/illumos-gate/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_clientstub.c | 125 void *AppCallback; // Client callback function and context 155 void *AppCallback; // Client callback function and context 1293 void *context 1316 err = ConnectToServer(sdRef, flags, resolve_request, handle_resolve_response, (void *)callBack, context); 1368 void *context 1379 err = ConnectToServer(sdRef, flags, query_request, handle_query_response, (void *)callBack, context); 1477 void *context /* may be NULL */ 1487 err = ConnectToServer(sdRef, flags, addrinfo_request, handle_addrinfo_response, (void *)callBack, context); 1531 void *context 1542 err = ConnectToServer(sdRef, flags, browse_request, handle_browse_response, (void *)callBack, context); 2231 SleepKeepaliveCallback(DNSServiceRef sdRef, DNSRecordRef rec, const DNSServiceFlags flags, DNSServiceErrorType errorCode, void *context) argument [all...] |
/illumos-gate/usr/src/uts/intel/io/scsi/adapters/pvscsi/ |
H A D | pvscsi.h | 176 uint64_t context; member in struct:PVSCSICmdDescAbortCmd 297 * - context: is a unique identifier of a command. It could normally be any 335 uint64_t context; member in struct:PVSCSIRingReqDesc 380 * - context: identifier of the command. The same thing that was specified 381 * under "context" as part of struct RingReqDesc at initiation time, 390 uint64_t context; member in struct:PVSCSIRingCmpDesc
|
/illumos-gate/usr/src/lib/libdtrace/common/ |
H A D | dt_cc.c | 60 * (2) The parse tree is "cooked" by assigning each clause a context (see the 82 * investigated in the context of whether they will have any substantive effect 1700 dt_dprintf("set context to %s:%s:%s:%s [%u] prp=%p attr=%s argc=%d\n", 1707 * based on the attributes of the provider and context itself. 1725 * Reset context-dependent variables and state at the end of cooking a D probe 1727 * do not reference any stale context-dependent data from the previous clause. 2332 dt_compile(dtrace_hdl_t *dtp, int context, dtrace_probespec_t pspec, void *arg, argument 2371 pcb.pcb_context = context; 2372 pcb.pcb_token = context; 2374 if (context ! [all...] |
/illumos-gate/usr/src/common/ficl/ |
H A D | ficl.h | 922 void *context, ficlInteger bottomToTop); 924 ficlStackWalkFunction callback, void *context); 942 void *context; member in struct:ficlCallback 1081 #define ficlVmGetContext(vm) ((vm)->callback.context) 1096 * Evaluates a block of input text in the context of the 1106 * Evaluates a block of input text in the context of the 1369 void *context; /* for your use, particularly with ficlDictionaryLock() */ member in struct:ficlDictionary 1571 * Note: the context pointer is there to provide context for applications. 1572 * It is copied to each VM's context fiel 1578 void *context; member in struct:ficlSystemInformation [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_spnego/mech/ |
H A D | spnego_mech.c | 348 void *context, 423 glue_spnego_gss_release_cred(void *context, argument 654 * The actual context is not yet determined, set the output 655 * context handle to refer to the spnego context itself. 936 void *context, 1079 * Now, switch the output context to refer to the 1080 * negotiated mechanism's context. 1689 ret = mech->gss_indicate_mechs(mech->context, minor_status, &mech_set); 1811 void *context, 347 glue_spnego_gss_acquire_cred( void *context, OM_uint32 *minor_status, gss_name_t desired_name, OM_uint32 time_req, gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument 935 glue_spnego_gss_init_sec_context( void *context, OM_uint32 *minor_status, gss_cred_id_t claimant_cred_handle, gss_ctx_id_t *context_handle, gss_name_t target_name, gss_OID mech_type, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t input_chan_bindings, gss_buffer_t input_token, gss_OID *actual_mech, gss_buffer_t output_token, OM_uint32 *ret_flags, OM_uint32 *time_rec) argument 1810 glue_spnego_gss_accept_sec_context( void *context, OM_uint32 *minor_status, gss_ctx_id_t *context_handle, gss_cred_id_t verifier_cred_handle, gss_buffer_t input_token, gss_channel_bindings_t input_chan_bindings, gss_name_t *src_name, gss_OID *mech_type, gss_buffer_t output_token, OM_uint32 *ret_flags, OM_uint32 *time_rec, gss_cred_id_t *delegated_cred_handle) argument 2003 glue_spnego_gss_display_status( void *context, OM_uint32 *minor_status, OM_uint32 status_value, int status_type, gss_OID mech_type, OM_uint32 *message_context, gss_buffer_t status_string) argument 2080 glue_spnego_gss_import_name( void *context, OM_uint32 *minor_status, gss_buffer_t input_name_buffer, gss_OID input_name_type, gss_name_t *output_name) argument 2114 glue_spnego_gss_release_name( void *context, OM_uint32 *minor_status, gss_name_t *input_name) argument 2140 glue_spnego_gss_compare_name( void *context, OM_uint32 *minor_status, const gss_name_t name1, const gss_name_t name2, int *name_equal) argument 2171 glue_spnego_gss_display_name( void *context, OM_uint32 *minor_status, gss_name_t input_name, gss_buffer_t output_name_buffer, gss_OID *output_name_type) argument 2206 glue_spnego_gss_inquire_names_for_mech( void *context, OM_uint32 *minor_status, gss_OID mechanism, gss_OID_set *name_types) argument 2317 glue_spnego_gss_delete_sec_context( void *context, OM_uint32 *minor_status, gss_ctx_id_t *context_handle, gss_buffer_t output_token) argument 2361 glue_spnego_gss_context_time( void *context, OM_uint32 *minor_status, const gss_ctx_id_t context_handle, OM_uint32 *time_rec) argument 2387 glue_spnego_gss_export_sec_context( void *context, OM_uint32 *minor_status, gss_ctx_id_t *context_handle, gss_buffer_t interprocess_token) argument 2411 glue_spnego_gss_import_sec_context( void *context, OM_uint32 *minor_status, const gss_buffer_t interprocess_token, gss_ctx_id_t *context_handle) argument 2436 glue_spnego_gss_inquire_context( void *context, OM_uint32 *minor_status, const gss_ctx_id_t context_handle, gss_name_t *src_name, gss_name_t *targ_name, OM_uint32 *lifetime_rec, gss_OID *mech_type, OM_uint32 *ctx_flags, int *locally_initiated, int *opened) argument 2488 glue_spnego_gss_wrap_size_limit( void *context, OM_uint32 *minor_status, const gss_ctx_id_t context_handle, int conf_req_flag, gss_qop_t qop_req, OM_uint32 req_output_size, OM_uint32 *max_input_size) argument 2721 spnego_gss_ctx_id_t context; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNSPosix.c | 347 TCPConnectionCallback callback, void *context) 355 (void)context; // Unused 1234 mDNSlocal void InterfaceChangeCallback(int fd, short filter, void *context) argument 1236 IfChangeRec *pChgRec = (IfChangeRec*) context; 1743 mStatus mDNSPosixAddFDToEventLoop(int fd, mDNSPosixEventCallback callback, void *context) argument 1760 newSource->Context = context; 346 mDNSPlatformTCPConnect(TCPSocket *sock, const mDNSAddr *dst, mDNSOpaque16 dstport, domainname *hostname, mDNSInterfaceID InterfaceID, TCPConnectionCallback callback, void *context) argument
|
H A D | DNSCommon.c | 1191 LogMsg("NSEC3HashName: ERROR!! Cannot allocate context"); 1457 const mDNSu16 qtype, mDNSQuestionCallback *const callback, void *const context) 1488 q->QuestionContext = context; 1456 mDNS_SetupQuestion(DNSQuestion *const q, const mDNSInterfaceID InterfaceID, const domainname *const name, const mDNSu16 qtype, mDNSQuestionCallback *const callback, void *const context) argument
|
H A D | uDNS.c | 1260 mDNSlocal void tcpCallback(TCPSocket *sock, void *context, mDNSBool ConnectionEstablished, mStatus err) argument 1262 tcpInfo_t *tcpInfo = (tcpInfo_t *)context; 1768 // GetZoneData_QuestionCallback is called from normal client callback context (core API calls allowed) 1876 // GetZoneData_StartQuery is called from normal client context (lock not held, or client callback) 2060 // Called in normal client context (lock not held) 2390 // Called in normal client context (lock not held) 4212 // Called in normal callback context (i.e. mDNS_busy and mDNS_reentrancy are both 1) 4267 // Called in normal callback context (i.e. mDNS_busy and mDNS_reentrancy are both 1) 4412 else LogInfo("RecordRegistrationGotZoneData: StartRecordNatMap for %s, state %d, context %p", ARDisplayString(m, newRR), newRR->state, newRR->NATinfo.clientContext);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpmtok_int.h | 274 CK_BYTE *context; member in struct:_ENCR_DECR_CONTEXT 287 } context; member in struct:_DIGEST_CONTEXT 297 void *context; // temporary work area member in struct:_SIGN_VERIFY_CONTEXT
