/illumos-gate/usr/src/cmd/nscd/ |
H A D | nscd_getentctx.c | 50 int to_delete; /* this ctx no longer valid */ 165 * If the ctx is not to be deleted and the cookie numbers 166 * match, return the ctx if not aborted and not in use. 187 nscd_getent_context_t *ctx) 192 (void) mutex_lock(&ctx->getent_mutex); 195 (me, "in_use = %d, ctx->thr_id = %d, thread id = %d\n", 196 ctx->in_use, ctx->thr_id, thr_self()); 198 in_use = ctx->in_use; 199 if (in_use == 1 && ctx 186 _nscd_is_getent_ctx_in_use( nscd_getent_context_t *ctx) argument 212 _nscd_free_ctx_if_aborted( nscd_getent_context_t *ctx) argument 655 nscd_getent_ctx_t *ctx; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/api/ |
H A D | kcf_dual.c | 433 crypto_ctx_t *ctx; local 487 ctx = kcf_new_ctx(cr, real_provider, sid); 488 if (ctx == NULL) { 492 encr_kcf_context = (kcf_context_t *)ctx->cc_framework_private; 508 rv = KCF_PROV_ENCRYPT_MAC_INIT(real_provider, ctx, &lencr_mech, 531 rv = kcf_submit_request(real_provider, ctx, cr, ¶ms, 538 *ctxp = (crypto_context_t)ctx; 573 crypto_ctx_t *ctx = NULL; local 639 if (ctx == NULL && pd->pd_prov_type == CRYPTO_SW_PROVIDER) { 640 ctx 870 crypto_ctx_t *ctx = (crypto_ctx_t *)context, *mac_ctx; local 973 crypto_ctx_t *ctx = (crypto_ctx_t *)context, *mac_ctx; local 1542 crypto_ctx_t *ctx = NULL; local 1856 crypto_ctx_t *ctx; local 1976 crypto_ctx_t *ctx = (crypto_ctx_t *)context, *mac_ctx; local 2066 crypto_ctx_t *ctx = (crypto_ctx_t *)context, *mac_ctx; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sess_mgr.c | 1015 ENCR_DECR_CONTEXT *ctx = (ENCR_DECR_CONTEXT *)cptr; local 1018 ctx->context_len + ctx->mech.ulParameterLen; 1028 ptr1 = (CK_BYTE *)ctx; 1030 ptr3 = ptr2 + ctx->context_len; 1032 if (ctx->context_len) { 1033 context = (CK_BYTE *)malloc(ctx->context_len); 1037 (void) memcpy(context, ptr2, ctx->context_len); 1040 if (ctx->mech.ulParameterLen) { 1042 ctx 1058 SIGN_VERIFY_CONTEXT *ctx = (SIGN_VERIFY_CONTEXT *)cptr; local 1100 DIGEST_CONTEXT *ctx = (DIGEST_CONTEXT *)cptr; local [all...] |
/illumos-gate/usr/src/cmd/sendmail/libmilter/ |
H A D | listener.c | 736 SMFICTX_PTR ctx; local 896 if ((ctx = (SMFICTX_PTR) malloc(sizeof *ctx)) == NULL) 900 smi_log(SMI_LOG_ERR, "%s: malloc(ctx) failed (%s), %s", 912 (void) memset(ctx, '\0', sizeof *ctx); 913 ctx->ctx_sd = connfd; 914 ctx->ctx_dbg = dbg; 915 ctx->ctx_timeout = timeout; 916 ctx [all...] |
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | arcfour.c | 200 rc4_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 227 ctx->cc_provider_private = keystream; 233 rc4_crypt(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output, argument 238 ret = rc4_crypt_update(ctx, input, output, req); 241 (void) rc4_free_context(ctx); 248 rc4_crypt_update(crypto_ctx_t *ctx, crypto_data_t *input, crypto_data_t *output, argument 256 ASSERT(ctx->cc_provider_private != NULL); 258 if ((ctx->cc_flags & CRYPTO_USE_OPSTATE) && ctx->cc_opstate != NULL) 259 key = ctx 484 rc4_crypt_final(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 501 crypto_ctx_t ctx; local 519 rc4_free_context(crypto_ctx_t *ctx) argument [all...] |
H A D | rsa.c | 491 rsa_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 516 ctx->cc_provider_private = ctxp; 523 rsaprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, argument 529 ASSERT(ctx->cc_provider_private != NULL); 530 ctxp = ctx->cc_provider_private; 544 (void) rsa_free_context(ctx); 567 rsa_free_context(crypto_ctx_t *ctx) argument 569 rsa_ctx_t *ctxp = ctx->cc_provider_private; 581 ctx->cc_provider_private = NULL; 695 rsaprov_decrypt(crypto_ctx_t *ctx, crypto_data_ argument 846 rsa_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 1127 rsaprov_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 1161 rsa_sign_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 1195 rsa_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 1320 rsaprov_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 1354 rsa_verify_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 1394 rsa_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 1521 rsa_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument [all...] |
