/illumos-gate/usr/src/uts/common/io/aggr/ |
H A D | aggr_port.c | 60 aggr_port_constructor(void *buf, void *arg, int kmflag) argument
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | ddi_hp_impl.c | 421 ddi_hp_cn_sysevent_t event_sub_class, int hint, int kmflag) 430 cn_path = kmem_zalloc(MAXPATHLEN, kmflag); 452 ap_id = kmem_zalloc(ap_id_len, kmflag); 468 err = nvlist_alloc(&ev_attr_list, NV_UNIQUE_NAME_TYPE, kmflag); 565 ((kmflag == KM_SLEEP) ? DDI_SLEEP : DDI_NOSLEEP)); 420 ddihp_cn_gen_sysevent(ddi_hp_cn_handle_t *hdlp, ddi_hp_cn_sysevent_t event_sub_class, int hint, int kmflag) argument
|
/illumos-gate/usr/src/uts/common/io/scsi/impl/ |
H A D | scsi_resource.c | 49 int kmflag; local 56 kmflag = (callback == SLEEP_FUNC) ? KM_SLEEP : KM_NOSLEEP; 57 if ((bp = getrbuf(kmflag)) == NULL) {
|
/illumos-gate/usr/src/uts/common/io/sdcard/impl/ |
H A D | sda_cmd.c | 264 sda_rtype_t rtype, void *data, int kmflag) 268 c = kmem_cache_alloc(sda_cmd_cache, kmflag); 297 sda_rtype_t rtype, void *data, int kmflag) 301 c = kmem_cache_alloc(sda_cmd_cache, kmflag); 263 sda_cmd_alloc(sda_slot_t *slot, sda_index_t index, uint32_t argument, sda_rtype_t rtype, void *data, int kmflag) argument 296 sda_cmd_alloc_acmd(sda_slot_t *slot, sda_index_t index, uint32_t argument, sda_rtype_t rtype, void *data, int kmflag) argument
|
/illumos-gate/usr/src/uts/common/io/softmac/ |
H A D | softmac_dev.c | 154 softmac_upper_constructor(void *buf, void *arg, int kmflag) argument
|
/illumos-gate/usr/src/common/crypto/aes/ |
H A D | aes_impl.c | 1741 * kmflag Flag passed to kmem_alloc(9F); ignored in userland. 1745 aes_alloc_keysched(size_t *size, int kmflag) argument 1750 keysched = (aes_key_t *)kmem_alloc(sizeof (aes_key_t), kmflag);
|
/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | ec.c | 88 const SECItem *pointP, SECItem *pointQ, int kmflag) 150 CHECK_MPI_OK( mp_init(&Px, kmflag) ); 151 CHECK_MPI_OK( mp_init(&Py, kmflag) ); 152 CHECK_MPI_OK( mp_init(&Qx, kmflag) ); 153 CHECK_MPI_OK( mp_init(&Qy, kmflag) ); 154 CHECK_MPI_OK( mp_init(&Gx, kmflag) ); 155 CHECK_MPI_OK( mp_init(&Gy, kmflag) ); 156 CHECK_MPI_OK( mp_init(&order, kmflag) ); 157 CHECK_MPI_OK( mp_init(&irreducible, kmflag) ); 158 CHECK_MPI_OK( mp_init(&a, kmflag) ); 87 ec_points_mul(const ECParams *params, const mp_int *k1, const mp_int *k2, const SECItem *pointP, SECItem *pointQ, int kmflag) argument 246 ec_NewKey(ECParams *ecParams, ECPrivateKey **privKey, const unsigned char *privKeyBytes, int privKeyLen, int kmflag) argument 358 EC_NewKeyFromSeed(ECParams *ecParams, ECPrivateKey **privKey, const unsigned char *seed, int seedlen, int kmflag) argument 379 ec_GenerateRandomPrivateKey(const unsigned char *order, int len, int kmflag) argument 431 EC_NewKey(ECParams *ecParams, ECPrivateKey **privKey, int kmflag) argument 468 EC_ValidatePublicKey(ECParams *ecParams, SECItem *publicValue, int kmflag) argument 555 ECDH_Derive(SECItem *publicValue, ECParams *ecParams, SECItem *privateValue, PRBool withCofactor, SECItem *derivedSecret, int kmflag) argument 631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag) argument 830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument 868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument [all...] |
