/illumos-gate/usr/src/uts/common/os/ |
H A D | audit_zone.c | 45 au_kcontext_t *kctx = kmem_zalloc(sizeof (au_kcontext_t), KM_SLEEP); local 54 global_kctx = kctx; 55 global_zone->zone_audit_kctxt = kctx; 57 kctx->auk_policy = global_kctx->auk_policy; 58 curproc->p_zone->zone_audit_kctxt = kctx; 60 kctx->auk_valid = AUK_VALID; 61 kctx->auk_zid = zone; 63 kctx->auk_info.ai_termid.at_type = AU_IPv4; 64 kctx->auk_info.ai_auid = AU_NOAUDITID; 65 kctx 100 au_kcontext_t *kctx = arg; local 124 au_kcontext_t *kctx = arg; local [all...] |
/illumos-gate/usr/src/uts/common/c2/ |
H A D | audit_io.c | 104 au_close(au_kcontext_t *kctx, caddr_t *d, int flag, au_event_t e_type, argument 112 ASSERT(kctx != NULL); 128 au_close_time(kctx, dchain, flag, e_type, e_mod, e_time); 231 au_close_time(au_kcontext_t *kctx, token_t *dchain, int flag, au_event_t e_type, argument 251 ASSERT(kctx != NULL); 254 ? kctx->auk_auditstate 277 if (kctx->auk_hostaddr_valid) 279 kctx->auk_info.ai_termid.at_type; 284 if (kctx->auk_policy & AUDIT_ZONENAME) { 291 if (kctx 366 au_enqueue(au_kcontext_t *kctx, au_buff_t *m, adr_t *hadrp, adr_t *sadrp, int size, int dontblock) argument 415 au_dequeue(au_kcontext_t *kctx, au_buff_t *freeto) argument 465 audit_sync_block(au_kcontext_t *kctx) argument 507 audit_async_block(au_kcontext_t *kctx, caddr_t *rpp) argument 531 au_door_upcall(au_kcontext_t *kctx, au_dbuf_t *aubuf) argument 584 au_doormsg(au_kcontext_t *kctx, uint32_t message_code, void *message) argument 619 au_doorio(au_kcontext_t *kctx) argument 760 au_kcontext_t *kctx; local 797 au_kcontext_t *kctx = GET_KCTX_GZ; local 834 au_kcontext_t *kctx; local 850 au_kcontext_t *kctx; local [all...] |
H A D | audit_syscalls.c | 131 au_kcontext_t *kctx = GET_KCTX_PZ; local 136 U2A(u)->tad_audit : kctx->auk_auditstate; 268 if (kctx->auk_policy & AUDIT_ZONENAME) { 277 if (kctx->auk_policy & AUDIT_SEQ) { 294 if (kctx->auk_policy & AUDIT_TRAIL) { 309 AS_INC(as_generated, 1, kctx); 310 AS_INC(as_audit, 1, kctx); 312 au_enqueue(kctx, s, &hadr, &sadr, size, 0); 314 AS_INC(as_totalsize, length, kctx); 334 au_kcontext_t *kctx; local 391 audit_dont_stop(void *kctx) argument 407 au_queue_kick(void *kctx) argument 440 au_output_thread(au_kcontext_t *kctx) argument [all...] |
H A D | audit_start.c | 131 au_kcontext_t *kctx; local 183 kctx = GET_KCTX_PZ; 186 if ((tad->tad_flag = auditme(kctx, tad, 187 kctx->auk_ets[tad->tad_event])) == 0) { 212 if ((kctx->auk_policy & AUDIT_CNT) || 213 (kctx->auk_policy & AUDIT_SCNT)) { 218 AS_INC(as_dropped, 1, kctx); 249 au_kcontext_t *kctx = GET_KCTX_PZ; local 260 au_close_time(kctx, (token_t *)attr->audi_ad, attr->audi_flag, 295 if (flag = audit_success(kctx, ta 398 audit_success(au_kcontext_t *kctx, struct t_audit_data *tad, int error, cred_t *cr) argument 435 auditme(au_kcontext_t *kctx, struct t_audit_data *tad, au_state_t estate) argument [all...] |
