Searched defs:kmd (Results 1 - 6 of 6) sorted by relevance
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_acct_mgmt.c | 55 krb5_module_data_t *kmd, 70 password = kmd->password; 71 context = kmd->kcontext; 168 krb5_module_data_t *kmd, 183 password = kmd->password; 196 if (code = krb5_init_secure_context(&kmd->kcontext)) { 204 if (code = krb5_timeofday(kmd->kcontext, &now)) { 213 if (kmd->expiration != 0) { 214 expiration = kmd->expiration; 217 if ((err = fetch_princ_entry(kmd, use 54 fetch_princ_entry( krb5_module_data_t *kmd, char *princ_str, kadm5_principal_ent_rec *prent, int debug) argument 165 exp_warn( pam_handle_t *pamh, char *user, krb5_module_data_t *kmd, int debug) argument 313 krb5_module_data_t *kmd = NULL; local [all...] |
H A D | krb5_password.c | 60 krb5_module_data_t *kmd, 70 login_result, kmd->env ? kmd->env : "<null>"); 72 if (kmd->env) { 80 if ((result = pam_putenv(pamh, kmd->env)) 93 free(kmd->env); 94 kmd->env = NULL; 108 krb5_module_data_t *kmd, 115 if (!kmd || kmd 58 set_ccname( pam_handle_t *pamh, krb5_module_data_t *kmd, int login_result, int debug) argument 106 get_set_creds( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char *newpass, int debug) argument 163 krb5_module_data_t *kmd = NULL; local [all...] |
H A D | krb5_setcred.c | 74 krb5_module_data_t *kmd = NULL; local 109 if (pam_get_data(pamh, KRB5_DATA, (const void**)&kmd) != PAM_SUCCESS) { 112 "PAM-KRB5 (setcred): kmd get failed, kmd=0x%p", 113 kmd); 122 "PAM-KRB5 (setcred): inst kmd structure"); 124 kmd = calloc(1, sizeof (krb5_module_data_t)); 126 if (kmd == NULL) 135 kmd->auth_status = PAM_AUTHINFO_UNAVAIL; 138 kmd, 285 attempt_refresh_cred( krb5_module_data_t *kmd, char *user, int flag) argument 361 krb5_renew_tgt( krb5_module_data_t *kmd, krb5_principal me, krb5_principal server, int flag) argument 599 attempt_delete_initcred(krb5_module_data_t *kmd) argument [all...] |
H A D | krb5_authenticate.c | 105 krb5_module_data_t *kmd = NULL; local 135 err = pam_get_data(pamh, KRB5_DATA, (const void**)&kmd); 146 if (kmd != NULL) { 147 if (++(kmd->auth_calls) > 2) { 150 * stack. Clear out the current kmd and proceed as if 156 " two times, clearing kmd"); 158 /* clear out/free current kmd */ 161 krb5_cleanup(pamh, kmd, err); 165 kmd = NULL; 166 } else if (kmd 500 attempt_krb5_auth( pam_handle_t *pamh, krb5_module_data_t *kmd, char *user, char **krb5_pass, boolean_t verify_tik) argument 998 krb5_module_data_t *kmd = (krb5_module_data_t *)data; local [all...] |
/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/ |
H A D | kmem.c | 2657 kmem_log_data_t *kmd) 2660 kmem_log_cpu_t *kmc = kmd->kmd_cpu; 2668 if (kmd->kmd_addr) { 2680 if (kmd->kmd_addr < (uintptr_t)b->bc_addr || 2681 kmd->kmd_addr >= (uintptr_t)b->bc_addr + bufsize) 2708 kmem_log_data_t kmd; local 2753 kmd.kmd_addr = NULL; 2754 kmd.kmd_cpu = kmc; 2786 kmd.kmd_addr = addr; 2794 (void) kmem_log_walk(addr, &b, &kmd); 2656 kmem_log_walk(uintptr_t addr, const kmem_bufctl_audit_t *b, kmem_log_data_t *kmd) argument [all...] |
/illumos-gate/usr/src/uts/common/os/ |
H A D | kmem.c | 4055 kmem_reset_reclaim_threshold(kmem_defrag_t *kmd) argument 4057 kmd->kmd_reclaim_numer = 1; 4069 kmem_adjust_reclaim_threshold(kmem_defrag_t *kmd, int direction) argument 4073 if (kmd->kmd_reclaim_numer < (KMEM_VOID_FRACTION - 1)) { 4074 kmd->kmd_reclaim_numer++; 4078 if (kmd->kmd_reclaim_numer > 1) { 4079 kmd->kmd_reclaim_numer--; 5523 kmem_defrag_t *kmd; local 5529 kmd = cp->cache_defrag; 5530 if (kmd [all...] |
Completed in 67 milliseconds