Searched refs:req (Results 1 - 25 of 85) sorted by relevance

1234

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dcopy_kdcreq.c32 krb5_kdc_req *req; local
35 req = calloc(1, sizeof (krb5_kdc_req));
36 if (req == NULL)
39 req->magic = in->magic;
40 req->msg_type = in->msg_type;
43 code = krb5_copy_pa_datas(context, in->padata, &req->padata);
48 req->kdc_options = in->kdc_options;
51 code = krb5_copy_principal(context, in->client, &req->client);
57 code = krb5_copy_principal(context, in->server, &req->server);
62 req
[all...]
H A Drd_req_dec.c91 rd_req_decrypt_tkt_part(krb5_context context, const krb5_ap_req *req, argument
106 server != NULL ? server : req->ticket->server,
107 req->ticket->enc_part.kvno,
108 req->ticket->enc_part.enctype, &ktent);
110 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket);
128 if (ktent.key.enctype != req->ticket->enc_part.enctype) {
134 req->ticket);
155 krb5_free_principal(context, req->ticket->server);
156 req->ticket->server = tmp;
173 krb5_principal princ = (krb5_principal) req
256 rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument
726 krb5_rd_req_decoded_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
741 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
757 krb5_rd_req_decoded_anyflag_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
773 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Apps/
H A Dweblatency.d108 self->req = stringof(this->str);
109 self->nam = strlen(self->req) > 15 ? self->req : self->nam;
110 self->req = dirname(self->req);
111 self->nam = strlen(self->req) > 15 ? self->req : self->nam;
112 self->req = dirname(self->req);
113 self->nam = strlen(self->req) > 1
[all...]
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Bin/
H A Dweblatency.d108 self->req = stringof(this->str);
109 self->nam = strlen(self->req) > 15 ? self->req : self->nam;
110 self->req = dirname(self->req);
111 self->nam = strlen(self->req) > 15 ? self->req : self->nam;
112 self->req = dirname(self->req);
113 self->nam = strlen(self->req) > 1
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ext.c43 const kdb_check_policy_as_req *req; local
47 req = (const kdb_check_policy_as_req *)request->data;
52 code = krb5_ldap_lockout_check_policy(context, req->client,
53 req->kdc_time);
66 const kdb_audit_as_req *req; local
69 req = (const kdb_audit_as_req *)request->data;
71 code = krb5_ldap_lockout_audit(context, req->client,
72 req->authtime, req->error_code);
83 const kdb_check_allowed_to_delegate_req *req; local
112 krb5_ldap_invoke(krb5_context context, unsigned int method, const krb5_data *req, krb5_data *rep) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_ext.c43 const kdb_check_policy_as_req *req; local
47 req = (const kdb_check_policy_as_req *)request->data;
52 code = krb5_db2_lockout_check_policy(context, req->client,
53 req->kdc_time);
66 const kdb_audit_as_req *req; local
69 req = (const kdb_audit_as_req *)request->data;
71 code = krb5_db2_lockout_audit(context, req->client,
72 req->authtime, req->error_code);
80 const krb5_data *req,
78 krb5_db2_invoke(krb5_context context, unsigned int method, const krb5_data *req, krb5_data *rep) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dset_ccache.c44 struct krb5_gss_ccache_name_req *req; local
52 assert(value->length == sizeof(*req));
54 if (value->length != sizeof(*req))
57 req = (struct krb5_gss_ccache_name_req *)value->value;
61 if (req->out_name) {
76 kg_set_ccache_name (&err, req->name);
89 if (req->out_name) {
90 *(req->out_name) = gss_out_name;
H A Dset_allowable_enctypes.c74 struct krb5_gss_set_allowable_enctypes_req *req; local
80 assert(value->length == sizeof(*req));
81 req = (struct krb5_gss_set_allowable_enctypes_req *)value->value;
95 if (req->ktypes) {
96 for (i = 0; i < req->num_ktypes && req->ktypes[i]; i++) {
97 if (!krb5_c_valid_enctype(req->ktypes[i])) {
115 memcpy(new_ktypes, req->ktypes, sizeof(krb5_enctype) * i);
H A Dkrb5_gss_glue.c196 struct krb5_gss_set_allowable_enctypes_req req; local
199 req.num_ktypes = num_ktypes;
200 req.ktypes = ktypes;
202 req_buffer.length = sizeof(req);
203 req_buffer.value = &req;
222 struct krb5_gss_ccache_name_req req; local
225 req.name = name;
226 req.out_name = out_name;
228 req_buffer.length = sizeof(req);
229 req_buffer.value = &req;
[all...]
