/illumos-gate/usr/src/lib/nametoaddr/straddr/common/ |
H A D | straddr.c | 184 char *nexttok; /* next token to process */ 402 * searchhost() looks for the specified token in the host file. 403 * The "field" parameter signifies which field to compare the token 404 * on, and returns all comma separated values associated with the token. 408 searchhost(struct netconfig *netconfigp, char *token, int field, char *hostbuf) argument 412 char *fileaddr; /* the first token in each line */ 413 char *filehost; /* the second token in each line */ 414 char *cmpstr; /* the string to compare token to */ 416 char *nexttok; /* next token to process */ 428 if ((strcmp(token, HOST_SELF_BIN 515 searchserv(struct netconfig *netconfigp, char *token, int field, char *servname) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSlotManager.c | 194 * Called from meta_Initialize. Searches for the "object token," which is used 195 * for storing token objects and loging into. 201 * will be used for the match. All token and slot values defined system-wide 284 unsigned char *token; local 300 token = metaslot_config.keystore_token; 301 token_str_len = strlen((char *)token); 302 (void) memset(token + token_str_len, ' ', 309 if (strncmp((char *)token, (char *)tokeninfo.label, 331 * it is never cleared. The token could 335 * when a token change [all...] |
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/ |
H A D | pkg.c | 140 char *token; local 145 token = strtok(tmpbuf, ":"); 146 token = strtok(NULL, ": \t\n"); 147 pkgver = topo_mod_strdup(mp, token); 149 token = strtok(tmpbuf, ":"); 150 token = strtok(NULL, ": \t\n"); 151 pkgdir = topo_mod_strdup(mp, token);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | context_establish.c | 150 * Generate an accept token for a context and channel binding puting the 151 * generated token output. 158 gss_buffer_t output /* The accept token */) 160 dh_token_desc token; local 161 /* Grap a pointer to the context_t part of the token */ 162 dh_cntx_t accept = &token.ver.dh_version_u. 168 token.ver.verno = ctx->proto_version; 169 /* Set the token type to be an ACCEPT token. */ 170 token 256 establish_session_keys(dh_context_t dhctx, const char *remote, dh_key_set_t keys, dh_signature_t sig, dh_token_t token) argument 374 dh_token_desc token; local 593 dh_token_desc token; /* Unserialed token */ local 801 continue_context(OM_uint32 *minor, gss_buffer_t token, dh_gss_context_t dh_gss_ctx, gss_channel_bindings_t channel) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 164 char **tprinc, *ptr, *token, *t_host = NULL, *realm; local 185 token = localname; 191 if ((ptr = strchr(token, '.')) != NULL) 193 for (ptr = token; *ptr; ptr++) 200 t_len = snprintf(NULL, 0, "host/%.*s.%s@%s", HOST_TRUNC, token, domain, 206 (void) snprintf(t_host, t_len, "host/%.*s.%s@%s", HOST_TRUNC, token,
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 304 gss_buffer_desc token; local 345 token.value = 0; 378 /* verify the token's integrity, and leave the token in ap_req. 800 "initial context token with delegation, %d extra bytes\n", 813 "initial context token, delegation flag but too small\n"); 817 "initial context token, %d extra bytes\n", 1071 /* the reply token hasn't been sent yet, but that's ok. */ 1075 token.length = g_token_size(mech_used, ap_rep.length); 1077 if ((token [all...] |
/illumos-gate/usr/src/lib/libshare/common/ |
H A D | plugin.c | 372 sa_proto_valid_space(char *proto, char *token) argument 378 ret = ops->sa_valid_space(token); 400 * sa_proto_security_prop(proto, token) 402 * Check to see if the property name in token is a valid named 407 sa_proto_security_prop(char *proto, char *token) argument 413 ret = ops->sa_security_prop(token);
