *pKey, int nKey, in memRbtreeKeyCompare() argument 704 *pRes = key_compare(pCur->pNode->pKey, pCur->pNode->nKey-nIgnore, in memRbtreeKeyCompare() 705 pKey, nKey); in memRbtreeKeyCompare() 741 * Insert a new record into the Rbtree. The key is given by (pKey,nKey) 750 const void *pKey, in memRbtreeInsert() argument [all …]
|
| H A D | hash.h | 56 void *pKey; int nKey; /* Key associated with this element */ member 62 ** SQLITE_HASH_INT nKey is used as the key and pKey is ignored. 64 ** SQLITE_HASH_POINTER pKey is used as the key and nKey is ignored. 66 ** SQLITE_HASH_STRING pKey points to a string that is nKey bytes long 70 ** SQLITE_HASH_BINARY pKey points to binary data nKey bytes long. 85 void *sqliteHashInsert(Hash*, const void *pKey, int nKey, void *pData); 86 void *sqliteHashFind(const Hash*, const void *pKey, int nKey); 104 #define sqliteHashKey(E) ((E)->pKey)
|
| H A D | btree.h | 74 int (*Moveto)(BtCursor*, const void *pKey, int nKey, int *pRes); 76 int (*Insert)(BtCursor*, const void *pKey, int nKey, 84 int (*KeyCompare)(BtCursor*, const void *pKey, int nKey, 124 #define sqliteBtreeMoveto(pCur, pKey, nKey, pRes)\ argument 125 (btCOps(pCur)->Moveto(pCur, pKey, nKey, pRes)) 127 #define sqliteBtreeInsert(pCur, pKey, nKey, pData, nData) \ argument 128 (btCOps(pCur)->Insert(pCur, pKey, nKey, pData, nData)) 136 #define sqliteBtreeKeyCompare(pCur, pKey, nKey, nIgnore, pRes)\ argument 137 (btCOps(pCur)->KeyCompare(pCur, pKey, nKey, nIgnore, pRes))
|
| H A D | attach.c | 29 void sqliteAttach(Parse *pParse, Token *pFilename, Token *pDbname, Token *pKey){ in sqliteAttach() argument 102 if( pKey && pKey->z && pKey->n ){ in sqliteAttach() 103 sqliteSetNString(&zKey, pKey->z, pKey->n, 0); in sqliteAttach()
|
| /titanic_54/usr/src/uts/common/io/ib/ibtl/ |
| H A D | ibtl_hca.c | 874 * Search for a Full pkey. Use the pkey at index 0 if not found. 887 "FULL PKEY 0x%x found, pkey_ix is %d", in ibtl_set_default_pkey_ix() 894 "to find a default PKEY in the table, using PKey 0x%x", in ibtl_set_default_pkey_ix() 1327 * pkey - The input PKey value, whose index we are interested in. 1329 * pkey_ix - The PKey index returned for the specified PKey. 1333 * Returns the PKey Index for the specified PKey, the device as specified 1338 ib_pkey_t pkey, uint16_t *pkey_ix) in ibtl_pkey2index() argument 1345 hca_devp, port_num, pkey); in ibtl_pkey2index() 1349 if ((pkey == IB_PKEY_INVALID_FULL) || in ibtl_pkey2index() 1350 (pkey == IB_PKEY_INVALID_LIMITED)) in ibtl_pkey2index() [all …]
|
| /titanic_54/usr/src/common/net/wanboot/ |
| H A D | p12misc.c | 224 * pkey - Entry which potentially has attributes to be freed. 230 sunw_evp_pkey_free(EVP_PKEY *pkey) in sunw_evp_pkey_free() argument 232 if (pkey != NULL) { in sunw_evp_pkey_free() 233 if (pkey->attributes != NULL) { in sunw_evp_pkey_free() 234 sk_X509_ATTRIBUTE_pop_free(pkey->attributes, in sunw_evp_pkey_free() 236 pkey->attributes = NULL; in sunw_evp_pkey_free() 238 EVP_PKEY_free(pkey); in sunw_evp_pkey_free() 249 * pkey - Points to a private key to set the keyidstr in. 262 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, in sunw_set_localkeyid() argument 278 if (pkey != NULL) { in sunw_set_localkeyid() [all …]
|
| H A D | p12auxpars.c | 151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs); 158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 172 * pkey - Points to location pointing to the private key returned. 209 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument 222 if (pkey) in sunw_PKCS12_parse() 223 *pkey = NULL; in sunw_PKCS12_parse() 265 name_str, pkey, cert, ca); in sunw_PKCS12_parse() 273 if (pkey && *pkey) { in sunw_PKCS12_parse() 274 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse() 301 * pkey - Points to location pointing to the private key returned. [all …]