|
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 154 struct context; 157 typedef int cipher_function_t(struct context *, 165 typedef int cipher_init_t(struct context *, char [16], 168 typedef int cipher_init_t(struct context *, unsigned char [16], 172 typedef void cipher_free_t(struct context *); 210 /* context that stores info */ 211 typedef struct context { struct 830 /* allocate enc & dec context */ 834 /* setup enc context */ 846 /* setup dec context */ 1724 digestmd5_privacy_encode(void *context, const struct iovec *invec, unsigned numiov, const char **output, unsigned *outputlen) argument 1811 digestmd5_privacy_decode_once(void *context, const char **input, unsigned *inputlen, char **output, unsigned *outputlen) argument 1985 digestmd5_privacy_decode(void *context, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument 2002 digestmd5_integrity_encode(void *context, const struct iovec *invec, unsigned numiov, const char **output, unsigned *outputlen) argument 2166 digestmd5_integrity_decode_once(void *context, const char **input, unsigned *inputlen, char **output, unsigned *outputlen) argument 2246 digestmd5_integrity_decode(void *context, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument [all...] |
/illumos-gate/usr/src/head/ |
H A D | meta.h | 262 char *context; member in struct:__anon2278
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 461 rd_and_store_forwarded_creds(krb5_context context, argument 472 if (retval = krb5_rd_cred(context, auth_context, inbuf, &creds, NULL)) 478 if ((retval = krb5_cc_default(context, &ccache))) 481 if ((retval = krb5_cc_initialize(context, ccache, 485 if ((retval = krb5_cc_store_cred(context, ccache, *creds)) != 0) 488 if ((retval = krb5_cc_close(context, ccache)) != 0) 492 if ((retval = krb5_unparse_name(context, (*creds)->client, 518 (void) krb5_kuserok(context, ticket->enc_part2->client, 526 krb5_free_creds(context, *creds); 558 "context [all...] |
/illumos-gate/usr/src/uts/common/io/drm/ |
H A D | drm.h | 54 * queues and the ability to detect the need for an OpenGL context 435 _DRM_LOCK_FLUSH = 0x04, /**< Flush this context's DMA queue first */ 450 int context; member in struct:drm_lock 557 int context; /**< Context handle */ member in struct:drm_dma
|
H A D | drmP.h | 371 int context; /* Kernel queue for this buffer */ member in struct:drm_buf 711 * can be used in interrupt context, so they need to know 774 int last_context; /* Last current context */ 851 * Saving S3 context
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 393 pkiDebug("%s: initializing openssl crypto context at %p\n", 415 pkiDebug("%s: freeing context at %p\n", __FUNCTION__, cryptoctx); 841 cms_signeddata_create(krb5_context context, argument 1064 retval = pkinit_sign_data(context, id_cryptoctx, digestInfo_buf, 1071 retval = pkinit_sign_data(context, id_cryptoctx, abuf, alen, 1087 krb5_set_error_message(context, retval, "%s\n", 1108 krb5_set_error_message(context, retval, "%s\n", 1125 krb5_set_error_message(context, retval, "%s\n", 1139 krb5_set_error_message(context, retval, "%s\n", 1190 cms_signeddata_verify(krb5_context context, argument 1517 cms_envelopeddata_create(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, krb5_preauthtype pa_type, int include_certchain, unsigned char *key_pack, unsigned int key_pack_len, unsigned char **out, unsigned int *out_len) argument 1647 cms_envelopeddata_verify(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_preauthtype pa_type, int require_crl_checking, unsigned char *enveloped_data, unsigned int enveloped_data_len, unsigned char **data, unsigned int *data_len) argument 1811 crypto_retrieve_X509_sans(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, X509 *cert, krb5_principal **princs_ret, krb5_principal **upn_ret, unsigned char ***dns_ret) argument 1976 crypto_retrieve_cert_sans(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, krb5_principal **princs_ret, krb5_principal **upn_ret, unsigned char ***dns_ret) argument 1998 