/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | validate.c | 46 __dh_validate_context(dh_gss_context_t ctx) argument 48 if (ctx && ctx->state != BAD) 58 __dh_install_context(dh_gss_context_t ctx) argument 60 return (ctx ? DH_SUCCESS : DH_BAD_CONTEXT); 68 __dh_remove_context(dh_gss_context_t ctx) argument 70 return (ctx ? DH_SUCCESS : DH_BAD_CONTEXT);
|
H A D | seq.c | 58 * gss_context_cntl(OM_uint32 *minor, gss_ctx_id_t ctx, int cmd, void *argp); 67 dh_gss_context_t ctx = (dh_gss_context_t)cntx; local 79 if (ctx) { 80 mutex_lock(&ctx->seqno_lock); 81 ctx->next_seqno = seqno; 82 mutex_unlock(&ctx->seqno_lock); 91 dh_gss_context_t ctx = (dh_gss_context_t)cntx; local 101 *(OM_uint32 *)argp = ctx->next_seqno; 110 dh_gss_context_t ctx = (dh_gss_context_t)cntx; local 123 if (ctx) { 135 dh_gss_context_t ctx = (dh_gss_context_t)cntx; local 207 dh_gss_context_t ctx = (dh_gss_context_t)cntx; local 356 __dh_seq_detection(dh_gss_context_t ctx, OM_uint32 seqno) argument 433 __dh_next_seqno(dh_gss_context_t ctx) argument 449 __dh_init_seq_hist(dh_gss_context_t ctx) argument 462 __dh_destroy_seq_hist(dh_gss_context_t ctx) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | verify_mgr.c | 32 SIGN_VERIFY_CONTEXT * ctx, 45 if (! sess || ! ctx) { 48 if (ctx->active != FALSE) { 96 ctx->context_len = 0; 97 ctx->context = NULL; 126 ctx->context_len = sizeof (RSA_DIGEST_CONTEXT); 127 ctx->context = (CK_BYTE *)malloc( 129 if (! ctx->context) { 132 (void) memset(ctx->context, 0x0, 152 ctx 31 verify_mgr_init(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_MECHANISM * mech, CK_BBOOL recover_mode, CK_OBJECT_HANDLE key) argument 208 verify_mgr_cleanup(SIGN_VERIFY_CONTEXT *ctx) argument 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 282 verify_mgr_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument [all...] |
H A D | dig_mgr.c | 301 DIGEST_CONTEXT *ctx, 304 if (! sess || ! ctx) { 307 if (ctx->active != FALSE) { 314 ctx->context_len = sizeof (SHA1_CTX); 315 ctx->context.sha1ctx = (SHA1_CTX *) 316 malloc(ctx->context_len); 317 if (!ctx->context.sha1ctx) 319 SHA1Init(ctx->context.sha1ctx); 325 ctx->context_len = sizeof (MD5_CTX); 326 ctx 300 digest_mgr_init(SESSION *sess, DIGEST_CONTEXT *ctx, CK_MECHANISM *mech) argument 349 digest_mgr_cleanup(DIGEST_CONTEXT *ctx) argument 372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 414 digest_mgr_digest_update(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *data, CK_ULONG data_len) argument 442 digest_mgr_digest_key(SESSION * sess, DIGEST_CONTEXT *ctx, CK_OBJECT_HANDLE key_handle) argument 478 digest_mgr_digest_final(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *hash, CK_ULONG *hash_len) argument [all...] |
