/osnet-11/usr/src/cmd/hal/hald/ |
H A D | hald_dbus.h | 33 DBusHandlerResult manager_get_all_devices (DBusConnection *conn, 35 DBusHandlerResult manager_find_device_string_match (DBusConnection *conn, 37 DBusHandlerResult manager_find_device_by_capability (DBusConnection *conn, 39 DBusHandlerResult manager_device_exists (DBusConnection *conn, 41 DBusHandlerResult device_get_all_properties (DBusConnection *conn, 43 DBusHandlerResult device_get_property (DBusConnection *conn, 45 DBusHandlerResult device_get_property_type (DBusConnection *conn, 47 DBusHandlerResult device_set_property (DBusConnection *conn, 49 DBusHandlerResult device_add_capability (DBusConnection *conn, 51 DBusHandlerResult device_remove_capability (DBusConnection *conn, [all...] |
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | common.c | 111 int (*_sasl_client_idle_hook)(sasl_conn_t *conn) = NULL; 112 int (*_sasl_server_idle_hook)(sasl_conn_t *conn) = NULL; 272 int sasl_encode(sasl_conn_t *conn, const char *input, argument 279 if(!conn) return SASL_BADPARAM; 281 PARAMERROR(conn); 291 result = sasl_encodev(conn, &tmp, 1, output, outputlen); 293 RETURN(conn, result); 298 int sasl_encodev(sasl_conn_t *conn, argument 311 if (!conn) return SASL_BADPARAM; 313 PARAMERROR(conn); 367 sasl_decode(sasl_conn_t *conn, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument 511 _sasl_conn_init(sasl_conn_t *conn, const char *service, unsigned int flags, enum Sasl_conn_type type, int (*idle_hook)(sasl_conn_t *conn), const char *serverFQDN, const char *iplocalport, const char *ipremoteport, const sasl_callback_t *callbacks, const sasl_global_callbacks_t *global_callbacks) argument 694 _sasl_conn_dispose(sasl_conn_t *conn) argument 738 sasl_getprop(sasl_conn_t *conn, int propnum, const void **pvalue) argument 892 sasl_setprop(sasl_conn_t *conn, int propnum, const void *value) argument 1273 sasl_errdetail(sasl_conn_t *conn) argument 1433 sasl_conn_t * conn; local 1511 sasl_conn_t *conn; local 1576 _sasl_proxy_policy(sasl_conn_t *conn, void *context __attribute__((unused)), const char *requested_user, unsigned rlen, const char *auth_identity, unsigned alen, const char *def_realm __attribute__((unused)), unsigned urlen __attribute__((unused)), struct propctx *propctx __attribute__((unused))) argument 1605 _sasl_getcallback(sasl_conn_t * conn, unsigned long callbackid, int (**pproc)(), void **pcontext) argument 1723 _sasl_log(sasl_conn_t *conn, int level, const char *fmt, ...) argument 1951 _sasl_alloc_utils(_sasl_global_context_t *gctx, sasl_conn_t *conn, sasl_global_callbacks_t *global_callbacks) argument 2098 sasl_idle(sasl_conn_t *conn) argument 2233 _sasl_get_errorbuf(sasl_conn_t *conn, char ***bufhdl, size_t **lenhdl) argument 2531 sasl_listmech(sasl_conn_t *conn, const char *user, const char *prefix, const char *sep, const char *suffix, const char **result, unsigned *plen, int *pcount) argument [all...] |
H A D | server.c | 115 static int _sasl_checkpass(sasl_conn_t *conn, 126 * conn -- SASL connection 147 int sasl_setpass(sasl_conn_t *conn, argument 155 sasl_server_conn_t *s_conn = (sasl_server_conn_t *) conn; 162 (conn == NULL) ? _sasl_gbl_ctx() : conn->gctx; 171 if (!conn) return SASL_BADPARAM; 172 if (conn->type != SASL_CONN_SERVER) PARAMERROR(conn); 176 PARAMERROR(conn); 634 server_idle(sasl_conn_t *conn) argument 1207 _sasl_transition(sasl_conn_t * conn, const char * pass, unsigned passlen) argument 1419 mech_permitted(sasl_conn_t *conn, mechanism_t *mech) argument [all...] |
