Searched defs:token (Results 76 - 100 of 258) sorted by relevance

1234567891011

/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dk5sealv3.c89 gss_buffer_t token,
212 /* Now that we know we're returning a valid token.... */
226 what goes into the output token. They may be the same, or
275 /* Fill in the output token -- data contents, if any, and
301 /* Now that we know we're actually generating the token... */
324 * No token should be generated for context deletion. Just
333 token->value = outbuf;
334 token->length = bufsize;
339 token->value = NULL;
340 token
86 gss_krb5int_make_seal_token_v3(krb5_context context, krb5_gss_ctx_id_rec *ctx, const gss_buffer_desc * message, gss_buffer_t token, int conf_req_flag, int toktype) argument
[all...]
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs_common.c356 static char token[10]; local
382 name = token;
384 getfsname("root", name, sizeof (token));
/illumos-gate/usr/src/tools/cscope-fast/
H A Dcrossref.c84 int token; /* current token */ local
106 /* get the next token */
107 switch (token = yylex()) {
112 token != INCLUDE && token != NEWFILE) {
116 /* see if the token has a symbol */
118 savesymbol(token);
126 (token == IDENT ||
127 token
164 savesymbol(int token) argument
[all...]
/illumos-gate/usr/src/uts/common/inet/ipf/
H A Dip_auth.c379 ipftoken_t *token; local
386 token = ipf_findtoken(IPFGENITER_AUTH, uid, ctx, ifs);
387 if (token != NULL)
388 error = fr_authgeniter(token, &iter, ifs);
856 /* Parameters: token(I) - pointer to ipftoken structure */
860 int fr_authgeniter(token, itp, ifs)
861 ipftoken_t *token;
877 * Retrieve "previous" entry from token and find the next entry.
879 fae = token->ipt_data;
887 * If we found an entry, add reference to it and update token
[all...]
/illumos-gate/usr/src/uts/common/io/usb/usba/
H A Dusba_devdb.c113 * returns the field from the token
140 token_t token; local
155 token = kobj_lex(file, tokval, sizeof (tokval));
156 while ((token != EOF) && (token != SEMICOLON)) {
157 switch (token) {
283 token = kobj_lex(file, tokval, sizeof (tokval));
287 return (token);
484 token_t token; local
494 token
[all...]
/illumos-gate/usr/src/uts/intel/io/acpica/
H A Dmaster_ops.c165 mftoken_t token = MF_UNEXPECTED; local
168 return (token); /* MF_UNEXPECTED */
187 token = MF_EOF;
191 token = MF_NEWLINE;
194 token = MF_EQUALS;
197 token = MF_BIT_OR;
216 token = MF_UNEXPECTED;
223 token = MF_STRING;
228 token = MF_UNEXPECTED;
232 token
262 mftoken_t token; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_logon.c83 smb_decode_krb5_pac(smb_token_t *token, char *data, uint_t len) argument
104 status = netr_setup_token_info3(&info.info3, token);
121 smb_token_t *token)
127 token->tkn_user.i_sid = smb_sid_splice(domsid,
129 if (token->tkn_user.i_sid == NULL)
132 token->tkn_primary_grp.i_sid = smb_sid_splice(domsid,
134 if (token->tkn_primary_grp.i_sid == NULL)
138 token->tkn_account_name =
140 if (token->tkn_account_name == NULL)
145 token
120 netr_setup_token_info3(struct netr_validation_info3 *info3, smb_token_t *token) argument
181 smb_logon_domain(smb_logon_t *user_info, smb_token_t *token) argument
227 netlogon_logon(smb_logon_t *user_info, smb_token_t *token) argument
285 netr_setup_token(struct netr_validation_info3 *info3, smb_logon_t *user_info, netr_info_t *netr_info, smb_token_t *token) argument
375 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_logon_t *user_info, smb_token_t *token) argument
723 netr_setup_token_wingrps(struct netr_validation_info3 *info3, smb_token_t *token) argument
[all...]
