/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | get_tkt_flags.c | 43 gss_buffer_desc rep; local 47 rep.value = &ctx->krb_flags; 48 rep.length = sizeof(ctx->krb_flags); 50 return generic_gss_add_buffer_set_member(minor_status, &rep, data_set);
|
H A D | inq_context.c | 299 gss_buffer_desc rep; local 303 rep.value = &ctx->krb_times.authtime; 304 rep.length = sizeof(ctx->krb_times.authtime); 306 return generic_gss_add_buffer_set_member(minor_status, &rep, data_set);
|
H A D | lucid_context.c | 81 gss_buffer_desc rep; local 116 rep.value = &lctx; 117 rep.length = sizeof(lctx); 119 retval = generic_gss_add_buffer_set_member(minor_status, &rep, data_set);
|
/osnet-11/usr/src/lib/passwdutil/ |
H A D | __check_history.c | 40 * rep = repositories to check. 51 __check_history(char *user, char *passwd, pwu_repository_t *rep) argument 57 repositories = get_ns(rep, PWU_READ); 72 res = rops[i]->checkhistory(user, passwd, rep);
|
H A D | __get_authtoken_attr.c | 41 __get_authtoken_attr(char *name, pwu_repository_t *rep, attrlist *item) argument 47 repositories = get_ns(rep, PWU_READ); 63 res = rops[i]->getattr(name, item, rep);
|
H A D | __user_to_authenticate.c | 32 __user_to_authenticate(char *name, pwu_repository_t *rep, char **auth_user, argument 44 repositories = get_ns(rep, PWU_WRITE); 57 pwu_res = rops[i]->user_to_authenticate(name, rep,
|
H A D | __set_authtoken_attr.c | 38 __set_authtoken_attr(char *name, char *oldpw, pwu_repository_t *rep, argument 59 repositories = get_ns(rep, PWU_WRITE); 86 err = rops[i]->getpwnam(name, items, rep, &buf); 90 err = rops[i]->update(items, rep, buf); 93 err = rops[i]->putpwnam(name, oldpw, rep, buf); 103 rep_success = i; /* this rep succeeded */
|
H A D | nss_attr.c | 41 int nss_getattr(char *name, attrlist *item, pwu_repository_t *rep); 42 int nss_getpwnam(char *name, attrlist *items, pwu_repository_t *rep, 81 * nss_getpwnam(name, items, rep, buf) 86 nss_getpwnam(char *name, attrlist *items, pwu_repository_t *rep, void **buf) argument 147 repositories = get_ns(rep, PWU_READ); 214 * nss_getattr(name, items, rep) 219 nss_getattr(char *name, attrlist *items, pwu_repository_t *rep) argument 227 res = nss_getpwnam(name, items, rep, (void **)&pwbuf);
|
H A D | nis_attr.c | 45 int nis_getattr(char *name, attrlist *item, pwu_repository_t *rep); 46 int nis_getpwnam(char *name, attrlist *items, pwu_repository_t *rep, 48 int nis_update(attrlist *items, pwu_repository_t *rep, void *buf); 49 int nis_putpwnam(char *name, char *oldpw, pwu_repository_t *rep, void *buf); 50 int nis_user_to_authenticate(char *user, pwu_repository_t *rep, 121 * nis_user_to_authenticate(name, rep, auth_user, privileged) 126 nis_user_to_authenticate(char *user, pwu_repository_t *rep, argument 143 res = nis_getpwnam(user, &attr_tmp[0], rep, (void **)&buf); 190 * nis_getattr(name, items, rep) 195 nis_getattr(char *name, attrlist *items, pwu_repository_t *rep) argument 289 nis_getpwnam(char *name, attrlist *items, pwu_repository_t *rep, void **buf) argument 395 nis_update(attrlist *items, pwu_repository_t *rep, void *buf) argument 471 nis_putpwnam(char *name, char *oldpw, pwu_repository_t *rep, void *buf) argument [all...] |
