key1
compare_keys(list_t *list, ulong_t key1, ulong_t key2)
if (key1 == key2)
if (key1 < key2)
dst_compare_keys(const DST_KEY *key1, const DST_KEY *key2)
if (key1 == key2)
if (key1 == NULL || key2 == NULL)
if (key1->dk_alg != key2->dk_alg)
if (key1->dk_key_size != key2->dk_key_size)
if (key1->dk_id != key2->dk_id)
return (key1->dk_func->compare(key1, key2));
int (*compare)(const DST_KEY *key1, const DST_KEY *key2);
dst_hmac_md5_compare_keys(const DST_KEY *key1, const DST_KEY *key2)
HMAC_Key *hkey1 = (HMAC_Key *) key1->dk_KEY_struct;
struct lockKey key1;
memset(&key1, 0, sizeof(key1));
key1.dev = statbuf.st_dev;
key1.ino = statbuf.st_ino;
key1.pid = getpid();
pLock = (struct lockInfo*)sqliteHashFind(&lockHash, &key1, sizeof(key1));
pLock->key = key1;
pOld = sqliteHashInsert(&lockHash, &pLock->key, sizeof(key1), pLock);
CK_ATTRIBUTE *k1Template, CK_ULONG k1AttrCount, meta_object_t *key1,
rv = meta_object_alloc(session, &key1);
pPublicKeyTemplate, ulPublicKeyAttributeCount, key1,
meta_object_activate(key1);
*phPublicKey = (CK_OBJECT_HANDLE) key1;
if (key1)
(void) meta_object_dealloc(session, key1, B_TRUE);
meta_object_t *key1 = NULL, *key2 = NULL;
if ((key1->isToken) || ((doKeyPair) && (key2->isToken))) {
if (key1->isFreeToken == FREE_ENABLED) {
rv = meta_object_get_attr(gen_session, slot_key1->hObject, key1);
if (key1->isFreeToken == FREE_ENABLED)
key1->isToken = B_TRUE;
meta_slot_object_activate(slot_key1, gen_session, key1->isToken);
key1->clones[slotnum] = slot_key1;
key1->master_clone_slotnum = slotnum;
if (key1->isFreeObject == FREE_ENABLED) {
rv = meta_freeobject_clone(session, key1);
CK_ATTRIBUTE *k1Template, CK_ULONG k1AttrCount, meta_object_t *key1,
&(key1->isToken));
&(key1->isSensitive));
&(key1->isPrivate));
&(key1->isExtractable)))
key1->isExtractable = B_TRUE;
if (key1->isToken)
((key1->isToken) || ((key2) && (key2->isToken)))) {
if (meta_freeobject_check(session, key1, pMechanism, k1Template,
if ((key1->isPrivate || (doKeyPair && key2->isPrivate)) &&
if (!meta_freeobject_set(key1, k1Template, k1AttrCount,
static int smb_netbios_match(const char *key1, const char *key2, size_t n);
smb_netbios_match(const char *key1, const char *key2, size_t n)
res = bcmp(key1, key2, NETBIOS_NAME_SZ);
res = strcmp(key1 + NETBIOS_NAME_SZ, key2 + NETBIOS_NAME_SZ);
kcf_get_hardware_provider(crypto_mech_type_t mech_type_1, crypto_key_t *key1,
if ((key1 != NULL) &&
key1)) {
if ((key1 != NULL) &&
!kcf_check_prov_mech_keylen(old, mech_type_1, key1)) {
kcf_get_dual_provider(crypto_mechanism_t *mech1, crypto_key_t *key1,
if ((key1 != NULL) && !kcf_check_prov_mech_keylen(pd,
mech1->cm_type, key1)) {
if (krb5_enctypes_list[i].etype == key1->enctype)
if ((ret = dr(context, enc, key1, r1, &input)))
input.length = key1->length;
input.data = (char *) key1->contents;
outkey->enctype = key1->enctype;
(krb5_context context, krb5_keyblock *key1, krb5_keyblock *key2, krb5_keyblock *outkey)
if (!(enctype_ok(key1->enctype)&&enctype_ok(key2->enctype)))
if (key1->length != key2->length || key1->enctype != key2->enctype)
(krb5_context context, krb5_keyblock *key1, krb5_keyblock *key2,
#define ILB_NAT_SRC_HASH(hash, key1, key2, hash_size) \
CRC32((hash), (key1), sizeof (uint32_t), -1U, crc32_table); \
gcdb_hash_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
struct rtsa_s *rp1 = (struct rtsa_s *)key1;
gcgrp_hash_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
tsol_gcgrp_addr_t *ga1 = (tsol_gcgrp_addr_t *)key1;
uint32_t key0, key1, key2, key3, key4;
key1 = (ARN_LE_READ_16(k->kv_val + 4) ^ xorMask) & 0xffff;
REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), ~key1);
REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1);
REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1);
di_key_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
dik1 = key1;
WRITE_TCAM_REG_KEY1(handle, tcam_ptr->key1);
WRITE_TCAM_REG_KEY1(handle, tcam_ptr->key1);
location, tcam_ptr->key0, tcam_ptr->key1,
tcam_rdptr.key0, tcam_rdptr.key1,
ibd_hash_key_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
if (bcmp((char *)key1, (char *)key2, IPOIB_ADDRL) == 0)
uint32_t key1 = *(uint32_t *)mr1;
if (key1 < key2)
if (key1 > key2)
WRITE_TCAM_REG_KEY1(handle, tcam_ptr->key1);
READ_TCAM_REG_KEY1(handle, &tcam_ptr->key1);
WRITE_TCAM_REG_KEY1(handle, tcam_ptr->key1);
location, tcam_ptr->key0, tcam_ptr->key1,
tcam_rdptr.key0, tcam_rdptr.key1,
sad_hash_keycmp(mod_hash_key_t key1, mod_hash_key_t key2)
struct apcommon *apc1 = (struct apcommon *)key1;
tl_hash_cmp_addr(mod_hash_key_t key1, mod_hash_key_t key2)
tl_addr_t *ap1 = (tl_addr_t *)key1;
ASSERT(key1 != NULL);
return (!tl_eqaddr((tl_addr_t *)key1, (tl_addr_t *)key2));
#define MH_KEYCMP(hash, key1, key2) ((hash->mh_keycmp)(key1, key2))
mod_hash_strkey_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
return (strcmp((char *)key1, (char *)key2));
mod_hash_ptrkey_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
uintptr_t k1 = (uintptr_t)key1;
mod_hash_idkey_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
return ((uint_t)(uintptr_t)key1 - (uint_t)(uintptr_t)key2);
project_hash_key_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
struct project_zone *pz1 = key1, *pz2 = key2;
rctl_dict_id_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
uint_t u1 = (uint_t)(uintptr_t)key1;
hash_labelkey_cmp(mod_hash_key_t key1, mod_hash_key_t key2)
ts_label_t *lab1 = (ts_label_t *)key1;
int (*ht_cmp)(const char *key1, const char *key2, size_t n);