H A D | client.c | 330 client_idle(sasl_conn_t *conn) argument 334 _sasl_global_context_t *gctx = conn == NULL ? _sasl_gbl_ctx() : conn->gctx; 350 conn, 351 conn ? ((sasl_client_conn_t *)conn)->cparams : NULL)) 594 sasl_client_conn_t *conn; local 629 conn = (sasl_client_conn_t *)*pconn; 631 conn->mech = NULL; 633 conn 694 have_prompts(sasl_conn_t *conn, const sasl_client_plug_t *mech) argument 744 sasl_client_start(sasl_conn_t *conn, const char *mechlist, sasl_interact_t **prompt_need, const char **clientout, unsigned *clientoutlen, const char **mech) argument 1046 sasl_client_step(sasl_conn_t *conn, const char *serverin, unsigned serverinlen, sasl_interact_t **prompt_need, const char **clientout, unsigned *clientoutlen) argument 1141 _sasl_client_listmech(sasl_conn_t *conn, const char *prefix, const char *sep, const char *suffix, const char **result, unsigned *plen, int *pcount) argument [all...] |
H A D | external.c | 82 || !sparams->utils->conn) 85 if (!sparams->utils->conn->external.auth_id) 106 || !sparams->utils->conn 113 if (!sparams->utils->conn->external.auth_id) 117 (!strcmp(sparams->utils->conn->external.auth_id, "anonymous"))) { 119 sasl_seterror(sparams->utils->conn,0, 122 sasl_seterror(sparams->utils->conn,0,"anonymous login not allowed"); 139 result = sparams->canon_user(sparams->utils->conn, 143 result = sparams->canon_user(sparams->utils->conn, 144 sparams->utils->conn [all...] |
H A D | checkpw.c | 150 static int auxprop_verify_password(sasl_conn_t *conn, argument 162 sasl_server_conn_t *sconn = (sasl_server_conn_t *)conn; 168 if (!conn || !userstr) 181 result = _sasl_canon_user(conn, userstr, 0, 183 &(conn->oparams)); 263 int _sasl_auxprop_verify_apop(sasl_conn_t *conn, argument 278 sasl_server_conn_t *sconn = (sasl_server_conn_t *)conn; 282 if (!conn || !userstr || !challenge || !response) 283 PARAMERROR(conn) 291 _sasl_log(conn, SASL_LOG_ER 407 pwcheck_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument 497 saslauthd_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service, const char *user_realm) argument 672 always_true(sasl_conn_t *conn, const char *userstr, const char *passwd __attribute__((unused)), const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument [all...] |
H A D | saslint.h | 74 #define RETURN(conn, val) { if(conn && (val) < SASL_OK) \ 75 (conn)->error_code = (val); \ 78 #define MEMERROR(conn) {\ 79 if(conn) sasl_seterror( (conn), 0, \ 81 RETURN(conn, SASL_NOMEM) } 82 #define PARAMERROR(conn) {\ 83 if(conn) sasl_seterror( (conn), SASL_NOLO [all...] |
H A D | canonusr.c | 82 int _sasl_canon_user(sasl_conn_t *conn, argument 98 if(!conn) return SASL_BADPARAM; 102 user_buf = conn->authid_buf; 105 user_buf = conn->user_buf; 111 if(conn->type == SASL_CONN_SERVER) sconn = (sasl_server_conn_t *)conn; 112 else if(conn->type == SASL_CONN_CLIENT) cconn = (sasl_client_conn_t *)conn; 118 result = _sasl_getcallback(conn, SASL_CB_CANON_USER, 121 result = cuser_cb(conn, contex [all...] |
H A D | seterror.c | 110 * if conn is NULL, function does nothing 112 void sasl_seterror(sasl_conn_t *conn, argument 142 if(!conn) { 160 gctx = conn->gctx; 164 if (conn->type == SASL_CONN_SERVER) { 165 utils = ((sasl_server_conn_t *)conn)->sparams->utils; 167 } else if (conn->type == SASL_CONN_CLIENT) { 168 utils = ((sasl_client_conn_t *)conn)->cparams->utils; 174 ret = utils->getcallback(conn, SASL_CB_LANGUAGE, &simple_cb, 187 _sasl_get_errorbuf(conn, [all...] |
/osnet-11/usr/src/lib/fm/libldom/sparc/ |