crypto_check_cert_eku(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, int checking_kdc_cert, int allow_secondary_usage, int *valid_eku) argument 2081 pkinit_octetstring2key(krb5_context context, krb5_enctype etype, unsigned char *key, unsigned int dh_key_len, krb5_keyblock * key_block) argument 2153 client_create_dh(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int dh_size, unsigned char **dh_params, unsigned int *dh_params_len, unsigned char **dh_pubkey, unsigned int *dh_pubkey_len) argument 2274 client_process_dh(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char *subjectPublicKey_data, unsigned int subjectPublicKey_length, unsigned char **client_key, unsigned int *client_key_len) argument 2344 server_check_dh(krb5_context context, pkinit_plg_crypto_context cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_octet_data *dh_params, int minbits) argument 2405 server_process_dh(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **dh_pubkey, unsigned int *dh_pubkey_len, unsigned char **server_key, unsigned int *server_key_len) argument 2623 pkinit_create_sequence_of_principal_identifiers( krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int type, krb5_data **out_data) argument 2718 pkinit_create_td_trusted_certifiers(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_data **out_data) argument 2734 pkinit_create_td_invalid_certificate( krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_data **out_data) argument 2752 pkinit_create_td_dh_parameters(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, pkinit_plg_opts *opts, krb5_data **out_data) argument 2946 pkinit_check_kdc_pkid(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char *pdid_buf, unsigned int pkid_len, int *valid_kdcPkId) argument 3012 pkinit_process_td_dh_params(krb5_context context, pkinit_plg_crypto_context cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_algorithm_identifier **algId, int *new_dh_size) argument 3411 pkinit_prompt_user(krb5_context context, pkinit_identity_crypto_context cctx, krb5_data *reply, char *prompt, int hidden) argument 3445 pkinit_login(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, CK_TOKEN_INFO *tip) argument 3548 pkinit_prompt_token(krb5_context context, pkinit_identity_crypto_context cctx) argument 3585 pkinit_choose_tokens(krb5_context context, pkinit_identity_crypto_context cctx, struct _token_choices *token_choices, int *choice) argument 3730 check_load_certs(krb5_context context, CK_SESSION_HANDLE session, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_principal princ, int do_matching, int load_cert) argument 3923 pkinit_open_session(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context cctx, krb5_principal princ, int do_matching) argument 4502 pkinit_decode_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument 4539 pkinit_decode_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument 4613 pkinit_decode_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument 4636 pkinit_sign_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4653 pkinit_sign_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4730 pkinit_sign_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4829 pkinit_get_kdc_cert(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_principal princ) argument 4845 pkinit_get_certs_pkcs12(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, krb5_principal princ) argument 4977 pkinit_load_fs_cert_and_key(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, char *certname, char *keyname, int cindex) argument 5034 pkinit_get_certs_fs(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, krb5_principal princ) argument 5063 pkinit_get_certs_dir(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, krb5_principal princ) argument 5165 pkinit_get_certs_pkcs11(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, krb5_principal princ, int do_matching) argument 5278 free_cred_info(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, struct _pkinit_cred_info *cred) argument 5297 crypto_free_cert_info(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx) argument 5317 crypto_load_certs(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, krb5_principal