Home
last modified time | relevance | path

Searched refs:sid (Results 1 – 25 of 83) sorted by relevance

1234

/dragonfly/sys/netinet6/
H A Dscope6.c73 struct scope6_id *sid; in scope6_ifattach() local
75 sid = (struct scope6_id *)kmalloc(sizeof(*sid), M_IFADDR, in scope6_ifattach()
93 return sid; in scope6_ifattach()
99 kfree(sid, M_IFADDR); in scope6_ifdetach()
107 struct scope6_id *sid = SID(ifp); in scope6_set() local
109 if (!sid) /* paranoid? */ in scope6_set()
165 struct scope6_id *sid = SID(ifp); in scope6_get() local
167 if (sid == NULL) /* paranoid? */ in scope6_get()
170 *idlist = *sid; in scope6_get()
354 struct scope6_id *sid; in in6_setscope() local
[all …]
/dragonfly/lib/libc/rpc/
H A Dsvc_auth_des.c121 short sid = 0; in _svcauth_des() local
196 if (sid < 0 || sid >= AUTHDES_CACHESZ) { in _svcauth_des()
251 if (sid < 0) { in _svcauth_des()
320 entry = &authdes_cache[sid]; in _svcauth_des()
322 cache_ref(sid); in _svcauth_des()
388 cache_ref(short sid) in cache_ref() argument
395 authdes_lru[0] = sid; in cache_ref()
396 for (i = 1; prev != sid; i++) { in cache_ref()
462 unsigned sid; in authdes_getucred() local
469 sid = adc->adc_nickname; in authdes_getucred()
[all …]
/dragonfly/usr.sbin/fwcontrol/
H A Dfwcontrol.c373 union fw_self_id sid; in show_topology_map() local
391 sid = tmap->self_id[i]; in show_topology_map()
392 if (sid.p0.sequel) { in show_topology_map()
398 sid.p0.phy_id, in show_topology_map()
399 sid.p0.link_active, in show_topology_map()
400 sid.p0.gap_count, in show_topology_map()
401 speed[sid.p0.phy_speed], in show_topology_map()
402 sid.p0.phy_delay, in show_topology_map()
403 sid.p0.contender, in show_topology_map()
408 sid.p0.initiated_reset, in show_topology_map()
[all …]
/dragonfly/sys/dev/crypto/aesni/
H A Daesni.c47 uint32_t sid; member
88 sc->sid = 1; in aesni_attach()
182 ses->id = sc->sid++; in aesni_newsession()
206 uint32_t sid; in aesni_freesession_locked() local
208 sid = ses->id; in aesni_freesession_locked()
212 ses->id = sid; in aesni_freesession_locked()
221 uint32_t sid; in aesni_freesession() local
224 sid = ((uint32_t)tid) & 0xffffffff; in aesni_freesession()
227 if (ses->id == sid) in aesni_freesession()
/dragonfly/crypto/libressl/crypto/cms/
H A Dcms_sd.c149 if (si->sid->type == CMS_SIGNERINFO_KEYIDENTIFIER) { in cms_sd_set_version()
220 sid->type = type; in cms_set1_SignerIdentifier()
229 if (sid->type == CMS_SIGNERINFO_ISSUER_SERIAL) { in cms_SignerIdentifier_get0_signer_id()
231 *issuer = sid->d.issuerAndSerialNumber->issuer; in cms_SignerIdentifier_get0_signer_id()
233 *sno = sid->d.issuerAndSerialNumber->serialNumber; in cms_SignerIdentifier_get0_signer_id()
234 } else if (sid->type == CMS_SIGNERINFO_KEYIDENTIFIER) { in cms_SignerIdentifier_get0_signer_id()
236 *keyid = sid->d.subjectKeyIdentifier; in cms_SignerIdentifier_get0_signer_id()
246 if (sid->type == CMS_SIGNERINFO_ISSUER_SERIAL) in cms_SignerIdentifier_cert_cmp()
248 else if (sid->type == CMS_SIGNERINFO_KEYIDENTIFIER) in cms_SignerIdentifier_cert_cmp()