|
| H A D | p12access.c | 97 * pkey - EVP_PKEY formatted private key 104 sunw_use_pkey(SSL_CTX *ctx, EVP_PKEY *pkey) in sunw_use_pkey() argument 107 if (ctx == NULL || pkey == NULL) { in sunw_use_pkey() 112 if (SSL_CTX_use_PrivateKey(ctx, pkey) != 1) { in sunw_use_pkey() 250 EVP_PKEY *pkey = NULL; in sunw_p12_use_keyfile() local 262 ret = p12_doparse(p12, passwd, DO_UNMATCHING, &pkey, NULL, in sunw_p12_use_keyfile() 264 if (ret > 0 && pkey != NULL) { in sunw_p12_use_keyfile() 265 if (sunw_use_pkey(ctx, pkey) != 1) { in sunw_p12_use_keyfile() 281 if (ret == -1 && pkey != NULL) { in sunw_p12_use_keyfile() 282 sunw_evp_pkey_free(pkey); in sunw_p12_use_keyfile() [all …]
|
| H A D | auxutil.c | 292 * pkey - Points at a location where the address of the matching private 303 * A pkey structure has a stack of attributes. 319 * A pointer to cert and/or pkey which matches the name or keyid is stored 328 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, argument 344 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL; 401 if (pkey != NULL && kl != NULL) { 403 * Looking for pkey to match a cert? If so, assume that 412 if (pkey != NULL) 413 *pkey = sk_EVP_PKEY_delete(kl, k); 428 if (pkey != NULL) [all …]
|
| H A D | p12aux.h | 119 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 132 * pkey - Points to location pointing to the private key returned. 180 * pkey - Points to stack of private keys. 239 * pkey - Entry which potentially has attributes to be freed. 253 * pkey - Points to a private key to set the keyidstr in. 274 * pkey - Points to a private key to set the keyidstr in. 296 * pkey - Points to a private key to get the keyid from 326 * - Pointer to receive address of first matching pkey found. 361 * - Pointer to receive address of first matching pkey found. 405 * pkey - Points to a private key.
|
| /titanic_54/usr/src/lib/libpkg/common/ |
| H A D | p12lib.c | 226 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 240 * pkey - Points to location pointing to the private key returned. 277 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument 290 if (pkey) in sunw_PKCS12_parse() 291 *pkey = NULL; in sunw_PKCS12_parse() 333 name_str, pkey, cert, ca); in sunw_PKCS12_parse() 341 if (pkey && *pkey) { in sunw_PKCS12_parse() 342 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse() 392 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) in sunw_PEM_contents() 418 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, NULL, NULL, in sunw_PEM_contents() [all …]
|
| /titanic_54/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
| H A D | openssl_spi.c | 799 readAltFormatPrivateKey(KMF_DATA *filedata, EVP_PKEY **pkey) in readAltFormatPrivateKey() argument 814 *pkey = NULL; in readAltFormatPrivateKey() 905 *pkey = ImportRawRSAKey(&rsa); in readAltFormatPrivateKey() 958 EVP_PKEY *pkey = NULL; in openssl_load_key() local 977 pkey = d2i_PrivateKey_bio(keyfile, NULL); in openssl_load_key() 978 if (pkey == NULL) { in openssl_load_key() 987 &pkey); in openssl_load_key() 993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL); in openssl_load_key() 994 if (pkey == NULL) { in openssl_load_key() 1011 &derdata, &pkey); in openssl_load_key() [all …]
|
| /titanic_54/usr/src/lib/libnsl/key/ |