H A D | ldom_xmpp_client.c | 72 static int iowrite(xmpp_conn_t *conn, char *buf, int size); 77 static void xmpp_close(xmpp_conn_t *conn); 78 static int start_tls(xmpp_conn_t *conn); 79 static void handle_ldm_resp(xmpp_conn_t *conn, char *buf, size_t buf_size); 80 static void handle_ldm_event(xmpp_conn_t *conn, char *buf, size_t buf_size); 195 xmpp_conn_t *conn = (xmpp_conn_t *)state; local 198 conn->state = CONN_STATE_DONE; 200 (void) iowrite(conn, START_TLS, strlen(START_TLS)); 202 if (start_tls(conn)) { 203 conn 233 xmpp_connect(xmpp_conn_t *conn) argument 264 xmpp_close(xmpp_conn_t *conn) argument 284 ioread(xmpp_conn_t *conn, char *buf, int size) argument 300 iowrite(xmpp_conn_t *conn, char *buf, int size) argument 348 xmpp_conn_t conn; local 560 xmpp_conn_t conn; local 666 start_tls(xmpp_conn_t *conn) argument 738 handle_ldm_resp(xmpp_conn_t *conn, char *buf, size_t buf_size) argument 805 handle_ldm_event(xmpp_conn_t *conn, char *buf, size_t buf_size) argument [all...] |
/osnet-11/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 541 * conn -- connection context 551 typedef int sasl_getsecret_t(sasl_conn_t *conn, void *context, int id, 597 * conn -- connection context 608 typedef int sasl_authorize_t(sasl_conn_t *conn, 631 typedef int sasl_server_userdb_checkpass_t(sasl_conn_t *conn, 647 typedef int sasl_server_userdb_setpass_t(sasl_conn_t *conn, 684 typedef int sasl_canon_user_t(sasl_conn_t *conn, 737 * conn -- mandatory connection context 742 LIBSASL_API const char *sasl_errdetail(sasl_conn_t *conn); 759 * if conn i [all...] |
H A D | saslplug.h | 39 * conn -- the connection to lookup a callback for 49 typedef int sasl_getcallback_t(sasl_conn_t *conn, 66 sasl_conn_t *conn; member in struct:sasl_utils 100 int (*mkchal)(sasl_conn_t *conn, char *buf, unsigned maxlen, 115 int (*checkpass)(sasl_conn_t *conn, 129 int (*getprop)(sasl_conn_t *conn, int propnum, const void **pvalue); 130 int (*setprop)(sasl_conn_t *conn, int propnum, const void *value); 144 void (*log)(sasl_conn_t *conn, int level, const char *fmt, ...); 147 void (*seterror)(sasl_conn_t *conn, unsigned flags, const char *fmt, ...); 265 * conn connectio [all...] |
H A D | plugin_common.h | 117 #define SETERROR( utils, msg ) (utils)->seterror( (utils)->conn, 0, (msg) ) 122 (utils)->seterror( (utils)->conn, 0, "Out of Memory") 125 (utils)->seterror( (utils)->conn, 0, \ 133 (utils)->seterror( (utils)->conn, 0, "Parameter Error") 136 (utils)->seterror( (utils)->conn, 0, \
|
H A D | saslutil.h | 60 LIBSASL_API int sasl_mkchal(sasl_conn_t *conn, char *buf,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | sendto_kdc.c | 634 static int service_tcp_fd (struct conn_state *conn, 636 static int service_udp_fd (struct conn_state *conn, 852 maybe_send (struct conn_state *conn, argument 860 dprint("maybe_send(@%p) state=%s type=%s\n", conn, 861 state_strings[conn->state], 862 conn->is_udp ? "udp" : "tcp"); 863 if (conn->state == INITIALIZING) 864 return start_connection(conn, selstate, callback_info, callback_buffer); 867 if (conn->state == FAILED) { 872 if (conn 901 kill_conn(struct conn_state *conn, struct select_state *selstate, int err) argument 946 service_tcp_fd(struct conn_state *conn, struct select_state *selstate, int ssflags) argument 1120 service_udp_fd(struct conn_state *conn, struct select_state *selstate, int ssflags) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/libmilter/ |
H A D | main.c | 98 static char *conn = NULL; variable 119 if (smfi == NULL || conn == NULL) 122 return mi_opensocket(conn, backlog, dbg, rmsocket, smfi); 180 if ((conn = (char *) malloc(l)) == NULL) 182 if (sm_strlcpy(conn, oconn, l) >= l) 224 if (conn == NULL) 242 if (mi_listener(conn, dbg, smfi, timeout, backlog) != MI_SUCCESS)
|
