/osnet-11/usr/src/cmd/sendmail/libmilter/ |
H A D | main.c | 98 static char *conn = NULL; variable 119 if (smfi == NULL || conn == NULL) 122 return mi_opensocket(conn, backlog, dbg, rmsocket, smfi); 180 if ((conn = (char *) malloc(l)) == NULL) 182 if (sm_strlcpy(conn, oconn, l) >= l) 224 if (conn == NULL) 242 if (mi_listener(conn, dbg, smfi, timeout, backlog) != MI_SUCCESS)
|
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | seterror.c | 110 * if conn is NULL, function does nothing 112 void sasl_seterror(sasl_conn_t *conn, argument 142 if(!conn) { 160 gctx = conn->gctx; 164 if (conn->type == SASL_CONN_SERVER) { 165 utils = ((sasl_server_conn_t *)conn)->sparams->utils; 167 } else if (conn->type == SASL_CONN_CLIENT) { 168 utils = ((sasl_client_conn_t *)conn)->cparams->utils; 174 ret = utils->getcallback(conn, SASL_CB_LANGUAGE, &simple_cb, 187 _sasl_get_errorbuf(conn, [all...] |
H A D | canonusr.c | 82 int _sasl_canon_user(sasl_conn_t *conn, argument 98 if(!conn) return SASL_BADPARAM; 102 user_buf = conn->authid_buf; 105 user_buf = conn->user_buf; 111 if(conn->type == SASL_CONN_SERVER) sconn = (sasl_server_conn_t *)conn; 112 else if(conn->type == SASL_CONN_CLIENT) cconn = (sasl_client_conn_t *)conn; 118 result = _sasl_getcallback(conn, SASL_CB_CANON_USER, 121 result = cuser_cb(conn, contex [all...] |
H A D | checkpw.c | 150 static int auxprop_verify_password(sasl_conn_t *conn, argument 162 sasl_server_conn_t *sconn = (sasl_server_conn_t *)conn; 168 if (!conn || !userstr) 181 result = _sasl_canon_user(conn, userstr, 0, 183 &(conn->oparams)); 263 int _sasl_auxprop_verify_apop(sasl_conn_t *conn, argument 278 sasl_server_conn_t *sconn = (sasl_server_conn_t *)conn; 282 if (!conn || !userstr || !challenge || !response) 283 PARAMERROR(conn) 291 _sasl_log(conn, SASL_LOG_ER 407 pwcheck_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument 497 saslauthd_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service, const char *user_realm) argument 672 always_true(sasl_conn_t *conn, const char *userstr, const char *passwd __attribute__((unused)), const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument [all...] |
H A D | client.c | 330 client_idle(sasl_conn_t *conn) argument 334 _sasl_global_context_t *gctx = conn == NULL ? _sasl_gbl_ctx() : conn->gctx; 350 conn, 351 conn ? ((sasl_client_conn_t *)conn)->cparams : NULL)) 594 sasl_client_conn_t *conn; local 629 conn = (sasl_client_conn_t *)*pconn; 631 conn->mech = NULL; 633 conn 694 have_prompts(sasl_conn_t *conn, const sasl_client_plug_t *mech) argument 744 sasl_client_start(sasl_conn_t *conn, const char *mechlist, sasl_interact_t **prompt_need, const char **clientout, unsigned *clientoutlen, const char **mech) argument 1046 sasl_client_step(sasl_conn_t *conn, const char *serverin, unsigned serverinlen, sasl_interact_t **prompt_need, const char **clientout, unsigned *clientoutlen) argument 1141 _sasl_client_listmech(sasl_conn_t *conn, const char *prefix, const char *sep, const char *suffix, const char **result, unsigned *plen, int *pcount) argument [all...] |
H A D | saslutil.c | 243 int sasl_mkchal(sasl_conn_t *conn, argument 260 if (conn->type == SASL_CONN_SERVER) 261 utils = ((sasl_server_conn_t *)conn)->sparams->utils; 262 else if (conn->type == SASL_CONN_CLIENT) 263 utils = ((sasl_client_conn_t *)conn)->cparams->utils; 271 if (hostflag && conn->serverFQDN) 272 len += strlen(conn->serverFQDN) + 1 /* for the @ */; 289 if (hostflag && conn->serverFQDN) 290 snprintf(buf,maxlen, "<%lu.%lu@%s>", randnum, now, conn->serverFQDN);
