Searched defs:token (Results 51 - 75 of 258) sorted by relevance

1234567891011

/illumos-gate/usr/src/lib/nametoaddr/straddr/common/
H A Dstraddr.c184 char *nexttok; /* next token to process */
402 * searchhost() looks for the specified token in the host file.
403 * The "field" parameter signifies which field to compare the token
404 * on, and returns all comma separated values associated with the token.
408 searchhost(struct netconfig *netconfigp, char *token, int field, char *hostbuf) argument
412 char *fileaddr; /* the first token in each line */
413 char *filehost; /* the second token in each line */
414 char *cmpstr; /* the string to compare token to */
416 char *nexttok; /* next token to process */
428 if ((strcmp(token, HOST_SELF_BIN
515 searchserv(struct netconfig *netconfigp, char *token, int field, char *servname) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaSlotManager.c194 * Called from meta_Initialize. Searches for the "object token," which is used
195 * for storing token objects and loging into.
201 * will be used for the match. All token and slot values defined system-wide
284 unsigned char *token; local
300 token = metaslot_config.keystore_token;
301 token_str_len = strlen((char *)token);
302 (void) memset(token + token_str_len, ' ',
309 if (strncmp((char *)token, (char *)tokeninfo.label,
331 * it is never cleared. The token could
335 * when a token change
[all...]
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/
H A Dpkg.c140 char *token; local
145 token = strtok(tmpbuf, ":");
146 token = strtok(NULL, ": \t\n");
147 pkgver = topo_mod_strdup(mp, token);
149 token = strtok(tmpbuf, ":");
150 token = strtok(NULL, ": \t\n");
151 pkgdir = topo_mod_strdup(mp, token);
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcontext_establish.c150 * Generate an accept token for a context and channel binding puting the
151 * generated token output.
158 gss_buffer_t output /* The accept token */)
160 dh_token_desc token; local
161 /* Grap a pointer to the context_t part of the token */
162 dh_cntx_t accept = &token.ver.dh_version_u.
168 token.ver.verno = ctx->proto_version;
169 /* Set the token type to be an ACCEPT token. */
170 token
256 establish_session_keys(dh_context_t dhctx, const char *remote, dh_key_set_t keys, dh_signature_t sig, dh_token_t token) argument
374 dh_token_desc token; local
593 dh_token_desc token; /* Unserialed token */ local
801 continue_context(OM_uint32 *minor, gss_buffer_t token, dh_gss_context_t dh_gss_ctx, gss_channel_bindings_t channel) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_solaris.c164 char **tprinc, *ptr, *token, *t_host = NULL, *realm; local
185 token = localname;
191 if ((ptr = strchr(token, '.')) != NULL)
193 for (ptr = token; *ptr; ptr++)
200 t_len = snprintf(NULL, 0, "host/%.*s.%s@%s", HOST_TRUNC, token, domain,
206 (void) snprintf(t_host, t_len, "host/%.*s.%s@%s", HOST_TRUNC, token,
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c304 gss_buffer_desc token; local
345 token.value = 0;
378 /* verify the token's integrity, and leave the token in ap_req.
800 "initial context token with delegation, %d extra bytes\n",
813 "initial context token, delegation flag but too small\n");
817 "initial context token, %d extra bytes\n",
1071 /* the reply token hasn't been sent yet, but that's ok. */
1075 token.length = g_token_size(mech_used, ap_rep.length);
1077 if ((token
[all...]
/illumos-gate/usr/src/lib/libshare/common/
H A Dplugin.c372 sa_proto_valid_space(char *proto, char *token) argument
378 ret = ops->sa_valid_space(token);
400 * sa_proto_security_prop(proto, token)
402 * Check to see if the property name in token is a valid named
407 sa_proto_security_prop(char *proto, char *token) argument
413 ret = ops->sa_security_prop(token);
/illumos-gate/usr/src/lib/libsldap/common/
H A Dns_sasl.c313 char buf[MSGSIZE], *conf = NULL, *token = NULL, *last = NULL; local
332 token = strtok_r(conf, " ", &last);
333 while (token != NULL) {
334 if (strncmp(token, "dns", 3) == 0) {
354 } else if (strncmp(token, "ldap", 4) == 0) {
357 /* next token */
358 token = strtok_r(NULL, " ", &last);
/illumos-gate/usr/src/lib/libsqlite/src/
H A Dtokenize.c155 ** keyword. If it is a keyword, the token code of that keyword is
218 ** Return the length of the token that begins at z[0].
219 ** Store the token type in *tokenType before returning.
439 sqliteSetNString(pzErrMsg, "unrecognized token: \"", -1,
553 ** (7) tkOTHER Any other SQL token.
559 u8 token; /* Value of the next token */ local
562 ** according to what token is seen. trans[state][token] returns the
580 token
[all...]
/illumos-gate/usr/src/lib/libtsol/common/
H A Dgetpathbylabel.c264 char *token; local
275 if ((token = strtok_r(mntopts, ",", &lasts)) != NULL) {
276 if (strcmp(token, zonematch) == 0) {
278 } else while ((token = strtok_r(NULL, ",",
280 if (strcmp(token, zonematch) == 0) {
/illumos-gate/usr/src/lib/libpp/common/
H A Dppop.c111 int token; local
163 switch (token = pplex())
178 if (!token)
180 pathcanon(pp.token, 0);
181 fp = ppsetfile(pp.token);
193 index = token == T_HEADER ? INC_STANDARD : INC_LOCAL;
203 if (streq(pp.token, "all"))
208 else if (streq(pp.token, "hosted"))
213 else if (streq(pp.token, "nohosted"))
220 error(3, "%s unexpected in %s map list", pptokstr(pp.token,
[all...]
/illumos-gate/usr/src/lib/libbsm/