/illumos-gate/usr/src/common/crypto/modes/ |
H A D | ccm.c | 854 ccm_init_ctx(ccm_ctx_t *ccm_ctx, char *param, int kmflag, argument 896 kmflag); 909 ccm_alloc_ctx(int kmflag) argument 914 if ((ccm_ctx = kmem_zalloc(sizeof (ccm_ctx_t), kmflag)) == NULL)
|
H A D | gcm.c | 688 gcm_alloc_ctx(int kmflag) argument 693 if ((gcm_ctx = kmem_zalloc(sizeof (gcm_ctx_t), kmflag)) == NULL) 704 gmac_alloc_ctx(int kmflag) argument 709 if ((gcm_ctx = kmem_zalloc(sizeof (gcm_ctx_t), kmflag)) == NULL) 720 gcm_set_kmflag(gcm_ctx_t *ctx, int kmflag) argument 722 ctx->gcm_kmflag = kmflag;
|
/illumos-gate/usr/src/uts/common/fs/sockfs/ |
H A D | nl7clogd.c | 135 #define LOGBUFV_ALLOC(kmflag) { \ 141 if (kmflag == KM_SLEEP) \ 143 _p = kmem_cache_alloc(log_buf_kmc, kmflag); \ 145 if (kmflag == KM_SLEEP) { \ 169 log_buf_alloc(int kmflag) argument 181 LOGBUFV_ALLOC(kmflag); 201 LOGBUFV_ALLOC(kmflag); 656 int kmflag = servicing_interrupt() ? KM_NOSLEEP : KM_SLEEP; local 669 log_buf_alloc(kmflag); 753 log_buf_alloc(kmflag); [all...] |
H A D | sockparams.c | 402 const char *name, boolean_t by_devpath, int kmflag, int *errorp) 427 namebuf = kmem_alloc(namelen, kmflag); 437 SOCKPARAMS_EPHEMERAL, kmflag, errorp); 441 SOCKPARAMS_EPHEMERAL, kmflag, errorp); 499 const char *dev, int kmflag, int *errorp) 502 kmflag, errorp)); 507 const char *mod, int kmflag, int *errorp) 510 kmflag, errorp)); 401 sockparams_hold_ephemeral(int family, int type, int protocol, const char *name, boolean_t by_devpath, int kmflag, int *errorp) argument 498 sockparams_hold_ephemeral_bydev(int family, int type, int protocol, const char *dev, int kmflag, int *errorp) argument 506 sockparams_hold_ephemeral_bymod(int family, int type, int protocol, const char *mod, int kmflag, int *errorp) argument
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | aes.c | 250 aes_check_mech_param(crypto_mechanism_t *mechanism, aes_ctx_t **ctx, int kmflag) argument 292 p = (alloc_fun)(kmflag); 362 int kmflag; local 371 kmflag = crypto_kmflag(req); 372 if ((rv = aes_check_mech_param(mechanism, &aes_ctx, kmflag)) 376 rv = aes_common_init_ctx(aes_ctx, template, mechanism, key, kmflag, 1315 crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, 1323 if ((keysched = aes_alloc_keysched(&size, kmflag)) == NULL) 1364 kmflag, is_encrypt_init, AES_BLOCK_LEN, aes_encrypt_block, 1314 aes_common_init_ctx(aes_ctx_t *aes_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, boolean_t is_encrypt_init) argument
|
H A D | dca_rsa.c | 392 crypto_key_t *key, int kmflag) 471 if ((reqp->dr_ctx.mod = kmem_alloc(reqp->dr_ctx.modlen, kmflag)) == 633 int kmflag, crypto_req_handle_t req, int mode) 641 rv = dca_rsainit(&ctx, mechanism, key, kmflag); 391 dca_rsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument 630 dca_rsaatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument
|
/illumos-gate/usr/src/psm/stand/boot/common/ |
H A D | heap_kmem.c | 441 kmem_alloc(size_t nbytes, int kmflag) argument
|
/illumos-gate/usr/src/uts/i86pc/io/ioat/ |
