/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | rq.c | 76 smb_rq_init(struct smb_ctx *ctx, uchar_t cmd, struct smb_rq **rqpp) argument 85 rqp->rq_ctx = ctx; 98 * Copy the ctx flags here, so the caller can 101 rqp->rq_hflags = ctx->ct_hflags; 102 rqp->rq_hflags2 = ctx->ct_hflags2; 335 smb_rq_internal(struct smb_ctx *ctx, struct smb_rq *rqp) argument 338 struct smb_iods *is = &ctx->ct_iods; 390 if ((err = smb_ssn_send(ctx, &rqp->rq_rq)) != 0) 393 if ((err = smb_ssn_recv(ctx, &rqp->rq_rp)) != 0)
|
H A D | private.h | 173 int smb_ctx_getaddr(struct smb_ctx *ctx); 174 int smb_ctx_gethandle(struct smb_ctx *ctx); 195 int smb_get_keychain(struct smb_ctx *ctx);
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/checksum/sha2/ |
H A D | sha2_test.c | 198 SHA2_CTX ctx; \ 200 SHA2Init(SHA ## mode ## _MECH_INFO_TYPE, &ctx); \ 201 SHA2Update(&ctx, _m, strlen(_m)); \ 202 SHA2Final(digest, &ctx); \ 216 SHA2_CTX ctx; \ 225 SHA2Init(SHA ## mode ## _MECH_INFO_TYPE, &ctx); \ 227 SHA2Update(&ctx, block, sizeof (block)); \ 228 SHA2Final(digest, &ctx); \
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | eventlog_log.c | 374 logr_get_snapshot(logr_context_t *ctx) argument 379 return (logr_interposer_ops.logr_op_snapshot(ctx)); 381 ctx->lc_cached_read_data = malloc(sizeof (logr_read_data_t)); 382 if (ctx->lc_cached_read_data != NULL) { 383 data = ctx->lc_cached_read_data; 392 data->rd_tot_recnum = logr_syslog_snapshot(ctx->lc_source_name,
|
H A D | svcctl_svc.c | 153 svcctl_context_t *ctx; local 158 if ((ctx = (svcctl_context_t *)hd->nh_data) == NULL) 161 if ((ctx->c_type != type) || (ctx->c_ctx.uc_cp == NULL)) 176 svcctl_context_t *ctx; local 181 ctx = (svcctl_context_t *)hd->nh_data; 183 switch (ctx->c_type) { 185 mgr_ctx = ctx->c_ctx.uc_mgr; 192 svc_ctx = ctx->c_ctx.uc_svc; 202 free(ctx); 215 svcctl_context_t *ctx; local 274 svcctl_context_t *ctx; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | store_cred.c | 128 krb5_context ctx = NULL; local 167 min = krb5_gss_init_context(&ctx); 230 maj = store_init_cred(ctx, minor_status, cred, default_cred); 235 maj = krb5_unparse_name(ctx, cred->princ, &client_name); 274 if (ctx) 275 krb5_free_context(ctx);
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | sasl.c | 38 extern void sasl_free_context(void *ctx); 39 extern int _sasl_client_init(void *ctx, const sasl_callback_t *callbacks); 40 extern int _sasl_client_new(void *ctx, const char *service, 45 extern int _sasl_server_init(void *ctx, 47 extern int _sasl_server_new(void *ctx, const char *service, 574 sasl_conn_t *ctx = NULL; local 607 NULL, 0, &ctx ); 611 sasl_dispose(&ctx); 615 sb->sb_sasl_ctx = (void *)ctx; 636 sasl_conn_t *ctx local 654 sasl_conn_t *ctx; local [all...] |
/illumos-gate/usr/src/cmd/sendmail/libmilter/ |
H A D | libmilter.h | 305 #define MI_MONITOR_BEGIN(ctx, cmd) \ 309 mi_monitor_work_begin(ctx, cmd);\ 312 #define MI_MONITOR_END(ctx, cmd) \ 316 mi_monitor_work_end(ctx, cmd); \ 325 #define MI_MONITOR_BEGIN(ctx, cmd) 326 #define MI_MONITOR_END(ctx, cmd)
