/illumos-gate/usr/src/cmd/idmap/idmapd/ |
H A D | server.c | 98 sanitize_mapping_request(idmap_mapping *req) argument 100 if (EMPTY_STRING(req->id1name)) { 101 free(req->id1name); 102 req->id1name = NULL; 104 if (EMPTY_STRING(req->id1domain)) { 105 free(req->id1domain); 106 req->id1domain = NULL; 108 if (EMPTY_STRING(req->id2name)) { 109 free(req->id2name); 110 req 121 validate_mapped_id_by_name_req(idmap_mapping *req) argument 188 idmap_mapping *req; local [all...] |
H A D | idmapd.c | 630 trace(idmap_mapping *req, idmap_id_res *res, char *fmt, ...) argument 637 assert(req != NULL); 647 trace_id(entry, "from", &req->id1, req->id1name, req->id1domain); 648 trace_id(entry, "to", &res->id, req->id2name, req->id2domain); 666 if (req->flag & IDMAP_REQ_FLG_TRACE) {
|
/illumos-gate/usr/src/cmd/troff/ |
H A D | n3.c | 214 int i, req; local 220 req = '.'; 230 req = copyb(); 246 if (req != '.') 247 control(req, 1); 352 int req, k; local 357 req = j; 411 return(req);
|
/illumos-gate/usr/src/uts/common/fs/sockfs/ |
H A D | nl7clogd.c | 651 nca_request_log_t *req; local 691 req = (nca_request_log_t *)wp; 692 if ((wp + sizeof (*req)) >= pep) goto full; 693 bzero(wp, sizeof (*req)); 694 wp += sizeof (*req); 702 req->request_url_len = sz; 703 req->request_url = off; 711 req->response_len = (uint_t)suri->resplen; 714 if (nl7c_http_log(quri, suri, req, &wp, &pep, &off)) goto full; 719 req [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | aes.c | 339 crypto_req_handle_t req) { 340 return (aes_common_init(ctx, mechanism, key, template, req, B_TRUE)); 346 crypto_req_handle_t req) { 347 return (aes_common_init(ctx, mechanism, key, template, req, B_FALSE)); 358 crypto_req_handle_t req, boolean_t is_encrypt_init) 371 kmflag = crypto_kmflag(req); 406 crypto_data_t *ciphertext, crypto_req_handle_t req) 458 ret = aes_encrypt_update(ctx, plaintext, ciphertext, req); 521 crypto_data_t *plaintext, crypto_req_handle_t req) 579 ret = aes_decrypt_update(ctx, ciphertext, plaintext, req); 337 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 344 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 356 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t template, crypto_req_handle_t req, boolean_t is_encrypt_init) argument 405 aes_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 520 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 635 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 710 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 797 aes_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 855 aes_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 959 aes_encrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1089 aes_decrypt_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1255 aes_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *tmpl, size_t *tmpl_size, crypto_req_handle_t req) argument 1431 aes_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument 1453 aes_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t template, crypto_req_handle_t req) argument [all...] |
H A D | dca_rsa.c | 64 crypto_req_handle_t req, int mode) 158 reqp->dr_kcf_req = req; 633 int kmflag, crypto_req_handle_t req, int mode) 660 rv = dca_rsastart(&ctx, input, output, req, mode); 63 dca_rsastart(crypto_ctx_t *ctx, crypto_data_t *in, crypto_data_t *out, crypto_req_handle_t req, int mode) argument 630 dca_rsaatomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *input, crypto_data_t *output, int kmflag, crypto_req_handle_t req, int mode) argument
|
