/illumos-gate/usr/src/cmd/policykit/ |
H A D | polkit-is-privileged.c | 79 LibPolKitContext *ctx = NULL; local 155 ctx = libpolkit_new_context (connection); 156 if (ctx == NULL) { 161 result = libpolkit_is_uid_allowed_for_privilege (ctx, 200 if (ctx != NULL) 201 libpolkit_free_context (ctx);
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_tkip.c | 104 struct tkip_ctx *ctx; local 106 ctx = kmem_zalloc(sizeof (struct tkip_ctx), KM_SLEEP); 107 if (ctx == NULL) 110 ctx->tc_ic = ic; 111 return (ctx); 117 struct tkip_ctx *ctx = k->wk_private; local 119 if (ctx != NULL) 120 kmem_free(ctx, sizeof (struct tkip_ctx)); 139 struct tkip_ctx *ctx = k->wk_private; local 140 struct ieee80211com *ic = ctx 195 struct tkip_ctx *ctx = k->wk_private; local 257 struct tkip_ctx *ctx = k->wk_private; local 285 struct tkip_ctx *ctx = k->wk_private; local 505 crypto_context_t ctx; local 534 crypto_context_t ctx; local 652 michael_mic(struct tkip_ctx *ctx, const uint8_t *key, mblk_t *mp, uint_t off, size_t data_len, uint8_t mic[IEEE80211_WEP_MICLEN]) argument 712 tkip_encrypt(struct tkip_ctx *ctx, struct ieee80211_key *key, mblk_t *mp, int hdrlen) argument 743 tkip_decrypt(struct tkip_ctx *ctx, struct ieee80211_key *key, mblk_t *mp, int hdrlen) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | context.c | 56 __dh_gss_context_time(void *ctx, /* Mechanism context (not used) */ argument 62 _NOTE(ARGUNUSED(ctx)) 96 __dh_gss_delete_sec_context(void *ctx, /* Mechanism context */ argument 101 _NOTE(ARGUNUSED(ctx)) 161 __dh_gss_export_sec_context(void *ctx, OM_uint32 *minor, argument 169 __dh_gss_import_sec_context(void * ctx, OM_uint32 *minor, argument 180 __dh_gss_inquire_context(void *ctx, /* Mechanism context */ argument 204 if (ctx == 0) { 209 *mech = ((dh_context_t)ctx)->mech; 261 __dh_gss_process_context_token(void *ctx, OM_uint3 argument 277 __dh_gss_wrap_size_limit(void *ctx, OM_uint32 *minor, gss_ctx_id_t context, int conf_req, gss_qop_t qop_req, OM_uint32 output_size, OM_uint32 *input_size ) argument [all...] |
H A D | name.c | 66 __dh_gss_compare_name(void *ctx, /* Per mechanism context (not used) */ argument 72 _NOTE(ARGUNUSED(ctx)) 95 __dh_gss_display_name(void * ctx, /* Per mechanism context (not used) */ argument 101 _NOTE(ARGUNUSED(ctx)) 331 do_exported_netname(dh_context_t ctx, /* Diffie-Hellman mech context */ argument 374 if (mechoidlen != ctx->mech->length) 376 if (memcmp(p, ctx->mech->elements, mechoidlen) != 0) 442 __dh_gss_import_name(void *ctx, /* Per mechanism context */ argument 475 stat = do_exported_netname((dh_context_t)ctx, minor, 526 __dh_gss_release_name(void *ctx, OM_uint3 argument 554 __dh_gss_inquire_names_for_mech(void *ctx, OM_uint32 *minor, gss_OID mech, gss_OID_set *names) argument 588 __dh_pname_to_uid(void *ctx, OM_uint32 *minor, const gss_name_t pname, uid_t *uid ) argument 634 __dh_gss_export_name(void *ctx, OM_uint32 *minor, const gss_name_t input_name, gss_buffer_t exported_name ) argument 773 __dh_gss_internal_release_oid(void *ctx, OM_uint32 *minor, gss_OID *oid) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | lucid_context.c | 46 gss_krb5_lucid_context_v1_t *ctx); 77 krb5_gss_ctx_id_t ctx = (krb5_gss_ctx_id_t)context_handle; local 98 kret = make_external_lucid_ctx_v1((krb5_pointer)ctx, 294 gss_krb5_lucid_context_v1_t *ctx) 296 if (ctx) { 297 if (ctx->protocol == 0) { 298 free_lucid_key_data(&ctx->rfc1964_kd.ctx_key); 300 if (ctx->protocol == 1) { 301 free_lucid_key_data(&ctx->cfx_kd.ctx_key); 302 if (ctx 293 free_external_lucid_ctx_v1( gss_krb5_lucid_context_v1_t *ctx) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/kinit/ |
