Searched refs:flavor (Results 1 - 25 of 27) sorted by relevance

12

/illumos-gate/usr/src/lib/libnsl/rpc/
H A Dsvc_auth.c52 * using the client auth struct flavor field to index into svcauthsw.
61 * The RPCSEC_GSS flavor is an exception. Its routine takes an
75 int flavor; member in struct:authsvc
130 /* flavor doesn't match any of the builtin types, so try new ones */
133 if (asp->flavor == cred_flavor) {
167 * prepared to handle. When an authentication flavor is registered,
168 * the flavor is checked against already registered values. If not
175 * 1 if flavor already registered
197 if (asp->flavor == cred_flavor) {
210 asp->flavor
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dsnoop_rpc.c147 /* eat flavor and verifier */
260 nameof_flavor(flavor)
261 int flavor;
263 switch (flavor) {
304 int pos, flavor, authlen; local
311 flavor = getxdr_long();
315 flavor, nameof_flavor(flavor), authlen); local
319 switch (flavor) {
380 int pos, flavor, verle local
387 flavor, nameof_flavor(flavor), verlen); local
[all...]
H A Dsnoop_nfs4.c546 static char *flavor_name(uint_t flavor);
2955 flavor_name(infop->flavor));
3590 infop->flavor, flavor_name(infop->flavor));
3591 switch (infop->flavor) {
3804 * Return the name of the given authentication flavor.
3808 flavor_name(uint_t flavor) argument
3813 switch (flavor) {
3827 sprintf(buf, "[flavor %d]", flavor);
[all...]
H A Dnfs4_xdr.c2224 if (!xdr_uint32_t(xdrs, &objp->flavor))
2226 switch (objp->flavor) {
/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dsec_svc.c89 * There is an assumption that any flavor less than AUTH_NULL is
129 * RPCSEC_GSS flavor routine takes an additional
141 * dependent e.g. for nfs, it is the pseudo flavor.
151 int flavor, stat; local
157 flavor = req->rq_cred.oa_flavor;
160 switch (flavor) {
215 * flavor - security flavor
224 sec_svc_loadrootnames(int flavor, int count, caddr_t **proots, model_t model) argument
245 switch (flavor) {
342 sec_svc_freerootnames(int flavor, int count, caddr_t *proots) argument
371 sec_svc_inrootlist(int flavor, caddr_t rootname, int count, caddr_t *roots) argument
[all...]
/illumos-gate/usr/src/lib/libsmedia/library/common/
H A Dl_generic.c113 smedia_format(smedia_handle_t handle, uint32_t flavor, uint32_t mode) argument
118 ffl.flavor = flavor;
H A Dl_defines.h51 uint32_t flavor; member in struct:format_flags
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs_auth.c288 * have a limited access to this vnode even if the security flavor
344 nfsauth_retrieve(struct exportinfo *exi, char *req_netid, int flavor, argument
360 * No entry in the cache for this client/flavor
371 varg.arg_u.arg.areq.req_flavor = flavor;
820 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor, argument
844 * has an entry for this flavor in the cache
861 ac.auth_flavor = flavor;
933 np->auth_flavor = flavor;
1001 res = nfsauth_retrieve(exi, svc_getnetid(req->rq_xprt), flavor,
1155 if (nfsauth_retrieve(exi, svc_getnetid(req->rq_xprt), flavor,
1179 nfsauth4_secinfo_access(struct exportinfo *exi, struct svc_req *req, int flavor, int perm, cred_t *cr) argument
1211 int i, flavor, perm; local
[all...]
H A Dnfs4_client_secinfo.c52 * "nfsstat -m" needs to print out what flavor is used for a mount
53 * point. V3 kernel gets the nfs pseudo flavor from the userland and provides
65 * return an integer for a flavor, thus the term "nfs pseudo flavor" is
66 * defined and the nfssec.conf file is used to map the nfs pseudo flavor
96 val[0].flavor = AUTH_SYS;
104 val[i].flavor = RPCSEC_GSS;
110 val[4].flavor = AUTH_DH;
116 val[5].flavor = AUTH_NONE;
142 * Map RPCSEC_GSS data to a nfs pseudo flavor numbe
[all...]
H A Dnfs_log_xdr.c155 unsigned int flavor; local
177 flavor = req->rq_cred.oa_flavor;
178 if (!xdr_u_int(xdrs, &flavor))
H A Dnfs4_srv.c850 * Check if the security flavor, nfsnum, is in the flavor_list.
936 * If the vnode is in a pseudo filesystem, or if the security flavor