320 if (!cms_set1_SignerIdentifier(si->sid, signer, type)) in CMS_add1_signer()
[all …]
H A Dcms_lcl.h128 CMS_SignerIdentifier *sid; member
428 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type);
429 int cms_SignerIdentifier_get0_signer_id(CMS_SignerIdentifier *sid,
431 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert);
/dragonfly/contrib/file/src/
H A Dcdf.c566 if (sid == CDF_SECID_END_OF_CHAIN) { in cdf_count_chain()
573 DPRINTF((" %d", sid)); in cdf_count_chain()
578 if (sid >= maxsector) { in cdf_count_chain()
582 sid = CDF_TOLE4(CAST(uint32_t, sat->sat_tab[sid])); in cdf_count_chain()
629 sid)) != CAST(ssize_t, ss)) { in cdf_read_long_sector_chain()
637 sid = CDF_TOLE4(CAST(uint32_t, sat->sat_tab[sid])); in cdf_read_long_sector_chain()
675 sid) != CAST(ssize_t, ss)) { in cdf_read_short_sector_chain()
679 sid = CDF_TOLE4(CAST(uint32_t, ssat->sat_tab[sid])); in cdf_read_short_sector_chain()
709 ns = cdf_count_chain(sat, sid, ss); in cdf_read_dir()
740 sid = CDF_TOLE4(CAST(uint32_t, sat->sat_tab[sid])); in cdf_read_dir()
[all …]
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Dwpas_kay.c267 const u8 *addr, u8 *sid, size_t *len) in ieee802_1x_auth_get_session_id() argument
285 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
324 u8 *sid; in ieee802_1x_notify_create_actor() local
339 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor()
342 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor()
351 if (ieee802_1x_auth_get_session_id(wpa_s, wpa_s->bssid, sid, &sid_len)) in ieee802_1x_notify_create_actor()
371 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
386 os_free(sid); in ieee802_1x_notify_create_actor()
/dragonfly/sys/dev/disk/iscsi/initiator/
H A Disc_sm.c101 sp->sid, ntohl(pq->pdu.ipdu.bhs.itt)); in _reject()
121 sp->sid, ntohl(pq->pdu.ipdu.bhs.itt), in _r2t()
139 sp->sid, ntohl(pq->pdu.ipdu.bhs.itt)); in _scsi_rsp()
158 sp->sid, ntohl(pq->pdu.ipdu.bhs.itt)); in _read_data()
210 xdebug("%d] dslen not zero", sp->sid); in _nop_in()
295 sp->sid, len, sp->opt.maxBurstLength); in i_prepPDU()
606 debug(3, "terminated sp=%p sp->sid=%d", sp, sp->sid); in ism_proc()
681 sdebug(6, "sid=%d %s", sp->sid, sp->dev->si_name); in isc_add_sysctls()
752 ic_lost_target(sp, sp->sid); in ism_stop()
772 sc->sessions[sp->sid] = NULL; in ism_stop()
[all …]
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dwpa_auth_kay.c355 struct sta_info *sta, u8 *sid, in ieee802_1x_auth_get_session_id() argument
374 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
412 u8 *sid; in ieee802_1x_notify_create_actor_hapd() local
427 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor_hapd()
430 if (!msk || !sid || !ckn || !cak) in ieee802_1x_notify_create_actor_hapd()
439 if (ieee802_1x_auth_get_session_id(hapd, sta, sid, &sid_len)) in ieee802_1x_notify_create_actor_hapd()
461 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
472 os_free(sid); in ieee802_1x_notify_create_actor_hapd()
/dragonfly/sys/dev/crypto/safe/
