/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | netshareenum.c | 78 rpc_netshareenum(struct smb_ctx *ctx, int *entriesp, int *totalp, 98 sprintf(ctx_string, "%p", ctx); 126 addrstr = inet_ntoa(ctx->ct_srvinaddr.sin_addr); 272 smb_rap_NetShareEnum(struct smb_ctx *ctx, int sLevel, void *pbBuffer, argument 285 error = smb_rap_request(rap, ctx); 299 rap_netshareenum(struct smb_ctx *ctx, int *entriesp, int *totalp, argument 313 error = smb_rap_NetShareEnum(ctx, 1, rpbuf, &bufsize, &entries, &total); 357 smb_netshareenum(struct smb_ctx *ctx, int *entriesp, int *totalp, argument 366 error = rpc_netshareenum(ctx, entriesp, totalp, entry_listp); 376 error = rap_netshareenum(ctx, entries [all...] |
H A D | krb5ssp.c | 40 * Based on code previously in ctx.c (from Boris Popov?) 96 krb5_auth_context ss_auth; /* auth ctx. w/ server (ptr) */ 253 struct smb_ctx *ctx = sp->smb_ctx; local 259 char *prin = ctx->ct_srvname; 271 if (ctx->ct_vcflags & SMBV_WILL_SIGN) 272 ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE; 383 struct smb_ctx *ctx = sp->smb_ctx; local 401 memset(ctx->ct_ssn_key, 0, SMBIOC_HASH_SZ); 404 memcpy(ctx->ct_ssn_key, ssn_key->contents, len); 409 if ((ctx [all...] |
H A D | nbns_rq.c | 97 static int nbns_rq_create(int opcode, struct nb_ctx *ctx, 180 nbns_resolvename(const char *name, struct nb_ctx *ctx, struct sockaddr **adpp) argument 190 error = nbns_rq_create(NBNS_OPCODE_QUERY, ctx, &rqp); 201 nn.nn_scope = ctx->nb_scope; 256 ctx->nb_lastns = rqp->nr_sender; 267 nbns_getnodestatus(struct nb_ctx *ctx, argument 279 error = nbns_rq_create(NBNS_OPCODE_QUERY, ctx, &rqp); 284 nn.nn_scope = ctx->nb_scope; 360 ctx->nb_lastns = rqp->nr_sender; 368 nbns_rq_create(int opcode, struct nb_ctx *ctx, struc argument 438 struct nb_ctx *ctx = rqp->nr_nbd; local 517 struct nb_ctx *ctx = rqp->nr_nbd; local 583 struct nb_ctx *ctx = rqp->nr_nbd; local [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/isc/ |
H A D | eventlib_p.h | 181 void *ctx; /* pointer to the evContext_p */ member in struct:__anon3879 186 #define emulMaskInit(ctx, field, ev, lastnext) \ 187 ctx->field.ctx = ctx; \ 188 ctx->field.type = ev; \ 189 ctx->field.result = lastnext; 261 void evPrintf(const evContext_p *ctx, int level, const char *fmt, ...) 265 extern int evPollfdRealloc(evContext_p *ctx, int pollfd_chunk_size, int fd); 276 evWait *evFreeWait(evContext_p *ctx, evWai [all...] |
/illumos-gate/usr/src/cmd/hal/probing/volume/ |
H A D | probe-volume.c | 75 set_fstyp_properties (LibHalContext *ctx, const char *udi, const char *fstype, nvlist_t *fsattr) argument 119 libhal_device_commit_changeset (ctx, cs, &error); 129 hsfs_contents(int fd, off_t probe_offset, LibHalContext *ctx, const char *udi) argument 204 libhal_device_set_property_bool (ctx, udi, 207 libhal_device_set_property_bool (ctx, udi, 210 libhal_device_set_property_bool (ctx, udi, 219 probe_disc (int fd, LibHalContext *ctx, const char *udi, dbus_bool_t *has_data, argument 361 libhal_device_commit_changeset (ctx, cs, &error); 427 LibHalContext *ctx = NULL; local 493 if ((ctx [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dca_rsa.c | 63 int dca_rsastart(crypto_ctx_t *ctx, crypto_data_t *in, crypto_data_t *out, argument 66 dca_request_t *reqp = ctx->cc_provider_private; 67 dca_t *dca = ctx->cc_provider; 203 (void) dca_free_context(ctx); 290 crypto_ctx_t ctx; local 291 ctx.cc_provider_private = reqp; 292 dca_rsactxfree(&ctx); 381 crypto_ctx_t ctx; local 382 ctx.cc_provider_private = reqp; 383 dca_rsactxfree(&ctx); 391 dca_rsainit(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, int kmflag) argument 605 crypto_ctx_t *ctx = (crypto_ctx_t *)arg; local 635 crypto_ctx_t ctx; /* on the stack */ local [all...] |
