/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | url.c | 66 int enclosed, secure; local 69 && skip_url_prefix( &url, &enclosed, &secure )); 186 int enclosed, secure, i, nattrs, at_start; local 196 if ( !skip_url_prefix( &url, &enclosed, &secure )) { 206 if ( secure ) {
|
H A D | request.c | 645 sprintf( msg, "* host: %s port: %d secure: %s%s\n", 951 int rc, tmprc, secure, msgid; local 967 secure = (( ludp->lud_options & LDAP_URL_OPT_SECURE ) != 0 ); 969 /* XXXmcs: can't tell if secure is supported by connect callback */ 970 if ( secure && ld->ld_extconnect_fn == NULL ) { 979 secure ? "S" : "", desc, refurl ); 1039 srv->lsrv_port = (secure) ? LDAPS_PORT : LDAP_PORT; 1051 if ( secure ) {
|
H A D | os-ip.c | 157 static LBER_SOCKET nsldapi_os_socket( LDAP *ld, int secure, int domain, 166 typedef LBER_SOCKET (NSLDAPI_SOCKET_FN)( LDAP *ld, int secure, int domain, 176 int secure, NSLDAPI_SOCKET_FN *socketfn, NSLDAPI_IOCTL_FN *ioctlfn, 196 nsldapi_os_socket( LDAP *ld, int secure, int domain, int type, int protocol ) argument 201 if ( secure ) { 204 "secure mode not supported") )); 467 int defport, int secure, char **krbinstancep ) 488 if ( secure ) { 503 defport, secure, nsldapi_os_socket, 538 int defport, int secure, NSLDAPI_SOCKET_F 466 nsldapi_connect_to_host( LDAP *ld, Sockbuf *sb, const char *hostlist, int defport, int secure, char **krbinstancep ) argument 537 nsldapi_try_each_host( LDAP *ld, const char *hostlist, int defport, int secure, NSLDAPI_SOCKET_FN *socketfn, NSLDAPI_IOCTL_FN *ioctlfn, NSLDAPI_CONNECT_WITH_TO_FN *connectwithtofn, NSLDAPI_CONNECT_FN *connectfn, NSLDAPI_CLOSE_FN *closefn ) argument 1616 nsldapi_compat_socket( LDAP *ld, int secure, int domain, int type, int protocol ) argument 1676 int s, secure; local [all...] |
/illumos-gate/usr/src/cmd/eeprom/sparc/ |
H A D | openprom.c | 416 int secure; local 427 secure = strcmp(opp2->oprom_array, "none"); 444 if (! secure) { 460 if (secure) { 479 * We must be in a secure mode in order to do this. 485 int secure; local 496 secure = strcmp(opp2->oprom_array, "none"); 498 if (!secure) { 499 (void) printf("Not in secure mode\n");
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/os/ |
H A D | init_os_ctx.c | 199 * because it needs to be able to specify "secure" */ 201 os_get_default_config_files(profile_filespec_t **pfiles, krb5_boolean secure) argument 208 if (!secure) 218 if (!name && !secure) 230 if (!name && !secure) 259 secure = 1; 261 if (secure) { 335 /* Set the profile paths in the context. If secure is set to TRUE 344 krb5_boolean secure = ctx->profile_secure; local 350 retval = os_get_default_config_files(&files, secure); [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | init_ctx.c | 359 init_common (krb5_context *context, krb5_boolean secure, krb5_boolean kdc) argument 418 ctx->profile_secure = secure;
|
/illumos-gate/usr/src/uts/common/inet/sctp/ |
H A D | sctp_hash.c | 536 boolean_t secure; local 547 secure = iraflags & IRAF_IPSEC_SECURE; 580 secure) {
|
H A D | sctp_input.c | 3404 boolean_t secure; local 3410 secure = ira->ira_flags & IRAF_IPSEC_SECURE; 3458 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL) 3490 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL) 3500 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL) 3518 boolean_t secure; local 3525 secure = iraflags & IRAF_IPSEC_SECURE; 3534 secure) {
|
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/ |
H A D | nodes.h | 168 SECURE *secure; member in struct:rstat_node
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/ssldap/ |