H A D | switch_utils.c | 46 * name_to_int(rep) 101 * get_ns(rep, accesstype) 121 get_ns(pwu_repository_t *rep, int accesstype) argument 131 if (rep != PWU_DEFAULT_REP) { 132 result = name_to_int(rep->type); 614 getpwnam_from(const char *name, pwu_repository_t *rep, int reptype) argument 645 getpwuid_from(uid_t uid, pwu_repository_t *rep, int reptype) argument 691 getspnam_from(const char *name, pwu_repository_t *rep, int reptype) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/ |
H A D | rc_common.c | 14 hash(krb5_donot_replay *rep, unsigned int hsize) argument 16 unsigned int h = rep->cusec + rep->ctime; 17 h += *rep->server; 18 h += *rep->client;
|
H A D | rc_common.h | 35 krb5_donot_replay rep; member in struct:authlist
|
H A D | rc_conv.c | 18 krb5_auth_to_replay(context, krb5_tkt_authent *auth,krb5_donot_replay *rep) 19 given auth, take important information and make rep; return -1 if failed 23 krb5_auth_to_rep(krb5_context context, krb5_tkt_authent *auth, krb5_donot_replay *rep) argument 26 rep->cusec = auth->authenticator->cusec; 27 rep->ctime = auth->authenticator->ctime; 28 if ((retval = krb5_unparse_name(context, auth->ticket->server, &rep->server))) 31 &rep->client))) { 32 free(rep->server);
|
H A D | rc_mem.c | 32 rc_store(krb5_context context, krb5_rcache id, krb5_donot_replay *rep) argument 39 rephash = hash(rep, t->hsize); 45 * Solaris: calling alive() on rep since it doesn't make sense to store 48 if (alive(time, rep, t->lifespan) == CMP_EXPIRED) 52 switch (cmp(&ta->rep, rep, t->lifespan)) { 56 if (alive(time, &ta->rep, t->lifespan) 58 free(ta->rep.client); 59 free(ta->rep.server); 60 free(ta->rep 267 krb5_rc_mem_store(krb5_context context, krb5_rcache id, krb5_donot_replay *rep) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_ext.c | 44 kdb_check_policy_as_rep *rep; local 48 rep = (kdb_check_policy_as_rep *)response->data; 50 rep->status = NULL; 55 rep->status = "LOCKED_OUT"; 81 krb5_data *rep) 87 code = krb5_db2_check_policy_as(context, method, req, rep); 90 code = krb5_db2_audit_as(context, method, req, rep); 78 krb5_db2_invoke(krb5_context context, unsigned int method, const krb5_data *req, krb5_data *rep) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | krb5_encode.c | 52 if (rep == NULL) return ASN1_MISSING_FIELD; \ 69 encode_krb5_pa_pk_as_req(const krb5_pa_pk_as_req *rep, krb5_data **code) argument 72 retval = asn1_encode_pa_pk_as_req(buf,rep,&length); 79 encode_krb5_pa_pk_as_req_draft9(const krb5_pa_pk_as_req_draft9 *rep, argument 83 retval = asn1_encode_pa_pk_as_req_draft9(buf,rep,&length); 90 encode_krb5_pa_pk_as_rep(const krb5_pa_pk_as_rep *rep, krb5_data **code) argument 93 retval = asn1_encode_pa_pk_as_rep(buf,rep,&length); 100 encode_krb5_pa_pk_as_rep_draft9(const krb5_pa_pk_as_rep_draft9 *rep, krb5_data **code) argument 103 retval = asn1_encode_pa_pk_as_rep_draft9(buf,rep,&length); 110 encode_krb5_auth_pack(const krb5_auth_pack *rep, krb5_dat argument 120 encode_krb5_auth_pack_draft9(const krb5_auth_pack_draft9 *rep, krb5_data **code) argument 131 encode_krb5_kdc_dh_key_info(const krb5_kdc_dh_key_info *rep, krb5_data **code) argument 141 encode_krb5_reply_key_pack(const krb5_reply_key_pack *rep, krb5_data **code) argument 151 encode_krb5_reply_key_pack_draft9(const krb5_reply_key_pack_draft9 *rep, krb5_data **code) argument 162 encode_krb5_td_trusted_certifiers( const krb5_external_principal_identifier **rep, krb5_data **code) argument 173 encode_krb5_td_dh_parameters(const krb5_algorithm_identifier **rep, krb5_data **code) argument 185 encode_krb5_typed_data(const krb5_typed_data **rep, krb5_data **code) argument [all...] |