H A D | sha1_mod.c | 239 crypto_req_handle_t req) 248 crypto_kmflag(req)); 548 crypto_req_handle_t req) 630 crypto_req_handle_t req) 663 crypto_req_handle_t req) 718 crypto_req_handle_t req) 846 crypto_req_handle_t req) 860 crypto_kmflag(req)); 915 sha1_mac_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 948 sha1_mac_final(crypto_ctx_t *ctx, crypto_data_t *mac, crypto_req_handle_t req) argument 238 sha1_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_req_handle_t req) argument 547 sha1_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 629 sha1_digest_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 662 sha1_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 715 sha1_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 844 sha1_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1051 sha1_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1171 sha1_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1365 sha1_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
H A D | sha2_mod.c | 265 crypto_req_handle_t req) 272 crypto_kmflag(req)); 579 crypto_req_handle_t req) 675 crypto_req_handle_t req) 708 crypto_req_handle_t req) 777 crypto_req_handle_t req) 917 crypto_req_handle_t req) 948 crypto_kmflag(req)); 1004 crypto_req_handle_t req) 1037 sha2_mac_final(crypto_ctx_t *ctx, crypto_data_t *mac, crypto_req_handle_t req) argument 264 sha2_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_req_handle_t req) argument 578 sha2_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 674 sha2_digest_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 707 sha2_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 774 sha2_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 915 sha2_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1003 sha2_mac_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 1157 sha2_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1299 sha2_mac_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1519 sha2_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
H A D | skein_mod.c | 320 crypto_req_handle_t req) 356 ctx->sc_digest_bitlen), crypto_kmflag(req)); 436 crypto_req_handle_t req) 461 ctx->sc_digest_bitlen), crypto_kmflag(req)); 498 crypto_req_handle_t req) 506 crypto_kmflag(req)); 532 crypto_req_handle_t req) 545 error = skein_update(ctx, data, req); 553 error = skein_final(ctx, digest, req); 565 skein_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 319 skein_digest_final_uio(skein_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 435 skein_digest_final_mblk(skein_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 497 skein_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_req_handle_t req) argument 531 skein_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 597 skein_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 646 skein_digest_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req) argument 716 skein_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 754 skein_mac_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 795 skein_create_ctx_template(crypto_provider_handle_t provider, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/uts/common/io/1394/ |
H A D | h1394.c | 867 * req The incoming AR request 878 h1394_read_request(void *sl_private, cmd1394_cmd_t *req) argument 899 s_priv = S1394_GET_CMD_PRIV(req); 903 switch (req->cmd_type) { 910 cmd_length = req->cmd_u.b.blk_length; 936 addr_blk = s1394_used_tree_search(hal, req->cmd_addr); 945 req->cmd_result = IEEE1394_RESP_ADDRESS_ERROR; 946 (void) s1394_send_response(hal, req); 953 end_of_request = (req->cmd_addr + cmd_length) - 1; 957 req 1096 h1394_write_request(void *sl_private, cmd1394_cmd_t *req) argument 1329 h1394_lock_request(void *sl_private, cmd1394_cmd_t *req) argument [all...] |