H A Dsmb_autohome.c77 smb_autohome_add(const smb_token_t *token) argument
86 if (token->tkn_flags & SMB_ATF_ANON)
89 uid = token->tkn_user.i_id;
90 gid = token->tkn_primary_grp.i_id;
93 username = token->tkn_account_name;
326 * whitespace is compressed to simplify the token parsing,
H A Deventlog_log.c142 char *token; local
148 if ((token = argv[LOGR_PRI_FAC]) == NULL)
154 if (strstr(token, entry->p_name) != NULL) {
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_authenticate.c56 * If smbd can authenticate the user an access token is returned and we
57 * generate a cred and new user based on the token.
94 * Get the final auth. token.
312 * Get the final auth. token.
379 * send us the authentication token.
387 smb_token_t *token = NULL; local
427 token = kmem_zalloc(sizeof (smb_token_t), KM_SLEEP);
428 ok = smb_token_xdr(&xdrs, token);
440 cr = smb_cred_create(token);
443 privileges = smb_priv_xlate(token);
483 smb_token_free(smb_token_t *token) argument
495 smb_priv_xlate(smb_token_t *token) argument
[all...]
H A Dsmb_signing.c123 smb_sign_begin(smb_request_t *sr, smb_token_t *token) argument
137 if (token->tkn_ssnkey.val == NULL || token->tkn_ssnkey.len == 0)
177 sign->mackey_len = token->tkn_ssnkey.len + sinfo->ssi_ntpwlen;
179 bcopy(token->tkn_ssnkey.val, sign->mackey, token->tkn_ssnkey.len);
181 bcopy(sinfo->ssi_ntpwd, sign->mackey + token->tkn_ssnkey.len,
/illumos-gate/usr/src/common/elfcap/
H A Delfcap.c346 * Concatenate a token to the string buffer. This can be a capabilities token
347 * or a separator token.
350 token(char **ostr, size_t *olen, const elfcap_str_t *nstr) function
403 if (follow++ && ((err = token(&str, &slen,
410 if ((err = token(&str, &slen, nstr)) != ELFCAP_ERR_NONE)
421 if (follow && ((err = token(&str, &slen, &format[fmt])) !=
/illumos-gate/usr/src/cmd/iconv/
H A Dscanner.c47 static char *token = NULL; variable
59 static struct token { struct
83 static struct token symwords[] = {
236 if ((token = realloc(token, toksz)) == NULL) {
244 token[tokidx++] = (char)c;
245 token[tokidx] = 0;
361 * This restarts the token from the beginning
363 * token is complete.)
366 if (token
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.c210 * msg and a token. It signs it using the supplied cipher_proc and stores
232 /* Digest the supplied token */
348 * __mk_sig: Generate a signature using a given qop over a token of a
355 char *tok, /* The token to sign */
374 /* Package the token for use in a verifier_proc */
390 * as the token verifier
393 __verify_sig(dh_token_t token, /* The token to be verified */ argument
396 dh_signature_t sig /* The signature from the serialized token */)
419 if (__cmpsig(sig, &token
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dummy/mech/
H A Ddmech.c98 static void free_dummy_token(dummy_token_t *token);
415 /* Check for defective input token. */
447 * tells us whether to return a token or not.
528 /* Make the length to 0, so the output token is not sent to peer */
617 /* Check for defective input token. */
964 /* Should I add the token structure to deal with import/export */
965 /* of sec_context. For now, I just create dummy interprocess token, and when */
968 /* from interprocess token. it can be done because the sec context in dummy */
1000 /* Assume that we got ctx from the interprocess token. */
1204 dummy_token_t token; local
1212 free_dummy_token(dummy_token_t *token) argument
[all...]
