/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5sealv3.c | 86 gss_krb5int_make_seal_token_v3 (krb5_context context, argument 124 context->kef_cipher_mt = get_cipher_mech_type(context, key); 125 context->kef_hash_mt = get_hash_mech_type(context, key); 127 if ((err = init_key_kef(context->kef_cipher_mt, key))) { 169 if ((err = krb5_c_encrypt_length(context, 205 err = krb5_c_encrypt(context, key, key_usage, 0, &plain, &cipher); 283 err = krb5_c_make_checksum(context, ctx->cksumtype, key, 299 krb5_free_checksum_contents(context, 355 krb5_context context = *contextptr; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_cipher.c | 54 * CRYPTO_INVALID_CONTEXT: Not a valid context. 77 * tmpl: a crypto_ctx_template_t, opaque template of a context of an 91 * schedule from the context template, tmpl. 133 /* Allocate and initialize the canonical context */ 161 /* Check if context sharing is possible */ 184 * Check if the software provider can support context 250 * For SW providers, check the validity of the context template 299 * tmpl: a crypto_ctx_template_t, opaque template of a context of an 376 * For SW providers, check the validity of the context template 457 * context 473 crypto_encrypt_update(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 533 crypto_encrypt_final(crypto_context_t context, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 755 crypto_decrypt_update(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 815 crypto_decrypt_final(crypto_context_t context, crypto_data_t *plaintext, crypto_call_req_t *cr) argument 852 crypto_encrypt_single(crypto_context_t context, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_call_req_t *cr) argument 887 crypto_decrypt_single(crypto_context_t context, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_call_req_t *cr) argument [all...] |
/illumos-gate/usr/src/uts/common/io/aac/ |
H A D | aac_ioctl.h | 85 uint32_t context; member in struct:aac_get_adapter_fib
|
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_radiuspacket.c | 173 MD5_CTX context; local 252 MD5Init(&context); 254 MD5Update(&context, &packet->code, 1); 255 MD5Update(&context, &packet->identifier, 1); 256 MD5Update(&context, packet->length, 2); 257 MD5Update(&context, req_authenticator, RAD_AUTHENTICATOR_LEN); 268 MD5Update(&context, packet->data, 271 MD5Update(&context, shared_secret, shared_secret_len); 272 MD5Final(md5_digest, &context);
|
/illumos-gate/usr/src/uts/common/rpc/ |
H A D | svc_mt.h | 70 void *context; member in struct:__anon6911
|
/illumos-gate/usr/src/uts/common/io/ib/clients/rdsv3/ |
H A D | ib_cm.c | 296 rdsv3_ib_snd_cq_comp_handler(struct ib_cq *cq, void *context) argument 298 struct rdsv3_connection *conn = context; 347 rdsv3_ib_cq_comp_handler(struct ib_cq *cq, void *context) argument 349 struct rdsv3_connection *conn = context; 785 ASSERT(!cm_id->context); 792 cm_id->context = conn; 837 struct rdsv3_connection *conn = cm_id->context;
|
/illumos-gate/usr/src/uts/common/sys/ib/clients/of/rdma/ |
H A D | rdma_cm.h | 137 void *context; member in struct:rdma_cm_id 150 * @context: User specified context associated with the id. 154 void *context, enum rdma_port_space ps); 312 * @context: User-defined context associated with the join request, returned 316 void *context);
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 46 process_chpw_request(krb5_context context, void *server_handle, argument 142 if (ret = krb5_auth_con_init(context, &auth_context)) { 145 "Failed initializing auth context: %s"), 148 (void) strlcpy(strresult, "Failed initializing auth context", 153 if (ret = krb5_auth_con_setflags(context, auth_context, 158 "context flags: %s"), 161 (void) strlcpy(strresult, "Failed initializing auth context", 166 if (ret = krb5_build_principal(context, &changepw, strlen(realm), realm, 180 ret = krb5_rd_req(context, &auth_context, &ap_req, changepw, keytab, 185 if (krb5_kt_get_name(context, keyta 566 handle_chpw(krb5_context context, int s1, void *serverhandle, kadm5_config_params *params) argument [all...] |
H A D | svr_iters.c | 55 krb5_context context; member in struct:iter_data 195 if (krb5_unparse_name(id->context, princ, &name) != 0) 251 data.context = handle->context; 254 ret = krb5_db_iter_policy(handle->context, exp, get_pols_iter, (void *)&data);
