/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | copy_kdcreq.c | 32 krb5_kdc_req *req; local 35 req = calloc(1, sizeof (krb5_kdc_req)); 36 if (req == NULL) 39 req->magic = in->magic; 40 req->msg_type = in->msg_type; 43 code = krb5_copy_pa_datas(context, in->padata, &req->padata); 48 req->kdc_options = in->kdc_options; 51 code = krb5_copy_principal(context, in->client, &req->client); 57 code = krb5_copy_principal(context, in->server, &req->server); 62 req [all...] |
H A D | rd_req_dec.c | 91 rd_req_decrypt_tkt_part(krb5_context context, const krb5_ap_req *req, argument 106 server != NULL ? server : req->ticket->server, 107 req->ticket->enc_part.kvno, 108 req->ticket->enc_part.enctype, &ktent); 110 retval = krb5_decrypt_tkt_part(context, &ktent.key, req->ticket); 128 if (ktent.key.enctype != req->ticket->enc_part.enctype) { 134 req->ticket); 155 krb5_free_principal(context, req->ticket->server); 156 req->ticket->server = tmp; 173 krb5_principal princ = (krb5_principal) req 256 rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument 726 krb5_rd_req_decoded_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 741 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 757 krb5_rd_req_decoded_anyflag_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 773 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Apps/ |
H A D | weblatency.d | 108 self->req = stringof(this->str); 109 self->nam = strlen(self->req) > 15 ? self->req : self->nam; 110 self->req = dirname(self->req); 111 self->nam = strlen(self->req) > 15 ? self->req : self->nam; 112 self->req = dirname(self->req); 113 self->nam = strlen(self->req) > 1 [all...] |
/osnet-11/usr/src/cmd/dtrace_toolkit/DTT/Bin/ |
H A D | weblatency.d | 108 self->req = stringof(this->str); 109 self->nam = strlen(self->req) > 15 ? self->req : self->nam; 110 self->req = dirname(self->req); 111 self->nam = strlen(self->req) > 15 ? self->req : self->nam; 112 self->req = dirname(self->req); 113 self->nam = strlen(self->req) > 1 [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ext.c | 43 const kdb_check_policy_as_req *req; local 47 req = (const kdb_check_policy_as_req *)request->data; 52 code = krb5_ldap_lockout_check_policy(context, req->client, 53 req->kdc_time); 66 const kdb_audit_as_req *req; local 69 req = (const kdb_audit_as_req *)request->data; 71 code = krb5_ldap_lockout_audit(context, req->client, 72 req->authtime, req->error_code); 83 const kdb_check_allowed_to_delegate_req *req; local 112 krb5_ldap_invoke(krb5_context context, unsigned int method, const krb5_data *req, krb5_data *rep) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_ext.c | 43 const kdb_check_policy_as_req *req; local 47 req = (const kdb_check_policy_as_req *)request->data; 52 code = krb5_db2_lockout_check_policy(context, req->client, 53 req->kdc_time); 66 const kdb_audit_as_req *req; local 69 req = (const kdb_audit_as_req *)request->data; 71 code = krb5_db2_lockout_audit(context, req->client, 72 req->authtime, req->error_code); 80 const krb5_data *req, 78 krb5_db2_invoke(krb5_context context, unsigned int method, const krb5_data *req, krb5_data *rep) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | set_ccache.c | 44 struct krb5_gss_ccache_name_req *req; local 52 assert(value->length == sizeof(*req)); 54 if (value->length != sizeof(*req)) 57 req = (struct krb5_gss_ccache_name_req *)value->value; 61 if (req->out_name) { 76 kg_set_ccache_name (&err, req->name); 89 if (req->out_name) { 90 *(req->out_name) = gss_out_name;
|
