/illumos-gate/usr/src/lib/libgss/ |
H A D | g_unseal.c | 49 gss_union_ctx_id_t ctx; local 78 ctx = (gss_union_ctx_id_t) context_handle; 79 mech = __gss_get_mechanism(ctx->mech_type); 86 ctx->internal_ctx_id,
|
H A D | g_verify.c | 46 gss_union_ctx_id_t ctx; local 65 ctx = (gss_union_ctx_id_t) context_handle; 66 mech = __gss_get_mechanism(ctx->mech_type); 73 ctx->internal_ctx_id,
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | mandatory_sumtype.c | 35 krb5int_c_mandatory_cksumtype (krb5_context ctx, krb5_enctype etype, argument
|
/illumos-gate/usr/src/cmd/nscd/ |
H A D | getexec.c | 40 #define nam_db ctx->nsc_db[0] 41 #define id_db ctx->nsc_db[1] 42 #define nam_id_db ctx->nsc_db[2] 48 exec_init_ctx(nsc_ctx_t *ctx) { argument 49 ctx->dbname = NSS_DBNAM_EXECATTR; 50 ctx->file_name = "/etc/security/exec_attr"; 51 ctx->db_count = 3;
|
H A D | gettnrhdb.c | 38 #define tsol_rh_db ctx->nsc_db[0] 47 tnrhdb_init_ctx(nsc_ctx_t *ctx) { argument 48 ctx->dbname = NSS_DBNAM_TSOL_RH; 49 ctx->db_count = 1; 50 ctx->file_name = TNRHDB_PATH;
|
H A D | getnet.c | 40 #define nam_db ctx->nsc_db[0] 41 #define addr_db ctx->nsc_db[1] 51 net_init_ctx(nsc_ctx_t *ctx) { argument 52 ctx->dbname = NSS_DBNAM_NETWORKS; 53 ctx->db_count = 2; 54 ctx->file_name = "/etc/inet/networks";
|
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_sign.c | 51 crypto_ctx_t *ctx; local 68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 76 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, B_FALSE); 81 *ctxp = (crypto_context_t)ctx; 84 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private); 149 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 155 if ((ctx == NULL) || 156 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) || 163 error = kcf_submit_request(pd, ctx, cr, ¶ms, B_FALSE); 177 crypto_ctx_t *ctx local 204 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 391 crypto_ctx_t *ctx; local 434 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local [all...] |
H A D | kcf_verify.c | 51 crypto_ctx_t *ctx; local 68 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 76 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, B_FALSE); 81 *ctxp = (crypto_context_t)ctx; 84 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private); 150 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 156 if ((ctx == NULL) || 157 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) || 164 error = kcf_submit_request(pd, ctx, cr, ¶ms, B_FALSE); 179 crypto_ctx_t *ctx local 206 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 393 crypto_ctx_t *ctx; local 436 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local [all...] |
/illumos-gate/usr/src/uts/common/disp/ |
H A D | thread.c | 1042 struct ctxop *ctx; local 1044 ctx = kmem_alloc(sizeof (struct ctxop), KM_SLEEP); 1045 ctx->save_op = save; 1046 ctx->restore_op = restore; 1047 ctx->fork_op = fork; 1048 ctx->lwp_create_op = lwp_create; 1049 ctx->exit_op = exit; 1050 ctx->free_op = free; 1051 ctx->arg = arg; 1052 ctx 1070 struct ctxop *ctx, *prev_ctx; local 1124 struct ctxop *ctx; local 1135 struct ctxop *ctx; local 1146 struct ctxop *ctx; local 1161 struct ctxop *ctx; local 1178 struct ctxop *ctx; local 1192 struct ctxop *ctx; local 1212 freectx_ctx(struct ctxop *ctx) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/smbclnt/smbutil/ |
H A D | status.c | 67 struct nb_ctx *ctx; local 76 error = nb_ctx_create(&ctx); 82 if (nb_ctx_readrcsection(NULL, ctx, "default", 0) != 0) 103 if ((ctx->nb_flags & NBCF_NS_ENABLE) == 0) { 110 error = nbns_getnodestatus(ctx, &ina, servername, workgroupname);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 299 DIGEST_CONTEXT *ctx, 305 if (! sess || ! ctx || ! out_data_len) { 314 MD5Update(ctx->context.md5ctx, in_data, in_data_len); 315 MD5Final(out_data, ctx->context.md5ctx); 323 SIGN_VERIFY_CONTEXT * ctx, 340 if (! sess || ! ctx || ! out_data_len) { 344 if (ctx->mech.mechanism == CKM_MD5_HMAC_GENERAL) { 345 hmac_len = *(CK_ULONG *)ctx->mech.pParameter; 363 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 486 SIGN_VERIFY_CONTEXT * ctx, 297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/smbclnt/smbiod/ |