H A D | s1394_asynch.c | 286 /* Out of TLABELs - Unable to send AT req */ 291 /* Out of TLABELs - Unable to send AT req */ 680 s1394_atreq_cmd_complete(s1394_hal_t *hal, cmd1394_cmd_t *req, int status) argument 693 s_priv = S1394_GET_CMD_PRIV(req); 698 switch (req->cmd_type) { 735 if (req->cmd_options & CMD1394_CANCEL_ON_BUS_RESET) { 739 s1394_remove_q_asynch_cmd(hal, req); 740 s1394_pending_q_insert(hal, req, S1394_PENDING_Q_REAR); 810 s1394_remove_q_asynch_cmd(hal, req); 814 req [all...] |
/illumos-gate/usr/src/uts/common/io/1394/targets/scsa1394/ |
H A D | sbp2_driver.c | 327 scsa1394_sbp2_req(scsa1394_state_t *sp, int lun, int req) argument 333 scsa1394_thr_wake(&lp->l_worker_thread, req);
|
/illumos-gate/usr/src/uts/common/io/cxgbe/t4nex/ |
H A D | t4_l2t.c | 192 struct cpl_l2t_write_req *req; local 196 if ((m = allocb(sizeof (*req), BPRI_HI)) == NULL) 200 req = (struct cpl_l2t_write_req *)m->b_wptr; 203 INIT_TP_WR(req, 0); 204 OPCODE_TID(req) = htonl(MK_OPCODE_TID(CPL_L2T_WRITE_REQ, e->idx | 206 req->params = htons(V_L2T_W_PORT(e->lport) | V_L2T_W_NOREPLY(!sync)); 207 req->l2t_idx = htons(e->idx); 208 req->vlan = htons(e->vlan); 209 (void) memcpy(req->dst_mac, e->dmac, sizeof (req [all...] |
/illumos-gate/usr/src/uts/common/xen/os/ |
H A D | hypercall.c | 58 HYPERVISOR_mmu_update(mmu_update_t *req, int count, int *success_count, argument 62 (ulong_t)req, (long)count, (ulong_t)success_count, 277 HYPERVISOR_mmuext_op(struct mmuext_op *req, int count, uint_t *success_count, argument 281 (ulong_t)req, (long)count, (ulong_t)success_count,
|
/illumos-gate/usr/src/uts/i86pc/io/pci/ |
H A D | pci_tools.c | 589 pci_cfgacc_req_t req; local 614 req.rcdip = NULL; 615 req.bdf = PCI_GETBDF(prg->bus_no, prg->dev_no, prg->func_no); 616 req.offset = prg->offset; 617 req.size = size; 618 req.write = write_flag; 619 req.ioacc = io_access; 626 VAL64(&req) = local_data; 627 pci_cfgacc_acc(&req); 629 pci_cfgacc_acc(&req); [all...] |
/illumos-gate/usr/src/uts/common/io/usb/clients/video/usbvc/ |
H A D | usbvc_v4l2.c | 267 "V4L2 ioctl: req too many buffers, fail"); 298 "v4l2 ioctls: req the same buffers" 304 * req different number of bufs, according to 311 "v4l2 ioctls: req different number bufs" 907 * By now, we've get some parametres of ctrl req, next try to set ctrl. 1376 char req[16]; local 1391 (void) strncpy(&req[0], "GET_MIN", sizeof (req)); 1398 (void) strncpy(&req[0], "GET_MAX", sizeof (req)); [all...] |
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/ |
H A D | iscsi_door.h | 95 iscsi_door_req_t req; member in union:_iscsi_door_msg
|
/illumos-gate/usr/src/uts/sun4v/io/ |
H A D | dr_io.c | 427 dr_io_configure(dr_vio_req_t *req, dr_vio_res_t *res) argument 432 uint64_t devid = req->dev_id; 434 char *name = req->name; 640 dr_io_unconfigure(dr_vio_req_t *req, dr_vio_res_t *res) argument 643 char *name = req->name; 645 uint64_t devid = req->dev_id; 680 if (req->msg_type == DR_VIO_FORCE_UNCONFIG) 782 dr_vio_req_t *req; local 811 req = buf; 812 switch (req [all...] |
/illumos-gate/usr/src/uts/sun4/io/efcode/ |
H A D | fcode.c | 53 struct fc_request *req; /* Active Request */ member in struct:fc_state 287 st->req = 0; 321 fp = st->req; 328 fp = st->req; 357 if ((fp = st->req) != NULL) 365 st->req = 0; 412 st->req = fp; 488 * we write back to the caller with the information from the req 514 ASSERT(st->req != NULL); 515 rp = st->req [all...] |