|
H A D | auxprop.c | 784 * conn connection context 793 * SASL_BADPARAM -- bad count/conn parameter 796 int sasl_auxprop_request(sasl_conn_t *conn, const char **propnames) argument 801 if(!conn) return SASL_BADPARAM; 802 if(conn->type != SASL_CONN_SERVER) 803 PARAMERROR(conn); 805 sconn = (sasl_server_conn_t *)conn; 813 RETURN(conn, result); 824 * returns NULL if conn is invalid. 826 struct propctx *sasl_auxprop_getctx(sasl_conn_t *conn) argument [all...] |
H A D | server.c | 115 static int _sasl_checkpass(sasl_conn_t *conn, 126 * conn -- SASL connection 147 int sasl_setpass(sasl_conn_t *conn, argument 155 sasl_server_conn_t *s_conn = (sasl_server_conn_t *) conn; 162 (conn == NULL) ? _sasl_gbl_ctx() : conn->gctx; 171 if (!conn) return SASL_BADPARAM; 172 if (conn->type != SASL_CONN_SERVER) PARAMERROR(conn); 176 PARAMERROR(conn); 634 server_idle(sasl_conn_t *conn) argument 1207 _sasl_transition(sasl_conn_t * conn, const char * pass, unsigned passlen) argument 1419 mech_permitted(sasl_conn_t *conn, mechanism_t *mech) argument [all...] |
H A D | common.c | 111 int (*_sasl_client_idle_hook)(sasl_conn_t *conn) = NULL; 112 int (*_sasl_server_idle_hook)(sasl_conn_t *conn) = NULL; 272 int sasl_encode(sasl_conn_t *conn, const char *input, argument 279 if(!conn) return SASL_BADPARAM; 281 PARAMERROR(conn); 291 result = sasl_encodev(conn, &tmp, 1, output, outputlen); 293 RETURN(conn, result); 298 int sasl_encodev(sasl_conn_t *conn, argument 311 if (!conn) return SASL_BADPARAM; 313 PARAMERROR(conn); 367 sasl_decode(sasl_conn_t *conn, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument 511 _sasl_conn_init(sasl_conn_t *conn, const char *service, unsigned int flags, enum Sasl_conn_type type, int (*idle_hook)(sasl_conn_t *conn), const char *serverFQDN, const char *iplocalport, const char *ipremoteport, const sasl_callback_t *callbacks, const sasl_global_callbacks_t *global_callbacks) argument 694 _sasl_conn_dispose(sasl_conn_t *conn) argument 738 sasl_getprop(sasl_conn_t *conn, int propnum, const void **pvalue) argument 892 sasl_setprop(sasl_conn_t *conn, int propnum, const void *value) argument 1273 sasl_errdetail(sasl_conn_t *conn) argument 1433 sasl_conn_t * conn; local 1511 sasl_conn_t *conn; local 1576 _sasl_proxy_policy(sasl_conn_t *conn, void *context __attribute__((unused)), const char *requested_user, unsigned rlen, const char *auth_identity, unsigned alen, const char *def_realm __attribute__((unused)), unsigned urlen __attribute__((unused)), struct propctx *propctx __attribute__((unused))) argument 1605 _sasl_getcallback(sasl_conn_t * conn, unsigned long callbackid, int (**pproc)(), void **pcontext) argument 1723 _sasl_log(sasl_conn_t *conn, int level, const char *fmt, ...) argument 1951 _sasl_alloc_utils(_sasl_global_context_t *gctx, sasl_conn_t *conn, sasl_global_callbacks_t *global_callbacks) argument 2098 sasl_idle(sasl_conn_t *conn) argument 2233 _sasl_get_errorbuf(sasl_conn_t *conn, char ***bufhdl, size_t **lenhdl) argument 2531 sasl_listmech(sasl_conn_t *conn, const char *user, const char *prefix, const char *sep, const char *suffix, const char **result, unsigned *plen, int *pcount) argument [all...] |