H A D | encr_mgr.c | 32 ENCR_DECR_CONTEXT * ctx, 45 if (! sess || ! ctx || ! mech) { 48 if (ctx->active != FALSE) { 105 ctx->context_len = 0; 106 ctx->context = NULL; 122 ctx->key = key_handle; 123 ctx->mech.ulParameterLen = mech->ulParameterLen; 124 ctx->mech.mechanism = mech->mechanism; 125 ctx->mech.pParameter = ptr; 126 ctx 31 encr_mgr_init(SESSION * sess, ENCR_DECR_CONTEXT * ctx, CK_ULONG operation, CK_MECHANISM * mech, CK_OBJECT_HANDLE key_handle) argument 133 encr_mgr_cleanup(ENCR_DECR_CONTEXT *ctx) argument 159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument [all...] |
/illumos-gate/usr/src/cmd/nscd/ |
H A D | gettnrhtp.c | 38 #define tsol_tp_db ctx->nsc_db[0] 43 tnrhtp_init_ctx(nsc_ctx_t *ctx) { argument 44 ctx->dbname = TNRHTP_PATH; 45 ctx->db_count = 1; 46 ctx->file_name = TNRHTP_PATH;
|
/illumos-gate/usr/src/cmd/hal/utils/ |
H A D | acpi.h | 21 gboolean battery_update(LibHalContext *ctx, const char *udi, int fd); 22 gboolean ac_adapter_update(LibHalContext *ctx, const char *udi, int fd); 23 gboolean lid_update(LibHalContext *ctx, const char *udi, int fd); 24 gboolean laptop_panel_update(LibHalContext *ctx, const char *udi, int fd); 26 int open_device(LibHalContext *ctx, char *udi);
|
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | ui-sun.c | 80 smb_get_authentication(struct smb_ctx *ctx) argument 90 ctx->ct_authflags &= ~SMB_AT_KRB5; 92 if (ctx->ct_flags & SMBCF_KCFOUND) { 95 ctx->ct_flags |= SMBCF_KCBAD; 98 if (ctx->ct_flags & SMBCF_NOPWD) 107 memset(ctx->ct_password, 0, sizeof (ctx->ct_password)); 108 strlcpy(ctx->ct_password, npw, sizeof (ctx->ct_password)); 123 if (ctx 137 smb_browse(struct smb_ctx *ctx, int anon) argument [all...] |
H A D | iod_wk.c | 65 smb_iod_work(smb_ctx_t *ctx) argument 67 smbioc_ssn_work_t *work = &ctx->ct_work; 70 DPRINT("server: %s", ctx->ct_srvname); 73 if (ctx->ct_tran_fd == -1 || ctx->ct_dev_fd == -1) { 99 if (ioctl(ctx->ct_dev_fd, 109 err = smb_iod_connect(ctx); 135 if (ioctl(ctx->ct_dev_fd, 145 if (ioctl(ctx->ct_dev_fd, 157 close(ctx [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.c | 94 AlgContext *ctx; local 122 ctx = mDNSPlatformMemAllocate(sizeof(AlgContext)); 123 if (!ctx) return mDNSNULL; 124 // Create expects ctx->alg to be initialized 125 ctx->alg = alg; 126 err = func->Create(ctx); 129 ctx->type = type; 130 return ctx; 132 mDNSPlatformMemFree(ctx); 137 mDNSexport mStatus AlgDestroy(AlgContext *ctx) argument 162 AlgLength(AlgContext *ctx) argument 186 AlgAdd(AlgContext *ctx, const void *data, mDNSu32 len) argument 210 AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument 234 AlgEncode(AlgContext *ctx) argument 258 AlgFinal(AlgContext *ctx, void *data, mDNSu32 len) argument [all...] |
H A D | CryptoAlg.h | 37 mStatus (*Create)(AlgContext *ctx); 38 mStatus (*Destroy)(AlgContext *ctx); 39 mDNSu32 (*Length)(AlgContext *ctx); 40 mStatus (*Add)(AlgContext *ctx, const void *data, mDNSu32 len); 41 // Verify the ctx using the key and compare it against signature/siglen 42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen); 44 mDNSu8* (*Encode)(AlgContext *ctx); 46 mStatus (*Final)(AlgContext *ctx, void *data, mDNSu32 len); 55 extern mStatus AlgDestroy(AlgContext *ctx); 56 extern mDNSu32 AlgLength(AlgContext *ctx); [all...] |