H A D | aes.c | 250 aes_check_mech_param(crypto_mechanism_t *mechanism, aes_ctx_t **ctx, int kmflag) argument 291 if (ctx != NULL) { 293 *ctx = p; 337 aes_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 340 return (aes_common_init(ctx, mechanism, key, template, req, B_TRUE)); 344 aes_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 347 return (aes_common_init(ctx, mechanism, key, template, req, B_FALSE)); 356 aes_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 383 ctx->cc_provider_private = aes_ctx; 405 aes_encrypt(crypto_ctx_t *ctx, crypto_data_ argument 520 aes_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 635 aes_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 710 aes_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 797 aes_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 855 aes_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 923 gcm_ctx_t *ctx = (gcm_ctx_t *)aes_ctx; local 1294 aes_free_context(crypto_ctx_t *ctx) argument [all...] |
/illumos-gate/usr/src/cmd/nscd/ |
H A D | nscd_switch.c | 1053 nscd_getent_context_t *ctx; local 1058 ctx = (nscd_getent_context_t *)contextp; 1059 s = ctx->nsw_state; 1060 n_src = ctx->n_src; 1061 be = ctx->be; 1066 ctx->be = 0; /* Should be unnecessary, but hey */ 1069 ctx->n_src = 0; 1109 if ((contextp = (nscd_getent_context_t *)contextpp->ctx) == 0) { 1114 contextp = (nscd_getent_context_t *)contextpp->ctx; 1203 if ((contextp = (nscd_getent_context_t *)contextpp->ctx) 1444 nscd_getent_context_t *ctx; local 1612 nscd_getent_context_t *ctx; local 1675 nscd_getent_context_t *ctx; local [all...] |
H A D | getnode.c | 52 #define nnam_db ctx->nsc_db[0] 53 #define addr_db ctx->nsc_db[1] 59 ipnode_init_ctx(nsc_ctx_t *ctx) { argument 60 ctx->dbname = NSS_DBNAM_IPNODES; 61 ctx->file_name = "/etc/inet/ipnodes"; 62 ctx->db_count = 2;
|
H A D | getserv.c | 36 #define name_db ctx->nsc_db[0] 37 #define port_db ctx->nsc_db[1] 51 serv_init_ctx(nsc_ctx_t *ctx) { argument 52 ctx->dbname = NSS_DBNAM_SERVICES; 53 ctx->file_name = "/etc/services"; 54 ctx->db_count = 2;
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | key_mgr.c | 239 ENCR_DECR_CONTEXT * ctx = NULL; local 326 ctx = (ENCR_DECR_CONTEXT *)malloc(sizeof (ENCR_DECR_CONTEXT)); 327 if (! ctx) { 330 (void) memset(ctx, 0x0, sizeof (ENCR_DECR_CONTEXT)); 332 rc = encr_mgr_init(sess, ctx, OP_WRAP, mech, h_wrapping_key); 337 ctx, data, data_len, wrapped_key, wrapped_key_len); 342 (void) encr_mgr_cleanup(ctx); 343 free(ctx); 358 ENCR_DECR_CONTEXT * ctx = NULL; local 418 ctx [all...] |