H A D | kinit.c | 189 krb5_context ctx; member in struct:k5_data 604 code = krb5_init_context(&k5->ctx); 609 errctx = k5->ctx; 612 code = krb5_cc_resolve(k5->ctx, opts->k5_cache_name, &k5->cc); 621 if ((code = krb5_cc_default(k5->ctx, &k5->cc))) { 630 if ((code = krb5_parse_name(k5->ctx, opts->principal_name, 642 code = krb5_sname_to_principal(k5->ctx, NULL, NULL, 651 code = krb5_cc_get_principal(k5->ctx, k5->cc, 664 if (code = krb5_sname_to_principal(k5->ctx, NULL, ROOT_UNAME, 671 if ((code = krb5_parse_name(k5->ctx, nam 826 kinit_prompter( krb5_context ctx, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[] ) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_mac.c | 376 crypto_ctx_t *ctx; local 393 if ((ctx = kcf_new_ctx(crq, real_provider, sid)) == NULL) { 405 rv = KCF_PROV_MAC_INIT(real_provider, ctx, &lmech, key, tmpl, 411 rv = kcf_submit_request(real_provider, ctx, crq, ¶ms, 419 *ctxp = (crypto_context_t)ctx; 422 KCF_CONTEXT_REFRELE((kcf_context_t *)ctx->cc_framework_private); 525 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 531 if ((ctx == NULL) || 532 ((kcf_ctx = (kcf_context_t *)ctx->cc_framework_private) == NULL) || 541 rv = KCF_PROV_MAC_UPDATE(pd, ctx, dat 574 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local 610 crypto_ctx_t *ctx = (crypto_ctx_t *)context; local [all...] |
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_tgt.c | 54 tgt_sm_event_dispatch(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 57 tgt_sm_created(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 60 tgt_sm_onlining(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 63 tgt_sm_online(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 66 tgt_sm_stmf_online(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 69 tgt_sm_deleting_need_offline(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 72 tgt_sm_offlining(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 75 tgt_sm_offline(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 78 tgt_sm_stmf_offline(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 81 tgt_sm_deleting_stmf_dereg(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx); 182 tgt_event_ctx_t *ctx; local 217 tgt_sm_event_dispatch(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 275 tgt_sm_created(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 307 tgt_sm_onlining(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 344 tgt_sm_online(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 382 tgt_sm_stmf_online(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 415 tgt_sm_deleting_need_offline(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 446 tgt_sm_offlining(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 481 tgt_sm_offline(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 519 tgt_sm_stmf_offline(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 548 tgt_sm_deleting_stmf_dereg(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 582 tgt_sm_deleting_stmf_dereg_fail(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 613 tgt_sm_deleting(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx) argument 669 tgt_sm_new_state(iscsit_tgt_t *tgt, tgt_event_ctx_t *ctx, iscsit_tgt_state_t new_state) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gc_frm_kdc.c | 85 krb5_context ctx; member in struct:tr_state 176 static krb5_error_code do_traversal(krb5_context ctx, krb5_ccache, 222 krb5_free_cred_contents(ts->ctx, &rb->cred[i]); 241 krb5_free_cred_contents(ts->ctx, &rb->cred[i]); 258 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str); 260 retval = krb5_unparse_name(ts->ctx, *ts->cur_kdc, &cur_kdc_str); 262 retval = krb5_unparse_name(ts->ctx, *ts->nxt_kdc, &nxt_kdc_str); 269 krb5_free_unparsed_name(ts->ctx, cur_tgt_str); 271 krb5_free_unparsed_name(ts->ctx, cur_kdc_str); 273 krb5_free_unparsed_name(ts->ctx, nxt_kdc_st 307 tgt_mcred(krb5_context ctx, krb5_principal client, krb5_principal dst, krb5_principal src, krb5_creds *mcreds) argument 766 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts) argument [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dca_dsa.c | 48 int dca_dsa_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, 50 int dca_dsa_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, 52 int dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, 57 dca_dsa_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, argument 60 dca_request_t *reqp = ctx->cc_provider_private; 61 dca_t *dca = ctx->cc_provider; 143 (void) dca_free_context(ctx); 194 crypto_ctx_t ctx; local 195 ctx.cc_provider_private = reqp; 196 dca_dsactxfree(&ctx); 201 dca_dsa_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *sig, crypto_req_handle_t req) argument 374 crypto_ctx_t ctx; local 382 dca_dsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag, int mode) argument 525 crypto_ctx_t *ctx = (crypto_ctx_t *)arg; local 547 crypto_ctx_t ctx; /* on the stack */ local [all...] |
H A D | ecc.c | 445 ecc_free_context(crypto_ctx_t *ctx) argument 447 ecc_ctx_t *ctxp = ctx->cc_provider_private; 460 ctx->cc_provider_private = NULL; 466 ecc_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 539 ctx->cc_provider_private = ctxp; 546 ecc_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 558 rv = ecc_sign_verify_common_init(ctx, mechanism, key, 566 ecc_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 578 rv = ecc_sign_verify_common_init(ctx, mechanism, key, 638 ecc_sign_common(ecc_ctx_t *ctx, crypto_data_ argument 705 ecc_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 733 ecc_sign_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 761 ecc_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 816 ecc_ctx_t ctx; local 841 ecc_verify_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 904 ecc_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 930 ecc_verify_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 957 ecc_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 1013 ecc_ctx_t ctx; local [all...] |
H A D | dca.c | 66 static int dca_free_context_low(crypto_ctx_t *ctx); 417 #define DCA_SOFTC_FROM_CTX(ctx) ((dca_t *)(ctx)->cc_provider) 418 #define DCA_MECH_FROM_CTX(ctx) \ 419 (((dca_request_t *)(ctx)->cc_provider_private)->dr_ctx.ctx_cm_type) 2091 DBG(dca, DCHATTY, "req=%p, in=%p, out=%p, ctx=%p, ibuf=%p, obuf=%p", 2094 DBG(dca, DCHATTY, "ctx paddr = %x, ibuf paddr = %x, obuf paddr = %x", 3686 dca_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 3693 softc = DCA_SOFTC_FROM_CTX(ctx); 3699 error = dca_3desctxinit(ctx, mechanis 3727 dca_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3779 dca_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3822 dca_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 3908 dca_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3949 dca_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4002 dca_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4045 dca_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4135 dca_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4174 dca_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 4208 dca_sign_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 4230 dca_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 4288 dca_sign_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4323 dca_sign_recover(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 4390 dca_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4429 dca_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 4463 dca_verify_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 4485 dca_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 4543 dca_verify_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4577 dca_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument 4665 dca_free_context(crypto_ctx_t *ctx) argument 4686 dca_free_context_low(crypto_ctx_t *ctx) argument 4719 crypto_ctx_t ctx; local [all...] |
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 104 MD5_CTX ctx; local 147 MD5Init(&ctx); 148 MD5Update(&ctx, (unsigned char *) &r, sizeof (r)); 149 MD5Update(&ctx, (unsigned char *) &counter, sizeof (counter)); 151 MD5Final(cinfo.digest, &ctx); 174 MD5_UTF8_8859_1(MD5_CTX *ctx, CONST_UCHAR *base, int len) argument 188 MD5Update(ctx, base, len); 196 if (scan != base) MD5Update(ctx, base, scan - base); 199 MD5Update(ctx, &cbuf, 1); 215 MD5_CTX ctx; local 248 MD5_CTX ctx; local 275 MD5_CTX ctx; local [all...] |