H A D | listener.c | 47 ** conn -- connection description 59 mi_opensocket(conn, backlog, dbg, rmsocket, smfi) 60 char *conn; 66 if (smfi == NULL || conn == NULL) 75 "%s: Opening listen socket on conn %s", 76 smfi->xxfi_name, conn); 80 listenfd = mi_milteropen(conn, backlog, rmsocket, smfi->xxfi_name); 84 "%s: Unable to create listening socket on conn %s", 85 smfi->xxfi_name, conn); 104 ** conn [all...] |
/osnet-11/usr/src/lib/rad/pykstat/common/ |
H A D | rad.py | 48 def __init__(self, conn = None): 49 if conn is None: 52 self._rc = conn
|
/osnet-11/usr/src/lib/rad/pysmf/common/ |
H A D | rad.py | 52 def __init__(self, conn = None): 53 if conn is None: 56 self._rc = conn
|
/osnet-11/usr/src/lib/libcommputil/common/ |
H A D | sdp_parse_helper.c | 146 sdp_free_connection(sdp_conn_t *conn) argument 150 while (conn != NULL) { 151 next_conn = conn->c_next; 152 if (conn->c_nettype != NULL) 153 free(conn->c_nettype); 154 if (conn->c_addrtype != NULL) 155 free(conn->c_addrtype); 156 if (conn->c_address != NULL) 157 free(conn->c_address); 158 free(conn); [all...] |
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 512 utils->log(utils->conn, SASL_LOG_ERR, 515 utils->seterror(utils->conn, 0, "Unable to allocate final buffer"); 1305 text->utils->log(text->utils->conn, SASL_LOG_DEBUG, 1317 text->utils->log(text->utils->conn, SASL_LOG_DEBUG, 1329 text->utils->log(text->utils->conn, SASL_LOG_DEBUG, 1343 text->utils->log(text->utils->conn, SASL_LOG_DEBUG, 1366 text->utils->log(text->utils->conn, SASL_LOG_DEBUG, 1379 text->utils->log(text->utils->conn, SASL_LOG_DEBUG, 1425 text->utils->log(text->utils->conn, SASL_LOG_DEBUG, 1432 text->utils->log(text->utils->conn, SASL_LOG_DEBU [all...] |
/osnet-11/usr/src/lib/libresolv2/common/isc/ |
H A D | ev_connects.c | 195 if (acc->conn == this) { 240 evConn *conn = id.opaque; local 243 if ((conn->flags & EV_CONN_LISTEN) == 0) { 248 new->conn = conn; 250 new->fd = accept(conn->fd, &new->ra.sa, &new->ralen); 282 evConn *conn = uap; local 312 (*conn->func)(opaqueCtx, conn->uap, new, &la.sa, lalen, &ra.sa, ralen); 317 evConn *conn local [all...] |
/osnet-11/usr/src/lib/sasl_plugins/plain/ |
H A D | plain.c | 124 params->utils->log(params->utils->conn, SASL_LOG_ERR, 139 params->utils->log(params->utils->conn, SASL_LOG_ERR, 142 params->utils->seterror(params->utils->conn, 0, 157 params->utils->log(params->utils->conn, SASL_LOG_ERR, 183 result = params->canon_user(params->utils->conn, 191 result = params->utils->checkpass(params->utils->conn, 199 params->utils->seterror(params->utils->conn, 0, 202 params->utils->seterror(params->utils->conn, 0, 211 result = params->canon_user(params->utils->conn, 217 params->transition(params->utils->conn, passwor [all...] |
/osnet-11/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 203 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR, 271 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR, 293 result = sparams->canon_user(sparams->utils->conn, 306 sparams->utils->seterror(sparams->utils->conn,0, 309 sparams->utils->seterror(sparams->utils->conn,0, 320 sparams->utils->seterror(sparams->utils->conn,0, 323 sparams->utils->seterror(sparams->utils->conn,0, 351 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR, 354 sparams->utils->seterror(sparams->utils->conn, 0, 381 sparams->utils->seterror(sparams->utils->conn, [all...] |
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | sfsasl.c | 30 sasl_conn_t *conn; member in struct:sasl_obj 36 sasl_conn_t *conn; member in struct:sasl_info 117 so->conn = si->conn; 223 result = sasl_decode(so->conn, buf, 310 result = sasl_getprop(so->conn, SASL_MAXOUTBUF, 315 result = sasl_encode(so->conn, buf, 353 ** conn -- the sasl connection pointer 366 sfdcsasl(fin, fout, conn, tmo) 369 sasl_conn_t *conn; [all...] |