H A D | ldapsinit.c | 255 PRBool secure; local 278 * Determine if secure option is set. Also, clear secure bit in options 280 * how to handle the secure option). 283 secure = PR_TRUE; 286 secure = PR_FALSE; 392 if ( SSL_OptionSet( sslfd, SSL_SECURITY, secure ) != SECSuccess || 393 SSL_OptionSet( sslfd, SSL_HANDSHAKE_AS_CLIENT, secure ) 394 != SECSuccess || ( secure && SSL_ResetHandshake( sslfd, 935 int ldapssl_import_fd ( LDAP *ld, int secure ) [all...] |
/illumos-gate/usr/src/cmd/dcs/sparc/sun4u/ |
H A D | rdr_messages.c | 155 int (*secure)(int, int); member in struct:__anon363 1382 if (libdscp.secure(0, fd) != DSCP_OK) { 4539 libdscp->secure = (int (*)(int, int))dlsym(lib, LIBDSCP_SECURE); 4544 (libdscp->secure == NULL) ||
|
/illumos-gate/usr/src/cmd/sgs/rtld/common/ |
H A D | analyze.c | 1091 * preloading or auditing a secure application, it can be a little more helpful 1092 * to indicate that a search of secure directories has failed, so adjust the 1099 int secure = 0; local 1103 secure++; 1114 if (secure) 1132 if (secure) 1879 * If this is a secure application, record any full path name directory
|
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | common.c | 239 static int secure = 0; variable 490 secure = 1; /* do SSL encryption */ 524 secure = 1; 824 if (secure == 1) { 1062 if ( !second_host && secure 1064 /* secure connection requested -- fail if no SSL */ 1074 if (secure) { 1082 if ( !second_host && secure 1084 /* secure connection requested -- fail if no SSL */ 1101 if (secure) { [all...] |
/illumos-gate/usr/src/uts/sun4u/sunfire/io/ |
H A D | sysctrl.c | 3206 "secure position\n", ddi_get_instance(list->dip), 3215 (key == KEY_SECURE) ? "secure" : "not-secure"); 3224 "secure" : "not-secure"); 3237 uint_t secure = 0; local 3242 * if any of the key switch positions are secure, 3249 if (secure++) 3260 if (secure) {
|
/illumos-gate/usr/src/uts/sun4u/tazmo/io/ |
H A D | envctrl.c | 2811 uint8_t secure = 0; local 2829 secure = unitp->encl_kstats[i].value; 2838 if ((secure & ENVCTRL_FSP_KEYMASK) == ENVCTRL_FSP_KEYLOCKED) {
|
/illumos-gate/usr/src/uts/sun4u/javelin/io/ |
H A D | envctrltwo.c | 2231 uint8_t secure = 0; local 2246 secure = unitp->encl_kstats.value; 2248 if ((secure & ENVCTRL_UE250_FSP_KEYMASK) ==
|
/illumos-gate/usr/src/uts/common/inet/ip/ |
H A D | ip6.c | 2401 boolean_t secure; local 2407 secure = ira->ira_flags & IRAF_IPSEC_SECURE; 2417 if (secure || ipss->ipsec_inbound_v6_policy_present) {
|
H A D | ip.c | 427 * happens if the incoming packet is secure. The information initialized 1275 * 2) The client may or may not expect things to come in secure. 1276 * If it comes in secure, the policy constraints are checked 1324 * should be accepted in clear when the Upper layer expects secure. 2019 * If the packet that caused the ICMP error is secure, we send 2049 * ROUTER : IFN could be secure or non-secure. 4829 boolean_t secure; local 4835 secure = ira->ira_flags & IRAF_IPSEC_SECURE; 4845 if (secure || ips 4929 boolean_t secure; local 5209 boolean_t secure; local 14297 boolean_t secure; local [all...] |
H A D | spd.c | 1024 boolean_t secure, netstack_t *ns) 1049 (secure ? "secure" : "not secure"), s, d); 2231 * to accept in clear. If it is secure, it is the job 2236 * where ULP accepts only secure data and the incoming 2318 * client expects secure. If somebody is replying 2321 * With global policy we might be just expecting secure 2356 * intermediate router sending in-secure ICMP 4188 * should go out secure 1023 ipsec_log_policy_failure(int type, char *func_name, ipha_t *ipha, ip6_t *ip6h, boolean_t secure, netstack_t *ns) argument [all...] |