princ, int do_matching) argument 5363 crypto_cert_get_count(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int *cert_count) argument 5387 crypto_cert_iteration_begin(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, pkinit_cert_iter_handle *ih_ret) argument 5417 crypto_cert_iteration_end(krb5_context context, pkinit_cert_iter_handle ih) argument 5433 crypto_cert_iteration_next(krb5_context context, pkinit_cert_iter_handle ih, pkinit_cert_handle *ch_ret) argument 5473 crypto_cert_release(krb5_context context, pkinit_cert_handle ch) argument 5488 crypto_retieve_X509_key_usage(krb5_context context, pkinit_plg_crypto_context plgcctx, pkinit_req_crypto_context reqcctx, X509 *x, unsigned int *ret_ku_bits, unsigned int *ret_eku_bits) argument 5594 crypto_cert_get_matching_data(krb5_context context, pkinit_cert_handle ch, pkinit_cert_matching_data **ret_md) argument 5694 crypto_cert_free_matching_data(krb5_context context, pkinit_cert_matching_data *md) argument 5720 crypto_cert_select(krb5_context context, pkinit_cert_matching_data *md) argument 5758 crypto_cert_select_default(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx) argument 5813 load_cas_and_crls(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int catype, char *filename) argument 5974 load_cas_and_crls_dir(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int catype, char *dirname) argument 6025 crypto_load_cas_and_crls(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_opts *idopts, pkinit_identity_crypto_context id_cryptoctx, int idtype, int catype, char *id) argument 6161 create_krb5_invalidCertificates(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_external_principal_identifier *** ids) argument 6190 create_krb5_supportedCMSTypes(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_algorithm_identifier ***oids) argument 6229 create_krb5_trustedCertifiers(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_external_principal_identifier *** ids) argument 6249 create_krb5_trustedCas(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int flag, krb5_trusted_ca *** ids) argument 6336 create_issuerAndSerial(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char **out, unsigned int *out_len) argument 6374 pkcs7_decrypt(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, PKCS7 *p7, BIO *data) argument 6411 pkinit_process_td_trusted_certifiers( krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_external_principal_identifier **krb5_trusted_certifiers, int td_type) argument 6489 pkcs7_dataDecode(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, PKCS7 *p7) argument [all...] |
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/emlxs/ |
H A D | emlxs_fcf.c | 2979 TID = (uint16_t)((unsigned long)mbq->context); 3222 mbq->context = (void *)((unsigned long)fcftab->TID); 3348 TID = (uint16_t)((unsigned long)mbq->context); 3487 mbq->context = (void *)((unsigned long)fcftab->TID); 3634 TID = (uint16_t)((unsigned long)mbq->context); 3812 mbq->context = (void *)((unsigned long)fcftab->TID); 5395 TID = (uint16_t)((unsigned long)mbq->context); 5547 mbq->context = (void *)((unsigned long)fcftab->TID); 5591 mbq->context = (void *)((unsigned long)fcftab->generation); 5733 uint32_t context; local 5887 uint32_t context; local [all...] |
/illumos-gate/usr/src/uts/common/io/mr_sas/ |
H A D | mr_sas.c | 2307 uint32_t context; local 2374 context = ddi_get32(instance->mfi_internal_dma_obj.acc_handle, 2376 cmd = instance->cmd_list[context]; 2441 * After clearing the frame buffer the context id of the 2951 &cmd->frame->io.context, cmd->index); 3282 /* Clear the frame buffer and assign back the context id */ 3284 ddi_put32(cmd->frame_dma_obj.acc_handle, &cmd->frame->hdr.context, 3388 /* Clear the frame buffer and assign back the context id */ 3390 ddi_put32(cmd->frame_dma_obj.acc_handle, &cmd->frame->hdr.context, 3458 /* Clear the frame buffer and assign back the context i 5079 uint32_t context; local [all...] |