/illumos-gate/usr/src/common/crypto/modes/ |
H A D | gcm.c | 131 gcm_mode_encrypt_contiguous_blocks(gcm_ctx_t *ctx, char *data, size_t length, argument 150 if (length + ctx->gcm_remainder_len < block_size) { 153 (uint8_t *)ctx->gcm_remainder + ctx->gcm_remainder_len, 155 ctx->gcm_remainder_len += length; 156 ctx->gcm_copy_to = datap; 160 lastp = (uint8_t *)ctx->gcm_cb; 166 if (ctx->gcm_remainder_len > 0) { 167 need = block_size - ctx->gcm_remainder_len; 172 bcopy(datap, &((uint8_t *)ctx 252 gcm_encrypt_final(gcm_ctx_t *ctx, crypto_data_t *out, size_t block_size, int (*encrypt_block)(const void *, const uint8_t *, uint8_t *), void (*copy_block)(uint8_t *, uint8_t *), void (*xor_block)(uint8_t *, uint8_t *)) argument 330 gcm_decrypt_incomplete_block(gcm_ctx_t *ctx, size_t block_size, size_t index, int (*encrypt_block)(const void *, const uint8_t *, uint8_t *), void (*xor_block)(uint8_t *, uint8_t *)) argument 370 gcm_mode_decrypt_contiguous_blocks(gcm_ctx_t *ctx, char *data, size_t length, crypto_data_t *out, size_t block_size, int (*encrypt_block)(const void *, const uint8_t *, uint8_t *), void (*copy_block)(uint8_t *, uint8_t *), void (*xor_block)(uint8_t *, uint8_t *)) argument 409 gcm_decrypt_final(gcm_ctx_t *ctx, crypto_data_t *out, size_t block_size, int (*encrypt_block)(const void *, const uint8_t *, uint8_t *), void (*xor_block)(uint8_t *, uint8_t *)) argument 513 gcm_format_initial_blocks(uchar_t *iv, ulong_t iv_len, gcm_ctx_t *ctx, size_t block_size, void (*copy_block)(uint8_t *, uint8_t *), void (*xor_block)(uint8_t *, uint8_t *)) argument 564 gcm_init(gcm_ctx_t *ctx, unsigned char *iv, size_t iv_len, unsigned char *auth_data, size_t auth_data_len, size_t block_size, int (*encrypt_block)(const void *, const uint8_t *, uint8_t *), void (*copy_block)(uint8_t *, uint8_t *), void (*xor_block)(uint8_t *, uint8_t *)) argument 720 gcm_set_kmflag(gcm_ctx_t *ctx, int kmflag) argument [all...] |
H A D | ecb.c | 42 ecb_cipher_contiguous_blocks(ecb_ctx_t *ctx, char *data, size_t length, argument 57 if (length + ctx->ecb_remainder_len < block_size) { 60 (uint8_t *)ctx->ecb_remainder + ctx->ecb_remainder_len, 62 ctx->ecb_remainder_len += length; 63 ctx->ecb_copy_to = datap; 67 lastp = (uint8_t *)ctx->ecb_iv; 73 if (ctx->ecb_remainder_len > 0) { 74 need = block_size - ctx->ecb_remainder_len; 79 bcopy(datap, &((uint8_t *)ctx [all...] |
H A D | ctr.c | 43 ctr_mode_contiguous_blocks(ctr_ctx_t *ctx, char *data, size_t length, argument 60 if (length + ctx->ctr_remainder_len < block_size) { 63 (uint8_t *)ctx->ctr_remainder + ctx->ctr_remainder_len, 65 ctx->ctr_remainder_len += length; 66 ctx->ctr_copy_to = datap; 70 lastp = (uint8_t *)ctx->ctr_cb; 76 if (ctx->ctr_remainder_len > 0) { 77 need = block_size - ctx->ctr_remainder_len; 82 bcopy(datap, &((uint8_t *)ctx 168 ctr_mode_final(ctr_ctx_t *ctx, crypto_data_t *out, int (*encrypt_block)(const void *, const uint8_t *, uint8_t *)) argument [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/isc/ |