/illumos-gate/usr/src/uts/sun4u/boston/os/ |
H A D | boston.c | 307 rmc_comm_msg_t req; /* request */ local 323 req.msg_type = DP_SET_CPU_NODENAME; 324 req.msg_len = strlen(utsname.nodename) + 1; 325 req.msg_bytes = 0; 326 req.msg_buf = (caddr_t)utsname.nodename; 331 (void) (rmc_req_res)(&req, NULL, 2000); 345 rmc_comm_msg_t req; /* request */ local 395 req.msg_type = DP_SET_CPU_SIGNATURE; 396 req.msg_len = (int)(sizeof (signature)); 397 req [all...] |
/illumos-gate/usr/src/uts/sun4u/io/ |
H A D | ppm_xgsubr.c | 433 ppmreq_t req; local 439 if (ddi_copyin((caddr_t)arg, &req, sizeof (req), mode)) { 447 if (req.ppmdev != PPM_INTERNAL_DEVICE_POWER) { 449 str, req.ppmdev)); 464 level = req.ppmop.idev_power.level; 485 req.ppmop.idev_power.level = (*ppmf.iocget)(); 486 if (ddi_copyout((const void *)&req, (void *)arg, 487 sizeof (req), mode)) {
|
H A D | rmc_comm_dp.c | 1200 rmc_comm_dp_msend(struct rmc_comm_state *rcs, dp_message_t *req) argument 1214 DPRINTF(rcs, DPRO, (CE_CONT, "msend msgtype=%02x\n", req->msg_type)); 1216 if (IS_NUMBERED_MSG(req->msg_type)) { 1269 if (IS_NUMBERED_MSG(req->msg_type)) { 1276 if (req->msg_msglen > DP_MAX_MSGLEN) { 1325 IS_NUMBERED_MSG(req->msg_type)) || 1327 IS_UNNUMBERED_MSG(req->msg_type))) && 1342 pkt->msg_type = req->msg_type; 1347 pkt->msg_msglen = req->msg_msglen + sizeof (dp_header_t); 1359 if (req 1561 dp_message_t *req = &drr->request; local [all...] |
/illumos-gate/usr/src/uts/sun4u/seattle/os/ |
H A D | seattle.c | 309 rmc_comm_msg_t req; /* request */ local 325 req.msg_type = DP_SET_CPU_NODENAME; 326 req.msg_len = strlen(utsname.nodename) + 1; 327 req.msg_bytes = 0; 328 req.msg_buf = (caddr_t)utsname.nodename; 333 (void) (rmc_req_res)(&req, NULL, 2000); 347 rmc_comm_msg_t req; /* request */ local 397 req.msg_type = DP_SET_CPU_SIGNATURE; 398 req.msg_len = (int)(sizeof (signature)); 399 req [all...] |
/illumos-gate/usr/src/cmd/lvm/metassist/layout/ |
H A D | layout.c | 304 * FUNCTION: process_request(devconfig_t *req, dlist_t **results) 306 * INPUT: req - a devconfig_t pointer to the current request 328 devconfig_t *req, 337 (void) devconfig_get_type(req, &type); 338 (void) devconfig_get_size(req, &nbytes); 339 comps = devconfig_get_components(req); 345 set_hsp_request(req); 356 return (populate_explicit_stripe(req, results)); 358 return (layout_stripe(req, nbytes, results)); 364 return (populate_explicit_concat(req, result 327 process_request( devconfig_t *req, dlist_t **results) argument 405 process_qos_request( devconfig_t *req, dlist_t **results) argument 1016 set_hsp_request( devconfig_t *req) argument 1048 process_hsp_request( devconfig_t *req, dlist_t **results) argument [all...] |
/illumos-gate/usr/src/uts/i86pc/os/ |
H A D | cpr_impl.c | 91 static int i_cpr_platform_alloc(psm_state_request_t *req); 92 static void i_cpr_platform_free(psm_state_request_t *req); 93 static int i_cpr_save_apic(psm_state_request_t *req); 94 static int i_cpr_restore_apic(psm_state_request_t *req); 667 power_req.req.ppm_power_enter_sx_req.sx_state = S3; 668 power_req.req.ppm_power_enter_sx_req.test_point = 670 power_req.req.ppm_power_enter_sx_req.wakephys = wakephys; 692 power_req.req.ppm_power_enter_sx_req.sx_state = S3; 786 i_cpr_platform_alloc(psm_state_request_t *req) argument 792 PMD(PMD_SX, ("cpu = %d, %s(%p) \n", CPU->cpu_id, str, (void *)req)) 807 i_cpr_platform_free(psm_state_request_t *req) argument 825 i_cpr_save_apic(psm_state_request_t *req) argument 841 i_cpr_restore_apic(psm_state_request_t *req) argument [all...] |