H A D | smbiod.c | 269 smb_ctx_t *ctx; local 279 err = smb_ctx_alloc(&ctx); 282 bcopy(clnt_ssn, &ctx->ct_iod_ssn, sizeof (ctx->ct_iod_ssn)); 298 if ((err = smb_ctx_gethandle(ctx)) != 0) 300 if (ioctl(ctx->ct_dev_fd, SMBIOC_SSN_CREATE, &ctx->ct_ssn) < 0) { 311 err = smb_iod_connect(ctx); 316 err = thr_create(NULL, 0, iod_work, ctx, THR_DETACHED, &tid); 322 ctx 342 smb_ctx_t *ctx = arg; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/ |
H A D | srvinfo.c | 106 struct smb_ctx *ctx = NULL; local 145 error = smb_ctx_alloc(&ctx); 153 * (in the ctx handle). 155 smb_ctx_setfullserver(ctx, server); 156 smb_ctx_setshare(ctx, "IPC$", USE_IPC); 158 smb_ctx_setdomain(ctx, dom, B_TRUE); 160 smb_ctx_setuser(ctx, usr, B_TRUE); 162 smb_ctx_setpassword(ctx, pw, NULL); 170 error = smb_ctx_readrc(ctx); 181 error = smb_ctx_resolve(ctx); 383 pipetest(struct smb_ctx *ctx) argument [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5sealv3.c | 87 krb5_gss_ctx_id_rec *ctx, 106 ASSERT(toktype != KG_TOK_SEAL_MSG || ctx->enc != 0); 107 ASSERT(ctx->big_endian == 0); 109 acceptor_flag = ctx->initiate ? 0 : FLAG_SENDER_IS_ACCEPTOR; 111 ? (ctx->initiate 114 : (ctx->initiate 117 if (ctx->have_acceptor_subkey) { 118 key = ctx->acceptor_subkey; 120 key = ctx->enc; 170 ctx 86 gss_krb5int_make_seal_token_v3(krb5_context context, krb5_gss_ctx_id_rec *ctx, const gss_buffer_desc * message, gss_buffer_t token, int conf_req_flag, int toktype) argument 348 gss_krb5int_unseal_token_v3(krb5_context *contextptr, OM_uint32 *minor_status, krb5_gss_ctx_id_rec *ctx, unsigned char *ptr, int bodysize, gss_buffer_t message_buffer, int *conf_state, int *qop_state, int toktype) argument [all...] |
H A D | k5seal.c | 379 krb5_gss_ctx_id_rec *ctx; local 409 ctx = (krb5_gss_ctx_id_rec *) context_handle; 411 if (ctx->subkey == NULL && !ctx->established) { 416 context = ctx->k5_context; 424 switch (ctx->proto) 427 code = make_seal_token_v1(context, ctx->enc, ctx->seq, 428 &ctx->seq_send, ctx [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/dummy/ |
H A D | dmech.c | 204 dummy_gss_ctx_id_rec *ctx; local 211 ctx = (dummy_gss_ctx_id_rec *) context_handle; 212 ASSERT(ctx->established == 1); 213 ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER); 238 dummy_gss_ctx_id_rec *ctx; local 245 ctx = (dummy_gss_ctx_id_rec *) context_handle; 246 ASSERT(ctx->established == 1); 247 ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER); 280 dummy_gss_ctx_id_rec *ctx; local 285 ctx 316 dummy_gss_ctx_id_rec *ctx; local 365 dummy_gss_ctx_id_t ctx; local 396 dummy_gss_ctx_id_t ctx; local [all...] |
/illumos-gate/usr/src/uts/common/io/igb/ |
H A D | igb_tx.c | 115 tx_context_t tx_context, *ctx; local 133 ctx = &tx_context; 139 if (igb_get_tx_context(mp, ctx) != TX_CXT_SUCCESS) { 144 if ((ctx->lso_flag && 145 (mbsize > (ctx->mac_hdr_len + IGB_LSO_MAXLEN))) || 146 (!ctx->lso_flag && 153 ctx = NULL; 185 if (ctx && ctx->lso_flag) { 186 hdr_len = ctx 596 igb_get_tx_context(mblk_t *mp, tx_context_t *ctx) argument 761 igb_check_tx_context(igb_tx_ring_t *tx_ring, tx_context_t *ctx) argument 803 igb_fill_tx_context(struct e1000_adv_tx_context_desc *ctx_tbd, tx_context_t *ctx, uint32_t ring_index) argument 856 igb_tx_fill_ring(igb_tx_ring_t *tx_ring, link_list_t *pending_list, tx_context_t *ctx, size_t mbsize) argument [all...] |
/illumos-gate/usr/src/lib/crypt_modules/bsdmd5/ |
