Searched refs:kctx (Results 1 - 16 of 16) sorted by relevance

/illumos-gate/usr/src/uts/common/os/
H A Daudit_zone.c45 au_kcontext_t *kctx = kmem_zalloc(sizeof (au_kcontext_t), KM_SLEEP); local
54 global_kctx = kctx;
55 global_zone->zone_audit_kctxt = kctx;
57 kctx->auk_policy = global_kctx->auk_policy;
58 curproc->p_zone->zone_audit_kctxt = kctx;
60 kctx->auk_valid = AUK_VALID;
61 kctx->auk_zid = zone;
63 kctx->auk_info.ai_termid.at_type = AU_IPv4;
64 kctx->auk_info.ai_auid = AU_NOAUDITID;
65 kctx
100 au_kcontext_t *kctx = arg; local
124 au_kcontext_t *kctx = arg; local
[all...]
/illumos-gate/usr/src/uts/common/c2/
H A Daudit_io.c104 au_close(au_kcontext_t *kctx, caddr_t *d, int flag, au_event_t e_type, argument
112 ASSERT(kctx != NULL);
128 au_close_time(kctx, dchain, flag, e_type, e_mod, e_time);
231 au_close_time(au_kcontext_t *kctx, token_t *dchain, int flag, au_event_t e_type, argument
251 ASSERT(kctx != NULL);
254 ? kctx->auk_auditstate
277 if (kctx->auk_hostaddr_valid)
279 kctx->auk_info.ai_termid.at_type;
284 if (kctx->auk_policy & AUDIT_ZONENAME) {
291 if (kctx
366 au_enqueue(au_kcontext_t *kctx, au_buff_t *m, adr_t *hadrp, adr_t *sadrp, int size, int dontblock) argument
415 au_dequeue(au_kcontext_t *kctx, au_buff_t *freeto) argument
465 audit_sync_block(au_kcontext_t *kctx) argument
507 audit_async_block(au_kcontext_t *kctx, caddr_t *rpp) argument
531 au_door_upcall(au_kcontext_t *kctx, au_dbuf_t *aubuf) argument
584 au_doormsg(au_kcontext_t *kctx, uint32_t message_code, void *message) argument
619 au_doorio(au_kcontext_t *kctx) argument
760 au_kcontext_t *kctx; local
797 au_kcontext_t *kctx = GET_KCTX_GZ; local
834 au_kcontext_t *kctx; local
850 au_kcontext_t *kctx; local
[all...]
H A Daudit_syscalls.c131 au_kcontext_t *kctx = GET_KCTX_PZ; local
136 U2A(u)->tad_audit : kctx->auk_auditstate;
268 if (kctx->auk_policy & AUDIT_ZONENAME) {
277 if (kctx->auk_policy & AUDIT_SEQ) {
294 if (kctx->auk_policy & AUDIT_TRAIL) {
309 AS_INC(as_generated, 1, kctx);
310 AS_INC(as_audit, 1, kctx);
312 au_enqueue(kctx, s, &hadr, &sadr, size, 0);
314 AS_INC(as_totalsize, length, kctx);
334 au_kcontext_t *kctx; local
391 audit_dont_stop(void *kctx) argument
407 au_queue_kick(void *kctx) argument
440 au_output_thread(au_kcontext_t *kctx) argument
[all...]
H A Daudit_start.c131 au_kcontext_t *kctx; local
183 kctx = GET_KCTX_PZ;
186 if ((tad->tad_flag = auditme(kctx, tad,
187 kctx->auk_ets[tad->tad_event])) == 0) {
212 if ((kctx->auk_policy & AUDIT_CNT) ||
213 (kctx->auk_policy & AUDIT_SCNT)) {
218 AS_INC(as_dropped, 1, kctx);
249 au_kcontext_t *kctx = GET_KCTX_PZ; local
260 au_close_time(kctx, (token_t *)attr->audi_ad, attr->audi_flag,
295 if (flag = audit_success(kctx, ta
398 audit_success(au_kcontext_t *kctx, struct t_audit_data *tad, int error, cred_t *cr) argument
435 auditme(au_kcontext_t *kctx, struct t_audit_data *tad, au_state_t estate) argument
[all...]