H A D | ioat_chan.c | 882 int kmflag; local 888 kmflag = KM_NOSLEEP; 890 kmflag = KM_SLEEP; 896 *cmd = kmem_cache_alloc(channel->ic_cmd_cache, kmflag);
|
/illumos-gate/usr/src/uts/common/io/usb/hcd/ehci/ |
H A D | ehci.c | 815 int kmflag = (flags & USB_FLAGS_SLEEP) ? local 896 pp = kmem_zalloc(sizeof (ehci_pipe_private_t), kmflag);
|
/illumos-gate/usr/src/uts/common/io/usb/usba/ |
H A D | usbai_pipe_mgmt.c | 776 int kmflag; local 841 kmflag = (usb_flags & USB_FLAGS_SLEEP) ? KM_SLEEP : KM_NOSLEEP; 844 if ((ph_data = kmem_zalloc(size, kmflag)) == NULL) {
|
/illumos-gate/usr/src/common/crypto/des/ |
H A D | des_impl.c | 942 des_alloc_keysched(size_t *keysched_size, des_strength_t strength, int kmflag) argument 958 keysched = (keysched_t *)kmem_alloc(size, kmflag);
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_db.c | 169 rfs4_dbe_kmem_constructor(void *obj, void *private, int kmflag) argument
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_miscapi.c | 93 * . kmflag: memory allocation flag. 107 * Process and interruption. kmflag should be KM_NOSLEEP when called 115 crypto_get_mech_list(uint_t *countp, int kmflag) argument 162 tmp_mech_name_tab = kmem_zalloc(n, kmflag); 261 mech_name_tab = kmem_zalloc(count * CRYPTO_MAX_MECH_NAME, kmflag);
|
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_cryptoadm.c | 841 uint_t *count, int kmflag) 853 mech_names = kmem_alloc(n * sizeof (crypto_mech_name_t), kmflag); 971 crypto_mech_name_t **array, uint_t *count, int kmflag) 997 kmflag); 840 dup_mech_names(kcf_provider_desc_t *provider, crypto_mech_name_t **array, uint_t *count, int kmflag) argument 970 crypto_build_permitted_mech_names(kcf_provider_desc_t *provider, crypto_mech_name_t **array, uint_t *count, int kmflag) argument
|
/illumos-gate/usr/src/uts/common/des/ |
H A D | des_crypt.c | 441 int kmflag; local 450 kmflag = crypto_kmflag(req); 454 des_ctx = ecb_alloc_ctx(kmflag); 464 des_ctx = cbc_alloc_ctx(kmflag); 467 des_ctx = ecb_alloc_ctx(kmflag); 477 des_ctx = cbc_alloc_ctx(kmflag); 484 strength, kmflag)) != CRYPTO_SUCCESS) { 1111 int kmflag) 1120 kmflag)) == NULL) 1109 des_common_init_ctx(des_ctx_t *des_ctx, crypto_spi_ctx_template_t *template, crypto_mechanism_t *mechanism, crypto_key_t *key, des_strength_t strength, int kmflag) argument
|
/illumos-gate/usr/src/uts/common/io/dls/ |
H A D | dls_link.c | 66 i_dls_link_constructor(void *buf, void *arg, int kmflag) argument
|
/illumos-gate/usr/src/uts/common/vm/ |
H A D | seg_kp.c | 399 int kmflag = (flags & KPD_NOWAIT) ? KM_NOSLEEP : KM_SLEEP; local 413 if ((kpd = kmem_zalloc(sizeof (struct segkp_data), kmflag)) == NULL) 422 vbase = vmem_alloc(SEGKP_VMEM(seg), len, kmflag | VM_BESTFIT); 431 if (page_resv(pages, kmflag) == 0) {
|
/illumos-gate/usr/src/uts/common/io/pciex/hotplug/ |
H A D | pcie_hp.c | 1201 dev_info_t *self, int kmflag) 1218 ap_id = kmem_zalloc(ap_id_len, kmflag); 1232 err = nvlist_alloc(&ev_attr_list, NV_UNIQUE_NAME_TYPE, kmflag); 1291 ((kmflag == KM_SLEEP) ? DDI_SLEEP : DDI_NOSLEEP)); 1200 pcie_hp_gen_sysevent_req(char *slot_name, int hint, dev_info_t *self, int kmflag) argument
|