H A D | set_allowable_enctypes.c | 74 struct krb5_gss_set_allowable_enctypes_req *req; local 80 assert(value->length == sizeof(*req)); 81 req = (struct krb5_gss_set_allowable_enctypes_req *)value->value; 95 if (req->ktypes) { 96 for (i = 0; i < req->num_ktypes && req->ktypes[i]; i++) { 97 if (!krb5_c_valid_enctype(req->ktypes[i])) { 115 memcpy(new_ktypes, req->ktypes, sizeof(krb5_enctype) * i);
|
H A D | krb5_gss_glue.c | 196 struct krb5_gss_set_allowable_enctypes_req req; local 199 req.num_ktypes = num_ktypes; 200 req.ktypes = ktypes; 202 req_buffer.length = sizeof(req); 203 req_buffer.value = &req; 222 struct krb5_gss_ccache_name_req req; local 225 req.name = name; 226 req.out_name = out_name; 228 req_buffer.length = sizeof(req); 229 req_buffer.value = &req; [all...] |
/osnet-11/usr/src/lib/krb5/dyn/ |
H A D | dynP.h | 44 int _DynRealloc (DynObjectP obj, int req), 45 _DynResize (DynObjectP obj, int req);
|
/osnet-11/usr/src/lib/libilb/common/ |
H A D | ilb_nat.c | 97 ilb_comm_t *req, *rbuf; local 107 if ((req = malloc(reqsz)) == NULL) 109 req_si = (ilb_show_info_t *)&req->ic_data; 125 free(req); 130 req->ic_cmd = ILBD_SHOW_NAT; 132 req->ic_cmd = ILBD_SHOW_PERSIST; 133 req->ic_flags = 0; 139 rc = i_ilb_do_comm(h, req, reqsz, rbuf, &tmp_rbufsz); 171 req->ic_flags = ILB_COMM_END; 173 rc = i_ilb_do_comm(h, req, reqs [all...] |
/osnet-11/usr/src/lib/libcpc/common/ |
H A D | subr.c | 48 cpc_request_t *req; local 72 for (req = set->cs_request; req != NULL; req = req->cr_next) { 77 req->cr_event) != 0) 80 req->cr_preset) != 0) 83 req->cr_flags) != 0) 86 req->cr_index) != 0) 89 if (req [all...] |
/osnet-11/usr/src/lib/lvm/libmeta/common/ |
H A D | meta_mn_changelog.c | 161 mddb_userreq_t req; local 186 (void) memset(&req, 0, sizeof (req)); 189 req.ur_size = MDMN_LOGRECSIZE_OD; 191 if (metaioctl(MD_MN_DB_USERREQ, &req, &req.ur_mde, NULL) != 0) { 192 (void) mdstealerror(ep, &req.ur_mde); 202 tlr->lr_selfid = req.ur_recid; 454 mddb_userreq_t req; local 469 (void) memset(&req, 533 mddb_userreq_t req; local [all...] |
H A D | meta_metad_subr.c | 110 mddb_userreq_t req; local 136 req = *reqp; /* structure assignment */ 137 sr = (md_set_record *)(uintptr_t)req.ur_data; 152 if (metaioctl(MD_DB_USERREQ, &req, &req.ur_mde, NULL) != 0) 153 return (mdstealerror(ep, &req.ur_mde)); 157 req.ur_size = sizeof (*sr); 159 if (metaioctl(MD_DB_USERREQ, &req, &req.ur_mde, NULL) != 0) 160 return (mdstealerror(ep, &req 422 mddb_userreq_t req; local 1454 mddb_userreq_t req; local 1834 mddb_userreq_t req; local 1990 mddb_userreq_t req; local [all...] |
/osnet-11/usr/src/tools/onbld/Scm/ |
H A D | Version.py | 112 for real, req in zip(hgver, desired): 113 if real != req: 114 return real > req
|
/osnet-11/usr/src/lib/libnsl/nsl/ |
H A D | t_bind.c | 50 const struct t_bind *req, 114 bind_reqp->ADDR_length = (req == NULL? 0: req->addr.len); 116 bind_reqp->CONIND_number = (req == NULL? 0: req->qlen); 121 req->addr.buf, &bind_reqp->ADDR_offset) < 0) { 146 if ((req != NULL) && req->addr.len != 0 && 160 if ((req->addr.len != bind_ackp->ADDR_length) || 161 (memcmp(req 48 _tx_bind( int fd, const struct t_bind *req, struct t_bind *ret, int api_semantics ) argument [all...] |
H A D | t_optmgmt.c | 57 const struct t_optmgmt *req, 107 optlen = req->opt.len; 115 if (req->opt.buf == NULL || 122 opt_start = (struct t_opthdr *)req->opt.buf; 228 optreq->MGMT_flags = req->flags; 233 req->opt.buf, &optreq->OPT_offset) < 0) { 280 ret->flags = optack->MGMT_flags & ~req->flags; 55 _tx_optmgmt( int fd, const struct t_optmgmt *req, struct t_optmgmt *ret, int api_semantics ) argument
|
/osnet-11/usr/src/lib/libipmi/common/ |