/osnet-11/usr/src/lib/krb5/dyn/
H A DdynP.h44 int _DynRealloc (DynObjectP obj, int req),
45 _DynResize (DynObjectP obj, int req);
/osnet-11/usr/src/lib/libilb/common/
H A Dilb_nat.c97 ilb_comm_t *req, *rbuf; local
107 if ((req = malloc(reqsz)) == NULL)
109 req_si = (ilb_show_info_t *)&req->ic_data;
125 free(req);
130 req->ic_cmd = ILBD_SHOW_NAT;
132 req->ic_cmd = ILBD_SHOW_PERSIST;
133 req->ic_flags = 0;
139 rc = i_ilb_do_comm(h, req, reqsz, rbuf, &tmp_rbufsz);
171 req->ic_flags = ILB_COMM_END;
173 rc = i_ilb_do_comm(h, req, reqs
[all...]
/osnet-11/usr/src/lib/libcpc/common/
H A Dsubr.c48 cpc_request_t *req; local
72 for (req = set->cs_request; req != NULL; req = req->cr_next) {
77 req->cr_event) != 0)
80 req->cr_preset) != 0)
83 req->cr_flags) != 0)
86 req->cr_index) != 0)
89 if (req
[all...]
/osnet-11/usr/src/lib/lvm/libmeta/common/
H A Dmeta_mn_changelog.c161 mddb_userreq_t req; local
186 (void) memset(&req, 0, sizeof (req));
189 req.ur_size = MDMN_LOGRECSIZE_OD;
191 if (metaioctl(MD_MN_DB_USERREQ, &req, &req.ur_mde, NULL) != 0) {
192 (void) mdstealerror(ep, &req.ur_mde);
202 tlr->lr_selfid = req.ur_recid;
454 mddb_userreq_t req; local
469 (void) memset(&req,
533 mddb_userreq_t req; local
[all...]
H A Dmeta_metad_subr.c110 mddb_userreq_t req; local
136 req = *reqp; /* structure assignment */
137 sr = (md_set_record *)(uintptr_t)req.ur_data;
152 if (metaioctl(MD_DB_USERREQ, &req, &req.ur_mde, NULL) != 0)
153 return (mdstealerror(ep, &req.ur_mde));
157 req.ur_size = sizeof (*sr);
159 if (metaioctl(MD_DB_USERREQ, &req, &req.ur_mde, NULL) != 0)
160 return (mdstealerror(ep, &req
422 mddb_userreq_t req; local
1454 mddb_userreq_t req; local
1834 mddb_userreq_t req; local
1990 mddb_userreq_t req; local
[all...]
/osnet-11/usr/src/tools/onbld/Scm/
H A DVersion.py112 for real, req in zip(hgver, desired):
113 if real != req:
114 return real > req
/osnet-11/usr/src/lib/libnsl/nsl/
H A Dt_bind.c50 const struct t_bind *req,
114 bind_reqp->ADDR_length = (req == NULL? 0: req->addr.len);
116 bind_reqp->CONIND_number = (req == NULL? 0: req->qlen);
121 req->addr.buf, &bind_reqp->ADDR_offset) < 0) {
146 if ((req != NULL) && req->addr.len != 0 &&
160 if ((req->addr.len != bind_ackp->ADDR_length) ||
161 (memcmp(req
48 _tx_bind( int fd, const struct t_bind *req, struct t_bind *ret, int api_semantics ) argument
[all...]
H A Dt_optmgmt.c57 const struct t_optmgmt *req,
107 optlen = req->opt.len;
115 if (req->opt.buf == NULL ||
122 opt_start = (struct t_opthdr *)req->opt.buf;
228 optreq->MGMT_flags = req->flags;
233 req->opt.buf, &optreq->OPT_offset) < 0) {
280 ret->flags = optack->MGMT_flags & ~req->flags;
55 _tx_optmgmt( int fd, const struct t_optmgmt *req, struct t_optmgmt *ret, int api_semantics ) argument
/osnet-11/usr/src/lib/libipmi/common/
H A Dipmi_user.c108 ipmi_get_user_access_req_t req = { 0 }; local
110 req.igua_channel = channel;
111 req.igua_uid = uid;
116 cmd.ic_data = &req;
117 cmd.ic_dlen = sizeof (req);
330 ipmi_set_user_password_t req = { 0 }; local
333 req.isup_uid = uid;
334 req.isup_op = IPMI_PASSWORD_OP_SET;
341 req.isup_len20 = 1;
343 (void) strcpy(req
[all...]
