Home
last modified time | relevance | path

Searched refs:kctx (Results 1 – 16 of 16) sorted by relevance

/titanic_41/usr/src/uts/common/os/
H A Daudit_zone.c45 au_kcontext_t *kctx = kmem_zalloc(sizeof (au_kcontext_t), KM_SLEEP); in au_zone_init() local
54 global_kctx = kctx; in au_zone_init()
55 global_zone->zone_audit_kctxt = kctx; in au_zone_init()
57 kctx->auk_policy = global_kctx->auk_policy; in au_zone_init()
58 curproc->p_zone->zone_audit_kctxt = kctx; in au_zone_init()
60 kctx->auk_valid = AUK_VALID; in au_zone_init()
61 kctx->auk_zid = zone; in au_zone_init()
63 kctx->auk_info.ai_termid.at_type = AU_IPv4; in au_zone_init()
64 kctx->auk_info.ai_auid = AU_NOAUDITID; in au_zone_init()
65 kctx->auk_auditstate = AUC_INIT_AUDIT; in au_zone_init()
[all …]
/titanic_41/usr/src/uts/common/c2/
H A Daudit_io.c104 au_close(au_kcontext_t *kctx, caddr_t *d, int flag, au_event_t e_type, in au_close() argument
112 ASSERT(kctx != NULL); in au_close()
128 au_close_time(kctx, dchain, flag, e_type, e_mod, e_time); in au_close()
231 au_close_time(au_kcontext_t *kctx, token_t *dchain, int flag, au_event_t e_type, in au_close_time() argument
251 ASSERT(kctx != NULL); in au_close_time()
254 ? kctx->auk_auditstate in au_close_time()
277 if (kctx->auk_hostaddr_valid) in au_close_time()
279 kctx->auk_info.ai_termid.at_type; in au_close_time()
284 if (kctx->auk_policy & AUDIT_ZONENAME) { in au_close_time()
291 if (kctx->auk_policy & AUDIT_TRAIL) in au_close_time()
[all …]
H A Daudit_syscalls.c131 au_kcontext_t *kctx = GET_KCTX_PZ; in audit() local
136 U2A(u)->tad_audit : kctx->auk_auditstate; in audit()
268 if (kctx->auk_policy & AUDIT_ZONENAME) { in audit()
277 if (kctx->auk_policy & AUDIT_SEQ) { in audit()
294 if (kctx->auk_policy & AUDIT_TRAIL) { in audit()
309 AS_INC(as_generated, 1, kctx); in audit()
310 AS_INC(as_audit, 1, kctx); in audit()
312 au_enqueue(kctx, s, &hadr, &sadr, size, 0); in audit()
314 AS_INC(as_totalsize, length, kctx); in audit()
334 au_kcontext_t *kctx; in auditdoor() local
[all …]
H A Daudit_start.c131 au_kcontext_t *kctx; in audit_start() local
183 kctx = GET_KCTX_PZ; in audit_start()
186 if ((tad->tad_flag = auditme(kctx, tad, in audit_start()
187 kctx->auk_ets[tad->tad_event])) == 0) { in audit_start()
212 if ((kctx->auk_policy & AUDIT_CNT) || in audit_start()
213 (kctx->auk_policy & AUDIT_SCNT)) { in audit_start()
218 AS_INC(as_dropped, 1, kctx); in audit_start()
249 au_kcontext_t *kctx = GET_KCTX_PZ; in audit_finish() local
260 au_close_time(kctx, (token_t *)attr->audi_ad, attr->audi_flag, in audit_finish()
295 if (flag = audit_success(kctx, tad, error, NULL)) { in audit_finish()
[all …]
H A Daudit.c96 au_kcontext_t *kctx = GET_KCTX_PZ; in audit_savepath() local
110 !(kctx->auk_policy & AUDIT_PUBLIC)) { in audit_savepath()
140 !(kctx->auk_policy & AUDIT_PATH)) || in audit_savepath()