/illumos-gate/usr/src/lib/libsip/common/
H A Dsip_parse_generic.c69 * Find the 'token'
72 sip_find_token(_sip_header_t *sip_header, char token) argument
75 if (token != SIP_COMMA &&
80 if (*sip_header->sip_hdr_current++ == token) {
83 * after the token
/illumos-gate/usr/src/lib/libcryptoutil/common/
H A Dcryptoutil.h161 CK_UTF8CHAR_PTR token; member in struct:pkcs11_uri_t
172 * Location of the file with a token PIN. Application can overload this,
/illumos-gate/usr/src/lib/libelfsign/common/
H A Delfcertlib.c386 * elfcertlib_loadtokenkey - Load the private key from token
514 * rely on the token for hashing.
680 * set the token device
683 elfcertlib_settoken(ELFsign_t ess, char *token) argument
699 KMF_TOKEN_LABEL_ATTR, token, strlen(token));
705 cryptoerror(LOG_ERR, "unable to select token\n");
/illumos-gate/usr/src/lib/libfsmgt/common/
H A Dfs_mounts.c430 char *token; local
441 token = strtok(optlist_copy, delimiter);
445 if (token == NULL) {
448 } else if ((return_value = is_option(token, opt, errp)) != NULL) {
453 while (token != NULL) {
454 token = NULL;
455 token = strtok(NULL, delimiter);
457 * If token is NULL then then we are at the end of the list
461 if (token == NULL) {
465 is_option(token, op
[all...]
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dnftw.c693 char *dirp, *token, *ptr; local
700 if ((token = strtok_r(dirp, "/", &ptr)) != NULL) {
706 while ((token = strtok_r(NULL, "/", &ptr)) != NULL) {
707 if ((cfd = openat(fd, token, O_RDONLY)) < 0) {
/illumos-gate/usr/src/cmd/users/
H A Dusers.c654 char *token; /* Ptr to a token extracted by strtok() */ local
720 /* Extract the first token putting an element on the list */
721 if ((token = strtok(g_arg, ",")) != NULL) {
724 pgrp->groupname = token;
735 while (token = strtok(NULL, ",")) {
740 (rc = strcmp(token, rgrp->groupname)))
747 pgrp->groupname = token;
767 /* Extract the first token from the argument to the -l option */
768 if (token
[all...]
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dzfs_lz4.c203 BYTE token; local
207 token = *ip++;
208 if ((length = (token >> ML_BITS)) == RUN_MASK) {
258 if ((length = (token & ML_MASK)) == ML_MASK) {
/illumos-gate/usr/src/lib/cfgadm_plugins/ib/common/
H A Dcfga_conf.c80 static int ibcfg_btoken = 0; /* begin of new token */
111 * Returns the field from the token
138 * valid IB token
148 ib_token_t token; local
153 /* make a note of the beginning of token */
159 token = EQUALS;
162 token = AMPERSAND;
165 token = BIT_OR;
168 token = STAR;
171 token
484 ib_token_t token; local
813 ib_token_t token = NEWLINE; local
925 ib_token_t token = NEWLINE; local
1087 ib_token_t token = NEWLINE; local
[all...]
/illumos-gate/usr/src/cmd/picl/plugins/sun4u/snowbird/envmond/
H A Dpicldr.c109 char *token, *lasts; local
119 token = (char *)strtok_r(buf, RECORD_WHITESPACE, &lasts);
120 if (token == NULL) {
127 policyp->interval = (uint8_t)strtoul(token, NULL, 0);
128 token = (char *)strtok_r(lasts, RECORD_WHITESPACE, &lasts);
129 if (token == NULL) {
132 policyp->pname = strdup(token);
/illumos-gate/usr/src/cmd/cvcd/sparc/sun4u/starcat/
H A Dcvcd.c837 char *token; local
841 while ((token = strtok(buf, delims)) != NULL) {
844 if (strcmp(token, "cvc_hostd") == 0 ||
845 strcmp(token, "442") == 0) {
851 if (strlen(token) == 5) {
852 token++;
853 if (strcmp(token, "port") == 0) {

Completed in 126 milliseconds

1234567891011