/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | svc_auth.c | 52 * using the client auth struct flavor field to index into svcauthsw. 61 * The RPCSEC_GSS flavor is an exception. Its routine takes an 75 int flavor; member in struct:authsvc 130 /* flavor doesn't match any of the builtin types, so try new ones */ 133 if (asp->flavor == cred_flavor) { 167 * prepared to handle. When an authentication flavor is registered, 168 * the flavor is checked against already registered values. If not 175 * 1 if flavor already registered 197 if (asp->flavor == cred_flavor) { 210 asp->flavor [all...] |
/illumos-gate/usr/src/lib/libsmedia/library/common/ |
H A D | l_defines.h | 51 uint32_t flavor; member in struct:format_flags
|
H A D | l_generic.c | 113 smedia_format(smedia_handle_t handle, uint32_t flavor, uint32_t mode) argument 118 ffl.flavor = flavor;
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keylogin.c | 114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument 216 fprintf(stderr, "Wrote %s key into %s\n", flavor, 222 flavor);
|
H A D | chkey.c | 452 getrpcpws(char *flavor) argument 457 if (flavor) 460 flavor, pw->pw_name); 733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument 836 flavor);
|
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | sec_svc.c | 89 * There is an assumption that any flavor less than AUTH_NULL is 129 * RPCSEC_GSS flavor routine takes an additional 141 * dependent e.g. for nfs, it is the pseudo flavor. 151 int flavor, stat; local 157 flavor = req->rq_cred.oa_flavor; 160 switch (flavor) { 215 * flavor - security flavor 224 sec_svc_loadrootnames(int flavor, int count, caddr_t **proots, model_t model) argument 245 switch (flavor) { 342 sec_svc_freerootnames(int flavor, int count, caddr_t *proots) argument 371 sec_svc_inrootlist(int flavor, caddr_t rootname, int count, caddr_t *roots) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_rpc.c | 147 /* eat flavor and verifier */ 260 nameof_flavor(flavor) 261 int flavor; 263 switch (flavor) { 304 int pos, flavor, authlen; local 311 flavor = getxdr_long(); 315 flavor, nameof_flavor(flavor), authlen); local 319 switch (flavor) { 380 int pos, flavor, verle local 387 flavor, nameof_flavor(flavor), verlen); local [all...] |
H A D | snoop_nfs4.c | 546 static char *flavor_name(uint_t flavor); 2955 flavor_name(infop->flavor)); 3590 infop->flavor, flavor_name(infop->flavor)); 3591 switch (infop->flavor) { 3804 * Return the name of the given authentication flavor. 3808 flavor_name(uint_t flavor) argument 3813 switch (flavor) { 3827 sprintf(buf, "[flavor %d]", flavor); [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netdfs.c | 907 uint32_t status, flavor; local 912 flavor = dfs_namespace_getflavor(path->p_unc.unc_share); 913 if (flavor == 0) 915 info.i_flavor = flavor; 1224 info300->flavor = DFS_VOLUME_FLAVOR_STANDALONE;
|
H A D | dfs.c | 420 * Determines the DFS namespace flavor. 431 /* get flavor info from state info (info level 2) */ 1858 * type (root/link) and namespace flavor. 1862 uint32_t flavor) 1870 if (flavor == DFS_VOLUME_FLAVOR_STANDALONE) { 1861 dfs_isvalidpropflagmask(uint32_t propflag_mask, uint32_t type, uint32_t flavor) argument
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs_log_xdr.c | 155 unsigned int flavor; local 177 flavor = req->rq_cred.oa_flavor; 178 if (!xdr_u_int(xdrs, &flavor))
|
