/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | getoption.c | 291 sasl_ssf_t *ssf; local 301 sc = sasl_getprop( ctx, SASL_SSF, (const void **) &ssf ); 305 *((sasl_ssf_t *) optdata) = *ssf;
|
H A D | sasl.c | 406 nsldapi_sasl_install( LDAP *ld, Sockbuf *sb, void *ctx_arg, sasl_ssf_t *ssf) argument 415 if (ssf && *ssf) { 655 sasl_ssf_t *ssf = NULL; local 817 saslrc = sasl_getprop( ctx, SASL_SSF, (const void **) &ssf ); 819 if( ssf && *ssf ) { 822 (unsigned long) *ssf, 0, 0 ); 824 rc = nsldapi_sasl_install(ld, ld->ld_conns->lconn_sb, ctx, ssf);
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | client.c | 786 if(conn->props.min_ssf < conn->external.ssf) { 789 minssf = conn->props.min_ssf - conn->external.ssf; 843 if ((conn->props.min_ssf <= conn->external.ssf) && 844 (conn->external.ssf > 1)) { 948 c_conn->cparams->external_ssf = conn->external.ssf; 1141 if(conn->props.min_ssf < conn->external.ssf) { 1144 minssf = conn->props.min_ssf - conn->external.ssf;
|
H A D | server.c | 1404 * IF mech strength + external strength < min ssf THEN FAIL 1470 s_conn->sparams->external_ssf=conn->external.ssf; 1488 if (conn->props.min_ssf < conn->external.ssf) { 1491 minssf = conn->props.min_ssf - conn->external.ssf; 1590 if ((conn->props.min_ssf <= conn->external.ssf) && 1591 (conn->external.ssf > 1)) { 2308 if (conn->props.min_ssf > conn->external.ssf) 2311 && conn->external.ssf == 0)
|
H A D | common.c | 841 *((const sasl_ssf_t **)pvalue) = &conn->external.ssf; 897 conn->external.ssf = *((sasl_ssf_t *)value); 900 conn->external.ssf; 903 conn->external.ssf;
|
H A D | saslint.h | 134 sasl_ssf_t ssf; member in struct:_sasl_external_properties
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | usersmtp.c | 1560 sasl_ssf_t ssf; local 1564 sasl_external_properties_t ssf; local 1622 ssf = 0; 1630 ssf = atoi(out); 1632 saslresult = sasl_setprop(mci->mci_conn, SASL_SSF_EXTERNAL, &ssf); 1695 ssf.ssf = 0; 1696 ssf.auth_id = NULL; 1700 ssf.auth_id = out; 1703 ssf [all...] |
H A D | srvrsmtp.c | 609 sasl_ssf_t *ssf; local 900 ext_ssf.ssf = 0; 1364 (const void **) &ssf); 1390 (void **) &ssf); 1397 ssf = NULL; 1404 "%u", *ssf); 1410 *ssf); 1418 if (ssf != NULL && *ssf > 0) 1449 auth_type, *ssf); [all...] |
H A D | deliver.c | 3122 sasl_ssf_t *ssf = NULL; local 3127 (const void **) &ssf); 3129 (void **) &ssf); 3138 result == SASL_OK ? *ssf : 0); 3145 if (result == SASL_OK && *ssf > 0)
|
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 272 sasl_ssf_t ssf; member in struct:digest_cipher 2598 if (stext->requiressf <= cipher->ssf && 2599 stext->limitssf >= cipher->ssf) { 3311 stext->requiressf <= cptr->ssf && 3312 stext->limitssf >= cptr->ssf) { 3324 oparams->mech_ssf = cptr->ssf; 3962 oparams->mech_ssf = ctext->cipher->ssf; 4486 /* get requested ssf */ 4507 and at most "limit" bits of ssf. */ 4521 if ((limit >= cipher->ssf) [all...] |
/illumos-gate/usr/src/uts/common/inet/sctp/ |
H A D | sctp_input.c | 2495 sctp_process_uo_gaps(sctp_t *sctp, uint32_t ctsn, sctp_sack_frag_t *ssf, argument 2520 for (gapcnt = 0; gapcnt < num_gaps; gapcnt++, ssf++) { 2528 SEQ_LT(ctsn + ntohs(ssf->ssf_start), xtsn)) { 2536 gapstart = ctsn + ntohs(ssf->ssf_start); 2537 gapend = ctsn + ntohs(ssf->ssf_end); 2710 sctp_sack_frag_t *ssf; local 2838 num_gaps * sizeof (*ssf))) { 2874 ssf = (sctp_sack_frag_t *)(sc + 1); 2875 for (i = 0; i < num_gaps; i++, ssf++) { 2878 if (SEQ_LEQ(cumtsn + ntohs(ssf [all...] |
/illumos-gate/usr/src/lib/libdisasm/common/ |
H A D | dis_s390x.c | 534 } ssf; member in union:inst 2415 uint32_t d1 = val_4_8(inst->ssf.d1h, inst->ssf.d1l); 2416 uint32_t d2 = val_4_8(inst->ssf.d2h, inst->ssf.d2l); 2419 d1, B[inst->ssf.b1], 2420 d2, B[inst->ssf.b2], R[inst->ssf.r3]);
|