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb_convert.c | 242 conv_princ_2db(krb5_context context, kdbe_princ_t *kdbe_princ) argument 280 krb5_free_principal(context, princ); 290 ulog_conv_2logentry(krb5_context context, krb5_db_entry *entries, argument 331 if ((ret = krb5_db_get_principal_nolock(context, ent->princ, &curr, 358 krb5_db_free_principal(context, &curr, nprincs); 497 ret = krb5_dbe_lookup_last_pwd_change(context, 507 context, ent, &tmpint, &tmpprinc))) { 514 krb5_free_principal(context, tmpprinc); 600 ulog_conv_2dbentry(krb5_context context, krb5_db_entry *entries, argument 644 ret = krb5_parse_name(context, dbprincst [all...] |
H A D | kdb_log.c | 138 ulog_add_update(krb5_context context, kdb_incr_update_t *upd) argument 153 INIT_ULOG(context); 243 ulog_finish_update(krb5_context context, kdb_incr_update_t *upd) argument 252 INIT_ULOG(context); 288 ulog_delete_update(krb5_context context, kdb_incr_update_t *upd) argument 293 return (ulog_add_update(context, upd)); 301 ulog_replay(krb5_context context, kdb_incr_result_t *incr_ret) argument 314 INIT_ULOG(context); 328 if (krb5_db_inited(context)) { 329 retval = krb5_db_open(context, NUL 421 ulog_check(krb5_context context, kdb_hlog_t *ulog) argument 530 ulog_map(krb5_context context, kadm5_config_params *params, int caller) argument 706 ulog_get_entries( krb5_context context, kdb_last_t last, kdb_incr_result_t *ulog_handle) argument [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ldap.c | 97 krb5_ldap_db_get_age(context, db_name, age) 98 krb5_context context; 110 krb5_ldap_read_startup_information(krb5_context context) argument 118 if ((retval=krb5_ldap_read_krbcontainer_params(context, &(ldap_context->krbcontainer)))) { 119 prepend_err_str (context, gettext("Unable to read Kerberos container"), retval, retval); 123 if ((retval=krb5_ldap_read_realm_params(context, context->default_realm, &(ldap_context->lrparams), &mask))) { 124 prepend_err_str (context, gettext("Unable to read Realm"), retval, retval); 135 retval = kadm5_get_config_params(context, 1, ¶ms_in, ¶ms_out); 165 kadm5_free_config_params(context, 267 krb5_ldap_alloc(krb5_context context, void *ptr, size_t size) argument 273 krb5_ldap_free(krb5_context context, void *ptr) argument 279 krb5_ldap_open(krb5_context context, char *conf_section, char **db_args, int mode) argument [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_identity.c | 279 parse_pkcs11_options(krb5_context context, argument 353 parse_fs_options(krb5_context context, argument 387 parse_pkcs12_options(krb5_context context, argument 413 process_option_identity(krb5_context context, argument 449 krb5_set_error_message(context, KRB5_PREAUTH_FAILED, 466 krb5_set_error_message(context, EINVAL, 471 return process_option_identity(context, plg_cryptoctx, 477 retval = parse_fs_options(context, idopts, residual); 480 retval = parse_pkcs12_options(context, idopts, residual); 484 retval = parse_pkcs11_options(context, idopt 502 process_option_ca_crl(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, const char *value, int catype) argument 538 pkinit_identity_process_option(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, int attr, const char *value) argument 583 pkinit_identity_initialize(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, int do_matching, krb5_principal princ) argument [all...] |
H A D | pkinit_lib.c | 181 free_krb5_auth_pack_draft9(krb5_context context, argument 185 krb5_free_principal(context, (*in)->pkAuthenticator.kdcName);
|
/illumos-gate/usr/src/lib/libadt_jni/common/ |
H A D | adt_jni.c | 300 jstring jhostname, jint context) { 316 context)) { 297 Java_com_sun_audit_AuditSession_sessionAttr(JNIEnv *env, jobject cls, jbyteArray jstate, jint euid, jint egid, jint ruid, jint rgid, jstring jhostname, jint context) argument
|
/illumos-gate/usr/src/uts/intel/io/pciex/hotplug/ |
H A D | pciehpc_acpi.c | 67 void *context); 475 pciehpc_acpi_notify_handler(ACPI_HANDLE device, uint32_t val, void *context) argument 477 pcie_hp_ctrl_t *ctrl_p = context;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | PosixDaemon.c | 241 mStatus udsSupportAddFDToEventLoop(int fd, udsEventCallback callback, void *context, void **platform_data) argument 246 return mDNSPosixAddFDToEventLoop(fd, callback, context);
|
/illumos-gate/usr/src/uts/common/inet/tcp/ |
H A D | tcp_time_wait.c | 705 MD5_CTX context; local 708 context = tcps->tcps_iss_key; 714 MD5Update(&context, (uchar_t *)&arg, 716 MD5Final((uchar_t *)answer, &context);
|
/illumos-gate/usr/src/common/ficl/ |
H A D | float.c | 173 struct stackContext *context = (struct stackContext *)c; local 177 (unsigned long) cell, context->count++, cell->f, cell->u); 180 (unsigned)cell, context->count++, cell->f, cell->u); 182 ficlVmTextOut(context->vm, buffer); 189 struct stackContext context; local 190 context.vm = vm; 191 context.count = 0; 193 &context);