H A D | ipmi_user.c | 108 ipmi_get_user_access_req_t req = { 0 }; local 110 req.igua_channel = channel; 111 req.igua_uid = uid; 116 cmd.ic_data = &req; 117 cmd.ic_dlen = sizeof (req); 330 ipmi_set_user_password_t req = { 0 }; local 333 req.isup_uid = uid; 334 req.isup_op = IPMI_PASSWORD_OP_SET; 341 req.isup_len20 = 1; 343 (void) strcpy(req [all...] |
H A D | ipmi_sunoem.c | 95 ipmi_send_sunoem_led_set(ipmi_handle_t *ihp, ipmi_cmd_sunoem_led_set_t *req) argument 102 cmd.ic_data = req; 103 cmd.ic_dlen = sizeof (*req); 115 ipmi_send_sunoem_led_get(ipmi_handle_t *ihp, ipmi_cmd_sunoem_led_get_t *req, argument 123 cmd.ic_data = req; 124 cmd.ic_dlen = sizeof (*req); 207 ipmi_sunoem_update_fru(ipmi_handle_t *ihp, ipmi_sunoem_fru_t *req) argument 214 switch (req->isf_type) { 216 req->isf_datalen = sizeof (req [all...] |
/osnet-11/usr/src/lib/libdtrace/common/ |
H A D | nfs.d | 78 ci_protocol = P->req->rq_xprt->xp_xpc.xpc_type == T_RDMA ? "rdma" : 79 P->req->rq_xprt->xp_xpc.xpc_netid == "tcp" ? "ipv4" : 80 P->req->rq_xprt->xp_xpc.xpc_netid == "tcp6" ? "ipv6" : 83 ci_local = (P->req->rq_xprt->xp_xpc.xpc_netid == "tcp") ? 85 P->req->rq_xprt->xp_xpc.xpc_lcladdr.buf)->sin_addr.S_un.S_addr) : 86 (P->req->rq_xprt->xp_xpc.xpc_netid == "tcp6") ? 88 P->req->rq_xprt->xp_xpc.xpc_lcladdr.buf)->sin6_addr) : 91 ci_remote = (P->req->rq_xprt->xp_xpc.xpc_netid == "tcp") ? 93 P->req->rq_xprt->xp_xpc.xpc_rtaddr.buf)->sin_addr.S_un.S_addr) : 94 (P->req [all...] |
/osnet-11/usr/src/lib/libnwam/common/ |
H A D | libnwam_util.c | 136 nwamd_door_arg_t req; local 138 req.nwda_type = type; 140 (void) strlcpy(req.nwda_data.nwdad_register_info.nwdad_name, 142 sizeof (req.nwda_data.nwdad_register_info.nwdad_name)); 144 return (send_msg_to_nwam(&req)); 151 nwamd_door_arg_t req; local 155 req.nwda_type = NWAM_REQUEST_TYPE_ACTION; 156 req.nwda_data.nwdad_object_action.nwdad_object_type = object_type; 157 req.nwda_data.nwdad_object_action.nwdad_action = action; 158 (void) strlcpy(req 175 nwamd_door_arg_t req; local 207 nwamd_door_arg_t req; local 246 nwamd_door_arg_t req; local 274 nwamd_door_arg_t req; local [all...] |
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 423 ** req -- is the file required? 432 # define TLS_OK_F(var, fn, req, st, type) if (ok) \ 437 else if (req) \ 446 ** req -- flags 451 # define TLS_UNR(bit, req) (bitset(bit, req) ? SFF_NORFILES : 0) 452 # define TLS_OUNR(bit, req) (bitset(bit, req) ? SFF_NOWRFILES : 0) 453 # define TLS_KEYSFF(req) \ 455 TLS_OUNR(TLS_I_KEY_OUNR, req) [all...] |
/osnet-11/usr/src/lib/libnsl/yp/ |
H A D | yp_order.c | 105 struct ypreq_nokey req; local 109 req.domain = domain; 110 req.map = map; 120 (char *)&req, (xdrproc_t)xdr_ypresp_order, (char *)&resp,
|
H A D | yp_enum.c | 141 struct ypreq_nokey req; local 145 req.domain = domain; 146 req.map = map; 159 (char *)&req, (xdrproc_t)xdr_ypresp_key_val, 313 struct ypreq_key req; local 317 req.domain = domain; 318 req.map = map; 319 req.keydat.dptr = inkey; 320 req.keydat.dsize = inkeylen; 331 YPPROC_NEXT, (xdrproc_t)xdr_ypreq_key, (char *)&req, [all...] |
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | ServiceTable.java | 500 * @param req Service registration request message. 504 SrvLocMsg register(SSrvReg req) { argument 506 SrvLocHeader hdr = req.getHeader(); 510 ServiceURL surl = req.URL; 511 String serviceType = req.serviceType; 512 Vector attrList = req.attrList; 513 Hashtable urlSig = req.URLSignature; 514 Hashtable attrSig = req.attrSignature; 645 SrvLocMsg ack = req.makeReply(existing); 713 args.addElement(req); 729 deregister(SSrvDereg req) argument 868 findServiceTypes(SSrvTypeMsg req) argument 945 findServices(SSrvMsg req) argument 1055 findAttributes(SAttrMsg req) argument [all...] |