|
/illumos-gate/usr/src/cmd/hal/probing/xkb/ |
H A D | probe-xkb.c | 281 LibHalContext *ctx = NULL; local 299 if ((ctx = libhal_ctx_init_direct(&error)) == NULL) { 340 libhal_device_commit_changeset(ctx, cs, &error); 350 if (ctx != NULL) { 351 libhal_ctx_shutdown(ctx, &error); 352 libhal_ctx_free(ctx);
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_signing.c | 160 smb_sign_ctx_t ctx = 0; local 170 rc = smb2_hmac_init(&ctx, s->sign_mech, sign_key->key, sign_key->len); 185 if ((rc = smb2_hmac_update(ctx, tmp_hdr, tlen)) != 0) 213 rc = smb2_hmac_update(ctx, (uint8_t *)mbuf->m_data + offset, tlen); 228 rc = smb2_hmac_update(ctx, (uint8_t *)mbuf->m_data, tlen); 238 if ((rc = smb2_hmac_final(ctx, digest)) != 0)
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 87 struct ccmp_ctx *ctx; local 89 ctx = kmem_zalloc(sizeof (struct ccmp_ctx), KM_SLEEP); 90 if (ctx == NULL) 93 ctx->cc_ic = ic; 94 return (ctx); 100 struct ccmp_ctx *ctx = k->wk_private; local 102 if (ctx != NULL) 103 kmem_free(ctx, sizeof (struct ccmp_ctx)); 121 struct ccmp_ctx *ctx = k->wk_private; local 125 hdrlen = ieee80211_hdrspace(ctx [all...] |
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_sched.c | 114 crypto_ctx_t *ctx; local 132 ctx = &kcf_ctx->kc_glbl_ctx; 133 ctx->cc_provider = pd->pd_prov_handle; 134 ctx->cc_session = sid; 135 ctx->cc_provider_private = NULL; 136 ctx->cc_framework_private = (void *)kcf_ctx; 137 ctx->cc_flags = 0; 138 ctx->cc_opstate = NULL; 140 return (ctx); 246 crypto_ctx_t *ctx; local 536 crypto_ctx_t *ctx; local 596 kcf_submit_request(kcf_provider_desc_t *pd, crypto_ctx_t *ctx, crypto_call_req_t *crq, kcf_req_params_t *params, boolean_t cont) argument 1668 crypto_cancel_ctx(crypto_context_t ctx) argument [all...] |
H A D | kcf_prov_lib.c | 397 crypto_update_iov(void *ctx, crypto_data_t *input, crypto_data_t *output, argument 401 common_ctx_t *common_ctx = ctx; 412 rv = (cipher)(ctx, input->cd_raw.iov_base + input->cd_offset, 419 crypto_update_uio(void *ctx, crypto_data_t *input, crypto_data_t *output, argument 423 common_ctx_t *common_ctx = ctx; 462 (cipher)(ctx, uiop->uio_iov[vec_idx].iov_base + offset, 484 crypto_update_mp(void *ctx, crypto_data_t *input, crypto_data_t *output, argument 488 common_ctx_t *common_ctx = ctx; 518 (cipher)(ctx, (char *)(mp->b_rptr + offset), cur_len,
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 1313 pkiDebug("%s: Bad magic value (%x) in req ctx\n", 1351 struct _pkinit_context *ctx = NULL; local 1353 ctx = (struct _pkinit_context *)calloc(1, sizeof(*ctx)); 1354 if (ctx == NULL) 1356 (void) memset(ctx, 0, sizeof(*ctx)); 1357 ctx->magic = PKINIT_CTX_MAGIC; 1358 ctx->opts = NULL; 1359 ctx 1396 struct _pkinit_context *ctx = (struct _pkinit_context *)blob; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softMAC.c | 188 soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech) 215 SOFT_MAC_INIT_CTX(MD5, &(ctx->hc_ctx_u.md5_ctx), 255 md5_hmac_ctx_init(&ctx->hc_ctx_u.md5_ctx, md5_ipad, md5_opad); 281 SOFT_MAC_INIT_CTX(SHA1, &(ctx->hc_ctx_u.sha1_ctx), 321 sha1_hmac_ctx_init(&ctx->hc_ctx_u.sha1_ctx, sha1_ipad, 361 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 402 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 443 sha2_hmac_ctx_init(CKM_TO_SHA2(mech), &ctx->hc_ctx_u.sha2_ctx, 670 sha2_hmac_ctx_init(uint_t mech, sha2_hc_ctx_t *ctx, uint64_t *ipad, argument 682 SHA2Init(mech, &ctx 187 mac_init_ctx(soft_session_t *session_p, soft_object_t *key, soft_hmac_ctx_t *ctx, CK_MECHANISM_TYPE mech) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/kwarn/ |
H A D | kwarnd_proc.c | 60 krb5_context ctx; member in struct:k5_data 760 if (code = krb5_init_context(&k5.ctx)) { 766 if ((code = krb5_cc_default(k5.ctx, &k5.cc))) { 773 if ((code = krb5_parse_name(k5.ctx, princ, 780 if ((code = krb5_get_renewed_creds(k5.ctx, &my_creds, k5.me, k5.cc, 786 if (code = krb5_cc_initialize(k5.ctx, k5.cc, k5.me)) { 792 if (code = krb5_cc_store_cred(k5.ctx, k5.cc, &my_creds)) { 801 krb5_free_cred_contents(k5.ctx, &my_creds); 804 krb5_free_unparsed_name(k5.ctx, k5.name); 806 krb5_free_principal(k5.ctx, k [all...] |
/illumos-gate/usr/src/lib/libadutils/common/ |
H A D | ldap_ping.c | 258 cldap_parse(ad_disc_t ctx, ad_disc_cds_t *cds, BerElement *ber) argument 297 if (ctx != NULL) 298 auto_set_DomainGUID(ctx, cp); 303 if (ctx != NULL) 304 auto_set_ForestName(ctx, val); 342 if (ctx != NULL) 343 auto_set_SiteName(ctx, val); 374 * If ctx != NULL, this is a query for a DC, in which case we 376 * "auto" (discovered) values in the ctx. 381 ldap_ping(ad_disc_t ctx, ad_disc_cds_ argument [all...] |
/illumos-gate/usr/src/common/crypto/skein/ |
H A D | skein_impl.h | 198 #define Skein_Show_Block(bits, ctx, X, blkPtr, wPtr, ksEvenPtr, ksOddPtr) 199 #define Skein_Show_Round(bits, ctx, r, X) 200 #define Skein_Show_R_Ptr(bits, ctx, r, X_ptr) 201 #define Skein_Show_Final(bits, ctx, cnt, outPtr) 202 #define Skein_Show_Key(bits, ctx, key, keyBytes)
|
/illumos-gate/usr/src/common/net/wanboot/ |
H A D | boot_http.c | 92 SSL_CTX *ctx; member in struct:http_conn_t 703 SSL_CTX *ctx = NULL; local 712 ctx = initialize_ctx(c_id); 713 if (ctx == NULL) { 728 if (ctx != NULL) 729 SSL_CTX_free(ctx); 739 if ((c_id->ssl = SSL_new(ctx)) == NULL) { 1383 if (c_id->ctx != NULL || c_id->ssl != NULL || c_id->fd != -1) 1758 * ctx = initialize_ctx(c_id); 1764 * non-NULL - Points to ctx structur 1776 SSL_CTX *ctx; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | context_establish.c | 156 gen_accept_token(dh_gss_context_t ctx, /* Diffie-Hellman context */ argument 168 token.ver.verno = ctx->proto_version; 172 accept->remote = ctx->local; 174 accept->local = ctx->remote; 176 accept->flags = ctx->flags; 