userdata
const krb5_data *userdata,
part.user_data = *userdata;
const krb5_data *userdata,
s.safe_body.user_data = *userdata;
const krb5_data *userdata, krb5_data *der_out,
ret = create_krbpriv(context, userdata, key, &rdata, local_addr,
create_krbpriv(krb5_context context, const krb5_data *userdata,
encpart.user_data = *userdata;
const krb5_data *userdata, krb5_data *der_out,
ret = create_krbsafe(context, userdata, key, &rdata, local_addr,
create_krbsafe(krb5_context context, const krb5_data *userdata, krb5_key key,
safemsg.user_data = *userdata;
krb5_data userdata = empty_data();
ret = read_krbpriv(context, authcon, inbuf, key, &rdata, &userdata, &enc);
*userdata_out = userdata;
userdata = empty_data();
krb5_free_data_contents(context, &userdata);
krb5_data userdata = empty_data();
ret = read_krbsafe(context, authcon, inbuf, key, &rdata, &userdata,
*userdata_out = userdata;
userdata = empty_data();
krb5_free_data_contents(context, &userdata);
get_key_cb(char *buf, int size, int rwflag, void *userdata)
struct get_key_cb_data *data = userdata;
userdata = data;
return userdata;
VARx(void *, userdata)
#define userdata ((loop)->userdata)
int wrap_password_callback(char *buf, int bufsiz, int verify, void *userdata)
return password_callback(buf, bufsiz, verify, (PW_CB_DATA *)userdata);
void *userdata, const char *info)
rwflag, userdata))
int ossl_pw_pem_password(char *buf, int size, int rwflag, void *userdata)
return ossl_pw_get_password(buf, size, rwflag, userdata, "PEM");
int ossl_pw_pvk_password(char *buf, int size, int rwflag, void *userdata)
return ossl_pw_get_password(buf, size, rwflag, userdata, "PVK");
int PEM_def_callback(char *buf, int num, int rwflag, void *userdata)
if (userdata) {
i = strlen(userdata);
memcpy(buf, userdata, i);
static int no_password_cb(char *buf, int num, int rwflag, void *userdata)
int PEM_def_callback(char *buf, int num, int rwflag, void *userdata);
typedef int pem_password_cb(char *buf, int size, int rwflag, void *userdata);
static int passcb(char *buf, int size, int rwflag, void *userdata)
static int pass_pw(char *buf, int size, int rwflag, void *userdata)
OPENSSL_strlcpy(buf, userdata, size);
return strlen(userdata);
static int get_password_cb(char *buf, int size, int rw_flag, void *userdata)
static int test_pem_password_cb(char *buf, int size, int rwflag, void *userdata)
OPENSSL_strlcpy(buf, (char *)userdata, (size_t)size);
if(entry->value.value.userdata.member)
SWIG_NewMemberObj(L,entry->value.value.userdata.pvalue,
entry->value.value.userdata.lvalue,
*(entry->value.value.userdata.ptype));
SWIG_NewPointerObj(L,entry->value.value.userdata.pvalue,
*(entry->value.value.userdata.ptype),0);
} userdata;
LSTRKEY(B), {LUA_TUSERDATA, { .userdata={0,0,(void*)(C),&D} } }
LSTRKEY(B), {LUA_TUSERDATA, { .userdata={1,S,(void*)(C),&D} } }
pmc_writelog(uint32_t userdata)
wl.pm_userdata = userdata;
struct hv_vss_opt_msg *userdata)
*userdata = hv_vss_dev_buf->opt_msg;
"%s (%ju) \n", __func__, vss_opt_name[userdata->opt],
(uintmax_t)userdata->msgid);
hv_vss_notified(struct hv_vss_dev_sc *dev_sc, struct hv_vss_opt_msg *userdata)
hv_vss_cp_vssreq_to_user(reqp, userdata);
userdata->status = VSS_SUCCESS;
userdata->status = VSS_FAIL;
hv_vss_daemon_acked(struct hv_vss_dev_sc *dev_sc, struct hv_vss_opt_msg *userdata)
opt = userdata->opt;
req_id = userdata->msgid;
status = userdata->status;
memset(&userdata->reserved, 0, sizeof(struct hv_vss_opt_msg) -
userdata->status = VSS_FAIL;
hv_vss_app_acked(struct hv_vss_dev_sc *dev_sc, struct hv_vss_opt_msg *userdata)
opt = userdata->opt;
req_id = userdata->msgid;
status = userdata->status;
memset(&userdata->reserved, 0, sizeof(struct hv_vss_opt_msg) -
userdata->status = VSS_FAIL;
struct hv_vss_opt_msg* userdata = (struct hv_vss_opt_msg*)data;
hv_vss_notified(sc, userdata);
hv_vss_daemon_acked(sc, userdata);
struct hv_vss_opt_msg* userdata = (struct hv_vss_opt_msg*)data;
hv_vss_notified(dev_sc, userdata);
hv_vss_app_acked(dev_sc, userdata);