Searched defs:kmd (Results 1 - 6 of 6) sorted by relevance

/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_acct_mgmt.c55 krb5_module_data_t *kmd,
70 password = kmd->password;
71 context = kmd->kcontext;
168 krb5_module_data_t *kmd,
183 password = kmd->password;
196 if (code = krb5_init_secure_context(&kmd->kcontext)) {
204 if (code = krb5_timeofday(kmd->kcontext, &now)) {
213 if (kmd->expiration != 0) {
214 expiration = kmd->expiration;
217 if ((err = fetch_princ_entry(kmd, use
54 fetch_princ_entry( krb5_module_data_t *kmd, char *princ_str, kadm5_principal_ent_rec *prent, int debug) argument
165 exp_warn( pam_handle_t *pamh, char *user, krb5_module_data_t *kmd, int debug) argument
313 krb5_module_data_t *kmd = NULL; local
[all...]
H A Dkrb5_password.c60 krb5_module_data_t *kmd,
70 login_result, kmd->env ? kmd->env : "<null>");
72 if (kmd->env) {
80 if ((result = pam_putenv(pamh, kmd->env))
93 free(kmd->env);
94 kmd->env = NULL;
108 krb5_module_data_t *kmd,
115 if (!kmd || kmd
58 set_ccname( pam_handle_t *pamh, krb5_module_data_t *kmd, int login_result, int debug) argument
106 get_set_creds( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char *newpass, int debug) argument
163 krb5_module_data_t *kmd = NULL; local
[all...]
H A Dkrb5_setcred.c74 krb5_module_data_t *kmd = NULL; local
109 if (pam_get_data(pamh, KRB5_DATA, (const void**)&kmd) != PAM_SUCCESS) {
112 "PAM-KRB5 (setcred): kmd get failed, kmd=0x%p",
113 kmd);
122 "PAM-KRB5 (setcred): inst kmd structure");
124 kmd = calloc(1, sizeof (krb5_module_data_t));
126 if (kmd == NULL)
135 kmd->auth_status = PAM_AUTHINFO_UNAVAIL;
138 kmd,
285 attempt_refresh_cred( krb5_module_data_t *kmd, char *user, int flag) argument
361 krb5_renew_tgt( krb5_module_data_t *kmd, krb5_principal me, krb5_principal server, int flag) argument
599 attempt_delete_initcred(krb5_module_data_t *kmd) argument
[all...]
H A Dkrb5_authenticate.c105 krb5_module_data_t *kmd = NULL; local
135 err = pam_get_data(pamh, KRB5_DATA, (const void**)&kmd);
146 if (kmd != NULL) {
147 if (++(kmd->auth_calls) > 2) {
150 * stack. Clear out the current kmd and proceed as if
156 " two times, clearing kmd");
158 /* clear out/free current kmd */
161 krb5_cleanup(pamh, kmd, err);
165 kmd = NULL;
166 } else if (kmd
500 attempt_krb5_auth( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char **krb5_pass, boolean_t verify_tik) argument
998 krb5_module_data_t *kmd = (krb5_module_data_t *)data; local
[all...]
/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/
H A Dkmem.c2657 kmem_log_data_t *kmd)
2660 kmem_log_cpu_t *kmc = kmd->kmd_cpu;
2668 if (kmd->kmd_addr) {
2680 if (kmd->kmd_addr < (uintptr_t)b->bc_addr ||
2681 kmd->kmd_addr >= (uintptr_t)b->bc_addr + bufsize)
2708 kmem_log_data_t kmd; local
2753 kmd.kmd_addr = NULL;
2754 kmd.kmd_cpu = kmc;
2786 kmd.kmd_addr = addr;
2794 (void) kmem_log_walk(addr, &b, &kmd);
2656 kmem_log_walk(uintptr_t addr, const kmem_bufctl_audit_t *b, kmem_log_data_t *kmd) argument
[all...]
/illumos-gate/usr/src/uts/common/os/
H A Dkmem.c4055 kmem_reset_reclaim_threshold(kmem_defrag_t *kmd) argument
4057 kmd->kmd_reclaim_numer = 1;
4069 kmem_adjust_reclaim_threshold(kmem_defrag_t *kmd, int direction) argument
4073 if (kmd->kmd_reclaim_numer < (KMEM_VOID_FRACTION - 1)) {
4074 kmd->kmd_reclaim_numer++;
4078 if (kmd->kmd_reclaim_numer > 1) {
4079 kmd->kmd_reclaim_numer--;
5523 kmem_defrag_t *kmd; local
5529 kmd = cp->cache_defrag;
5530 if (kmd
[all...]

Completed in 110 milliseconds