Lines Matching defs:flavor
288 * have a limited access to this vnode even if the security flavor
344 nfsauth_retrieve(struct exportinfo *exi, char *req_netid, int flavor,
360 * No entry in the cache for this client/flavor
371 varg.arg_u.arg.areq.req_flavor = flavor;
820 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor,
844 * has an entry for this flavor in the cache
861 ac.auth_flavor = flavor;
933 np->auth_flavor = flavor;
1001 res = nfsauth_retrieve(exi, svc_getnetid(req->rq_xprt), flavor,
1155 if (nfsauth_retrieve(exi, svc_getnetid(req->rq_xprt), flavor, &addr,
1176 * a given nfs flavor number which is an explicitly shared flavor.
1180 int flavor, int perm, cred_t *cr)
1199 access = nfsauth_cache_get(exi, req, flavor, cr, NULL, NULL, NULL,
1211 int i, flavor, perm;
1236 * Get the nfs flavor number from xprt.
1238 flavor = (int)(uintptr_t)req->rq_xprt->xp_cookie;
1242 * there are no lists associated with this flavor then there's no
1249 if (flavor != sp[i].s_secinfo.sc_nfsnum) {
1265 flavor = AUTH_NONE;
1271 * If the flavor is in the ex_secinfo list, but not an explicitly
1272 * shared flavor by the user, it is a result of the nfsv4 server
1276 * e.g. flavor in (flavor) indicates that it is not explictly
1297 flavor != AUTH_SYS || crgetngroups(cr) < NGRPS)) {
1305 access = nfsauth_cache_get(exi, req, flavor, cr, uid, gid, ngids, gids);
1320 * Client's security flavor doesn't match with "ro" or
1323 if ((access & NFSAUTH_WRONGSEC) && (flavor != AUTH_NONE)) {