Searched defs:secure (Results 1 - 19 of 19) sorted by relevance

/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Durl.c66 int enclosed, secure; local
69 && skip_url_prefix( &url, &enclosed, &secure ));
186 int enclosed, secure, i, nattrs, at_start; local
196 if ( !skip_url_prefix( &url, &enclosed, &secure )) {
206 if ( secure ) {
H A Drequest.c645 sprintf( msg, "* host: %s port: %d secure: %s%s\n",
951 int rc, tmprc, secure, msgid; local
967 secure = (( ludp->lud_options & LDAP_URL_OPT_SECURE ) != 0 );
969 /* XXXmcs: can't tell if secure is supported by connect callback */
970 if ( secure && ld->ld_extconnect_fn == NULL ) {
979 secure ? "S" : "", desc, refurl );
1039 srv->lsrv_port = (secure) ? LDAPS_PORT : LDAP_PORT;
1051 if ( secure ) {
H A Dos-ip.c157 static LBER_SOCKET nsldapi_os_socket( LDAP *ld, int secure, int domain,
166 typedef LBER_SOCKET (NSLDAPI_SOCKET_FN)( LDAP *ld, int secure, int domain,
176 int secure, NSLDAPI_SOCKET_FN *socketfn, NSLDAPI_IOCTL_FN *ioctlfn,
196 nsldapi_os_socket( LDAP *ld, int secure, int domain, int type, int protocol ) argument
201 if ( secure ) {
204 "secure mode not supported") ));
467 int defport, int secure, char **krbinstancep )
488 if ( secure ) {
503 defport, secure, nsldapi_os_socket,
538 int defport, int secure, NSLDAPI_SOCKET_F
466 nsldapi_connect_to_host( LDAP *ld, Sockbuf *sb, const char *hostlist, int defport, int secure, char **krbinstancep ) argument
537 nsldapi_try_each_host( LDAP *ld, const char *hostlist, int defport, int secure, NSLDAPI_SOCKET_FN *socketfn, NSLDAPI_IOCTL_FN *ioctlfn, NSLDAPI_CONNECT_WITH_TO_FN *connectwithtofn, NSLDAPI_CONNECT_FN *connectfn, NSLDAPI_CLOSE_FN *closefn ) argument
1616 nsldapi_compat_socket( LDAP *ld, int secure, int domain, int type, int protocol ) argument
1676 int s, secure; local
[all...]
/illumos-gate/usr/src/cmd/eeprom/sparc/
H A Dopenprom.c416 int secure; local
427 secure = strcmp(opp2->oprom_array, "none");
444 if (! secure) {
460 if (secure) {
479 * We must be in a secure mode in order to do this.
485 int secure; local
496 secure = strcmp(opp2->oprom_array, "none");
498 if (!secure) {
499 (void) printf("Not in secure mode\n");
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/os/
H A Dinit_os_ctx.c199 * because it needs to be able to specify "secure" */
201 os_get_default_config_files(profile_filespec_t **pfiles, krb5_boolean secure) argument
208 if (!secure)
218 if (!name && !secure)
230 if (!name && !secure)
259 secure = 1;
261 if (secure) {
335 /* Set the profile paths in the context. If secure is set to TRUE
344 krb5_boolean secure = ctx->profile_secure; local
350 retval = os_get_default_config_files(&files, secure);
[all...]
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dinit_ctx.c359 init_common (krb5_context *context, krb5_boolean secure, krb5_boolean kdc) argument
418 ctx->profile_secure = secure;
/illumos-gate/usr/src/uts/common/inet/sctp/
H A Dsctp_hash.c536 boolean_t secure; local
547 secure = iraflags & IRAF_IPSEC_SECURE;
580 secure) {
H A Dsctp_input.c3404 boolean_t secure; local
3410 secure = ira->ira_flags & IRAF_IPSEC_SECURE;
3458 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL)
3490 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL)
3500 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL)
3518 boolean_t secure; local
3525 secure = iraflags & IRAF_IPSEC_SECURE;
3534 secure) {
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/
H A Dnodes.h168 SECURE *secure; member in struct:rstat_node
/illumos-gate/usr/src/lib/libldap5/sources/ldap/ssldap/
H A Dldapsinit.c255 PRBool secure; local
278 * Determine if secure option is set. Also, clear secure bit in options
280 * how to handle the secure option).