H A D | nfs_auth.c | 288 * have a limited access to this vnode even if the security flavor 344 nfsauth_retrieve(struct exportinfo *exi, char *req_netid, int flavor, argument 360 * No entry in the cache for this client/flavor 371 varg.arg_u.arg.areq.req_flavor = flavor; 820 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor, argument 844 * has an entry for this flavor in the cache 861 ac.auth_flavor = flavor; 933 np->auth_flavor = flavor; 1001 res = nfsauth_retrieve(exi, svc_getnetid(req->rq_xprt), flavor, 1155 if (nfsauth_retrieve(exi, svc_getnetid(req->rq_xprt), flavor, 1179 nfsauth4_secinfo_access(struct exportinfo *exi, struct svc_req *req, int flavor, int perm, cred_t *cr) argument 1211 int i, flavor, perm; local [all...] |
H A D | nfs_server.c | 1986 checkwin(int flavor, int window, struct svc_req *req) argument 1990 switch (flavor) { 2071 * right value. Normally xp_cookie is just the RPC flavor 2073 * could be a pseudo flavor. 2080 * Check if the auth flavor is valid for this export 2092 * probably due to the flavor not matching during 2093 * the mount attempt. So map the flavor to AUTH_NONE 2104 * Access was granted even though the flavor mismatched 2186 "no secinfo data for flavor %d", 2267 * returns 0 on failure, -1 on a drop, -2 on wrong security flavor, [all...] |
H A D | nfs4_srv.c | 850 * Check if the security flavor, nfsnum, is in the flavor_list. 936 * If the vnode is in a pseudo filesystem, or if the security flavor 937 * used in the request is valid but not an explicitly shared flavor, 1017 * For a real export node, return the flavor that the client 1028 resok_val[i].flavor = si->sc_rpcnum; 1029 if (resok_val[i].flavor == RPCSEC_GSS) { 1059 int access, flavor, perm; local 1061 flavor = secp[i].s_secinfo.sc_nfsnum; 1065 flavor, perm, cs->basecr); 1069 flavor_list[ret_cnt] = flavor; 1952 is_exported_sec(int flavor, struct exportinfo *exi) argument [all...] |
/illumos-gate/usr/src/cmd/smserverd/ |
H A D | smediad.c | 261 static int32_t scsi_format(int32_t fd, uint_t flavor, uint_t mode); 272 static int32_t scsi_ls120_format(uint_t fd, uint_t flavor, uint32_t capacity, 607 scsi_zip_format(int32_t fd, uint_t flavor, uint_t mode) argument 682 switch (flavor) { 724 flavor); 764 scsi_ls120_format(uint_t fd, uint_t flavor, uint32_t capacity, argument 802 switch (flavor) { 852 scsi_format(int32_t fd, uint_t flavor, uint_t mode) argument 935 switch (flavor) { 951 flavor); 3089 scsi_floppy_format(int32_t fd, uint_t flavor, uint_t mode) argument [all...] |
H A D | smserver.h | 304 uint_t flavor; member in struct:smedia_reqformat
|
/illumos-gate/usr/src/cmd/fs.d/nfs/nfsstat/ |
H A D | nfsstat.c | 1038 char *flavor; local 1178 flavor = nfs_sec.sc_name; 1180 flavor = NULL; 1182 if (flavor != NULL) 1183 printf(",sec=%s", flavor);
|
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/ |
H A D | mountd.c | 2014 * only one security flavor is allowed. So we need 2015 * to determine two things: the particular flavor, 2017 * flavor, i.e. is in the access list. 2080 * client may get readonly access with one flavor 2161 * flavor that the client is using. If it finds 2165 * flavor. Other flavors are values of the new "sec=" option. 2168 check_client(share_t *sh, struct cln *cln, int flavor, uid_t clnt_uid, argument 2173 return (check_client_new(sh, cln, flavor, clnt_uid, clnt_gid, 2177 return (check_client_old(sh, cln, flavor, clnt_uid, clnt_gid, 2302 check_client_old(share_t *sh, struct cln *cln, int flavor, uid_ argument 2615 is_wrongsec(share_t *sh, struct cln *cln, int flavor) argument 2659 check_client_new(share_t *sh, struct cln *cln, int flavor, uid_t clnt_uid, gid_t clnt_gid, uint_t clnt_ngids, gid_t *clnt_gids, uid_t *srv_uid, gid_t *srv_gid, uint_t *srv_ngids, gid_t **srv_gids) argument [all...] |
/illumos-gate/usr/src/uts/common/nfs/ |
H A D | nfs4_kprot.h | 1252 uint32_t flavor; member in struct:secinfo4
|