Lines Matching refs:flavor
850 * Check if the security flavor, nfsnum, is in the flavor_list.
936 * If the vnode is in a pseudo filesystem, or if the security flavor
937 * used in the request is valid but not an explicitly shared flavor,
1017 * For a real export node, return the flavor that the client
1028 resok_val[i].flavor = si->sc_rpcnum;
1029 if (resok_val[i].flavor == RPCSEC_GSS) {
1059 int access, flavor, perm;
1061 flavor = secp[i].s_secinfo.sc_nfsnum;
1065 flavor, perm, cs->basecr);
1069 flavor_list[ret_cnt] = flavor;
1079 * If the flavor is in the flavor list,
1085 resok_val[k].flavor = si->sc_rpcnum;
1086 if (resok_val[k].flavor == RPCSEC_GSS) {
1223 if (resok_val[i].flavor == RPCSEC_GSS) {
1939 * Check to see if a given "flavor" is an explicitly shared flavor.
1940 * The assumption of this routine is the "flavor" is already a valid
1941 * flavor in the secinfo list of "exi".
1947 * flavor2 is not an explicitly shared flavor for /export,
1952 is_exported_sec(int flavor, struct exportinfo *exi)
1959 if (flavor == sp[i].s_secinfo.sc_nfsnum ||
1970 * Check if the security flavor used in the request matches what is
2005 * First, check if the security flavor used in the request
2685 * In the same exported filesystem, if the security flavor used
2686 * is not an explicitly shared flavor, limit the view to the visible
3499 * don't know what security flavor should be used until we resolve the
3505 * So what we will have to in rfs4_op_lookup is check that flavor of