H A D | bsdmd5.c | 80 MD5_CTX ctx, ctx1; local 97 MD5Init(&ctx); 100 MD5Update(&ctx, (uchar_t *)plaintext, strlen(plaintext)); 103 MD5Update(&ctx, (uchar_t *)crypt_alg_magic, strlen(crypt_alg_magic)); 106 MD5Update(&ctx, (uchar_t *)sp, sl); 115 MD5Update(&ctx, final, pl > 16 ? 16 : pl); 123 MD5Update(&ctx, final, 1); 125 MD5Update(&ctx, (uchar_t *)plaintext, 1); 134 MD5Final(final, &ctx);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | cred.c | 54 __dh_gss_acquire_cred(void *ctx, /* Per mechanism context */ argument 64 /* Diffie-Hellman mechanism context is ctx */ 65 dh_context_t cntx = (dh_context_t)ctx; 158 * __dh_gss_add_cred(void * ctx, OM_uint32 *minor, gss_cred_id_t cred_in, 172 __dh_gss_inquire_cred(void *ctx, /* Per mechanism context */ argument 182 /* ctx is a Diffie-Hellman context */ 183 dh_context_t cntx = (dh_context_t)ctx; 245 __dh_gss_inquire_cred_by_mech(void *ctx, /* Per mechananism context */ argument 254 /* ctx is them Diffie-Hellman mechanism context */ 255 dh_context_t context = (dh_context_t)ctx; 291 __dh_gss_release_cred(void *ctx, OM_uint32 *minor, gss_cred_id_t *cred ) argument [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | iod_cl.c | 163 * On success, sets ctx->ct_door_fd 166 smb_iod_start(smb_ctx_t *ctx) argument 195 if (ctx->ct_door_fd != -1) 196 close(ctx->ct_door_fd); 197 ctx->ct_door_fd = fd; 209 * Ask the IOD to connect using the info in ctx. 213 smb_iod_cl_newvc(smb_ctx_t *ctx) argument 219 if (ctx->ct_door_fd < 0) 222 da.data_ptr = (void *) &ctx->ct_iod_ssn; 223 da.data_size = sizeof (ctx [all...] |
H A D | ntlmssp.c | 93 ntlm_rand_ssn_key(struct smb_ctx *ctx, 232 struct smb_ctx *ctx = sp->smb_ctx; local 258 if (ctx->ct_vcflags & SMBV_WILL_SIGN) { 260 ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE; 310 struct smb_ctx *ctx = sp->smb_ctx; local 343 bcopy(&hdr.h_challenge, ctx->ct_srv_chal, NTLM_CHAL_SZ); 419 struct smb_ctx *ctx = sp->smb_ctx; local 446 if (ctx->ct_authflags & SMB_AT_ANON) { 459 } else if (ctx->ct_authflags & SMB_AT_NTLM2) { 463 err = ntlm_build_target_info(ctx, 592 ntlm_rand_ssn_key( struct smb_ctx *ctx, ntlmssp_state_t *ssp_st, struct mbdata *ek_mbp) argument 625 struct smb_ctx *ctx = sp->smb_ctx; local [all...] |
/illumos-gate/usr/src/cmd/cdrw/ |
H A D | main.c | 114 LibHalContext *ctx = NULL; local 128 if ((ctx = libhal_ctx_new()) == NULL) 133 if (!libhal_ctx_set_dbus_connection(ctx, con)) 138 if (!libhal_ctx_init(ctx, &error)) { 143 return (ctx); 147 detach_from_hald(ctx, state); 153 detach_from_hald(LibHalContext *ctx, hal_state_t state) argument 156 DBusConnection *con = libhal_ctx_get_dbus_connection(ctx); 162 if (libhal_ctx_shutdown(ctx, &error) == FALSE) 167 (void) libhal_ctx_free(ctx); 186 LibHalContext *ctx; local [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | db2_exp.c | 106 WRAP_K (krb5_db2_db_fini, (krb5_context ctx), (ctx)); 114 (krb5_context ctx, 117 (ctx, s, t)); 128 WRAP_K (krb5_db2_db_unlock, (krb5_context ctx), (ctx)); 131 (krb5_context ctx, 136 (ctx, p, d, i, b)); 138 (krb5_context ctx, 141 (ctx, [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | changepw.c | 97 struct sendto_callback_context *ctx = callback_context; local 98 krb5_free_data_contents(ctx->context, message); 107 struct sendto_callback_context *ctx = callback_context; local 133 code = krb5_os_localaddr(ctx->context, &addrs); 143 krb5_free_addresses(ctx->context, addrs); 148 krb5_free_addresses(ctx->context, addrs); 158 if ((code = krb5_auth_con_setaddrs(ctx->context, ctx->auth_context, 162 if (ctx->set_password_for) 163 code = krb5int_mk_setpw_req(ctx [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | blowfish.c | 275 blowfish_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 316 ctx->cc_provider_private = blowfish_ctx; 336 blowfish_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 351 ASSERT(ctx->cc_provider_private != NULL); 352 blowfish_ctx = ctx->cc_provider_private; 368 ret = blowfish_encrypt_update(ctx, plaintext, ciphertext, req); 370 (void) blowfish_free_context(ctx); 378 blowfish_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 393 ASSERT(ctx->cc_provider_private != NULL); 394 blowfish_ctx = ctx 420 blowfish_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 483 blowfish_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 546 blowfish_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 570 blowfish_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 805 blowfish_free_context(crypto_ctx_t *ctx) argument [all...] |