/illumos-gate/usr/src/cmd/lp/cmd/lpsched/ |
H A D | alerts.c | 170 fdprintf(fd, Pf_msg[3], rp->secure->req_id);
|
H A D | disp4.c | 204 req_id = Strdup(pps->request->secure->req_id);
|
H A D | disp2.c | 317 (pps->request ? pps->request->secure->req_id : ""),
|
/illumos-gate/usr/src/uts/common/inet/sctp/ |
H A D | sctp_hash.c | 536 boolean_t secure; local 547 secure = iraflags & IRAF_IPSEC_SECURE; 580 secure) {
|
H A D | sctp_input.c | 3404 boolean_t secure; local 3410 secure = ira->ira_flags & IRAF_IPSEC_SECURE; 3458 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL) 3490 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL) 3500 if (secure && sctp_check_in_policy(mp, ira, ipst) == NULL) 3518 boolean_t secure; local 3525 secure = iraflags & IRAF_IPSEC_SECURE; 3534 secure) {
|
/illumos-gate/usr/src/lib/libast/common/misc/ |
H A D | fastfind.c | 431 if (fp->secure = ((st.st_mode & (S_IRGRP|S_IROTH)) == S_IRGRP) && st.st_gid == getegid() && getegid() != getgid()) 914 if (!fp->secure || !access(fp->decode.path, F_OK)) 926 if (!fp->secure || !access(fp->decode.path, F_OK))
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | ldap-int.h | 687 int port, int secure, char **krbinstancep );
|
/illumos-gate/usr/src/cmd/dcs/sparc/sun4u/ |
H A D | rdr_messages.c | 155 int (*secure)(int, int); member in struct:__anon363 1382 if (libdscp.secure(0, fd) != DSCP_OK) { 4539 libdscp->secure = (int (*)(int, int))dlsym(lib, LIBDSCP_SECURE); 4544 (libdscp->secure == NULL) ||
|
/illumos-gate/usr/src/cmd/sgs/rtld/common/ |
H A D | analyze.c | 1091 * preloading or auditing a secure application, it can be a little more helpful 1092 * to indicate that a search of secure directories has failed, so adjust the 1099 int secure = 0; local 1103 secure++; 1114 if (secure) 1132 if (secure) 1879 * If this is a secure application, record any full path name directory
|
/illumos-gate/usr/src/uts/sun4u/sunfire/io/ |
H A D | sysctrl.c | 3206 "secure position\n", ddi_get_instance(list->dip), 3215 (key == KEY_SECURE) ? "secure" : "not-secure"); 3224 "secure" : "not-secure"); 3237 uint_t secure = 0; local 3242 * if any of the key switch positions are secure, 3249 if (secure++) 3260 if (secure) {
|
/illumos-gate/usr/src/uts/sun4u/javelin/io/ |
H A D | envctrltwo.c | 2231 uint8_t secure = 0; local 2246 secure = unitp->encl_kstats.value; 2248 if ((secure & ENVCTRL_UE250_FSP_KEYMASK) ==
|
/illumos-gate/usr/src/uts/common/inet/ip/ |
H A D | ip6.c | 2401 boolean_t secure; local 2407 secure = ira->ira_flags & IRAF_IPSEC_SECURE; 2417 if (secure || ipss->ipsec_inbound_v6_policy_present) {
|
H A D | ip.c | 427 * happens if the incoming packet is secure. The information initialized 1275 * 2) The client may or may not expect things to come in secure. 1276 * If it comes in secure, the policy constraints are checked 1324 * should be accepted in clear when the Upper layer expects secure. 2019 * If the packet that caused the ICMP error is secure, we send 2049 * ROUTER : IFN could be secure or non-secure. 4829 boolean_t secure; local 4835 secure = ira->ira_flags & IRAF_IPSEC_SECURE; 4845 if (secure || ips 4929 boolean_t secure; local 5209 boolean_t secure; local 14297 boolean_t secure; local [all...] |
H A D | spd.c | 1024 boolean_t secure, netstack_t *ns) 1049 (secure ? "secure" : "not secure"), s, d); 2231 * to accept in clear. If it is secure, it is the job 2236 * where ULP accepts only secure data and the incoming 2318 * client expects secure. If somebody is replying 2321 * With global policy we might be just expecting secure 2356 * intermediate router sending in-secure ICMP 4188 * should go out secure 1023 ipsec_log_policy_failure(int type, char *func_name, ipha_t *ipha, ip6_t *ip6h, boolean_t secure, netstack_t *ns) argument [all...] |
/illumos-gate/usr/src/uts/sun4u/tazmo/io/ |
H A D | envctrl.c | 2811 uint8_t secure = 0; local 2829 secure = unitp->encl_kstats[i].value; 2838 if ((secure & ENVCTRL_FSP_KEYMASK) == ENVCTRL_FSP_KEYLOCKED) {
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | k5-int.h | 738 * because it needs to be able to specify "secure" */ 741 (profile_filespec_t **pfiles, krb5_boolean secure);
|
/illumos-gate/usr/src/cmd/ypcmd/yp2lscripts/ |
H A D | inityp2l.sh | 539 HELP - If selected, it will allow you to set the secure flag on 2992 # Generate secure flag entries 3001 # If a map is secure, then it needs to be mentioned here 3055 get_confirm "Do you wish to set the secure flag for $STR map (y/n/h)?" \ 3099 get_confirm_nodef "Set secure flag for $MAP,${_DMN} (y/n)?"
|