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 294 ** ctx -- TLS context 314 tls_set_verify(ctx, ssl, vrfy) 315 SSL_CTX *ctx; 322 SSL_CTX_set_verify(ctx, vrfy ? SSL_VERIFY_PEER : SSL_VERIFY_NONE, 488 ** ctx -- pointer to context 519 inittls(ctx, req, options, srv, certfile, keyfile, cacertpath, cacertfile, dhparam) 520 SSL_CTX **ctx; 551 if (ctx == NULL) 553 syserr("STARTTLS=%s, inittls: ctx == NULL", who); 555 SM_ASSERT(ctx ! [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | kfree.c | 664 krb5_free_sam_challenge(krb5_context ctx, krb5_sam_challenge *sc) argument 668 krb5_free_sam_challenge_contents(ctx, sc); 673 krb5_free_sam_challenge_2(krb5_context ctx, krb5_sam_challenge_2 *sc2) argument 677 krb5_free_sam_challenge_2_contents(ctx, sc2); 682 krb5_free_sam_challenge_contents(krb5_context ctx, krb5_sam_challenge *sc) argument 687 krb5_free_data_contents(ctx, &sc->sam_type_name); 689 krb5_free_data_contents(ctx, &sc->sam_track_id); 691 krb5_free_data_contents(ctx, &sc->sam_challenge_label); 693 krb5_free_data_contents(ctx, &sc->sam_challenge); 695 krb5_free_data_contents(ctx, 705 krb5_free_sam_challenge_2_contents(krb5_context ctx, krb5_sam_challenge_2 *sc2) argument 726 krb5_free_sam_challenge_2_body(krb5_context ctx, krb5_sam_challenge_2_body *sc2) argument 736 krb5_free_sam_challenge_2_body_contents(krb5_context ctx, krb5_sam_challenge_2_body *sc2) argument 756 krb5_free_sam_response(krb5_context ctx, krb5_sam_response *sr) argument 765 krb5_free_sam_response_2(krb5_context ctx, krb5_sam_response_2 *sr2) argument 774 krb5_free_sam_response_contents(krb5_context ctx, krb5_sam_response *sr) argument 787 krb5_free_sam_response_2_contents(krb5_context ctx, krb5_sam_response_2 *sr2) argument 798 krb5_free_predicted_sam_response(krb5_context ctx, krb5_predicted_sam_response *psr) argument 808 krb5_free_predicted_sam_response_contents(krb5_context ctx, krb5_predicted_sam_response *psr) argument 824 krb5_free_enc_sam_response_enc(krb5_context ctx, krb5_enc_sam_response_enc *esre) argument 834 krb5_free_enc_sam_response_enc_2(krb5_context ctx, krb5_enc_sam_response_enc_2 *esre2) argument 844 krb5_free_enc_sam_response_enc_contents(krb5_context ctx, krb5_enc_sam_response_enc *esre) argument 854 krb5_free_enc_sam_response_enc_2_contents(krb5_context ctx, krb5_enc_sam_response_enc_2 *esre2) argument 864 krb5_free_pa_enc_ts(krb5_context ctx, krb5_pa_enc_ts *pa_enc_ts) argument [all...] |
/illumos-gate/usr/src/lib/libgss/ |
H A D | g_inquire_context.c | 80 gss_union_ctx_id_t ctx; local 98 ctx = (gss_union_ctx_id_t)context_handle; 99 mech = __gss_get_mechanism(ctx->mech_type); 109 ctx->internal_ctx_id,
|
/illumos-gate/usr/src/common/crypto/md5/amd64/ |
H A D | md5_amd64.pl | 24 # void md5_block_asm_host_order(MD5_CTX *ctx, const void *inpp, 164 void md5_block_asm_host_order(MD5_CTX *ctx, const void *inpp, 180 / rdi = arg #1 (ctx, MD5_CTX pointer) 183 mov %rdi, %rbp / rbp = ctx 186 mov 0*4(%rbp), %eax / eax = ctx->A 187 mov 1*4(%rbp), %ebx / ebx = ctx->B 188 mov 2*4(%rbp), %ecx / ecx = ctx->C 189 mov 3*4(%rbp), %edx / edx = ctx->D 190 push %rbp / save ctx 288 1: pop %rbp / restore ctx [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/isc/ |
H A D | ev_connects.c | 57 static void listener(evContext ctx, void *uap, int fd, int evmask); 58 static void connector(evContext ctx, void *uap, int fd, int evmask); 66 evContext_p *ctx = opaqueCtx.opaque; local 101 if (ctx->conns != NULL) 102 ctx->conns->prev = new; 104 new->next = ctx->conns; 105 ctx->conns = new; 115 evContext_p *ctx = opaqueCtx.opaque; local 145 if (ctx->conns != NULL) 146 ctx 157 evContext_p *ctx = opaqueCtx.opaque; local 239 evContext_p *ctx = opaqueCtx.opaque; local 281 evContext_p *ctx = opaqueCtx.opaque; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/smbclnt/mount/ |