H A Dsafevar.h48 #define SAFE_CARD(sid) (((sid) & 0xf0000000) >> 28) argument
49 #define SAFE_SESSION(sid) ( (sid) & 0x0fffffff) argument
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c484 u8 *sid; in eap_ikev2_get_session_id() local
492 sid = os_malloc(sid_len); in eap_ikev2_get_session_id()
493 if (sid) { in eap_ikev2_get_session_id()
495 sid[offset] = EAP_TYPE_IKEV2; in eap_ikev2_get_session_id()
497 os_memcpy(sid + offset, data->ikev2.i_nonce, in eap_ikev2_get_session_id()
500 os_memcpy(sid + offset, data->ikev2.r_nonce, in eap_ikev2_get_session_id()
504 sid, sid_len); in eap_ikev2_get_session_id()
507 return sid; in eap_ikev2_get_session_id()
H A Deap_pax.c524 u8 *sid; in eap_pax_get_session_id() local
529 sid = os_malloc(1 + EAP_PAX_MID_LEN); in eap_pax_get_session_id()
530 if (sid == NULL) in eap_pax_get_session_id()
534 sid[0] = EAP_TYPE_PAX; in eap_pax_get_session_id()
535 os_memcpy(sid + 1, data->mid, EAP_PAX_MID_LEN); in eap_pax_get_session_id()
537 return sid; in eap_pax_get_session_id()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_ikev2.c522 u8 *sid; in eap_ikev2_get_session_id() local
530 sid = os_malloc(sid_len); in eap_ikev2_get_session_id()
531 if (sid) { in eap_ikev2_get_session_id()
533 sid[offset] = EAP_TYPE_IKEV2; in eap_ikev2_get_session_id()
535 os_memcpy(sid + offset, data->ikev2.i_nonce, in eap_ikev2_get_session_id()
538 os_memcpy(sid + offset, data->ikev2.r_nonce, in eap_ikev2_get_session_id()
542 sid, sid_len); in eap_ikev2_get_session_id()
545 return sid; in eap_ikev2_get_session_id()
H A Deap_server_pax.c576 u8 *sid; in eap_pax_get_session_id() local
581 sid = os_malloc(1 + EAP_PAX_MID_LEN); in eap_pax_get_session_id()
582 if (sid == NULL) in eap_pax_get_session_id()
586 sid[0] = EAP_TYPE_PAX; in eap_pax_get_session_id()
587 os_memcpy(sid + 1, data->mid, EAP_PAX_MID_LEN); in eap_pax_get_session_id()
589 return sid; in eap_pax_get_session_id()
/dragonfly/sys/dev/crypto/ubsec/
H A Dubsecvar.h49 #define UBSEC_CARD(sid) (((sid) & 0xf0000000) >> 28) argument
50 #define UBSEC_SESSION(sid) ( (sid) & 0x0fffffff) argument
/dragonfly/sys/opencrypto/
H A Dcryptodev.c61 u_int64_t sid; member
161 u_int64_t sid; in cryptof_ioctl() local
306 error = crypto_newsession(&sid, (txform ? &crie : &cria), crid); in cryptof_ioctl()
311 cse = csecreate(fcr, sid, crie.cri_key, crie.cri_klen, in cryptof_ioctl()
317 crypto_freesession(sid); in cryptof_ioctl()
324 SES2(sop)->crid = CRYPTO_SESID2HID(cse->sid); in cryptof_ioctl()
481 crp->crp_sid = cse->sid; in cryptodev_op()
794 csecreate(struct fcrypt *fcr, u_int64_t sid, caddr_t key, u_int64_t keylen, in csecreate() argument
806 cse->sid = sid; in csecreate()
820 error = crypto_freesession(cse->sid); in csefree()
H A Dcryptosoft.c829 swcr_newsession(device_t dev, u_int32_t *sid, struct cryptoini *cri) in swcr_newsession() argument
841 if (sid == NULL || cri == NULL) in swcr_newsession()
1080 *sid = i; in swcr_newsession()
1090 u_int32_t sid = CRYPTO_SESID2LID(tid); in swcr_freesession() local
