kb
consumer.setOption(Option.aggsize, Option.kb(1));
kb(dqp->dqb_curblocks - dqp->dqb_bsoftlimit + 1));
kb(dqp->dqb_curblocks - dqp->dqb_bsoftlimit + 1),
kb(dqp->dqb_curblocks - dqp->dqb_bsoftlimit + 1));
kb(dqp->dqb_curblocks),
kb(dqp->dqb_bsoftlimit),
kb(dqp->dqb_bhardlimit),
kb(dqp->dqb_curblocks),
kb(dqp->dqb_bsoftlimit),
kb(dqp->dqb_bhardlimit),
kmt_brkpt_t *kb = sep->se_data;
kb->kb_addr)) == NULL ||
kmt_brkpt_t *kb;
kb = mdb_zalloc(sizeof (kmt_brkpt_t), UM_SLEEP);
kb->kb_addr = ka->ka_addr;
sep->se_data = kb;
kmt_brkpt_t *kb = sep->se_data;
&sym, NULL) == 0 && sym.st_value == kb->kb_addr);
return (ka->ka_addr == kb->kb_addr);
kmt_brkpt_t *kb = sep->se_data;
if ((rv = kmdb_dpi_brkpt_arm(kb->kb_addr, &kb->kb_oinstr)) != 0)
kmt_brkpt_t *kb = sep->se_data;
if ((rv = kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr)) != 0)
kmt_wp_overlap(mdb_sespec_t *sep, kmt_brkpt_t *kb, int flags)
kb->kb_addr - wp->wp_addr < wp->wp_size);
kmt_brkpt_t *kb = sep->se_data;
if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
if (kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr) == 0 &&
if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
kmt_brkpt_t *kb = sep->se_data;
pc == kb->kb_addr);
kmt_brkpt_t *kb = sep->se_data;
sep->se_ops == &kmt_brkpt_ops && kb->kb_addr == pc);
const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag)
if (!key || !signature || !digest || !kb || (kblen < 0)) {
CHECK_MPI_OK( mp_read_unsigned_octets(&k, kb, kblen) );
krb5_get_key_enctype(krb5_keyblock *kb)
return (kb->enctype);
krb5_get_key_length(krb5_keyblock *kb)
return (kb->length);
krb5_get_key_data(krb5_keyblock *kb)
return (kb->contents);
krb5_set_key_enctype(krb5_keyblock *kb, krb5_enctype enctype)
kb->enctype = enctype;
krb5_set_key_length(krb5_keyblock *kb, unsigned int len)
kb->length = len;
krb5_set_key_data(krb5_keyblock *kb, krb5_octet *data)
kb->contents = data;
krb5_keyblock *kb)
if (!kb)
(void) memset(kb, 0, sizeof (*kb));
kb->enctype = enctype;
kb->length = length;
kb->contents = malloc(length);
if (!kb->contents) {
(void) memset(kb->contents, 0, length);
kb->contents = NULL;
kb->dk_list = NULL;
kb->kef_key = NULL;
kb->hKey = CK_INVALID_HANDLE;
krb5_keyblock *kb;
kb = malloc (sizeof(krb5_keyblock));
if (!kb) {
kb->magic = KV5M_KEYBLOCK;
kb->enctype = enctype;
kb->length = length;
kb->contents = malloc (length);
if(!kb->contents) {
free (kb);
kb->contents = NULL;
kb->dk_list = NULL;
kb->kef_key = NULL;
kb->hKey = CK_INVALID_HANDLE;
*out = kb;
tkey.data = kb;
memmove(kb, &pg, sizeof(db_pgno_t));
memmove(kb + sizeof(db_pgno_t),
char *dest, db[NOVFLSIZE], kb[NOVFLSIZE];
new Option(Option.bufsize, Option.kb(256)),
new Option(Option.aggsize, Option.kb(256)),
uchar_t key_block[MAX_KEYBLOCK], *kb, *export_keys = NULL;
kb = key_block;
ClientRandomLen, rounds, kb);
kb, size);
obj_tmpl[5].pValue = kb;
kb += mac_key_bytes;
obj_tmpl[5].pValue = kb;
kb += mac_key_bytes;
soft_ssl_weaken_key(mech, kb, (uint_t)secret_key_bytes,
soft_ssl_weaken_key(mech, kb, secret_key_bytes,
new_tmpl[n].pValue = kb;
kb += secret_key_bytes;
soft_ssl_weaken_key(mech, kb, (uint_t)secret_key_bytes,
soft_ssl_weaken_key(mech, kb, secret_key_bytes,
new_tmpl[n].pValue = kb;
kb += secret_key_bytes;
bcopy(kb, kmo->pIVClient, iv_bytes);
kb += iv_bytes;
bcopy(kb, kmo->pIVServer, iv_bytes);
} kb = {
kb.pending = -1;
ASSERT(kb.pending >= 0);
if (kb.pending & 0x100) {
kb.pending &= 0xff;
switch (kb.pending) {
ret = kb.pending;
kb.pending = -1;
if (!kb.initialized) {
kb.initialized = B_TRUE;
if (kb.pending >= 0)
switch (kb.led_state) {
kb.led_commanded = leds;
kb.led_state = KB_LED_VALUE_SENT;
kb.led_state = KB_LED_IDLE;
kb.pending = kb_translate(code);
if (kb.pending >= 0) {
if (kb.led_state != KB_LED_IDLE) {
if (kb_calculate_leds() == kb.led_commanded) {
kb.led_state = KB_LED_IDLE;
kb.led_state = KB_LED_COMMAND_SENT;