H A D | mr_sas.h | 1321 uint32_t context; /* 08h */ member in struct:mrsas_header 1344 uint32_t context; /* 08h */ member in struct:mrsas_init_frame 1384 uint32_t context; /* 08h */ member in struct:mrsas_io_frame 1413 uint32_t context; /* 08h */ member in struct:mrsas_pthru_frame 1436 uint32_t context; /* 08h */ member in struct:mrsas_dcmd_frame 1465 uint32_t context; /* 08h */ member in struct:mrsas_abort_frame 1492 uint32_t context; /* 08h */ member in struct:mrsas_smp_frame 1517 uint32_t context; /* 08h */ member in struct:mrsas_stp_frame
|
/illumos-gate/usr/src/uts/common/sys/fibre-channel/fca/oce/ |
H A D | oce_hw.h | 902 /* event queue context structure */ 1169 struct mq_ring_ctx context; member in struct:mbx_create_common_mq::__anon7678::__anon7679
|
/illumos-gate/usr/src/uts/intel/io/drm/ |
H A D | radeon_drm.h | 82 #define RADEON_EMIT_PP_MISC 0 /* context/7 */ 83 #define RADEON_EMIT_PP_CNTL 1 /* context/3 */ 84 #define RADEON_EMIT_RB3D_COLORPITCH 2 /* context/1 */ 423 drm_radeon_context_regs_t context; member in struct:__anon9551
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dprov.c | 109 #define D_CONTEXT 0x00000040 /* context entry points */ 1182 * Find object context. Allows the find object init/find/final 1616 /* retrieve the softc and instance number from a SPI crypto context */ 1629 * The dprov private context most of the time contains a pointer to the 1642 * When the context refers to a single KCF context, the 1653 * When the context is used for cipher/mac operations, it contains 1664 * Helper macros for context accessors. These macros return the 1665 * k-API context corresponding to the given SPI context fo 4267 crypto_context_t context = DPROV_CTX_SINGLE(ctx); local [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/impl/ |
H A D | scsi_hba.c | 128 * (tunable based on calling context). 386 * self/child context. Filtering of messages is provided based on logging 1285 * Establish the devinfo context of this tran structure, preserving 2357 /* Establish the devinfo context of this tran structure. */ 5444 * probe node context. 5863 * avoids issues related to memory allocation in interrupt context 7005 * NOTE: child should only be used in SCSI_HBA_LOG context since with 7184 * NOTE: child should only be used in SCSI_HBA_LOG context since with 7275 * Based on calling context tunable, only enumerate one 8610 char context[6 local 8772 char *context; local 8857 char *context; local 9485 char context[64]; local 9629 char context[64]; local 9686 char context[64]; local 9894 char *context = damap_name(phymap->phymap_dam); local 10002 char *context = damap_name(phymap->phymap_dam); local 10048 char context[64]; local 10102 char *context; local 10151 char *context = damap_name(phymap->phymap_dam); local 10282 char *context = damap_name(phymap->phymap_dam); local 10345 char *context = damap_name(phymap->phymap_dam); local 10366 char *context = damap_name(phymap->phymap_dam); local [all...] |
/illumos-gate/usr/src/uts/common/sys/ib/adapters/tavor/ |
H A D | tavor_hw.h | 739 tavor_hw_qp_ee_cq_eq_rdb_t context; member in struct:tavor_hw_initqueryhca_s 769 tavor_hw_qp_ee_cq_eq_rdb_t context; member in struct:tavor_hw_initqueryhca_s 983 * The SW2HW_EQ command transfers ownership of an EQ context from software 1299 * The SW2HW_CQ command transfers ownership of an CQ context from software 1650 * (both primary and secondary) for each QP context. Note: Since this
|
/illumos-gate/usr/src/uts/common/sys/fibre-channel/fca/emlxs/ |
H A D | emlxs_menlo.h | 100 uint32_t context; /* Context */ member in struct:menlo_get_cmd 163 uint32_t context; /* context = NSL port 0 or 1 */ member in struct:menlo_loopback_cmd
|
/illumos-gate/usr/src/uts/common/io/mega_sas/ |
H A D | megaraid_sas.h | 678 uint32_t context; /* 08h */ member in struct:megasas_header 699 uint32_t context; /* 08h */ member in struct:megasas_init_frame 737 uint32_t context; /* 08h */ member in struct:megasas_io_frame 764 uint32_t context; /* 08h */ member in struct:megasas_pthru_frame 785 uint32_t context; /* 08h */ member in struct:megasas_dcmd_frame 812 uint32_t context; /* 08h */ member in struct:megasas_abort_frame 837 uint32_t context; /* 08h */ member in struct:megasas_smp_frame 860 uint32_t context; /* 08h */ member in struct:megasas_stp_frame
|