/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | s4u_creds.c | 138 krb5_pa_for_user *req, 149 for (i = 0; i < krb5_princ_size(context, req->user); i++) { 150 data.length += krb5_princ_component(context, req->user, i)->length; 152 data.length += krb5_princ_realm(context, req->user)->length; 153 data.length += req->auth_package.length; 159 name_type = krb5_princ_type(context, req->user); 166 for (i = 0; i < krb5_princ_size(context, req->user); i++) { 167 memcpy(p, krb5_princ_component(context, req->user, i)->data, 168 krb5_princ_component(context, req->user, i)->length); 169 p += krb5_princ_component(context, req 136 make_pa_for_user_checksum(krb5_context context, krb5_keyblock *key, krb5_pa_for_user *req, krb5_checksum *cksum) argument [all...] |
H A D | chpw.c | 60 /* ap-req data */ 274 struct krb5_setpw_req req; local 285 req.target = targprinc; 286 req.password.data = passwd; 287 req.password.length = strlen(passwd); 288 ret = encode_krb5_setpw_req(&req, &encoded_setpw);
|
H A D | get_in_tkt.c | 791 int i, req, next = 0; local 792 for (req = 0; ktypes[req]; req++) { 793 if (ktypes[req] == request.ktype[next]) { 798 if (ktypes[req] == request.ktype[i]) {
|
/osnet-11/usr/src/lib/libvscan/common/ |
H A D | libvscan.c | 1347 vs_stats_req_t *req; local 1351 if ((req = calloc(1, sizeof (vs_stats_req_t))) == NULL) 1355 free(req); 1360 free(req); 1365 req->vsr_magic = VS_STATS_DOOR_MAGIC; 1366 req->vsr_id = VS_STATS_GET; 1368 arg.data_ptr = (char *)req; 1384 free(req); 1397 vs_stats_req_t *req; local 1404 if ((req [all...] |
/osnet-11/usr/src/lib/libnsl/yp/ |
H A D | yp_match.c | 506 struct ypreq_key req; local 510 req.domain = domain; 511 req.map = map; 512 req.keydat.dptr = key; 513 req.keydat.dsize = keylen; 525 (xdrproc_t)xdr_ypreq_key, (char *)&req,
|
/osnet-11/usr/src/lib/libipmi/common/ |
H A D | ipmi_lan.c | 109 ipmi_req_add_entry(ipmi_handle_t *ihp, ipmi_cmd_t *req) argument 116 (void) memcpy(&e->ire_req, req, sizeof (ipmi_cmd_t)); 418 ipmi_lan_build_cmd(ipmi_handle_t *ihp, ipmi_cmd_t *req) argument 432 if ((entry = ipmi_req_add_entry(ihp, req)) == NULL) 435 len = req->ic_dlen + 29; 473 msg[off++] = req->ic_dlen + 7; 479 msg_hdr.imh_lun = req->ic_lun; 480 msg_hdr.imh_netfn = req->ic_netfn; 487 msg_hdr.imh_cmd = req->ic_cmd; 492 if (req [all...] |
/osnet-11/usr/src/cmd/sendmail/db/btree/ |
H A D | bt_page.c | 243 DB_LOCKREQ req; local 247 req.op = DB_LOCK_DUMP; 248 lock_vec(dbp->dbenv->lk_info, dbc->locker, 0, &req, 1, NULL);
|
/osnet-11/usr/src/lib/krb5/dyn/ |
H A D | dyn.c | 398 * Resize the array so that element req exists. 400 int _DynResize(obj, req) 402 int req; 406 if (obj->size > req) 409 return _DynRealloc(obj, (req - obj->size) / obj->inc + 1); 417 while (size <= req)
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | iconv.c | 584 iconvctl(iconv_t cd, int req, void *arg) argument 593 if (req < ICONV_GET_CONVERSION_BEHAVIOR || req > ICONV_TRIVIALP) { 603 if (req == ICONV_SET_CONVERSION_BEHAVIOR) { 617 return ((*cd->_conv->_icv_iconvctl)(cd->_conv->_icv_state, req, arg)); 621 passthru_icv_iconvctl(iconv_t cd, int req, void *arg) argument 629 switch (req) {
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 233 krb5_pa_pk_as_req *req = NULL; local 347 init_krb5_pa_pk_as_req(&req); 348 if (req == NULL) { 360 &req->signedAuthPack.data, 361 &req->signedAuthPack.length); 369 &req->signedAuthPack.data, 370 &req->signedAuthPack.length); 373 print_buffer_bin((unsigned char *)req->signedAuthPack.data, 374 req->signedAuthPack.length, 405 reqctx->cryptoctx, reqctx->idctx, &req [all...] |
/osnet-11/usr/src/lib/rpcsec_gss/ |