H A D | asn1_encode.c | 683 krb5int_asn1_do_full_encode(const void *rep, krb5_data **code, argument 693 if (rep == NULL) 700 retval = krb5int_asn1_encode_a_thing(buf, rep, a, &length);
|
H A D | ldap_key_seq.c | 303 krb5int_ldap_decode_sequence_of_keys (krb5_data *in, ldap_seqof_key_data **rep) argument 323 *rep = repval;
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ext.c | 44 kdb_check_policy_as_rep *rep; local 48 rep = (kdb_check_policy_as_rep *)response->data; 50 rep->status = NULL; 55 rep->status = "LOCKED_OUT"; 115 krb5_data *rep) 121 code = krb5_ldap_check_policy_as(context, method, req, rep); 124 code = krb5_ldap_audit_as(context, method, req, rep); 127 code = krb5_ldap_check_allowed_to_delegate(context, method, req, rep); 112 krb5_ldap_invoke(krb5_context context, unsigned int method, const krb5_data *req, krb5_data *rep) argument
|
/osnet-11/usr/src/lib/libast/common/misc/ |
H A D | optjoin.c | 54 register Optpass_f rep; local 65 err = rep = 0; 108 if (!rep || opt_info.index != last_index || opt_info.offset != last_offset) 109 rep = fun; 110 else if (fun == rep)
|
H A D | recfmt.c | 38 unsigned int rep[4 * 1024]; member in struct:__anon1168 105 if (m < elementsof(q->rep)) 109 q->rep[m]++; 117 if ((total <= 0 || !(total % i)) && q->rep[i] > q->rep[n]) 125 g = (((g * 100) / i) * 100) / q->rep[i];
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Encode/Encode/ |
H A D | encode.h | 67 const U8 *rep; /* Replacement character in this encoding member in struct:encode_s 69 int replen; /* Number of octets in rep */
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 58 krb5_data *rep) 82 rep->length = 0; 319 * Construct the ap-rep 560 rep->length = 6 + ap_rep.length + cipher.length; 561 if ((rep->data = (char *)malloc(rep->length)) == NULL) { 565 ptr = rep->data; 570 *ptr++ = (rep->length>>8) & 0xff; 571 *ptr++ = rep->length & 0xff; 586 * ap-rep dat 55 process_chpw_request(krb5_context context, void *server_handle, char *realm, int s, krb5_keytab keytab, struct sockaddr_in *sin, krb5_data *req, krb5_data *rep) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | fast.c | 565 krb5_kdc_rep *rep, krb5_data *request, 576 if (rep->enc_part2->flags& TKT_FLG_ENC_PA_REP) { 577 pa = krb5int_find_pa_data(context, rep->enc_part2->enc_padata, 594 pa = krb5int_find_pa_data(context, rep->enc_part2->enc_padata, 563 krb5int_fast_verify_nego(krb5_context context, struct krb5int_fast_request_state *state, krb5_kdc_rep *rep, krb5_data *request, krb5_keyblock *decrypting_key, krb5_boolean *fast_avail) argument
|
H A D | rd_req_dec.c | 425 krb5_donot_replay rep; local 430 if (!(retval = krb5_auth_to_rep(context, &tktauthent, &rep))) { 433 &rep.msghash); 435 retval = krb5_rc_store(context, (*auth_context)->rcache, &rep); 436 free(rep.msghash); 438 free(rep.server); 439 free(rep.client);
|