H A D | eventlib.c | 68 evContext_p *ctx; local 74 OKNEW(ctx); 77 ctx->cur = NULL; 80 ctx->debug = 0; 81 ctx->output = NULL; 84 ctx->conns = NULL; 85 INIT_LIST(ctx->accepts); 88 ctx->files = NULL; 90 ctx->pollfds = NULL; 91 ctx 144 evContext_p *ctx = opaqueCtx.opaque; local 152 evContext_p *ctx = opaqueCtx.opaque; local 212 evContext_p *ctx = opaqueCtx.opaque; local 478 evContext_p *ctx = opaqueCtx.opaque; local 591 evContext_p *ctx = opaqueCtx.opaque; local 667 evContext_p *ctx = opaqueCtx.opaque; local 673 evPrintf(const evContext_p *ctx, int level, const char *fmt, ...) argument 745 evContext_p *ctx; local 813 evPollfdRealloc(evContext_p *ctx, int pollfd_chunk_size, int fd) argument 855 evContext_p *ctx = (evContext_p *)maskp->ctx; local 889 evContext_p *ctx = maskp->ctx; local 920 evContext_p *ctx = maskp->ctx; local [all...] |
H A D | ev_files.c | 42 static evFile *FindFD(const evContext_p *ctx, int fd, int eventmask); 52 evContext_p *ctx = opaqueCtx.opaque; local 56 evPrintf(ctx, 1, 57 "evSelectFD(ctx %p, fd %d, mask 0x%x, func %p, uap %p)\n", 58 ctx, fd, eventmask, func, uap); 62 if (fd > ctx->highestFD) 73 /* Make sure both ctx->pollfds[] and ctx->fdTable[] are large enough */ 74 if (fd >= ctx->maxnfds && evPollfdRealloc(ctx, 157 evContext_p *ctx = opaqueCtx.opaque; local 268 FindFD(const evContext_p *ctx, int fd, int eventmask) argument [all...] |
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | prop.h | 79 * ctx -- context from prop_new() 88 int prop_request(struct propctx *ctx, const char **names); 97 const struct propval *prop_get(struct propctx *ctx); 112 int prop_getnames(struct propctx *ctx, const char **names, 117 * ctx -- property context 120 void prop_clear(struct propctx *ctx, int requests); 125 void prop_erase(struct propctx *ctx, const char *name); 129 * ctx -- is disposed and set to NULL; noop if ctx or *ctx i [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | smbrdr_glue.c | 84 struct smb_ctx *ctx; local 87 err = smbrdr_ctx_new(&ctx, srv, dom, user); 89 smb_ctx_free(ctx); 94 smbrdr_ctx_free(struct smb_ctx *ctx) argument 96 smb_ctx_free(ctx); 109 struct smb_ctx *ctx = NULL; local 121 if ((err = smb_ctx_alloc(&ctx)) != 0) 126 * (in the ctx handle). 128 (void) smb_ctx_setfullserver(ctx, server); 129 (void) smb_ctx_setshare(ctx, "IP [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | context_time.c | 38 krb5_gss_ctx_id_rec *ctx; local 48 ctx = (krb5_gss_ctx_id_rec *) context_handle; 50 if (! ctx->established) { 55 if ((code = krb5_timeofday(ctx->k5_context, &now))) { 57 save_error_info(*minor_status, ctx->k5_context); 61 if ((lifetime = ctx->endtime - now) <= 0) {
|
/illumos-gate/usr/src/tools/cw/ |