H A D | svc_rpcsec_gss.c | 422 do_callback(req, client_data) 423 struct svc_req *req; 433 if (req->rq_prog != cbl->cb.program || 434 req->rq_vers != cbl->cb.version) 439 ret = (*cbl->cb.callback)(req, client_data->deleg, 461 __rpc_gss_getcred(req, rcred, ucred, cookie) 462 struct svc_req *req; 475 svcauth = __svc_get_svcauth(req->rq_xprt); 1641 __rpc_gss_svc_max_data_length(req, max_tp_unit_len) 1642 struct svc_req *req; [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | clnt_vc.c | 385 struct t_optmgmt req, res; local 396 req.flags = T_NEGOTIATE; 397 req.opt.len = sizeof (struct opthdr) + opt->len; 398 req.opt.buf = (char *)opt; 406 if (t_optmgmt(fd, &req, &res) < 0 || res.flags != T_SUCCESS) { 419 struct t_optmgmt req, res; local 430 req.flags = T_CURRENT; 431 req.opt.len = sizeof (struct opthdr) + opt->len; 432 req.opt.buf = (char *)opt; 440 if (t_optmgmt(fd, &req, [all...] |
H A D | svc_vc.c | 1979 __svc_vc_dup(struct svc_req *req, caddr_t *resp_buf, uint_t *resp_bufsz) argument 1981 return (__svc_dup(req, resp_buf, resp_bufsz, 1983 ((struct cf_conn *)req->rq_xprt->xp_p1)->cf_cache)); 1987 __svc_vc_dupdone(struct svc_req *req, caddr_t resp_buf, uint_t resp_bufsz, argument 1990 return (__svc_dupdone(req, resp_buf, resp_bufsz, status, 1992 ((struct cf_conn *)req->rq_xprt->xp_p1)->cf_cache));
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | authdata_plugin.h | 275 const krb5_ap_req *req);
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_db2.h | 173 const krb5_data *req,
|
/osnet-11/usr/src/lib/libnsl/nss/ |
H A D | netdir_inet_sundry.c | 904 struct t_optmgmt req, resp; local 981 req.flags = T_NEGOTIATE; 982 req.opt.len = sizeof (struct opthdr) + opt->len; 983 req.opt.buf = (char *)opt; 990 if (t_optmgmt(fd, &req, &resp) < 0 || resp.flags != T_SUCCESS) { 1018 if (t_optmgmt(fd, &req, &resp) < 0 || resp.flags != T_SUCCESS) {
|
/osnet-11/usr/src/lib/libadutils/common/ |
H A D | addisc.c | 1362 validate_DomainController(ad_disc_t ctx, enum ad_disc_req req) argument 1379 if (req == AD_DISC_GLOBAL) 1385 else if (req == AD_DISC_PREFER_SITE) 1496 ad_disc_get_DomainController(ad_disc_t ctx, enum ad_disc_req req, argument 1502 domain_controller_item = validate_DomainController(ctx, req); 1783 validate_GlobalCatalog(ad_disc_t ctx, enum ad_disc_req req) argument 1800 if (req == AD_DISC_GLOBAL) 1806 else if (req == AD_DISC_PREFER_SITE) 1912 ad_disc_get_GlobalCatalog(ad_disc_t ctx, enum ad_disc_req req, argument 1918 global_catalog_item = validate_GlobalCatalog(ctx, req); [all...] |
/osnet-11/usr/src/lib/libresolv2/common/resolv/ |
H A D | res_findzonecut.c | 673 u_char req[NS_PACKETSZ]; local 677 NULL, 0, NULL, req, NS_PACKETSZ); 682 n = res_nsend(statp, req, n, resp, NS_MAXMSG);
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | netr_clnt.c | 57 #define NETR_AUTH_IS_EXTENDED_SESSIONSECURITY(req) \ 58 ((req)->au_ntlm_flags & NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY) && \ 59 ((req)->au_ntpasswd.len == SMBAUTH_RESP_SZ) && \ 60 ((req)->au_lmpasswd.len >= SMBAUTH_CLNT_NONCE_SZ)
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ldap.h | 358 const krb5_data *req,
|
/osnet-11/usr/src/lib/libinetsvc/common/ |
H A D | inetsvc.c | 1253 uds_request_t req; local 1259 req = UR_REFRESH_INETD; 1260 if (send(fd, &req, sizeof (req), 0) < 0) {
|
/osnet-11/usr/src/lib/fm/libasr/common/ |
H A D | libasr.h | 298 asr_handle_t *ah, const asr_regreq_t *req, nvlist_t *rsp),
|
/osnet-11/usr/src/lib/libsip/common/ |
H A D | sip_add_hdrs.c | 867 sip_add_require(sip_msg_t sip_msg, char *req) argument 871 if (req == NULL) 873 ret = sip_add_str_to_msg(sip_msg, SIP_REQUIRE, req, NULL, (char)NULL);
|
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AttributeVerifier.java | 1789 Vector req = new Vector(); 1830 req.addElement(reqVal); 1877 return req;
|
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | pkgweb.c | 1203 OCSP_REQUEST *req; local 1245 if ((req = OCSP_REQUEST_new()) == NULL) { 1258 if ((OCSP_request_add0_id(req, id)) == NULL) { 1265 OCSP_request_add1_nonce(req, NULL, -1); 1302 len = i2d_OCSP_REQUEST(req, NULL); 1317 if (i2d_OCSP_REQUEST_bio(cbio, req) <= 0) { 1491 if (OCSP_check_nonce(req, bs) <= 0) {
|