H A D | audit.c | 96 au_kcontext_t *kctx = GET_KCTX_PZ; local 110 !(kctx->auk_policy & AUDIT_PUBLIC)) { 140 !(kctx->auk_policy & AUDIT_PATH)) || 280 au_kcontext_t *kctx = GET_KCTX_PZ; local 304 !(kctx->auk_policy & AUDIT_PATH)) || 351 au_kcontext_t *kctx = GET_KCTX_PZ; local 375 !(kctx->auk_policy & AUDIT_PATH)) || 429 au_kcontext_t *kctx = GET_KCTX_PZ; local 431 if (!(kctx->auk_policy & AUDIT_PUBLIC) && (attr->va_uid == 0) && 539 au_kcontext_t *kctx; local 598 au_kcontext_t *kctx; local 741 au_kcontext_t *kctx = GET_KCTX_PZ; local 963 au_kcontext_t *kctx = GET_KCTX_PZ; local 1216 au_kcontext_t *kctx = GET_KCTX_PZ; local 1436 au_kcontext_t *kctx; local 1866 au_kcontext_t *kctx = GET_KCTX_PZ; local 2017 au_kcontext_t *kctx = GET_KCTX_PZ; local 2099 au_kcontext_t *kctx = GET_KCTX_PZ; local [all...] |
H A D | audit_event.c | 1964 au_kcontext_t *kctx = GET_KCTX_PZ; local 1998 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4093 au_kcontext_t *kctx = GET_KCTX_PZ; local 4177 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4223 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4294 au_kcontext_t *kctx = GET_KCTX_PZ; local 4379 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4424 au_close(kctx, &(u_ad), 0, 0, 0, NULL); 4490 au_kcontext_t *kctx = GET_KCTX_PZ; local 4569 au_close(kctx, 4680 au_kcontext_t *kctx = GET_KCTX_PZ; local 5440 au_kcontext_t *kctx = GET_KCTX_PZ; local 5497 au_kcontext_t *kctx = GET_KCTX_PZ; local 5560 au_kcontext_t *kctx = GET_KCTX_PZ; local 5694 au_kcontext_t *kctx = GET_KCTX_PZ; local [all...] |
H A D | audit_token.c | 103 au_kcontext_t *kctx = GET_KCTX_PZ; local 123 adr_uint32(&adr, &kctx->auk_info.ai_termid.at_type, 1); 124 adr_char(&adr, (char *)&kctx->auk_info.ai_termid.at_addr[0], 125 (int)kctx->auk_info.ai_termid.at_type);
|
/illumos-gate/usr/src/uts/common/syscall/ |
H A D | auditsys.c | 409 au_kcontext_t *kctx = GET_KCTX_PZ; local 411 policy = audit_policy | kctx->auk_policy; 440 au_kcontext_t *kctx; local 445 kctx = GET_KCTX_NGZ; 459 kctx->auk_policy = policy & AUDIT_LOCAL; 471 if (kctx->auk_current_vp != NULL) 472 (void) au_doormsg(kctx, AU_DBUF_POLICY, &policy); 479 mutex_enter(&(kctx->auk_queue.lock)); 482 (kctx->auk_queue.cnt >= kctx 493 au_kcontext_t *kctx; local 507 au_kcontext_t *kctx; local 524 au_kcontext_t *kctx; local 537 au_kcontext_t *kctx; local 556 au_kcontext_t *kctx = GET_KCTX_PZ; local 609 au_kcontext_t *kctx; local 680 au_kcontext_t *kctx = GET_KCTX_PZ; local 700 au_kcontext_t *kctx; local 823 au_kcontext_t *kctx = GET_KCTX_PZ; local 835 au_kcontext_t *kctx = GET_KCTX_PZ; local 