1092 if (sid > swcr_sesnum || swcr_sessions == NULL || in swcr_freesession()
1093 swcr_sessions[sid] == NULL) { in swcr_freesession()
1098 if (sid == 0) in swcr_freesession()
1101 return(swcr_freesession_slot(&swcr_sessions[sid], sid)); in swcr_freesession()
1106 swcr_freesession_slot(struct swcr_data **swdp, u_int32_t sid) in swcr_freesession_slot() argument
1119 if (sid && swcr_minsesnum > sid) in swcr_freesession_slot()
[all …]
/dragonfly/sys/libkern/
H A Dlinux_idr.c317 idr_get_new_above(struct idr *idp, void *ptr, int sid, int *id) in idr_get_new_above() argument
327 if (sid >= idp->idr_count || idp->idr_maxwant < sid) { in idr_get_new_above()
328 idp->idr_maxwant = max(idp->idr_maxwant, sid); in idr_get_new_above()
333 resid = idr_find_free(idp, sid, INT_MAX); in idr_get_new_above()
343 if (sid <= idp->idr_freeindex) in idr_get_new_above()
/dragonfly/sys/dev/crypto/hifn/
H A Dhifn7751var.h336 #define HIFN_CARD(sid) (((sid) & 0xf0000000) >> 28) argument
337 #define HIFN_SESSION(sid) ((sid) & 0x000007ff) argument
/dragonfly/sbin/jscan/
H A Ddump_debug.c61 int16_t sid; in dump_debug_stream() local
65 sid = head.streamid & JREC_STREAMID_MASK; in dump_debug_stream()
69 if (sid >= JREC_STREAMID_JMIN && sid < JREC_STREAMID_JMAX) { in dump_debug_stream()
/dragonfly/crypto/openssh/
H A Dssh-agent.c121 struct sshbuf *sid; member
203 sshbuf_free(e->session_ids[i].sid); in close_socket()
761 if (parse_userauth_request(data, key, &user, &sid, in process_sign_request2()
777 if (buf_equal(sid, in process_sign_request2()
862 sshbuf_free(sid); in process_sign_request2()
1495 struct sshbuf *sid = NULL, *sig = NULL; in process_ext_session_bind() local
1502 (r = sshbuf_froms(e->request, &sid)) != 0 || in process_ext_session_bind()
1513 sshbuf_ptr(sid), sshbuf_len(sid), NULL, 0, NULL)) != 0) { in process_ext_session_bind()
1525 sid_match = buf_equal(sid, e->session_ids[i].sid) == 0; in process_ext_session_bind()
1559 if ((r = sshbuf_putb(e->session_ids[i].sid, sid)) != 0) in process_ext_session_bind()
[all …]
/dragonfly/sys/dev/crypto/padlock/
H A Dpadlock.c269 uint32_t sid = ses->ses_id; in padlock_freesession_one() local
278 ses->ses_id = sid; in padlock_freesession_one()
290 uint32_t sid = ((uint32_t)tid) & 0xffffffff; in padlock_freesession() local
295 if (ses->ses_id == sid) in padlock_freesession()
/dragonfly/usr.bin/stat/
H A Dstat.c626 char smode[12], sid[12], path[PATH_MAX + 4]; in format1() local
730 snprintf(sid, sizeof(sid), "(%ld)", (long)st->st_uid); in format1()
731 sdata = sid; in format1()
744 snprintf(sid, sizeof(sid), "(%ld)", (long)st->st_gid); in format1()
745 sdata = sid; in format1()
/dragonfly/lib/libevtr/
H A Devtr.c463 struct id_map *sid; \
465 sid = id_tree_RB_LOOKUP(tree, id); \
466 return sid ? sid->data : NULL; \
484 struct id_map *sid, *osid; \
486 sid = malloc(sizeof(*sid)); \
487 if (!sid) { \
490 sid->id = id; \
491 sid->data = data; \
492 if ((osid = id_tree_RB_INSERT(tree, sid))) { \
493 free(sid); \
[all …]

1234