Lines Matching defs:context

81  * Server side RPCSEC_GSS context information.
87 gss_ctx_id_t context;
109 * Data structures used for LRU based context management.
119 * sweep_clients. When the last_ref_time of a context is older than
120 * than the current time minus the delta, i.e, the context has not
122 * context back to the cache if the ref_cnt is zero. The first delta
144 * and the context has not been referenced in INACTIVE_DELTA seconds, return
161 * lock used with context/lru variables
331 * Cleanup routine for destroying context, called after service
333 * associated with this context. If the reference count is zero and the
334 * context is marked as stale, we would then destroy the context. Additionally,
347 * First check if current context needs to be cleaned up.
419 * If it exceeds the maximum, kill context.
507 * accepts the context. If a callback is not specified, accept
508 * the incoming context.
528 client_data->context, &lock, &client_data->cookie);
621 * Transfer the context data from the user land to the kernel.
633 * convert the token into a context
635 gssstat = kgss_export_sec_context(&minor, client_data->context,
639 * context just to be safe.
642 RPCGSS_LOG0(4, "svc_rpcsec_gss: export sec context "
646 RPCGSS_LOG(1, "svc_rpcsec_gss: export sec context failed "
649 (void) kgss_delete_sec_context(&minor, &client_data->context,
657 (void) kgss_delete_sec_context(&minor, &client_data->context,
663 client_data->context);
665 RPCGSS_LOG(1, "svc_rpcsec_gss: import sec context "
668 &client_data->context, NULL);
737 &client_data->context,
822 * for the context.
836 "_svc_rpcsec_gss: transfer sec context failed\n");
876 * retries on an established context.
1033 RPCGSS_LOG0(1, "_svcrpcsec_gss: no security context\n");
1045 * If context not established, go thru INIT code but with
1062 * sake of reentrancy (we don't want to look in the context
1070 gss_parms->context = (void *)client_data->context;
1074 * This is an established context. Continue to
1137 RPCGSS_LOG0(1, "_svcrpcsec_gss: no security context\n");
1154 * Once the context is established and there is no more
1169 * sake of reentrancy (we don't want to look in the context
1177 gss_parms->context = (void *)client_data->context;
1184 if (!check_verf(msg, client_data->context,
1207 * If the context was locked, make sure that the client
1226 "failed on good context. Ignoring "
1252 * If context is locked, make sure that the client
1265 * structure in context. This is okay, since
1267 * the context (so it's MT safe).
1300 RPCGSS_LOG0(1, "_svcrpcsec_gss: no security context\n");
1406 check_verf(struct rpc_msg *msg, gss_ctx_id_t context, int *qop_state, uid_t uid)
1452 gssstat = kgss_verify(&minor_stat, context, &msg_buf, &tok_buf,
1463 RPCGSS_LOG(4, "check_verf: context 0x%p\n", (void *)context);
1491 if ((kgss_sign(&minor, cl->context, cl->qop, &in_buf,
1504 * Create client context.
1534 client_data->context = GSS_C_NO_CONTEXT;
1546 * The client context handle is a 32-bit key (unsigned int).
1564 * Insert client context into hash list and LRU list.
1592 * Fetch a client, given the client context handle. Move it to the
1593 * top of the LRU list since this is the most recently used context.
1635 * Given the client context handle, find the context corresponding to it.
1655 * Destroy a client context.
1689 * If there is a GSS context, clean up GSS state.
1691 if (client_data->context != GSS_C_NO_CONTEXT) {
1692 (void) kgss_delete_sec_context(&minor, &client_data->context,
1786 * If context is not established, or if neither integrity nor
1796 (gss_ctx_id_t)gss_parms->context,
1815 * If context is not established, or if neither integrity nor
1824 (gss_ctx_id_t)gss_parms->context,
1839 * Add retransmit entry to the context cache entry for a new xid.
1871 * Delete the retransmit data from the context cache entry.