/osnet-11/usr/src/lib/libresolv2/common/isc/ |
H A D | ev_connects.c | 195 if (acc->conn == this) { 240 evConn *conn = id.opaque; local 243 if ((conn->flags & EV_CONN_LISTEN) == 0) { 248 new->conn = conn; 250 new->fd = accept(conn->fd, &new->ra.sa, &new->ralen); 282 evConn *conn = uap; local 312 (*conn->func)(opaqueCtx, conn->uap, new, &la.sa, lalen, &ra.sa, ralen); 317 evConn *conn local [all...] |
H A D | eventlib_p.h | 82 #define EV_CONN_SELECTED 0x0002 /*%< evSelectFD(conn->file). */ 108 evConn * conn; member in struct:evAccept
|
/osnet-11/usr/src/lib/libcommputil/common/ |
H A D | sdp_parse_helper.c | 146 sdp_free_connection(sdp_conn_t *conn) argument 150 while (conn != NULL) { 151 next_conn = conn->c_next; 152 if (conn->c_nettype != NULL) 153 free(conn->c_nettype); 154 if (conn->c_addrtype != NULL) 155 free(conn->c_addrtype); 156 if (conn->c_address != NULL) 157 free(conn->c_address); 158 free(conn); [all...] |
H A D | sdp_parse.c | 394 sdp_parse_connection(sdp_conn_t **conn, const char *begin, const char *end, argument 503 if (*conn == NULL) { 504 *conn = new_conn; 506 tmp = *conn;
|
H A D | sdp.c | 407 sdp_add_connection(sdp_conn_t **conn, const char *nettype, const char *addrtype, argument 414 if (conn == NULL || nettype == NULL || addrtype == NULL || 435 if (*conn == NULL) { 436 *conn = new_conn; 438 tmp = *conn; 723 sdp_conn_t *conn; local 759 conn = session->s_conn; 760 SDP_LEN_CONNECTION(conn); 808 conn = media->m_conn; 809 SDP_LEN_CONNECTION(conn); 834 sdp_conn_t *conn; local 964 sdp_conn_t *conn; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | changepw.c | 113 kpasswd_sendto_msg_callback(struct conn_state *conn, argument 131 if (getsockname(conn->fd, ss2sa(&local_addr), &addrlen) < 0) { 174 * to break us? Yes - provide 1 per conn-state / host...
|
H A D | sendto_kdc.c | 634 static int service_tcp_fd (struct conn_state *conn, 636 static int service_udp_fd (struct conn_state *conn, 852 maybe_send (struct conn_state *conn, argument 860 dprint("maybe_send(@%p) state=%s type=%s\n", conn, 861 state_strings[conn->state], 862 conn->is_udp ? "udp" : "tcp"); 863 if (conn->state == INITIALIZING) 864 return start_connection(conn, selstate, callback_info, callback_buffer); 867 if (conn->state == FAILED) { 872 if (conn 901 kill_conn(struct conn_state *conn, struct select_state *selstate, int err) argument 946 service_tcp_fd(struct conn_state *conn, struct select_state *selstate, int ssflags) argument 1120 service_udp_fd(struct conn_state *conn, struct select_state *selstate, int ssflags) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | sfsasl.c | 30 sasl_conn_t *conn; member in struct:sasl_obj 36 sasl_conn_t *conn; member in struct:sasl_info 117 so->conn = si->conn; 223 result = sasl_decode(so->conn, buf, 310 result = sasl_getprop(so->conn, SASL_MAXOUTBUF, 315 result = sasl_encode(so->conn, buf, 353 ** conn -- the sasl connection pointer 366 sfdcsasl(fin, fout, conn, tmo) 369 sasl_conn_t *conn; [all...] |
/osnet-11/usr/src/cmd/hal/tools/ |
H A D | hal-device.c | 103 DBusConnection *conn; local 133 if (!(conn = dbus_bus_get(DBUS_BUS_SYSTEM, &error))) { 139 /* fprintf(stderr, "connected to: %s\n", dbus_bus_get_unique_name(conn)); */ 141 if (!libhal_ctx_set_dbus_connection(hal_ctx, conn)) return 4; 164 dbus_connection_unref(conn);