H A D | dprov.c | 41 * - ctx management 1617 #define DPROV_SOFTC_FROM_CTX(ctx, softc, instance) { \ 1618 (softc) = (dprov_state_t *)(ctx)->cc_provider; \ 1922 dprov_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, argument 1931 DPROV_SOFTC_FROM_CTX(ctx, softc, instance); 1948 mechanism, NULL, NULL, NULL, ctx, KM_SLEEP); 1957 dprov_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest, argument 1969 DPROV_SOFTC_FROM_CTX(ctx, softc, instance); 1974 NULL, data, NULL, digest, ctx, KM_NOSLEEP); 1983 dprov_digest_update(crypto_ctx_t *ctx, crypto_data_ argument 2007 dprov_digest_key(crypto_ctx_t *ctx, crypto_key_t *key, crypto_req_handle_t req) argument 2029 dprov_digest_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req) argument 2117 dprov_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2151 dprov_mac(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *mac, crypto_req_handle_t req) argument 2174 dprov_mac_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 2197 dprov_mac_final(crypto_ctx_t *ctx, crypto_data_t *mac, crypto_req_handle_t req) argument 2337 dprov_encrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2370 dprov_encrypt(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 2394 dprov_encrypt_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 2419 dprov_encrypt_final(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_req_handle_t req) argument 2478 dprov_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2511 dprov_decrypt(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 2536 dprov_decrypt_update(crypto_ctx_t *ctx, crypto_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 2561 dprov_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_req_handle_t req) argument 2651 dprov_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2685 dprov_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 2708 dprov_sign_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 2731 dprov_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 2788 dprov_sign_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2816 dprov_sign_recover(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 2871 dprov_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2904 dprov_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 2927 dprov_verify_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req) argument 2951 dprov_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 3009 dprov_verify_recover_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3037 dprov_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument 3209 dprov_encrypt_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *encrypt_mech, crypto_key_t *encrypt_key, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_spi_ctx_template_t encr_ctx_template, crypto_spi_ctx_template_t mac_ctx_template, crypto_req_handle_t req) argument 3254 dprov_encrypt_mac(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_req_handle_t req) argument 3282 dprov_encrypt_mac_update(crypto_ctx_t *ctx, crypto_data_t *plaintext, crypto_dual_data_t *ciphertext, crypto_req_handle_t req) argument 3307 dprov_encrypt_mac_final(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_req_handle_t req) argument 3380 dprov_mac_decrypt_init(crypto_ctx_t *ctx, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_mechanism_t *decrypt_mech, crypto_key_t *decrypt_key, crypto_spi_ctx_template_t mac_ctx_template, crypto_spi_ctx_template_t decr_ctx_template, crypto_req_handle_t req) argument 3425 dprov_mac_decrypt(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *mac, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3450 dprov_mac_decrypt_update(crypto_ctx_t *ctx, crypto_dual_data_t *ciphertext, crypto_data_t *plaintext, crypto_req_handle_t req) argument 3475 dprov_mac_decrypt_final(crypto_ctx_t *ctx, crypto_data_t *mac, crypto_data_t *plaintext, crypto_req_handle_t req) argument 4248 dprov_free_context(crypto_ctx_t *ctx) argument 5041 dprov_digest_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_key_t *key, crypto_data_t *digest, crypto_ctx_t *ctx, int kmflag) argument 5066 dprov_mac_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_data_t *data, crypto_key_t *key, crypto_data_t *mac, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument 5092 dprov_sign_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument 5119 dprov_verify_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument 5171 dprov_cipher_mac_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_ctx_t *ctx, crypto_session_id_t sid, crypto_mechanism_t *cipher_mech, crypto_key_t *cipher_key, crypto_mechanism_t *mac_mech, crypto_key_t *mac_key, crypto_dual_data_t *dual_data, crypto_data_t *data, crypto_data_t *mac, int kmflag) argument 5202 dprov_cipher_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *plaintext, crypto_data_t *ciphertext, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument 5410 crypto_ctx_t *ctx = taskq_req->dr_digest_req.dr_ctx; local 5526 crypto_ctx_t *ctx = taskq_req->dr_mac_req.dr_ctx; local 5642 crypto_ctx_t *ctx = taskq_req->dr_sign_req.sr_ctx; local 5827 emulate_verify_with_mac(crypto_ctx_t *ctx, crypto_data_t *in_mac) argument 5862 crypto_ctx_t *ctx = taskq_req->dr_verify_req.vr_ctx; local 6120 crypto_ctx_t *ctx = taskq_req->dr_cipher_req.dr_ctx; local 6354 crypto_ctx_t *ctx = taskq_req->dr_cipher_mac_req.mr_ctx; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | MICwrap.c | 49 __dh_gss_sign(void *ctx, /* Per mechanism context (not used) */ argument 56 _NOTE(ARGUNUSED(ctx)) 119 __dh_gss_verify(void *ctx, /* Per mechanism context (not used) */ argument 126 _NOTE(ARGUNUSED(ctx)) 211 __dh_gss_seal(void * ctx, /* Per mechanism context */ argument 220 _NOTE(ARGUNUSED(ctx)) 303 __dh_gss_unseal(void *ctx, /* Per mechanism context (not used) */ argument 311 _NOTE(ARGUNUSED(ctx))
|
H A D | support.c | 44 __dh_gss_display_status(void *ctx, /* Per mechanism context */ argument 80 !__OID_equal(((dh_context_t)ctx)->mech, mech)) 169 * __dh_gss_indicate_mechs(void *ctx, OM_uint32 *minor, gss_OID_set *mechs)
|
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | print.c | 58 smb_open_printer(struct smb_ctx *ctx, const char *title, argument 77 from_fd = ctx->ct_dev_fd;
|
H A D | ssp.c | 86 ssp_ctx_create_client(struct smb_ctx *ctx, struct mbdata *hint_mb) argument 98 ctx->ct_ssp_ctx = sp; 99 sp->smb_ctx = ctx; 172 ssp_ctx_destroy(struct smb_ctx *ctx) argument 176 sp = ctx->ct_ssp_ctx; 177 ctx->ct_ssp_ctx = NULL; 223 ssp_ctx_next_token(struct smb_ctx *ctx, argument 238 sp = ctx->ct_ssp_ctx;
|
H A D | file.c | 73 struct smb_ctx *ctx, char *path, 98 from_fd = ctx->ct_dev_fd; 133 smb_fh_open(struct smb_ctx *ctx, const char *path, int oflag) argument 198 fd = smb_fh_ntcreate(ctx, ntpath, 72 smb_fh_ntcreate( struct smb_ctx *ctx, char *path, int req_acc, int efattr, int share_acc, int open_disp, int create_opts) argument
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/checksum/edonr/ |