| H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_nis() argument 195 if (pkey) { in getkeys_nis() 202 (void) strcpy(pkey, keyval); in getkeys_nis() 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_files() argument 276 if (pkey) { in getkeys_files() 285 (void) strcpy(pkey, mval); in getkeys_files() 310 __getpublickey_cached(char *netname, char *pkey, int *from_cache) in __getpublickey_cached() argument 312 return (__getpublickey_cached_g(netname, KEYSIZE, 0, pkey, in __getpublickey_cached() 317 getpublickey(const char *netname, char *pkey) in getpublickey() argument 319 return (__getpublickey_cached((char *)netname, pkey, (int *)0)); in getpublickey() [all …]
|
| /titanic_54/usr/src/uts/common/io/ib/ibnex/ |
| H A D | ibnex_hca.c | 302 * port=x,pkey=y,protocol=ip,<wanboot options> 304 * ibport@<Port#>,<pkey>,<service name> 305 * where pkey = 0 for port communication service nodes 318 ib_pkey_t pkey; in ibnex_config_obp_args() local 344 devname, &pkey, &port_num) != IBNEX_SUCCESS) { in ibnex_config_obp_args() 382 rval = ibnex_get_dip_from_guid(port_guid, index, pkey, &cdip); in ibnex_config_obp_args() 390 if (pkey == port_attr->pa_pkey_tbl[ii].pt_pkey) { in ibnex_config_obp_args() 392 index, IBNEX_VPPA_COMMSVC_NODE, pkey, &rval, in ibnex_config_obp_args() 408 * Parses the device node name and extracts "PKEY" and "port#" 413 char *devname, ib_pkey_t *pkey, uint8_t *port) in ibnex_prom_devname_to_pkey_n_portnum() argument [all …]
|
| /titanic_54/usr/src/cmd/ibd_upgrade/ |
| H A D | ibd_upgrade.sh | 40 pkey= 56 pkey=0x$2 121 # per partition; consequently device names have non zero pkey) 131 -o "$pkey" = "0x0" -o "$pkey" = "0x" ]; then 151 do_cmd "dladm create-part -f -l $2 -P $pkey $partition_name"
|
| /titanic_54/usr/src/uts/common/io/ib/clients/eoib/ |
| H A D | eib_ibt.c | 207 * changed, we'll reset the affected channels to the new pkey. in eib_ibt_link_mod() 235 "eib_ibt_link_mod: pkey has changed for vnic(s), " in eib_ibt_link_mod() 330 eib_ibt_modify_chan_pkey(eib_t *ss, eib_chan_t *chan, ib_pkey_t pkey) in eib_ibt_modify_chan_pkey() argument 333 * Make sure the channel pkey and index are set to what we need in eib_ibt_modify_chan_pkey() 335 return (eib_ibt_chan_pkey(ss, chan, pkey, B_TRUE, NULL)); in eib_ibt_modify_chan_pkey() 717 * We already have the vhub pkey recorded in our eib_chan_t. in eib_ibt_reset_partitions() 718 * We only need to make sure our pkey index still matches it. in eib_ibt_reset_partitions() 808 "pkey=0x%x) failed, ret=%d", in eib_ibt_chan_pkey() 814 * If the pkey and the pkey index we have already matches the in eib_ibt_chan_pkey() 831 * Otherwise, if we're asked only to test if the pkey index in eib_ibt_chan_pkey() [all …]
|
| /titanic_54/usr/src/lib/libnsl/rpc/ |
| H A D | auth_des.c | 106 netobj pkey; in authdes_seccreate() local 116 pkey.n_bytes = (char *)pkey_data; in authdes_seccreate() 117 pkey.n_len = (uint_t)strlen((char *)pkey_data) + 1; in authdes_seccreate() 118 return (authdes_pk_seccreate(servername, &pkey, win, timehost, in authdes_seccreate() 129 authdes_pk_seccreate(const char *servername, netobj *pkey, uint_t window, in authdes_pk_seccreate() argument 156 (void) memcpy(ad->ad_pkey, pkey->n_bytes, pkey->n_len); in authdes_pk_seccreate() 406 netobj pkey; in authdes_refresh() local 422 pkey.n_bytes = (char *)(ad->ad_pkey); in authdes_refresh() 423 pkey.n_len = (uint_t)strlen((char *)ad->ad_pkey) + 1; in authdes_refresh() 424 if (key_encryptsession_pk(ad->ad_servername, &pkey, &ad->ad_xkey) < 0) { in authdes_refresh()
|