H A D | cw.c | 331 #define CC(ctx) \ 332 (((ctx)->i_flags & CW_F_SHADOW) ? \ 333 ((ctx)->i_compiler == CW_C_CC ? CW_C_GCC : CW_C_CC) : \ 334 (ctx)->i_compiler) 505 cw_ictx_t *ctx = calloc(sizeof (cw_ictx_t), 1); local 506 if (ctx) 507 if ((ctx->i_ae = calloc(sizeof (struct aelist), 1)) == NULL) { 508 free(ctx); 512 return (ctx); 639 do_gcc(cw_ictx_t *ctx) argument 1510 do_cc(cw_ictx_t *ctx) argument 1590 prepctx(cw_ictx_t *ctx) argument 1647 invoke(cw_ictx_t *ctx) argument 1695 reap(cw_ictx_t *ctx) argument 1752 exec_ctx(cw_ictx_t *ctx, int block) argument 1810 cw_ictx_t *ctx = newictx(); local [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | init_ctx.c | 197 * deal with fork safety issue regarding the krb ctx and the pkcs11 hSession 198 * field. This function is called if it is determined that the krb ctx hSession 203 krb5_reinit_ef_handle(krb5_context ctx) argument 205 ctx->cryptoki_initialized = FALSE; 207 if (krb5_init_ef_handle(ctx) != 0) { 216 /* reset the ctx pid since we're in a new process (child) */ 217 ctx->pid = __krb5_current_pid; 220 if (ctx->arcfour_ctx.initialized) { 222 ret = krb5_open_pkcs11_session(&ctx->arcfour_ctx.eSession); 224 ctx 283 krb5_init_ef_handle(krb5_context ctx) argument 316 krb5_free_ef_handle(krb5_context ctx) argument 361 krb5_context ctx = 0; local 536 krb5_free_context(krb5_context ctx) argument 814 copy_ktypes(krb5_context ctx, unsigned int nktypes, krb5_enctype *oldktypes, krb5_enctype **newktypes) argument 834 krb5_copy_context(krb5_context ctx, krb5_context *nctx_out) argument [all...] |
/illumos-gate/usr/src/cmd/vscan/vscand/ |
H A D | vs_icap.c | 239 vs_scan_ctx_t ctx; local 258 (void) memset(&ctx, 0, sizeof (vs_scan_ctx_t)); 259 ctx.vsc_idx = eng->vse_eidx; 260 (void) strlcpy(ctx.vsc_host, eng->vse_host, sizeof (ctx.vsc_host)); 261 ctx.vsc_port = eng->vse_port; 262 ctx.vsc_sockfd = eng->vse_sockfd; 263 ctx.vsc_fd = fd; 264 ctx.vsc_fname = fname; 265 ctx 319 vs_icap_option_request(vs_scan_ctx_t *ctx) argument 349 vs_icap_send_option_req(vs_scan_ctx_t *ctx) argument 388 vs_icap_read_option_resp(vs_scan_ctx_t *ctx) argument 436 vs_icap_respmod_request(vs_scan_ctx_t *ctx) argument 502 vs_icap_may_preview(vs_scan_ctx_t *ctx) argument 571 vs_icap_send_preview(vs_scan_ctx_t *ctx) argument 602 vs_icap_send_respmod_hdr(vs_scan_ctx_t *ctx, int ispreview) argument 638 vs_icap_create_respmod_hdr(vs_scan_ctx_t *ctx, int ispreview) argument 741 vs_icap_read_respmod_resp(vs_scan_ctx_t *ctx) argument 782 vs_icap_read_resp_code(vs_scan_ctx_t *ctx) argument 820 vs_icap_read_hdr(vs_scan_ctx_t *ctx, vs_hdr_t hdrs[], int num_hdrs) argument 861 vs_icap_set_scan_result(vs_scan_ctx_t *ctx) argument 938 vs_icap_read_encap_hdr(vs_scan_ctx_t *ctx) argument 1003 vs_icap_read_encap_data(vs_scan_ctx_t *ctx) argument 1040 vs_icap_create_repair_file(vs_scan_ctx_t *ctx) argument 1065 vs_icap_read_resp_body(vs_scan_ctx_t *ctx) argument 1091 vs_icap_read_body_chunk(vs_scan_ctx_t *ctx) argument 1208 