280 au_kcontext_t *kctx = GET_KCTX_PZ; in audit_anchorpath() local
304 !(kctx->auk_policy & AUDIT_PATH)) || in audit_anchorpath()
351 au_kcontext_t *kctx = GET_KCTX_PZ; in audit_symlink() local
375 !(kctx->auk_policy & AUDIT_PATH)) || in audit_symlink()
429 au_kcontext_t *kctx = GET_KCTX_PZ; in object_is_public() local
431 if (!(kctx->auk_policy & AUDIT_PUBLIC) && (attr->va_uid == 0) && in object_is_public()
539 au_kcontext_t *kctx; in audit_core_start() local
[all …]
H A Daudit_event.c1961 au_kcontext_t *kctx = GET_KCTX_PZ; in aus_close() local
1995 au_close(kctx, &(u_ad), 0, 0, 0, NULL); in aus_close()
4090 au_kcontext_t *kctx = GET_KCTX_PZ; in auf_recvmsg() local
4174 au_close(kctx, &(u_ad), 0, 0, 0, NULL); in auf_recvmsg()
4220 au_close(kctx, &(u_ad), 0, 0, 0, NULL); in auf_recvmsg()
4291 au_kcontext_t *kctx = GET_KCTX_PZ; in auf_recvfrom() local
4376 au_close(kctx, &(u_ad), 0, 0, 0, NULL); in auf_recvfrom()
4421 au_close(kctx, &(u_ad), 0, 0, 0, NULL); in auf_recvfrom()
4487 au_kcontext_t *kctx = GET_KCTX_PZ; in auf_sendmsg() local
4566 au_close(kctx, &(u_ad), 0, 0, 0, NULL); in auf_sendmsg()
[all …]
H A Daudit_token.c103 au_kcontext_t *kctx = GET_KCTX_PZ; in au_to_header_ex() local
123 adr_uint32(&adr, &kctx->auk_info.ai_termid.at_type, 1); in au_to_header_ex()
124 adr_char(&adr, (char *)&kctx->auk_info.ai_termid.at_addr[0], in au_to_header_ex()
125 (int)kctx->auk_info.ai_termid.at_type); in au_to_header_ex()
/titanic_41/usr/src/uts/common/syscall/
H A Dauditsys.c409 au_kcontext_t *kctx = GET_KCTX_PZ; in getpolicy() local
411 policy = audit_policy | kctx->auk_policy; in getpolicy()
440 au_kcontext_t *kctx; in setpolicy() local
445 kctx = GET_KCTX_NGZ; in setpolicy()
459 kctx->auk_policy = policy & AUDIT_LOCAL; in setpolicy()
471 if (kctx->auk_current_vp != NULL) in setpolicy()
472 (void) au_doormsg(kctx, AU_DBUF_POLICY, &policy); in setpolicy()
479 mutex_enter(&(kctx->auk_queue.lock)); in setpolicy()
482 (kctx->auk_queue.cnt >= kctx->auk_queue.hiwater))) in setpolicy()
483 cv_broadcast(&(kctx->auk_queue.write_cv)); in setpolicy()
[all …]
/titanic_41/usr/src/lib/libsmbfs/smb/
H A Dkrb5ssp.c165 krb5_context kctx = ss->ss_krb5ctx; in krb5ssp_get_tkt() local
174 if (kctx == NULL || kcc == NULL) { in krb5ssp_get_tkt()
180 kerr = krb5_set_default_tgs_enctypes(kctx, kenctypes); in krb5ssp_get_tkt()
187 kerr = krb5_auth_con_init(kctx, &ss->ss_auth); in krb5ssp_get_tkt()
209 kerr = krb5_mk_req(kctx, &ss->ss_auth, rq_opts, "cifs", server, in krb5ssp_get_tkt()
235 krb5_free_data_contents(kctx, &outdata); in krb5ssp_get_tkt()
475 krb5_context kctx; in krb5ssp_destroy() local
482 if ((kctx = ss->ss_krb5ctx) != NULL) { in krb5ssp_destroy()
485 (void) krb5_auth_con_free(kctx, ss->ss_auth); in krb5ssp_destroy()
488 krb5_free_principal(kctx, ss->ss_krb5clp); in krb5ssp_destroy()
[all …]