H A D | mount.c | 66 /* This needs to know ctx->ct_dev_fd, etc. */ 170 struct smb_ctx *ctx = NULL; local 227 error = smb_ctx_alloc(&ctx); 237 error = smb_ctx_parseunc(ctx, argv[argc - 2], 242 error = smb_ctx_readrc(ctx); 271 ret = setsubopt(ctx, &mdata, sopt); 303 ctx->ct_fullserver, ctx->ct_origshare); 337 ctx->ct_ssn.ssn_owner = SMBM_ANY_OWNER; 339 ctx 409 setsubopt(smb_ctx_t *ctx, struct smbfs_args *mdatap, char *subopt) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/ |
H A D | srvenum.c | 113 struct smb_ctx *ctx = NULL; local 152 error = smb_ctx_alloc(&ctx); 160 * (in the ctx handle). 162 smb_ctx_setfullserver(ctx, server); 163 smb_ctx_setshare(ctx, "IPC$", USE_IPC); 165 smb_ctx_setdomain(ctx, dom, B_TRUE); 167 smb_ctx_setuser(ctx, usr, B_TRUE); 169 smb_ctx_setpassword(ctx, pw, NULL); 177 error = smb_ctx_readrc(ctx); 188 error = smb_ctx_resolve(ctx); 404 pipetest(struct smb_ctx *ctx) argument [all...] |
/illumos-gate/usr/src/cmd/hal/addons/network-devices/ |
H A D | common.c | 167 add_network_printer(LibHalContext *ctx, char *base, char *hostaddr, argument 187 if (libhal_device_exists(ctx, udi, &error) == TRUE) 190 if ((tmp_udi = libhal_new_device(ctx, &error)) == NULL) 196 libhal_device_set_property_string(ctx, tmp_udi, 199 libhal_device_set_property_string(ctx, tmp_udi, 202 libhal_device_property_strlist_append(ctx, tmp_udi, 204 libhal_device_property_strlist_append(ctx, tmp_udi, 207 libhal_device_set_property_string(ctx, tmp_udi, 211 libhal_device_set_property_string(ctx, tmp_udi, 215 libhal_device_set_property_string(ctx, tmp_ud [all...] |
H A D | snmp.c | 32 add_snmp_device(LibHalContext *ctx, char *parent, char *name, char *community) argument 40 add_network_printer(ctx, parent, name, device, community); 66 scan_for_devices_using_snmp(LibHalContext *ctx, char *parent, char *community, argument 76 ctx, NP(parent), NP(community), NP(network))); 124 add_snmp_device(ctx, parent, (char *)elem->data, community);
|
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_callprov.c | 830 * ctx - Context for this operation 837 common_submit_request(kcf_provider_desc_t *pd, crypto_ctx_t *ctx, argument 859 err = KCF_PROV_DIGEST_INIT(pd, ctx, &dops->do_mech, 864 err = KCF_PROV_DIGEST(pd, ctx, dops->do_data, 869 err = KCF_PROV_DIGEST_UPDATE(pd, ctx, 874 err = KCF_PROV_DIGEST_FINAL(pd, ctx, 879 ASSERT(ctx == NULL); 888 err = KCF_PROV_DIGEST_KEY(pd, ctx, dops->do_digest_key, 906 err = KCF_PROV_MAC_INIT(pd, ctx, &mops->mo_mech, 911 err = KCF_PROV_MAC(pd, ctx, mop 1657 kcf_emulate_dual(kcf_provider_desc_t *pd, crypto_ctx_t *ctx, kcf_req_params_t *params) argument [all...] |
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | impl.h | 610 #define KCF_PROV_FREE_CONTEXT(pd, ctx) ( \ 612 KCF_PROV_CTX_OPS(pd)->free_context(ctx) : CRYPTO_NOT_SUPPORTED) 635 #define KCF_PROV_DIGEST_INIT(pd, ctx, mech, req) ( \ 637 KCF_PROV_DIGEST_OPS(pd)->digest_init(ctx, mech, req) : \ 644 #define KCF_PROV_DIGEST(pd, ctx, data, _digest, req) ( \ 646 KCF_PROV_DIGEST_OPS(pd)->digest(ctx, data, _digest, req) : \ 649 #define KCF_PROV_DIGEST_UPDATE(pd, ctx, data, req) ( \ 651 KCF_PROV_DIGEST_OPS(pd)->digest_update(ctx, data, req) : \ 654 #define KCF_PROV_DIGEST_KEY(pd, ctx, key, req) ( \ 656 KCF_PROV_DIGEST_OPS(pd)->digest_key(ctx, ke [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_verify.c | 234 void *ctx; local 239 dst_verify_data(SIG_MODE_INIT, key, &ctx, NULL, 0, NULL, 0); 242 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, 244 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, 249 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, msg, recstart - msg, 259 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, buf, n, NULL, 0); 262 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, 273 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, buf, n, NULL, 0); 276 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, 281 dst_verify_data(SIG_MODE_UPDATE, key, &ctx, [all...] |