H A Daudit.c96 au_kcontext_t *kctx = GET_KCTX_PZ; local
110 !(kctx->auk_policy & AUDIT_PUBLIC)) {
140 !(kctx->auk_policy & AUDIT_PATH)) ||
280 au_kcontext_t *kctx = GET_KCTX_PZ; local
304 !(kctx->auk_policy & AUDIT_PATH)) ||
351 au_kcontext_t *kctx = GET_KCTX_PZ; local
375 !(kctx->auk_policy & AUDIT_PATH)) ||
429 au_kcontext_t *kctx = GET_KCTX_PZ; local
431 if (!(kctx->auk_policy & AUDIT_PUBLIC) && (attr->va_uid == 0) &&
539 au_kcontext_t *kctx; local
598 au_kcontext_t *kctx; local
741 au_kcontext_t *kctx = GET_KCTX_PZ; local
963 au_kcontext_t *kctx = GET_KCTX_PZ; local
1216 au_kcontext_t *kctx = GET_KCTX_PZ; local
1436 au_kcontext_t *kctx; local
1866 au_kcontext_t *kctx = GET_KCTX_PZ; local
2017 au_kcontext_t *kctx = GET_KCTX_PZ; local
2099 au_kcontext_t *kctx = GET_KCTX_PZ; local
[all...]
H A Daudit_event.c1964 au_kcontext_t *kctx = GET_KCTX_PZ; local
1998 au_close(kctx, &(u_ad), 0, 0, 0, NULL);
4093 au_kcontext_t *kctx = GET_KCTX_PZ; local
4177 au_close(kctx, &(u_ad), 0, 0, 0, NULL);
4223 au_close(kctx, &(u_ad), 0, 0, 0, NULL);
4294 au_kcontext_t *kctx = GET_KCTX_PZ; local
4379 au_close(kctx, &(u_ad), 0, 0, 0, NULL);
4424 au_close(kctx, &(u_ad), 0, 0, 0, NULL);
4490 au_kcontext_t *kctx = GET_KCTX_PZ; local
4569 au_close(kctx,
4680 au_kcontext_t *kctx = GET_KCTX_PZ; local
5440 au_kcontext_t *kctx = GET_KCTX_PZ; local
5497 au_kcontext_t *kctx = GET_KCTX_PZ; local
5560 au_kcontext_t *kctx = GET_KCTX_PZ; local
5694 au_kcontext_t *kctx = GET_KCTX_PZ; local
[all...]
H A Daudit_token.c103 au_kcontext_t *kctx = GET_KCTX_PZ; local
123 adr_uint32(&adr, &kctx->auk_info.ai_termid.at_type, 1);
124 adr_char(&adr, (char *)&kctx->auk_info.ai_termid.at_addr[0],
125 (int)kctx->auk_info.ai_termid.at_type);
/illumos-gate/usr/src/uts/common/syscall/
H A Dauditsys.c409 au_kcontext_t *kctx = GET_KCTX_PZ; local
411 policy = audit_policy | kctx->auk_policy;
440 au_kcontext_t *kctx; local
445 kctx = GET_KCTX_NGZ;
459 kctx->auk_policy = policy & AUDIT_LOCAL;
471 if (kctx->auk_current_vp != NULL)
472 (void) au_doormsg(kctx, AU_DBUF_POLICY, &policy);
479 mutex_enter(&(kctx->auk_queue.lock));
482 (kctx->auk_queue.cnt >= kctx
493 au_kcontext_t *kctx; local
507 au_kcontext_t *kctx; local
524 au_kcontext_t *kctx; local
537 au_kcontext_t *kctx; local
556 au_kcontext_t *kctx = GET_KCTX_PZ; local
609 au_kcontext_t *kctx; local
680 au_kcontext_t *kctx = GET_KCTX_PZ; local
700 au_kcontext_t *kctx; local
823 au_kcontext_t *kctx = GET_KCTX_PZ; local
835 au_kcontext_t *kctx = GET_KCTX_PZ; local
1045 au_kcontext_t *kctx = GET_KCTX_PZ; local
1062 au_kcontext_t *kctx; local
1111 au_kcontext_t *kctx = GET_KCTX_PZ; local
1131 au_kcontext_t *kctx; local
[all...]