H A Dauditxml.pm60 $tokenId = $internal->getAttr('token');
501 %token = (); # token name => $objRef
502 @token = (); # token id
519 register('token', 0, \&token);
592 @token = sort @token;
620 return $token{
754 sub token { subroutine
[all...]
/illumos-gate/usr/src/cmd/powertop/common/
H A Dcpufreq.c169 char *s, *token, *prog_ptr; local
204 for (token = strtok(s, ":"), s = NULL;
205 token != NULL && g_npstates < NSTATES;
206 token = strtok(NULL, ":")) {
208 state->speed = HZ2MHZ(atoll(token));
219 if (token != NULL)
/illumos-gate/usr/src/cmd/rpcgen/
H A Drpc_scan.h98 * a token
100 struct token { struct
104 typedef struct token token; typedef in typeref:struct:token
109 extern void scan(tok_kind, token *);
110 extern void scan2(tok_kind, tok_kind, token *);
111 extern void scan3(tok_kind, tok_kind, tok_kind, token *);
112 extern void scan_num(token *);
113 extern void peek(token *);
114 extern int peekscan(tok_kind, token *);
[all...]
/illumos-gate/usr/src/cmd/abi/spectrans/parser/
H A Dparser.h62 int token; member in struct:__anon1
124 extern int xlator_start_if(const Meta_info meta_info, const int token,
126 extern int xlator_take_kvpair(const Meta_info, const int token, char *value);
/illumos-gate/usr/src/cmd/abi/spectrans/spec2map/
H A Dversions.c176 char *token = currtok(); local
178 if (token == NULL || *token != '#') {
181 /* Swallow token. */
182 token = nexttok();
190 char *token = currtok(); local
193 errlog(VERBOSE, "token = '%s';",
194 token ? token : "<NULL>");
196 if (token
241 char *token = currtok(); local
268 char *token = currtok(); local
389 char *token = currtok(); local
469 char *token = currtok(); local
494 char *token = currtok(); local
[all...]
/illumos-gate/usr/src/cmd/allocate/
H A Dadd_allocatable.c315 verify_label(char *token, char *progname) argument
320 if ((strstr(token, DAOPT_MINLABEL) == NULL) &&
321 (strstr(token, DAOPT_MAXLABEL) == NULL)) {
325 if ((val = strchr(token, '=')) == NULL)
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Ddelete.c28 * This file implements the token object delete operation for this tool.
30 * and cleans up. User must be R/W logged into the token.
225 char *token, int oclass, char *objlabel,
256 if (token && strlen(token)) {
258 token, strlen(token));
316 char *token, char *objlabel,
366 if (token != NULL) {
368 KMF_TOKEN_LABEL_ATTR, token,
224 delete_nss_keys(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument
314 delete_nss_certs(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
379 delete_nss_crl(void *kmfhandle, char *dir, char *prefix, char *token, char *issuer, char *subject) argument
418 delete_pk11_keys(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument
521 delete_pk11_certs(KMF_HANDLE_T kmfhandle, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
[all...]
H A Dexport.c27 * The basic flow of the process is to find the soft token,
28 * log into it, find the PKCS#11 objects in the soft token
438 pk_export_pk11_keys(KMF_HANDLE_T kmfhandle, char *token, argument
457 rv = select_token(kmfhandle, token, TRUE);
700 "k:(keystore)y:(objtype)T:(token)"
720 case 'T': /* token specifier */
865 * 1. When accessing PKCS11 token
H A Dgencert.c47 char *token, char *subject, char *altname,
89 /* Select a PKCS11 token */
90 kmfrv = select_token(kmfhandle, token, FALSE);
98 kmfrv = genkeypair_pkcs11(kmfhandle, token, certlabel,
197 * the key pair from the token.
409 char *token, char *subject, char *altname,
429 if (token == NULL)
430 token = DEFAULT_NSS_TOKEN;
455 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir,
552 if (token !
46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
[all...]
H A Dgencsr.c47 char *token, char *subject, char *altname,
72 /* Select a PKCS11 token */
73 kmfrv = select_token(kmfhandle, token, FALSE);
79 kmfrv = genkeypair_pkcs11(kmfhandle, token, certlabel,
140 * from the token.
262 char *token, char *subject, char *altname,
281 if (token == NULL)
282 token = DEFAULT_NSS_TOKEN;
298 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir,
353 if (token
46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
[all...]
H A Dlist.c27 * This file implements the token object list operation for this tool.
29 * and cleans up. User must be logged into the token to list private
303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, argument
327 rv = select_token(kmfhandle, token,
334 rv = token_auth_needed(kmfhandle, token, &auth);
421 (void) get_token_password(kstype, token, &cred);
451 (void) get_token_password(kstype, token, &cred);
895 * List token object.
923 "k:(keystore)t:(objtype)T:(token)d:(dir)"
972 case 'T': /* token specifie
[all...]
/illumos-gate/usr/src/cmd/sgs/m4/common/
H A Dm4ext.c58 /* token storage */
59 wchar_t *token; /* buffer */ variable
/illumos-gate/usr/src/cmd/latencytop/common/
H A Dlatencytop.c214 char *token = NULL; local
292 for (token = strtok(optarg, ","); token != NULL;
293 token = strtok(NULL, ",")) {
296 if (strncmp(token, "no", 2) == 0) {
298 token = &token[2];
301 if (CMPOPT(token, "filter") == 0) {
309 } else if (CMPOPT(token, "sched") == 0) {
317 } else if (CMPOPT(token, "sob
[all...]
/illumos-gate/usr/src/cmd/ldmad/
H A Dldma_system.c164 uint64_t token; local
170 status = pri_get(PRI_GET, &token, &buf, malloc, ldma_md_free);

Completed in 148 milliseconds

1234567891011