1045 au_kcontext_t *kctx = GET_KCTX_PZ; local 1062 au_kcontext_t *kctx; local 1111 au_kcontext_t *kctx = GET_KCTX_PZ; local 1131 au_kcontext_t *kctx; local [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | krb5ssp.c | 165 krb5_context kctx = ss->ss_krb5ctx; local 174 if (kctx == NULL || kcc == NULL) { 175 fn = "null kctx or kcc"; 180 kerr = krb5_set_default_tgs_enctypes(kctx, kenctypes); 187 kerr = krb5_auth_con_init(kctx, &ss->ss_auth); 209 kerr = krb5_mk_req(kctx, &ss->ss_auth, rq_opts, "cifs", server, 235 krb5_free_data_contents(kctx, &outdata); 240 /* Free kctx in krb5ssp_destroy */ 475 krb5_context kctx; local 482 if ((kctx 510 krb5_context kctx = NULL; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | lucid_context.c | 142 void *kctx; local 148 kctx = value->value; 149 if (!kctx) { 155 if (! kg_validate_lucidctx_id(kctx)) { 161 version = ((gss_krb5_lucid_context_version_t *)kctx)->version; 164 (void)kg_delete_lucidctx_id(kctx); 165 free_external_lucid_ctx_v1((gss_krb5_lucid_context_v1_t*) kctx);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | gssapi_krb5.h | 268 void **kctx); 276 void *kctx);
|
H A D | gssapiP_krb5.h | 770 void **kctx);
|
/illumos-gate/usr/src/uts/common/gssapi/ |
H A D | gssd_clnt_stubs.c | 855 struct kgss_ctx *kctx; local 866 kctx = KGSS_ALLOC(); 872 kctx->mech = &default_gc; 873 kctx->gssd_ctx = GSSD_NO_CONTEXT; 874 *context_handle = (gss_ctx_id_t)kctx; 876 kctx = (struct kgss_ctx *)*context_handle; 893 gssd_cred_verifier, &kctx->gssd_ctx, &kctx->gssd_ctx_verifier, 899 KGSS_FREE(kctx); 907 __kgss_reset_mech(&kctx 1132 struct kgss_ctx *kctx; local 1345 struct kgss_ctx *kctx; local 1472 struct kgss_ctx *kctx; local 1522 struct kgss_ctx *kctx; local [all...] |
/illumos-gate/usr/src/cmd/gss/gssd/ |
H A D | gssd_clnt_stubs.c | 787 struct kgss_ctx *kctx; local 797 kctx = KGSS_ALLOC(); 798 *context_handle = (gss_ctx_id_t)kctx; 799 kctx->gssd_ctx = (OM_uint32) GSS_C_NO_CONTEXT; 801 kctx = (struct kgss_ctx *)*context_handle; 814 gssd_cred_verifier, &kctx->gssd_ctx, 815 &kctx->gssd_ctx_verifier, 821 KGSS_FREE(kctx); 1047 struct kgss_ctx *kctx; local 1053 kctx 1227 struct kgss_ctx *kctx; local 2370 struct kgss_ctx *kctx; local 2468 struct kgss_ctx *kctx; local [all...] |
/illumos-gate/usr/src/uts/common/crypto/core/ |
H A D | kcf_sched.c | 1167 kcf_context_t *kctx = (kcf_context_t *)buf; local 1169 kctx->kc_refcnt = 0; 1170 mutex_init(&kctx->kc_in_use_lock, NULL, MUTEX_DEFAULT, NULL); 1179 kcf_context_t *kctx = (kcf_context_t *)buf; local 1181 ASSERT(kctx->kc_refcnt == 0); 1182 mutex_destroy(&kctx->kc_in_use_lock);
|
/illumos-gate/usr/src/uts/sun4u/os/ |
H A D | cpr_impl.c | 225 uint64_t kctx = kcontextreg; local 288 kcontextreg = kctx;
|