178 accept->expire = ctx->expire; 182 keys.dh_key_set_len = ctx->no_keys; 183 keys.dh_key_set_val = ctx->keys; 360 __dh_gss_accept_sec_context(void *ctx, /* Per mechanism context */ argument 375 /* ctx i 889 __dh_gss_init_sec_context(void *ctx, OM_uint32 *minor, gss_cred_id_t cred, gss_ctx_id_t *context, gss_name_t target, gss_OID mech, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t channel, gss_buffer_t input_token, gss_OID *mech_rec, gss_buffer_t output_token, OM_uint32 *flags_rec, OM_uint32 *time_rec ) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/autofs/ |
H A D | ns_fnmount.c | 436 FN_ctx_t *ctx; local 443 ctx = fn_ctx_handle_from_ref(ref, XFN2(0) status); 444 if (ctx == NULL) { 451 bindings = fn_ctx_list_bindings(ctx, empty_cname, status); 452 fn_ctx_handle_destroy(ctx); 576 FN_ctx_t *ctx; local 579 ctx = fn_ctx_handle_from_ref(ref, XFN2(0) status); 580 if (ctx == NULL) { 584 attr = fn_attr_get(ctx, empty_cname, &attr_exported, XFN2(1) status); 585 fn_ctx_handle_destroy(ctx); 843 equiv_name(FN_ctx_t *ctx, const char *cname, FN_status_t *status) argument [all...] |
/illumos-gate/usr/src/uts/common/inet/ip/ |
H A D | ip_tunables.c | 55 ill_walk_context_t ctx; local 80 ill = ILL_START_WALK_V6(&ctx, ipst); 82 ill = ILL_START_WALK_V4(&ctx, ipst); 84 for (; ill != NULL; ill = ill_next(&ctx, ill)) { 103 ill_walk_context_t ctx; local 131 ill = ILL_START_WALK_V6(&ctx, ipst); 133 ill = ILL_START_WALK_V4(&ctx, ipst); 134 for (; ill != NULL; ill = ill_next(&ctx, ill)) { 273 ill_walk_context_t ctx; local 289 ill = ILL_START_WALK_V6(&ctx, ips [all...] |
/illumos-gate/usr/src/uts/common/dtrace/ |
H A D | dcpc.c | 466 kcpc_ctx_t *ctx, *octx; local 471 set->ks_ctx = ctx = kcpc_ctx_alloc(KM_SLEEP); 472 ctx->kc_set = set; 473 ctx->kc_cpuid = c->cpu_id; 475 if (kcpc_assign_reqs(set, ctx) != 0) 478 if (kcpc_configure_reqs(ctx, set, &subcode) != 0) 498 kcpc_cpu_program(c, ctx); 518 kcpc_ctx_free(ctx); 526 kcpc_ctx_t *ctx; local 539 ctx [all...] |
/illumos-gate/usr/src/uts/sun4v/vm/ |
H A D | mach_sfmmu_asm.s | 74 sfmmu_setctx_sec(uint_t ctx) 89 * %g1 = sfmmup whose ctx is being stolen (victim) 97 ! if (sec-ctx > INVALID_CONTEXT) 98 ! write INVALID_CONTEXT to sec-ctx 99 ! if (pri-ctx > INVALID_CONTEXT) 100 ! write INVALID_CONTEXT to pri-ctx 105 ! if (sec-ctx > INVALID_CONTEXT) 106 ! write INVALID_CONTEXT to sec-ctx 108 ! if (pri-ctx > INVALID_CONTEXT) 109 ! write INVALID_CONTEXT to pri-ctx [all...] |
/illumos-gate/usr/src/uts/common/fs/smbclnt/smbfs/ |
H A D | smbfs_subr.h | 198 int smbfs_smb_findnext(struct smbfs_fctx *ctx, int limit, 200 int smbfs_smb_findclose(struct smbfs_fctx *ctx, struct smb_cred *scrp); 271 void smbfs_fname_tolocal(struct smbfs_fctx *ctx); 294 int smbfs_xa_findopen(struct smbfs_fctx *ctx, struct smbnode *dnp, 296 int smbfs_xa_findnext(struct smbfs_fctx *ctx, uint16_t limit); 297 int smbfs_xa_findclose(struct smbfs_fctx *ctx);
|