H A D | mech_rsa.c | 177 ENCR_DECR_CONTEXT *ctx, 190 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 220 ENCR_DECR_CONTEXT *ctx, 233 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 264 SIGN_VERIFY_CONTEXT *ctx, 277 if (! sess || ! ctx || ! out_data_len) { 280 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 308 SIGN_VERIFY_CONTEXT * ctx, 320 rc = object_mgr_find_in_map1(sess->hContext, ctx->key, &key_obj); 347 SIGN_VERIFY_CONTEXT *ctx, 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | api.h | 80 extern int crypto_digest_update(crypto_context_t ctx, crypto_data_t *data, 82 extern int crypto_digest_final(crypto_context_t ctx, crypto_data_t *digest, 105 extern int crypto_mac_update(crypto_context_t ctx, crypto_data_t *data, 107 extern int crypto_mac_final(crypto_context_t ctx, crypto_data_t *data, 124 extern int crypto_sign_update(crypto_context_t ctx, crypto_data_t *data, 126 extern int crypto_sign_final(crypto_context_t ctx, crypto_data_t *signature, 152 extern int crypto_verify_update(crypto_context_t ctx, crypto_data_t *data, 154 extern int crypto_verify_final(crypto_context_t ctx, crypto_data_t *signature, 180 extern int crypto_encrypt_update(crypto_context_t ctx, 183 extern int crypto_encrypt_final(crypto_context_t ctx, [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | disp_status.c | 144 void krb5_gss_save_error_info(OM_uint32 minor_code, krb5_context ctx) argument 149 fprintf(stderr, "%s(%lu, ctx=%p)\n", __func__, 150 (unsigned long) minor_code, (void *)ctx); 152 s = (char *)krb5_get_error_message(ctx, (krb5_error_code)minor_code); 154 fprintf(stderr, "%s(%lu, ctx=%p) saving: %s\n", __func__, 155 (unsigned long) minor_code, (void *)ctx, s); 159 ctx. Put it back, in case we make this call again *sigh*. */ 160 krb5_set_error_message(ctx, (krb5_error_code)minor_code, "%s", s); 161 krb5_free_error_message(ctx, s);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_spnego/mech/ |
H A D | spnego_disp_status.c | 152 void spnego_gss_save_error_info(OM_uint32 minor_code, spnego_gss_ctx_id_t ctx) argument 157 fprintf(stderr, "%s(%lu, ctx=%p)\n", __func__, 158 (unsigned long) minor_code, (void *)ctx); 160 s = (char *)spnego_get_error_message(ctx, minor_code); 162 fprintf(stderr, "%s(%lu, ctx=%p) saving: %s\n", __func__, 163 (unsigned long) minor_code, (void *)ctx, s); 167 ctx. Put it back, in case we make this call again *sigh*. */ 168 spnego_set_error_message(ctx, minor_code, "%s", s); 169 spnego_free_error_message(ctx, s);
|
/illumos-gate/usr/src/cmd/hal/probing/printer/ |
H A D | probe-printer.c | 116 LibHalContext *ctx = NULL; local 130 if ((ctx = libhal_ctx_init_direct(&error)) == NULL) 156 libhal_device_commit_changeset(ctx, cs, &error); 165 if (ctx != NULL) { 169 libhal_ctx_shutdown(ctx, &error); 170 libhal_ctx_free(ctx);
|
/illumos-gate/usr/src/lib/libc/amd64/unwind/ |
H A D | eh_frame.c | 68 _Unw_Decode_FDE(struct eh_frame_fields *f, struct _Unwind_Context *ctx) argument 92 fde_data = ctx->fde; 147 if ((ctx->pc < func) || (ctx->pc > (func+range))) 149 ctx->func = func; 150 ctx->range = range; 178 ctx->pfn = pfn; 180 ctx->lsda = lsda; 311 _Unw_EhfhLookup(struct _Unwind_Context *ctx) argument 316 uint64_t pc = ctx [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | os-proto.h | 66 krb5_error_code krb5_secure_config_files(krb5_context ctx);
|
/illumos-gate/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_sign.c | 158 void *ctx; local 162 dst_sign_data(SIG_MODE_INIT, key, &ctx, NULL, 0, NULL, 0); 167 dst_sign_data(SIG_MODE_UPDATE, key, &ctx, 169 dst_sign_data(SIG_MODE_UPDATE, key, &ctx, 174 dst_sign_data(SIG_MODE_UPDATE, key, &ctx, msg, *msglen, 180 dst_sign_data(SIG_MODE_UPDATE, key, &ctx, buf, n, NULL, 0); 186 dst_sign_data(SIG_MODE_UPDATE, key, &ctx, buf, cp2-buf, 192 dst_sign_data(SIG_MODE_UPDATE, key, &ctx, buf, n, NULL, 0); 210 dst_sign_data(SIG_MODE_UPDATE, key, &ctx, buf, cp2-buf, 213 n = dst_sign_data(SIG_MODE_FINAL, key, &ctx, NUL [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/hmac/ |