|
H A D | stack.c | 379 void *context, ficlInteger bottomToTop) 389 if (callback(context, cell) == FICL_FALSE) 378 ficlStackWalk(ficlStack *stack, ficlStackWalkFunction callback, void *context, ficlInteger bottomToTop) argument
|
/illumos-gate/usr/src/uts/intel/io/pci/ |
H A D | pci_resource.c | 60 static ACPI_STATUS acpi_wr_cb(ACPI_RESOURCE *rp, void *context); 262 acpi_wr_cb(ACPI_RESOURCE *rp, void *context) argument 264 int bus = (intptr_t)context;
|
/illumos-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss.c | 78 gss_ctx_id_t context; /* GSS context id */ member in struct:_rpc_gss_data 79 gss_buffer_desc ctx_handle; /* RPCSEC context handle */ 98 * Create a context. 183 * Now invoke the real interface that sets up the context from 219 options_ret->gss_context = ap->context; 229 * Private interface to create a context. This is the interface 230 * that's invoked when the context has to be refreshed. 267 ap->context = GSS_C_NO_CONTEXT; 279 * set state for starting context setu [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dummy/mech/ |
H A D | dmech.c | 28 * exchanged during security context establishment can be 576 dummy_gss_ctx_id_t context; local 580 context = (dummy_gss_ctx_id_t)(context_handle); 583 if (!context->established) 607 dummy_gss_ctx_id_t context; local 611 context = (dummy_gss_ctx_id_t)(context_handle); 614 if (!context->established) 648 dummy_gss_ctx_id_t context; local 652 context = (dummy_gss_ctx_id_t)(context_handle); 655 if (!context 691 dummy_gss_ctx_id_t context; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_memory.c | 138 static void krb5_mcc_free (krb5_context context, krb5_ccache id); 141 krb5_mcc_initialize(krb5_context context, krb5_ccache id, krb5_principal princ) argument 145 krb5_mcc_free(context, id); 146 ret = krb5_copy_principal(context, princ, 162 krb5_mcc_close(krb5_context context, krb5_ccache id) argument 169 krb5_mcc_free(krb5_context context, krb5_ccache id) argument 176 krb5_free_creds(context, curr->creds); 182 krb5_free_principal(context, d->prin); 193 krb5_mcc_destroy(krb5_context context, krb5_ccache id) argument 214 krb5_mcc_free(context, i 246 krb5_mcc_resolve(krb5_context context, krb5_ccache *id, const char *residual) argument 298 krb5_mcc_start_seq_get(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor) argument 336 krb5_mcc_next_cred(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument 414 krb5_mcc_end_seq_get(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor) argument 487 krb5_mcc_generate_new(krb5_context context, krb5_ccache *id) argument 539 random_string(krb5_context context, char *string, unsigned int length) argument 580 krb5_mcc_get_name(krb5_context context, krb5_ccache id) argument 599 krb5_mcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *princ) argument 610 krb5_mcc_retrieve(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument 624 krb5_mcc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument 643 krb5_mcc_set_flags(krb5_context context, krb5_ccache id, krb5_flags flags) argument 649 krb5_mcc_get_flags(krb5_context context, krb5_ccache id, krb5_flags *flags) argument 685 krb5_mcc_ptcursor_new( krb5_context context, krb5_cc_ptcursor *cursor) argument 722 krb5_mcc_ptcursor_next( krb5_context context, krb5_cc_ptcursor cursor, krb5_ccache *ccache) argument 757 krb5_mcc_ptcursor_free( krb5_context context, krb5_cc_ptcursor *cursor) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 41 krb5_context context, 71 krb5_free_keyblock_contents (context, as_key); 80 if ((ret = krb5_unparse_name(context, client, &clientstr))) 95 krb5int_set_prompt_types(context, &prompt_type); 96 if ((ret = (((*prompter)(context, prompter_data, NULL, NULL, 98 krb5int_set_prompt_types(context, 0); 101 krb5int_set_prompt_types(context, 0); 105 if ((ret = krb5_principal2salt(context, client, &defsalt))) 113 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, 123 krb5_get_init_creds_password(krb5_context context, argument 40 krb5_get_as_key_password( krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument 152 __krb5_get_init_creds_password( krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument 515 krb5int_populate_gic_opt( krb5_context context, krb5_gic_opt_ext **opte, krb5_flags options, krb5_address * const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_creds *creds) argument 574 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument [all...] |