283 secure = PR_TRUE;
286 secure = PR_FALSE;
392 if ( SSL_OptionSet( sslfd, SSL_SECURITY, secure ) != SECSuccess ||
393 SSL_OptionSet( sslfd, SSL_HANDSHAKE_AS_CLIENT, secure )
394 != SECSuccess || ( secure && SSL_ResetHandshake( sslfd,
935 int ldapssl_import_fd ( LDAP *ld, int secure )
[all...]
/illumos-gate/usr/src/cmd/dcs/sparc/sun4u/
H A Drdr_messages.c155 int (*secure)(int, int); member in struct:__anon363
1382 if (libdscp.secure(0, fd) != DSCP_OK) {
4539 libdscp->secure = (int (*)(int, int))dlsym(lib, LIBDSCP_SECURE);
4544 (libdscp->secure == NULL) ||
/illumos-gate/usr/src/cmd/sgs/rtld/common/
H A Danalyze.c1091 * preloading or auditing a secure application, it can be a little more helpful
1092 * to indicate that a search of secure directories has failed, so adjust the
1099 int secure = 0; local
1103 secure++;
1114 if (secure)
1132 if (secure)
1879 * If this is a secure application, record any full path name directory
/illumos-gate/usr/src/cmd/ldap/common/
H A Dcommon.c239 static int secure = 0; variable
490 secure = 1; /* do SSL encryption */
524 secure = 1;
824 if (secure == 1) {
1062 if ( !second_host && secure
1064 /* secure connection requested -- fail if no SSL */
1074 if (secure) {
1082 if ( !second_host && secure
1084 /* secure connection requested -- fail if no SSL */
1101 if (secure) {
[all...]
/illumos-gate/usr/src/uts/sun4u/sunfire/io/
H A Dsysctrl.c3206 "secure position\n", ddi_get_instance(list->dip),
3215 (key == KEY_SECURE) ? "secure" : "not-secure");
3224 "secure" : "not-secure");
3237 uint_t secure = 0; local
3242 * if any of the key switch positions are secure,
3249 if (secure++)
3260 if (secure) {
/illumos-gate/usr/src/uts/sun4u/tazmo/io/
H A Denvctrl.c2811 uint8_t secure = 0; local
2829 secure = unitp->encl_kstats[i].value;
2838 if ((secure & ENVCTRL_FSP_KEYMASK) == ENVCTRL_FSP_KEYLOCKED) {
/illumos-gate/usr/src/uts/sun4u/javelin/io/
H A Denvctrltwo.c2231 uint8_t secure = 0; local
2246 secure = unitp->encl_kstats.value;
2248 if ((secure & ENVCTRL_UE250_FSP_KEYMASK) ==
/illumos-gate/usr/src/uts/common/inet/ip/
H A Dip6.c2401 boolean_t secure; local
2407 secure = ira->ira_flags & IRAF_IPSEC_SECURE;
2417 if (secure || ipss->ipsec_inbound_v6_policy_present) {
H A Dip.c427 * happens if the incoming packet is secure. The information initialized
1275 * 2) The client may or may not expect things to come in secure.
1276 * If it comes in secure, the policy constraints are checked
1324 * should be accepted in clear when the Upper layer expects secure.
2019 * If the packet that caused the ICMP error is secure, we send
2049 * ROUTER : IFN could be secure or non-secure.
4829 boolean_t secure; local
4835 secure = ira->ira_flags & IRAF_IPSEC_SECURE;
4845 if (secure || ips
4929 boolean_t secure; local
5209 boolean_t secure; local
14297 boolean_t secure; local
[all...]
H A Dspd.c1024 boolean_t secure, netstack_t *ns)
1049 (secure ? "secure" : "not secure"), s, d);
2231 * to accept in clear. If it is secure, it is the job
2236 * where ULP accepts only secure data and the incoming
2318 * client expects secure. If somebody is replying
2321 * With global policy we might be just expecting secure
2356 * intermediate router sending in-secure ICMP
4188 * should go out secure
1023 ipsec_log_policy_failure(int type, char *func_name, ipha_t *ipha, ip6_t *ip6h, boolean_t secure, netstack_t *ns) argument
[all...]

Completed in 141 milliseconds