|
/illumos-gate/usr/src/lib/libsldap/common/ |
H A D | ns_sasl.c | 313 char buf[MSGSIZE], *conf = NULL, *token = NULL, *last = NULL; local 332 token = strtok_r(conf, " ", &last); 333 while (token != NULL) { 334 if (strncmp(token, "dns", 3) == 0) { 354 } else if (strncmp(token, "ldap", 4) == 0) { 357 /* next token */ 358 token = strtok_r(NULL, " ", &last);
|
/illumos-gate/usr/src/lib/libsqlite/src/ |
H A D | tokenize.c | 155 ** keyword. If it is a keyword, the token code of that keyword is 218 ** Return the length of the token that begins at z[0]. 219 ** Store the token type in *tokenType before returning. 439 sqliteSetNString(pzErrMsg, "unrecognized token: \"", -1, 553 ** (7) tkOTHER Any other SQL token. 559 u8 token; /* Value of the next token */ local 562 ** according to what token is seen. trans[state][token] returns the 580 token [all...] |
/illumos-gate/usr/src/lib/libtsol/common/ |
H A D | getpathbylabel.c | 264 char *token; local 275 if ((token = strtok_r(mntopts, ",", &lasts)) != NULL) { 276 if (strcmp(token, zonematch) == 0) { 278 } else while ((token = strtok_r(NULL, ",", 280 if (strcmp(token, zonematch) == 0) {
|
/illumos-gate/usr/src/lib/libpp/common/ |
H A D | ppop.c | 111 int token; local 163 switch (token = pplex()) 178 if (!token) 180 pathcanon(pp.token, 0); 181 fp = ppsetfile(pp.token); 193 index = token == T_HEADER ? INC_STANDARD : INC_LOCAL; 203 if (streq(pp.token, "all")) 208 else if (streq(pp.token, "hosted")) 213 else if (streq(pp.token, "nohosted")) 220 error(3, "%s unexpected in %s map list", pptokstr(pp.token, [all...] |
/illumos-gate/usr/src/lib/libbsm/ |
H A D | auditxml.pm | 60 $tokenId = $internal->getAttr('token'); 501 %token = (); # token name => $objRef 502 @token = (); # token id 519 register('token', 0, \&token); 592 @token = sort @token; 620 return $token{ 754 sub token { subroutine [all...] |
/illumos-gate/usr/src/cmd/powertop/common/ |
H A D | cpufreq.c | 169 char *s, *token, *prog_ptr; local 204 for (token = strtok(s, ":"), s = NULL; 205 token != NULL && g_npstates < NSTATES; 206 token = strtok(NULL, ":")) { 208 state->speed = HZ2MHZ(atoll(token)); 219 if (token != NULL)
|
/illumos-gate/usr/src/cmd/rpcgen/ |
H A D | rpc_scan.h | 98 * a token 100 struct token { struct 104 typedef struct token token; typedef in typeref:struct:token 109 extern void scan(tok_kind, token *); 110 extern void scan2(tok_kind, tok_kind, token *); 111 extern void scan3(tok_kind, tok_kind, tok_kind, token *); 112 extern void scan_num(token *); 113 extern void peek(token *); 114 extern int peekscan(tok_kind, token *); [all...] |
/illumos-gate/usr/src/cmd/abi/spectrans/parser/ |
H A D | parser.h | 62 int token; member in struct:__anon1 124 extern int xlator_start_if(const Meta_info meta_info, const int token, 126 extern int xlator_take_kvpair(const Meta_info, const int token, char *value);
|
/illumos-gate/usr/src/cmd/abi/spectrans/spec2map/ |
H A D | versions.c | 176 char *token = currtok(); local 178 if (token == NULL || *token != '#') { 181 /* Swallow token. */ 182 token = nexttok(); 190 char *token = currtok(); local 193 errlog(VERBOSE, "token = '%s';", 194 token ? token : "<NULL>"); 196 if (token 241 char *token = currtok(); local 268 char *token = currtok(); local 389 char *token = currtok(); local 469 char *token = currtok(); local 494 char *token = currtok(); local [all...] |
/illumos-gate/usr/src/cmd/allocate/ |
H A D | add_allocatable.c | 315 verify_label(char *token, char *progname) argument 320 if ((strstr(token, DAOPT_MINLABEL) == NULL) && 321 (strstr(token, DAOPT_MAXLABEL) == NULL)) { 325 if ((val = strchr(token, '=')) == NULL)