|
H A D | lshal.c | 579 DBusConnection *conn; local 664 conn = dbus_bus_get (DBUS_BUS_SYSTEM, &error); 665 if (conn == NULL) { 673 dbus_connection_setup_with_g_main (conn, NULL); 679 if (!libhal_ctx_set_dbus_connection (hal_ctx, conn)) { 726 dbus_connection_unref (conn);
|
/osnet-11/usr/src/cmd/hal/probing/volume/ |
H A D | probe-volume.c | 428 DBusConnection *conn; local
|
/osnet-11/usr/src/lib/libsldap/common/ |
H A D | ns_connmgmt.h | 103 struct ns_conn_mgmt *conn_mgmt; /* ref counted conn management */ 109 boolean_t keep_conn; /* keep the conn for reuse ? */ 146 * If the state is NS_CONN_MT_CONNECTED, then use the real *conn server/cred. 156 struct ns_conn_mgmt *conn_mgmt; /* ref counted conn management */ 162 char *conn_server; /* conn name/IP [port] string */ 163 ns_cred_t *conn_cred; /* conn ns_cred_t */ 164 Connection *conn; /* name, IP address, ldap handle, etc */ member in struct:ns_conn_mt 181 NS_CONN_MGMT_INACTIVE = 1, /* conn sharing not yet requested */ 232 boolean_t do_mt_conn; /* need and able to do MT conn ? */
|
/osnet-11/usr/src/lib/libnsl/dial/ |
H A D | conn.c | 72 * conn - place a telephone call to system and login, etc. 82 conn(char *system) function 87 CDEBUG(4, "conn(%s)\n", system);
|
/osnet-11/usr/src/cmd/hal/addons/cpufreq/ |
H A D | addon-cpufreq.c | 148 DBusConnection *conn; local 188 conn = libhal_ctx_get_dbus_connection(ctx); 203 dbus_connection_setup_with_g_main(conn, NULL); 210 if (!dbus_connection_add_filter(conn, hald_dbus_cpufreq_filter, 216 dbus_connection_set_exit_on_disconnect(conn, 0);
|
/osnet-11/usr/src/lib/libsasl/include/ |
H A D | saslplug.h | 39 * conn -- the connection to lookup a callback for 49 typedef int sasl_getcallback_t(sasl_conn_t *conn, 66 sasl_conn_t *conn; member in struct:sasl_utils 100 int (*mkchal)(sasl_conn_t *conn, char *buf, unsigned maxlen, 115 int (*checkpass)(sasl_conn_t *conn, 129 int (*getprop)(sasl_conn_t *conn, int propnum, const void **pvalue); 130 int (*setprop)(sasl_conn_t *conn, int propnum, const void *value); 144 void (*log)(sasl_conn_t *conn, int level, const char *fmt, ...); 147 void (*seterror)(sasl_conn_t *conn, unsigned flags, const char *fmt, ...); 265 * conn connectio [all...] |
/osnet-11/usr/src/lib/fm/libldom/sparc/ |
H A D | ldom_xmpp_client.c | 72 static int iowrite(xmpp_conn_t *conn, char *buf, int size); 77 static void xmpp_close(xmpp_conn_t *conn); 78 static int start_tls(xmpp_conn_t *conn); 79 static void handle_ldm_resp(xmpp_conn_t *conn, char *buf, size_t buf_size); 80 static void handle_ldm_event(xmpp_conn_t *conn, char *buf, size_t buf_size); 195 xmpp_conn_t *conn = (xmpp_conn_t *)state; local 198 conn->state = CONN_STATE_DONE; 200 (void) iowrite(conn, START_TLS, strlen(START_TLS)); 202 if (start_tls(conn)) { 203 conn 233 xmpp_connect(xmpp_conn_t *conn) argument 264 xmpp_close(xmpp_conn_t *conn) argument 284 ioread(xmpp_conn_t *conn, char *buf, int size) argument 300 iowrite(xmpp_conn_t *conn, char *buf, int size) argument 348 xmpp_conn_t conn; local 560 xmpp_conn_t conn; local 666 start_tls(xmpp_conn_t *conn) argument 738 handle_ldm_resp(xmpp_conn_t *conn, char *buf, size_t buf_size) argument 805 handle_ldm_event(xmpp_conn_t *conn, char *buf, size_t buf_size) argument [all...] |