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dkrb5ssp.c165 krb5_context kctx = ss->ss_krb5ctx; local
174 if (kctx == NULL || kcc == NULL) {
175 fn = "null kctx or kcc";
180 kerr = krb5_set_default_tgs_enctypes(kctx, kenctypes);
187 kerr = krb5_auth_con_init(kctx, &ss->ss_auth);
209 kerr = krb5_mk_req(kctx, &ss->ss_auth, rq_opts, "cifs", server,
235 krb5_free_data_contents(kctx, &outdata);
240 /* Free kctx in krb5ssp_destroy */
475 krb5_context kctx; local
482 if ((kctx
510 krb5_context kctx = NULL; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dlucid_context.c142 void *kctx; local
148 kctx = value->value;
149 if (!kctx) {
155 if (! kg_validate_lucidctx_id(kctx)) {
161 version = ((gss_krb5_lucid_context_version_t *)kctx)->version;
164 (void)kg_delete_lucidctx_id(kctx);
165 free_external_lucid_ctx_v1((gss_krb5_lucid_context_v1_t*) kctx);
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dgssapi_krb5.h268 void **kctx);
276 void *kctx);
H A DgssapiP_krb5.h770 void **kctx);
/illumos-gate/usr/src/uts/common/gssapi/
H A Dgssd_clnt_stubs.c855 struct kgss_ctx *kctx; local
866 kctx = KGSS_ALLOC();
872 kctx->mech = &default_gc;
873 kctx->gssd_ctx = GSSD_NO_CONTEXT;
874 *context_handle = (gss_ctx_id_t)kctx;
876 kctx = (struct kgss_ctx *)*context_handle;
893 gssd_cred_verifier, &kctx->gssd_ctx, &kctx->gssd_ctx_verifier,
899 KGSS_FREE(kctx);
907 __kgss_reset_mech(&kctx
1132 struct kgss_ctx *kctx; local
1345 struct kgss_ctx *kctx; local
1472 struct kgss_ctx *kctx; local
1522 struct kgss_ctx *kctx; local
[all...]
/illumos-gate/usr/src/cmd/gss/gssd/
H A Dgssd_clnt_stubs.c787 struct kgss_ctx *kctx; local
797 kctx = KGSS_ALLOC();
798 *context_handle = (gss_ctx_id_t)kctx;
799 kctx->gssd_ctx = (OM_uint32) GSS_C_NO_CONTEXT;
801 kctx = (struct kgss_ctx *)*context_handle;
814 gssd_cred_verifier, &kctx->gssd_ctx,
815 &kctx->gssd_ctx_verifier,
821 KGSS_FREE(kctx);
1047 struct kgss_ctx *kctx; local
1053 kctx
1227 struct kgss_ctx *kctx; local
2370 struct kgss_ctx *kctx; local
2468 struct kgss_ctx *kctx; local
[all...]
/illumos-gate/usr/src/uts/common/crypto/core/
H A Dkcf_sched.c1167 kcf_context_t *kctx = (kcf_context_t *)buf; local
1169 kctx->kc_refcnt = 0;
1170 mutex_init(&kctx->kc_in_use_lock, NULL, MUTEX_DEFAULT, NULL);
1179 kcf_context_t *kctx = (kcf_context_t *)buf; local
1181 ASSERT(kctx->kc_refcnt == 0);
1182 mutex_destroy(&kctx->kc_in_use_lock);
/illumos-gate/usr/src/uts/sun4u/os/
H A Dcpr_impl.c225 uint64_t kctx = kcontextreg; local
288 kcontextreg = kctx;

Completed in 148 milliseconds