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | delete.c | 28 * This file implements the token object delete operation for this tool. 30 * and cleans up. User must be R/W logged into the token. 225 char *token, int oclass, char *objlabel, 256 if (token && strlen(token)) { 258 token, strlen(token)); 316 char *token, char *objlabel, 366 if (token != NULL) { 368 KMF_TOKEN_LABEL_ATTR, token, 224 delete_nss_keys(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument 314 delete_nss_certs(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 379 delete_nss_crl(void *kmfhandle, char *dir, char *prefix, char *token, char *issuer, char *subject) argument 418 delete_pk11_keys(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument 521 delete_pk11_certs(KMF_HANDLE_T kmfhandle, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument [all...] |
H A D | export.c | 27 * The basic flow of the process is to find the soft token, 28 * log into it, find the PKCS#11 objects in the soft token 438 pk_export_pk11_keys(KMF_HANDLE_T kmfhandle, char *token, argument 457 rv = select_token(kmfhandle, token, TRUE); 700 "k:(keystore)y:(objtype)T:(token)" 720 case 'T': /* token specifier */ 865 * 1. When accessing PKCS11 token
|
H A D | gencert.c | 47 char *token, char *subject, char *altname, 89 /* Select a PKCS11 token */ 90 kmfrv = select_token(kmfhandle, token, FALSE); 98 kmfrv = genkeypair_pkcs11(kmfhandle, token, certlabel, 197 * the key pair from the token. 409 char *token, char *subject, char *altname, 429 if (token == NULL) 430 token = DEFAULT_NSS_TOKEN; 455 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir, 552 if (token ! 46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument 408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument [all...] |
H A D | gencsr.c | 47 char *token, char *subject, char *altname, 72 /* Select a PKCS11 token */ 73 kmfrv = select_token(kmfhandle, token, FALSE); 79 kmfrv = genkeypair_pkcs11(kmfhandle, token, certlabel, 140 * from the token. 262 char *token, char *subject, char *altname, 281 if (token == NULL) 282 token = DEFAULT_NSS_TOKEN; 298 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir, 353 if (token 46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument 261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument [all...] |
H A D | list.c | 27 * This file implements the token object list operation for this tool. 29 * and cleans up. User must be logged into the token to list private 303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, argument 327 rv = select_token(kmfhandle, token, 334 rv = token_auth_needed(kmfhandle, token, &auth); 421 (void) get_token_password(kstype, token, &cred); 451 (void) get_token_password(kstype, token, &cred); 895 * List token object. 923 "k:(keystore)t:(objtype)T:(token)d:(dir)" 972 case 'T': /* token specifie [all...] |
/illumos-gate/usr/src/cmd/sgs/m4/common/ |
H A D | m4ext.c | 58 /* token storage */ 59 wchar_t *token; /* buffer */ variable
|
/illumos-gate/usr/src/cmd/latencytop/common/ |
H A D | latencytop.c | 214 char *token = NULL; local 292 for (token = strtok(optarg, ","); token != NULL; 293 token = strtok(NULL, ",")) { 296 if (strncmp(token, "no", 2) == 0) { 298 token = &token[2]; 301 if (CMPOPT(token, "filter") == 0) { 309 } else if (CMPOPT(token, "sched") == 0) { 317 } else if (CMPOPT(token, "sob [all...] |
/illumos-gate/usr/src/cmd/ldmad/ |
H A D | ldma_system.c | 164 uint64_t token; local 170 status = pri_get(PRI_GET, &token, &buf, malloc, ldma_md_free);
|