H A Dipmi_sunoem.c95 ipmi_send_sunoem_led_set(ipmi_handle_t *ihp, ipmi_cmd_sunoem_led_set_t *req) argument
102 cmd.ic_data = req;
103 cmd.ic_dlen = sizeof (*req);
115 ipmi_send_sunoem_led_get(ipmi_handle_t *ihp, ipmi_cmd_sunoem_led_get_t *req, argument
123 cmd.ic_data = req;
124 cmd.ic_dlen = sizeof (*req);
207 ipmi_sunoem_update_fru(ipmi_handle_t *ihp, ipmi_sunoem_fru_t *req) argument
214 switch (req->isf_type) {
216 req->isf_datalen = sizeof (req
[all...]
/osnet-11/usr/src/lib/libdtrace/common/
H A Dnfs.d78 ci_protocol = P->req->rq_xprt->xp_xpc.xpc_type == T_RDMA ? "rdma" :
79 P->req->rq_xprt->xp_xpc.xpc_netid == "tcp" ? "ipv4" :
80 P->req->rq_xprt->xp_xpc.xpc_netid == "tcp6" ? "ipv6" :
83 ci_local = (P->req->rq_xprt->xp_xpc.xpc_netid == "tcp") ?
85 P->req->rq_xprt->xp_xpc.xpc_lcladdr.buf)->sin_addr.S_un.S_addr) :
86 (P->req->rq_xprt->xp_xpc.xpc_netid == "tcp6") ?
88 P->req->rq_xprt->xp_xpc.xpc_lcladdr.buf)->sin6_addr) :
91 ci_remote = (P->req->rq_xprt->xp_xpc.xpc_netid == "tcp") ?
93 P->req->rq_xprt->xp_xpc.xpc_rtaddr.buf)->sin_addr.S_un.S_addr) :
94 (P->req
[all...]
/osnet-11/usr/src/lib/libnwam/common/
H A Dlibnwam_util.c136 nwamd_door_arg_t req; local
138 req.nwda_type = type;
140 (void) strlcpy(req.nwda_data.nwdad_register_info.nwdad_name,
142 sizeof (req.nwda_data.nwdad_register_info.nwdad_name));
144 return (send_msg_to_nwam(&req));
151 nwamd_door_arg_t req; local
155 req.nwda_type = NWAM_REQUEST_TYPE_ACTION;
156 req.nwda_data.nwdad_object_action.nwdad_object_type = object_type;
157 req.nwda_data.nwdad_object_action.nwdad_action = action;
158 (void) strlcpy(req
175 nwamd_door_arg_t req; local
207 nwamd_door_arg_t req; local
246 nwamd_door_arg_t req; local
274 nwamd_door_arg_t req; local
[all...]
/osnet-11/usr/src/cmd/sendmail/src/
H A Dtls.c423 ** req -- is the file required?
432 # define TLS_OK_F(var, fn, req, st, type) if (ok) \
437 else if (req) \
446 ** req -- flags
451 # define TLS_UNR(bit, req) (bitset(bit, req) ? SFF_NORFILES : 0)
452 # define TLS_OUNR(bit, req) (bitset(bit, req) ? SFF_NOWRFILES : 0)
453 # define TLS_KEYSFF(req) \
455 TLS_OUNR(TLS_I_KEY_OUNR, req)
[all...]
/osnet-11/usr/src/lib/libnsl/yp/
H A Dyp_order.c105 struct ypreq_nokey req; local
109 req.domain = domain;
110 req.map = map;
120 (char *)&req, (xdrproc_t)xdr_ypresp_order, (char *)&resp,
H A Dyp_enum.c141 struct ypreq_nokey req; local
145 req.domain = domain;
146 req.map = map;
159 (char *)&req, (xdrproc_t)xdr_ypresp_key_val,
313 struct ypreq_key req; local
317 req.domain = domain;
318 req.map = map;
319 req.keydat.dptr = inkey;
320 req.keydat.dsize = inkeylen;
331 YPPROC_NEXT, (xdrproc_t)xdr_ypreq_key, (char *)&req,
[all...]
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/
H A DServiceTable.java500 * @param req Service registration request message.
504 SrvLocMsg register(SSrvReg req) { argument
506 SrvLocHeader hdr = req.getHeader();
510 ServiceURL surl = req.URL;
511 String serviceType = req.serviceType;
512 Vector attrList = req.attrList;
513 Hashtable urlSig = req.URLSignature;
514 Hashtable attrSig = req.attrSignature;
645 SrvLocMsg ack = req.makeReply(existing);
713 args.addElement(req);
729 deregister(SSrvDereg req) argument
868 findServiceTypes(SSrvTypeMsg req) argument
945 findServices(SSrvMsg req) argument
1055 findAttributes(SAttrMsg req) argument
[all...]

Completed in 59 milliseconds

1234