H A D | hmac.c | 59 SHA1_CTX ctx; local 67 HMACInit(&ctx, hmac_key, ka->ka_len); 73 HMACUpdate(&ctx, buf, i); 83 HMACFinal(&ctx, hmac_key, ka->ka_len, digest);
|
/illumos-gate/usr/src/cmd/krb5/ldap_util/ |
H A D | kdb5_ldap_realm.h | 57 krb5_context ctx; member in struct:iterate_args
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | util_validate.c | 265 int g_save_ctx_id(vdb, ctx) 267 gss_ctx_id_t ctx; 269 return(g_save(vdb, V_CTX_ID, (void *) ctx)); 293 int g_validate_ctx_id(vdb, ctx) 295 gss_ctx_id_t ctx; 297 return(g_validate(vdb, V_CTX_ID, (void *) ctx)); 320 int g_delete_ctx_id(vdb, ctx) 322 gss_ctx_id_t ctx; 324 return(g_delete(vdb, V_CTX_ID, (void *) ctx));
|
/illumos-gate/usr/src/uts/i86pc/io/ |
H A D | cpudrv_mach.c | 134 cpudrv_set_topspeed(void *ctx, int plat_level) argument 145 dip = ctx; 182 cpudrv_get_topspeed(void *ctx) argument 190 dip = ctx; 210 cpudrv_notify_handler(ACPI_HANDLE obj, UINT32 val, void *ctx) argument 219 dip = ctx; 234 cpudrv_redefine_topspeed(ctx); 273 cpudrv_redefine_topspeed(void *ctx) argument 289 (*cpupm_redefine_topspeed)(ctx);
|
/illumos-gate/usr/src/uts/common/des/ |
H A D | des_crypt.c | 433 des_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 489 ctx->cc_provider_private = des_ctx; 529 des_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 544 ASSERT(ctx->cc_provider_private != NULL); 545 des_ctx = ctx->cc_provider_private; 561 ret = des_encrypt_update(ctx, plaintext, ciphertext, req); 563 (void) des_free_context(ctx); 571 des_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, argument 586 ASSERT(ctx->cc_provider_private != NULL); 587 des_ctx = ctx 613 des_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 675 des_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 737 des_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 761 des_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_req_handle_t req) argument 1044 des_free_context(crypto_ctx_t *ctx) argument [all...] |
/illumos-gate/usr/src/uts/common/os/ |
H A D | cpu_event.c | 99 /* Get CPU sequential id from ctx. */ 100 #define CPU_IDLE_CTX2CPUID(ctx) ((processorid_t)(intptr_t)(ctx)) 103 #define CPU_IDLE_CTX2IDX(ctx) \ 104 (((int)(intptr_t)(ctx)) * CPU_IDLE_VALUE_GROUP_SIZE) 250 cpu_idle_dtrace_enter(void *arg, cpu_idle_callback_context_t ctx, argument 256 cpu_idle_prop_array[CPU_IDLE_PROP_IDX_IDLE_STATE].handle, ctx); 262 cpu_idle_dtrace_exit(void *arg, cpu_idle_callback_context_t ctx, int flag) argument 637 cpu_idle_callback_context_t ctx; local 642 ctx 740 cpu_idle_callback_context_t ctx; local 1005 cpu_idle_prop_get_value(cpu_idle_prop_handle_t hdl, cpu_idle_callback_context_t ctx, cpu_idle_prop_value_t *valp) argument 1034 cpu_idle_prop_get_uint32(cpu_idle_prop_handle_t hdl, cpu_idle_callback_context_t ctx) argument 1047 cpu_idle_prop_get_uint64(cpu_idle_prop_handle_t hdl, cpu_idle_callback_context_t ctx) argument 1060 cpu_idle_prop_get_intptr(cpu_idle_prop_handle_t hdl, cpu_idle_callback_context_t ctx) argument 1073 cpu_idle_prop_get_hrtime(cpu_idle_prop_handle_t hdl, cpu_idle_callback_context_t ctx) argument 1086 cpu_idle_prop_set_value(cpu_idle_prop_handle_t hdl, cpu_idle_callback_context_t ctx, cpu_idle_prop_value_t val) argument [all...] |