937 * used in the request is valid but not an explicitly shared flavor,
1017 * For a real export node, return the flavor that the client
1028 resok_val[i].flavor = si->sc_rpcnum;
1029 if (resok_val[i].flavor == RPCSEC_GSS) {
1059 int access, flavor, perm; local
1061 flavor = secp[i].s_secinfo.sc_nfsnum;
1065 flavor, perm, cs->basecr);
1069 flavor_list[ret_cnt] = flavor;
1952 is_exported_sec(int flavor, struct exportinfo *exi) argument
[all...]
/illumos-gate/usr/src/cmd/keyserv/
H A Dkeylogin.c114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument
216 fprintf(stderr, "Wrote %s key into %s\n", flavor,
222 flavor);
H A Dchkey.c452 getrpcpws(char *flavor) argument
457 if (flavor)
460 flavor, pw->pw_name);
733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument
836 flavor);
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/
H A Dmountd.c2014 * only one security flavor is allowed. So we need
2015 * to determine two things: the particular flavor,
2017 * flavor, i.e. is in the access list.
2080 * client may get readonly access with one flavor
2161 * flavor that the client is using. If it finds
2165 * flavor. Other flavors are values of the new "sec=" option.
2168 check_client(share_t *sh, struct cln *cln, int flavor, uid_t clnt_uid, argument
2173 return (check_client_new(sh, cln, flavor, clnt_uid, clnt_gid,
2177 return (check_client_old(sh, cln, flavor, clnt_uid, clnt_gid,
2302 check_client_old(share_t *sh, struct cln *cln, int flavor, uid_ argument
2615 is_wrongsec(share_t *sh, struct cln *cln, int flavor) argument
2659 check_client_new(share_t *sh, struct cln *cln, int flavor, uid_t clnt_uid, gid_t clnt_gid, uint_t clnt_ngids, gid_t *clnt_gids, uid_t *srv_uid, gid_t *srv_gid, uint_t *srv_ngids, gid_t **srv_gids) argument
[all...]
/illumos-gate/usr/src/lib/libsmedia/library/inc/
H A Dsmedia.h152 int smedia_format(smedia_handle_t handle, uint_t flavor, uint_t mode);
/illumos-gate/usr/src/cmd/smserverd/
H A Dsmediad.c261 static int32_t scsi_format(int32_t fd, uint_t flavor, uint_t mode);
272 static int32_t scsi_ls120_format(uint_t fd, uint_t flavor, uint32_t capacity,
607 scsi_zip_format(int32_t fd, uint_t flavor, uint_t mode) argument
682 switch (flavor) {
724 flavor);
764 scsi_ls120_format(uint_t fd, uint_t flavor, uint32_t capacity, argument
802 switch (flavor) {
852 scsi_format(int32_t fd, uint_t flavor, uint_t mode) argument
935 switch (flavor) {
951 flavor);
3089 scsi_floppy_format(int32_t fd, uint_t flavor, uint_t mode) argument
[all...]
H A Dsmserver.h304 uint_t flavor; member in struct:smedia_reqformat
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetdfs.c907 uint32_t status, flavor; local
912 flavor = dfs_namespace_getflavor(path->p_unc.unc_share);
913 if (flavor == 0)
915 info.i_flavor = flavor;
1224 info300->flavor = DFS_VOLUME_FLAVOR_STANDALONE;
H A Ddfs.c420 * Determines the DFS namespace flavor.
431 /* get flavor info from state info (info level 2) */
1858 * type (root/link) and namespace flavor.
1862 uint32_t flavor)
1870 if (flavor == DFS_VOLUME_FLAVOR_STANDALONE) {
1861 dfs_isvalidpropflagmask(uint32_t propflag_mask, uint32_t type, uint32_t flavor) argument
/illumos-gate/usr/src/cmd/fs.d/nfs/nfsstat/
H A Dnfsstat.c1038 char *flavor; local
1178 flavor = nfs_sec.sc_name;
1180 flavor = NULL;
1182 if (flavor != NULL)
1183 printf(",sec=%s", flavor);
/illumos-gate/usr/src/lib/libsmedia/plugins/floppy/common/
H A Df_format.c566 ft.flag = ((struct format_flags *)ip)->flavor;
/illumos-gate/usr/src/lib/libsmedia/plugins/scsi/common/
H A Ds_generic.c386 reqformat.flavor = ffl->flavor;
/illumos-gate/usr/src/uts/common/smbsrv/ndl/
H A Dnetdfs.ndl200 DWORD flavor;
/illumos-gate/usr/src/head/rpcsvc/
H A Dnfs4_prot.x134 NFS4ERR_WRONGSEC = 10016,/* wrong security flavor */
1254 union secinfo4 switch (uint32_t flavor) {
/illumos-gate/usr/src/uts/common/nfs/
H A Dnfs4_kprot.h1252 uint32_t flavor; member in struct:secinfo4

Completed in 2860 milliseconds

12