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dlucid_context.c142 void *kctx; in gss_krb5int_free_lucid_sec_context() local
148 kctx = value->value; in gss_krb5int_free_lucid_sec_context()
149 if (!kctx) { in gss_krb5int_free_lucid_sec_context()
155 if (! kg_validate_lucidctx_id(kctx)) { in gss_krb5int_free_lucid_sec_context()
161 version = ((gss_krb5_lucid_context_version_t *)kctx)->version; in gss_krb5int_free_lucid_sec_context()
164 (void)kg_delete_lucidctx_id(kctx); in gss_krb5int_free_lucid_sec_context()
165 free_external_lucid_ctx_v1((gss_krb5_lucid_context_v1_t*) kctx); in gss_krb5int_free_lucid_sec_context()
/titanic_41/usr/src/uts/common/gssapi/
H A Dgssd_clnt_stubs.c855 struct kgss_ctx *kctx; in kgss_init_sec_context() local
866 kctx = KGSS_ALLOC(); in kgss_init_sec_context()
872 kctx->mech = &default_gc; in kgss_init_sec_context()
873 kctx->gssd_ctx = GSSD_NO_CONTEXT; in kgss_init_sec_context()
874 *context_handle = (gss_ctx_id_t)kctx; in kgss_init_sec_context()
876 kctx = (struct kgss_ctx *)*context_handle; in kgss_init_sec_context()
893 gssd_cred_verifier, &kctx->gssd_ctx, &kctx->gssd_ctx_verifier, in kgss_init_sec_context()
899 KGSS_FREE(kctx); in kgss_init_sec_context()
907 __kgss_reset_mech(&kctx->mech, *actual_mech_type); in kgss_init_sec_context()
1132 struct kgss_ctx *kctx; in kgss_accept_sec_context() local
[all …]
/titanic_41/usr/src/cmd/gss/gssd/
H A Dgssd_clnt_stubs.c787 struct kgss_ctx *kctx; in kgss_init_sec_context() local
797 kctx = KGSS_ALLOC(); in kgss_init_sec_context()
798 *context_handle = (gss_ctx_id_t)kctx; in kgss_init_sec_context()
799 kctx->gssd_ctx = (OM_uint32) GSS_C_NO_CONTEXT; in kgss_init_sec_context()
801 kctx = (struct kgss_ctx *)*context_handle; in kgss_init_sec_context()
814 gssd_cred_verifier, &kctx->gssd_ctx, in kgss_init_sec_context()
815 &kctx->gssd_ctx_verifier, in kgss_init_sec_context()
821 KGSS_FREE(kctx); in kgss_init_sec_context()
1047 struct kgss_ctx *kctx; in kgss_accept_sec_context() local
1053 kctx = KGSS_ALLOC(); in kgss_accept_sec_context()
[all …]
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dgssapi_krb5.h268 void **kctx);
276 void *kctx);
H A DgssapiP_krb5.h770 void **kctx);
/titanic_41/usr/src/uts/common/crypto/core/
H A Dkcf_sched.c1167 kcf_context_t *kctx = (kcf_context_t *)buf; in kcf_context_cache_constructor() local
1169 kctx->kc_refcnt = 0; in kcf_context_cache_constructor()
1170 mutex_init(&kctx->kc_in_use_lock, NULL, MUTEX_DEFAULT, NULL); in kcf_context_cache_constructor()
1179 kcf_context_t *kctx = (kcf_context_t *)buf; in kcf_context_cache_destructor() local
1181 ASSERT(kctx->kc_refcnt == 0); in kcf_context_cache_destructor()
1182 mutex_destroy(&kctx->kc_in_use_lock); in kcf_context_cache_destructor()
/titanic_41/usr/src/uts/sun4u/os/
H A Dcpr_impl.c225 uint64_t kctx = kcontextreg; in i_cpr_mp_setup() local
288 kcontextreg = kctx; in i_cpr_mp_setup()