vs_icap_send_chunk(vs_scan_ctx_t *ctx, int chunk_len) argument 1251 vs_icap_send_termination(vs_scan_ctx_t *ctx) argument 1271 vs_icap_readline(vs_scan_ctx_t *ctx, char *buf, int buflen) argument 1354 vs_icap_resp_violations(vs_scan_ctx_t *ctx, int hdr_id, char *line) argument 1384 vs_icap_resp_violation_rec(vs_scan_ctx_t *ctx, int vr_idx) argument 1432 vs_icap_opt_value(vs_scan_ctx_t *ctx, int hdr_id, char *line) argument 1504 vs_icap_resp_istag(vs_scan_ctx_t *ctx, int hdr_id, char *line) argument 1562 vs_icap_opt_ext(vs_scan_ctx_t *ctx, int hdr_id, char *line) argument 1610 vs_icap_resp_infection(vs_scan_ctx_t *ctx, int hdr_id, char *line) argument 1680 vs_icap_resp_virus_id(vs_scan_ctx_t *ctx, int hdr_id, char *line) argument 1705 vs_icap_resp_encap(vs_scan_ctx_t *ctx, int hdr_id, char *line) argument 1804 vs_icap_update_options(vs_scan_ctx_t *ctx) argument 1834 char *tmp, *ctx; local [all...] |
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | llib-lsasl | 20 extern int _sasl_server_init(void *ctx, const sasl_callback_t *callbacks, 23 extern int _sasl_server_new(void *ctx, const char *service, 29 extern int _sasl_client_init(void *ctx, 32 extern int _sasl_client_new(void *ctx, 41 extern int _sasl_client_add_plugin(void *ctx, 44 extern int _sasl_server_add_plugin(void *ctx, 47 extern int _sasl_canonuser_add_plugin(void *ctx, 50 extern int _sasl_auxprop_add_plugin(void *ctx,
|
/illumos-gate/usr/src/lib/hal/libhal/common/ |
H A D | libhal.h | 64 "%s %d : LibHalContext *ctx is NULL\n", \ 103 * @ctx: context for connection to hald 104 * @dbus_connection: DBus connection to use in ctx 109 typedef void (*LibHalIntegrateDBusIntoMainLoop) (LibHalContext *ctx, 114 * @ctx: context for connection to hald 119 typedef void (*LibHalDeviceAdded) (LibHalContext *ctx, 124 * @ctx: context for connection to hald 129 typedef void (*LibHalDeviceRemoved) (LibHalContext *ctx, 134 * @ctx: context for connection to hald 141 typedef void (*LibHalDeviceNewCapability) (LibHalContext *ctx, [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/irs/ |
H A D | hesiod.c | 65 static int parse_config_file(struct hesiod_p *ctx, const char *filename); 66 static char ** get_txt_records(struct hesiod_p *ctx, int class, 68 static int init(struct hesiod_p *ctx); 77 struct hesiod_p *ctx; local 80 ctx = malloc(sizeof(struct hesiod_p)); 81 if (ctx == 0) { 86 memset(ctx, 0, sizeof (*ctx)); 88 if (parse_config_file(ctx, _PATH_HESIOD_CONF) < 0) { 93 ctx 153 struct hesiod_p *ctx = (struct hesiod_p *) context; local 174 struct hesiod_p *ctx = (struct hesiod_p *) context; local 233 struct hesiod_p *ctx = (struct hesiod_p *) context; local 272 parse_config_file(struct hesiod_p *ctx, const char *filename) argument 343 get_txt_records(struct hesiod_p *ctx, int class, const char *name) argument 464 struct hesiod_p *ctx = context; local 483 struct hesiod_p *ctx = context; local 495 init(struct hesiod_p *ctx) argument [all...] |