Searched refs:ki (Results 1 - 9 of 9) sorted by relevance

/xnu-2422.115.4/libkern/kmod/
H A Dc_stop.c50 __private_extern__ kern_return_t _stop(kmod_info_t *ki, void *data) argument
53 return (*_antimain)(ki, data);
H A Dc_start.c54 __private_extern__ kern_return_t _start(kmod_info_t *ki, void *data) argument
57 return (*_realmain)(ki, data);
/xnu-2422.115.4/bsd/nfs/
H A Dnfs_gss.c129 #define HASHLEN(ki) (((ki)->hash_len > MAX_DIGEST) ? \
130 (panic("nfs_gss.c:%d ki->hash_len is invalid = %d\n", __LINE__, (ki)->hash_len), MAX_DIGEST) : (ki)->hash_len)
132 #define HASHLEN(ki) (((ki)->hash_len > MAX_DIGEST) ? \
133 (printf("nfs_gss.c:%d ki->hash_len is invalid = %d\n", __LINE__, (ki)->hash_len), MAX_DIGEST) : (ki)
448 gss_key_info *ki; local
705 gss_key_info *ki = &cp->gss_clnt_kinfo; local
1003 gss_key_info *ki = &cp->gss_clnt_kinfo; local
2100 gss_key_info *ki; local
2408 gss_key_info *ki; local
2500 gss_key_info *ki = &cp->gss_svc_kinfo; local
3069 nfs_gss_token_put( gss_key_info *ki, u_char *alg, u_char *p, int initiator, int datalen, u_char *cksum) argument
3208 nfs_gss_token_get( gss_key_info *ki, u_char *alg, u_char *p, int initiator, uint32_t *len, u_char *cksum) argument
3348 nfs_gss_cksum_mchain( gss_key_info *ki, mbuf_t mhead, u_char *alg, int offset, int len, u_char *digest) argument
3405 nfs_gss_cksum_chain( gss_key_info *ki, struct nfsm_chain *nmc, u_char *alg, int offset, int len, u_char *cksum) argument
3429 nfs_gss_cksum_rep(gss_key_info *ki, uint32_t seqnum, u_char *cksum) argument
3453 nfs_gss_encrypt_mchain( gss_key_info *ki, mbuf_t mhead, int offset, int len, int encrypt) argument
3524 nfs_gss_encrypt_chain( gss_key_info *ki, struct nfsm_chain *nmc, int offset, int len, int encrypt) argument
3547 gss_digest_Init(GSS_DIGEST_CTX *ctx, gss_key_info *ki) argument
3583 gss_des_crypt(gss_key_info *ki, des_cblock *in, des_cblock *out, int32_t len, des_cblock *iv, des_cblock *retiv, int encrypt, int usage) argument
3603 gss_key_init(gss_key_info *ki, uint32_t skeylen) argument
[all...]
/xnu-2422.115.4/libkern/c++/Tests/TestSerialization/test1/
H A Dtest1_main.cpp64 test1_start(struct kmod_info *ki, void *data) argument
104 test1_stop(struct kmod_info *ki, void *data) argument
/xnu-2422.115.4/libkern/c++/Tests/TestSerialization/test2/
H A Dtest2_main.cpp119 test2_start(struct kmod_info *ki, void *data) argument
176 test2_stop(struct kmod_info *ki, void *data) argument
/xnu-2422.115.4/osfmk/mach/
H A Dkmod.h59 typedef kern_return_t kmod_start_func_t(struct kmod_info * ki, void * data);
60 typedef kern_return_t kmod_stop_func_t(struct kmod_info * ki, void * data);
/xnu-2422.115.4/bsd/kern/
H A Dkern_credential.c2479 struct kauth_identity ki; local
2498 ki.ki_valid = 0;
2501 error = kauth_identity_find_uid(*(uid_t *)src, &ki, namebuf);
2504 error = kauth_identity_find_gid(*(gid_t *)src, &ki, namebuf);
2507 error = kauth_identity_find_guid((guid_t *)src, &ki, namebuf);
2510 error = kauth_identity_find_ntsid((ntsid_t *)src, &ki, namebuf);
2515 error = kauth_identity_find_nam((char *)src, from, &ki);
2558 if (!expired(&ki)) {
2577 if (ki.ki_valid & to) {
2578 KAUTH_DEBUG("CACHE - found matching entry with valid 0x%08x", ki
3145 struct kauth_identity ki; local
[all...]
/xnu-2422.115.4/security/
H A Dmac_policy.h6795 kmod_start(kmod_info_t *ki, void *xd) \
6802 kmod_stop(kmod_info_t *ki, void *xd) \
6807 extern kern_return_t _start(kmod_info_t *ki, void *data); \
6808 extern kern_return_t _stop(kmod_info_t *ki, void *data); \
/xnu-2422.115.4/libkern/c++/
H A DOSKext.cpp75 extern void OSRuntimeUnloadCPP(kmod_info_t * ki, void * data);

Completed in 121 milliseconds