H A D | edonr_test.c | 156 EdonRState ctx; \ 158 EdonRInit(&ctx, mode); \ 159 EdonRUpdate(&ctx, (const uint8_t *) _m, strlen(_m) * 8);\ 160 EdonRFinal(&ctx, digest); \ 174 EdonRState ctx; \ 183 EdonRInit(&ctx, mode); \ 185 EdonRUpdate(&ctx, block, sizeof (block) * 8); \ 186 EdonRFinal(&ctx, digest); \
|
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_login.c | 75 login_event_ctx_t *ctx); 78 login_sm_init(iscsit_conn_t *ict, login_event_ctx_t *ctx); 81 login_sm_waiting(iscsit_conn_t *ict, login_event_ctx_t *ctx); 84 login_sm_processing(iscsit_conn_t *ict, login_event_ctx_t *ctx); 87 login_sm_responding(iscsit_conn_t *ict, login_event_ctx_t *ctx); 90 login_sm_responded(iscsit_conn_t *ict, login_event_ctx_t *ctx); 93 login_sm_ffp(iscsit_conn_t *ict, login_event_ctx_t *ctx); 96 login_sm_done(iscsit_conn_t *ict, login_event_ctx_t *ctx); 99 login_sm_error(iscsit_conn_t *ict, login_event_ctx_t *ctx); 102 login_sm_new_state(iscsit_conn_t *ict, login_event_ctx_t *ctx, 333 login_event_ctx_t *ctx; local 406 login_sm_event_dispatch(iscsit_conn_login_t *lsm, iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 476 login_sm_init(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 515 login_sm_waiting(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 542 login_sm_processing(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 561 login_sm_responding(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 602 login_sm_responded(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 646 login_sm_ffp(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 664 login_sm_done(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 685 login_sm_error(iscsit_conn_t *ict, login_event_ctx_t *ctx) argument 704 login_sm_new_state(iscsit_conn_t *ict, login_event_ctx_t *ctx, iscsit_login_state_t new_state) argument [all...] |
/illumos-gate/usr/src/uts/common/io/bnxe/577xx/drivers/common/lm/l5/ |
H A D | lm_l5.c | 2186 struct iscsi_context *ctx; local 2219 ctx = iscsi->ctx_virt; 2221 mm_memset(ctx, 0, sizeof(struct iscsi_context)); 2224 ctx->xstorm_ag_context.hq_prod = 1; //this value represents actual hq_prod + 1 2228 ctx->xstorm_st_context.iscsi.first_burst_length = ISCSI_DEFAULT_FIRST_BURST_LENGTH; 2229 ctx->xstorm_st_context.iscsi.max_send_pdu_length = ISCSI_DEFAULT_MAX_PDU_LENGTH; 2235 ctx->xstorm_st_context.iscsi.sq_pbl_base.lo = pbl_base.as_u32.low; 2236 ctx->xstorm_st_context.iscsi.sq_pbl_base.hi = pbl_base.as_u32.high; 2239 ctx->xstorm_st_context.iscsi.sq_curr_pbe.lo = req2->sq_first_pte.lo; 2240 ctx 2382 struct fcoe_context *ctx; local [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_signing.c | 230 smb_sign_ctx_t ctx = 0; local 261 if ((rc = smb_md5_init(&ctx, s->sign_mech)) != 0) 265 rc = smb_md5_update(ctx, sign->mackey, sign->mackey_len); 280 rc = smb_md5_update(ctx, &smbhdr.r.raw, size); 294 rc = smb_md5_update(ctx, &mbuf->m_data[offset], size); 301 rc = smb_md5_update(ctx, mbuf->m_data, mbuf->m_len); 306 rc = smb_md5_final(ctx, digest);
|
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | saslplug.h | 158 int (*prop_request)(struct propctx *ctx, const char **names); 159 const struct propval *(*prop_get)(struct propctx *ctx); 160 int (*prop_getnames)(struct propctx *ctx, const char **names, 162 void (*prop_clear)(struct propctx *ctx, int requests); 163 void (*prop_dispose)(struct propctx **ctx); 164 int (*prop_format)(struct propctx *ctx, const char *sep, int seplen, 166 int (*prop_set)(struct propctx *ctx, const char *name, 168 int (*prop_setvals)(struct propctx *ctx, const char *name, 170 void (*prop_erase)(struct propctx *ctx, const char *name);
|
/illumos-gate/usr/src/head/ |
H A D | stack_unwind.h | 161 struct _Unwind_Context *ctx, void *_Sa) 165 uint64_t fp = _Unwind_GetCFA(ctx); 167 if (fp == 0 || _Unwind_GetGR(ctx, RET_ADD) == 0) {