| H A D | key_call.c | 611 * both, of skey or pkey may have zero length. If both lengths are 615 * Stores the specified netname/pkey/skey triplet in the keyserv. 625 const char *pkey, in key_setnet_g_ext() argument 646 arg.st_pub_key.keybuf3_val = (char *)pkey; in key_setnet_g_ext() 698 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g() argument 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g() 709 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g_ruid() argument 711 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g_ruid() 716 key_get_conv(char *pkey, des_block *deskey) in key_get_conv() argument 720 if (!key_call((rpcproc_t)KEY_GET_CONV, xdr_keybuf, pkey, in key_get_conv() [all …]
|
| /titanic_54/usr/src/lib/nsswitch/ldap/common/ |
| H A D | getkeyent.c | 69 char *keytype = (char *)argp->key.pkey.keytype; in _nss_ldap_key2str() 73 char *buffer, *pkey, *skey; in _nss_ldap_key2str() local 98 pkey = *pkey_array + keytypelen; in _nss_ldap_key2str() 126 len = strlen(pkey) + strlen(skey) + 2; in _nss_ldap_key2str() 137 (void) snprintf(buffer, len, "%s:%s", pkey, skey); in _nss_ldap_key2str() 175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname)) in getkeys()
|
| /titanic_54/usr/src/lib/gss_mechs/mech_dh/dh192/ |
| H A D | fakensl.c | 44 int algtype, char *pkey, size_t pkeylen, int *cached) in __getpublickey_cached_g() argument 46 return (getpublickey(remotename, pkey)); in __getpublickey_cached_g() 53 int algtype, char *pkey, size_t pkeylen) in getpublickey_g() argument 55 return (getpublickey(remotename, pkey)); in getpublickey_g()
|
| /titanic_54/usr/src/cmd/krb5/kadmin/dbutil/ |
| H A D | dump.c | 613 krb5_key_data *pkey, *akey, nullkey; local 656 pkey = akey = (krb5_key_data *) NULL; 696 &pkey)) && 709 if (!pkey && akey) { 710 pkey = akey; 724 (krb5_int32) pkey->key_data_length[0], 726 (krb5_int32) pkey->key_data_length[1], 729 (krb5_int32) pkey->key_data_type[0]); 730 for (i=0; i<pkey->key_data_length[0]; i++) { 731 fprintf(arg->ofile, "%02x", pkey->key_data_contents[0][i]); [all …]
|
| /titanic_54/usr/src/uts/common/io/ib/mgt/ibmf/ |
| H A D | ibmf_impl.c | 1824 /* get the pkey index for the specified pkey */ in ibmf_i_init_qp() 1841 "pkey index\n"); in ibmf_i_init_qp() 2397 "ibmf_i_alloc_qp() enter, clientp = %p, pkey = %x, qkey = %x \n", in ibmf_i_alloc_qp() 2402 * get the pkey index associated with this pkey if present in table in ibmf_i_alloc_qp() 2406 (void) sprintf(errmsg, "pkey not in table, pkey = %x", p_key); in ibmf_i_alloc_qp() 2680 /* get the pkey based on the pkey_ix */ in ibmf_i_query_qp() 2687 tnf_string, msg, "failed to get pkey from index", in ibmf_i_query_qp() 2697 "pkey = 0x%x, qkey = 0x%x, portnum = %d\n", in ibmf_i_query_qp() 2698 tnf_uint, qp_num, *qp_nump, tnf_uint, pkey, *p_keyp, in ibmf_i_query_qp() 2725 "ibmf_i_modify_qp() enter, qp_hdl = %p, flags = %x, pkey = 0x%x, " in ibmf_i_modify_qp() [all …]
|
| H A D | ibmf.c | 40 #define IBMF_INVALID_PKEY(pkey) (((pkey) & 0x7FFF) == 0) argument 897 * Check the validity of the pkey and qkey in the posted packet in ibmf_msg_transport() 899 * For the alternate qps, the pkey and qkey should match the in ibmf_msg_transport() 900 * pkey and qkey maintained in the ibmf cached qp context in ibmf_msg_transport() 910 "PKey in packet not default PKey"); in ibmf_msg_transport() 931 (void) sprintf(errmsg, "PKey in packet does not match " in ibmf_msg_transport() 932 "PKey in the QP context"); in ibmf_msg_transport() 1091 tnf_uint, pkey, p_key, tnf_uint, qkey, q_key); in ibmf_alloc_qp() 1118 /* validate PKey */ in ibmf_alloc_qp() 1274 "pkey = 0x%x, qkey = 0x%x\n", tnf_uint, qp_num, *qp_num, in ibmf_query_qp() [all …]
|
| /titanic_54/usr/src/uts/common/sys/ib/clients/of/rdma/ |
| H A D | ib_addr.h | 72 uint16_t pkey) in ib_addr_set_pkey() argument 74 dev_addr->broadcast[8] = pkey >> 8; in ib_addr_set_pkey() 75 dev_addr->broadcast[9] = (unsigned char) pkey; in ib_addr_set_pkey()
|