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | kcpc.h | 62 kcpc_ctx_t *ks_ctx; /* ctx this set belongs to */ 167 extern void kcpc_program(kcpc_ctx_t *ctx, boolean_t for_thread, 173 extern void kcpc_unprogram(kcpc_ctx_t *ctx, boolean_t cu_interpose); 208 extern void kcpc_free(kcpc_ctx_t *ctx, int isexec);
|
/illumos-gate/usr/src/cmd/cdrw/ |
H A D | main.h | 92 void detach_from_hald(LibHalContext *ctx, hal_state_t state);
|
/illumos-gate/usr/src/tools/onbld/Scm/ |
H A D | WorkSpace.py | 190 def oldname(ctx, fname): 196 fctx = ctx.filectx(fname, filelog=octx.filelog()) 198 fctx = ctx.filectx(fname) 233 for ctx in reversed(self.revs): 234 desc = ctx.description().splitlines() 236 cfiles = set(ctx.files()) 256 entry.parentname = oldname(ctx, fname) 336 return filter(lambda ctx: not [p for p in ctx.parents() if p in revset], 352 nodes = set(node.hex(ctx [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | auth_con.c | 197 krb5_auth_con_setsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument 200 krb5_free_keyblock(ctx, ac->send_subkey); 203 return krb5_copy_keyblock(ctx, keyblock, &ac->send_subkey); 209 krb5_auth_con_setrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock *keyblock) argument 212 krb5_free_keyblock(ctx, ac->recv_subkey); 215 return krb5_copy_keyblock(ctx, keyblock, &ac->recv_subkey); 221 krb5_auth_con_getsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument 224 return krb5_copy_keyblock(ctx, ac->send_subkey, keyblock); 230 krb5_auth_con_getrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock **keyblock) argument 233 return krb5_copy_keyblock(ctx, a 483 krb5int_auth_con_chkseqnum( krb5_context ctx, krb5_auth_context ac, krb5_ui_4 in_seq) argument [all...] |
H A D | chk_trans.c | 292 krb5_context ctx; 311 if (same_data (krb5_princ_realm (cdata->ctx, cdata->tgs[i]), realm)) 319 krb5_check_transited_list (krb5_context ctx, const krb5_data *trans_in, 337 r = krb5_walk_realm_tree (ctx, crealm, srealm, &cdata.tgs, 349 r = krb5_unparse_name (ctx, cdata.tgs[i], &name); 356 cdata.ctx = ctx; 358 krb5_free_realm_tree (ctx, cdata.tgs); 423 krb5_context ctx; 424 r = krb5_init_context (&ctx); 291 krb5_context ctx; member in struct:check_data 318 krb5_check_transited_list(krb5_context ctx, const krb5_data *trans_in, const krb5_data *crealm, const krb5_data *srealm) argument 421 krb5_context ctx; local [all...] |
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 122 MD5_CTX ctx; local 136 _sasl_MD5Init(&ctx); 137 _sasl_MD5Update(&ctx, salt, 16); 138 _sasl_MD5Update(&ctx, "sasldb", 6); 139 _sasl_MD5Update(&ctx, passwd, passlen); 142 _sasl_MD5Final((*secret)->data + 17, &ctx); 279 MD5_CTX ctx; local 310 _sasl_MD5Init(&ctx); 311 _sasl_MD5Update(&ctx, challenge, strlen(challenge)); 312 _sasl_MD5Update(&ctx, auxprop_value [all...] |
/illumos-gate/usr/src/cmd/rmvolmgr/ |
H A D | rmvolmgr.c | 77 static void rmm_device_added(LibHalContext *ctx, const char *udi); 78 static void rmm_device_removed(LibHalContext *ctx, const char *udi); 79 static void rmm_property_modified(LibHalContext *ctx, const char *udi, 81 static void rmm_device_condition(LibHalContext *ctx, const char *udi, 298 rmm_managed_alloc(LibHalContext *ctx, const char *udi) argument 309 if (!rmm_volume_aa_from_prop(ctx, udi, NULL, &v->aa)) { 429 rmm_device_added(LibHalContext *ctx, const char *udi) argument 438 rmm_device_removed(LibHalContext *ctx, const char *udi) argument 447 rmm_property_modified(LibHalContext *ctx, const char *udi, const char *key, argument 472 if ((v = rmm_managed_alloc(ctx, ud 515 rmm_device_condition(LibHalContext *ctx, const char *udi, const char *name, const char *detail) argument [all...] |