Searched refs:flavor (Results 1 - 25 of 27) sorted by relevance

12

/opensolaris-onvv-gate/usr/src/lib/libnsl/rpc/
H A Dsvc_auth.c52 * using the client auth struct flavor field to index into svcauthsw.
61 * The RPCSEC_GSS flavor is an exception. Its routine takes an
75 int flavor; member in struct:authsvc
130 /* flavor doesn't match any of the builtin types, so try new ones */
133 if (asp->flavor == cred_flavor) {
167 * prepared to handle. When an authentication flavor is registered,
168 * the flavor is checked against already registered values. If not
175 * 1 if flavor already registered
197 if (asp->flavor == cred_flavor) {
210 asp->flavor
[all...]
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dsnoop_rpc.c147 /* eat flavor and verifier */
260 nameof_flavor(flavor)
261 int flavor;
263 switch (flavor) {
304 int pos, flavor, authlen; local
311 flavor = getxdr_long();
315 flavor, nameof_flavor(flavor), authlen); local
319 switch (flavor) {
380 int pos, flavor, verle local
387 flavor, nameof_flavor(flavor), verlen); local
[all...]
H A Dsnoop_nfs4.c541 static char *flavor_name(uint_t flavor);
2950 flavor_name(infop->flavor));
3585 infop->flavor, flavor_name(infop->flavor));
3586 switch (infop->flavor) {
3799 * Return the name of the given authentication flavor.
3803 flavor_name(uint_t flavor) argument
3808 switch (flavor) {
3822 sprintf(buf, "[flavor %d]", flavor);
[all...]
H A Dnfs4_xdr.c2212 if (!xdr_uint32_t(xdrs, &objp->flavor))
2214 switch (objp->flavor) {
/opensolaris-onvv-gate/usr/src/uts/common/rpc/sec/
H A Dsec_svc.c89 * There is an assumption that any flavor less than AUTH_NULL is
129 * RPCSEC_GSS flavor routine takes an additional
141 * dependent e.g. for nfs, it is the pseudo flavor.
151 int flavor, stat; local
157 flavor = req->rq_cred.oa_flavor;
160 switch (flavor) {
215 * flavor - security flavor
224 sec_svc_loadrootnames(int flavor, int count, caddr_t **proots, model_t model) argument
245 switch (flavor) {
342 sec_svc_freerootnames(int flavor, int count, caddr_t *proots) argument
371 sec_svc_inrootlist(int flavor, caddr_t rootname, int count, caddr_t *roots) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/libsmedia/library/common/
H A Dl_generic.c113 smedia_format(smedia_handle_t handle, uint32_t flavor, uint32_t mode) argument
118 ffl.flavor = flavor;
H A Dl_defines.h51 uint32_t flavor; member in struct:format_flags
/opensolaris-onvv-gate/usr/src/uts/common/fs/nfs/
H A Dnfs_auth.c314 * have a limited access to this vnode even if the security flavor
369 nfsauth_retrieve(struct exportinfo *exi, char *req_netid, int flavor, argument
388 * No entry in the cache for this client/flavor
427 varg.arg_u.arg.areq.req_flavor = flavor;
767 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor) argument
782 * has an entry for this flavor in the cache
802 if (EQADDR(&addr, &p->auth_addr) && flavor == p->auth_flavor)
896 if (!nfsauth_retrieve(exi, svc_getnetid(req->rq_xprt), flavor,
909 p->auth_flavor = flavor;
929 * a given nfs flavor numbe
932 nfsauth4_secinfo_access(struct exportinfo *exi, struct svc_req *req, int flavor, int perm) argument
962 int i, flavor, perm; local
[all...]
H A Dnfs4_client_secinfo.c52 * "nfsstat -m" needs to print out what flavor is used for a mount
53 * point. V3 kernel gets the nfs pseudo flavor from the userland and provides
65 * return an integer for a flavor, thus the term "nfs pseudo flavor" is
66 * defined and the nfssec.conf file is used to map the nfs pseudo flavor
96 val[0].flavor = AUTH_SYS;
104 val[i].flavor = RPCSEC_GSS;
110 val[4].flavor = AUTH_DH;
116 val[5].flavor = AUTH_NONE;
142 * Map RPCSEC_GSS data to a nfs pseudo flavor numbe
[all...]
H A Dnfs_log_xdr.c155 unsigned int flavor; local
177 flavor = req->rq_cred.oa_flavor;
178 if (!xdr_u_int(xdrs, &flavor))
H A Dnfs4_srv.c847 * Check if the security flavor, nfsnum, is in the flavor_list.
933 * If the vnode is in a pseudo filesystem, or if the security flavor
934 * used in the request is valid but not an explicitly shared flavor,
1016 * For a real export node, return the flavor that the client
1027 resok_val[i].flavor = si->sc_rpcnum;
1028 if (resok_val[i].flavor == RPCSEC_GSS) {
1058 int access, flavor, perm; local
1060 flavor = secp[i].s_secinfo.sc_nfsnum;
1064 flavor, perm);
1068 flavor_list[ret_cnt] = flavor;
1946 is_exported_sec(int flavor, struct exportinfo *exi) argument
[all...]
/opensolaris-onvv-gate/usr/src/cmd/keyserv/
H A Dkeylogin.c114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument
216 fprintf(stderr, "Wrote %s key into %s\n", flavor,
222 flavor);
H A Dchkey.c452 getrpcpws(char *flavor) argument
457 if (flavor)
460 flavor, pw->pw_name);
733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument
836 flavor);
/opensolaris-onvv-gate/usr/src/cmd/fs.d/nfs/mountd/
H A Dmountd.c2011 * only one security flavor is allowed. So we need
2012 * to determine two things: the particular flavor,
2014 * flavor, i.e. is in the access list.
2078 * client may get readonly access with one flavor
2159 * flavor that the client is using. If it finds
2163 * flavor. Other flavors are values of the new "sec=" option.
2167 struct nd_hostservlist *clnames, int flavor)
2170 return (check_client_new(sh, NULL, &nb, &clnames, flavor));
2172 return (check_client_old(sh, NULL, &nb, &clnames, flavor));
2177 struct nd_hostservlist **clnames, int flavor)
2166 check_client(share_t *sh, struct netbuf *nb, struct nd_hostservlist *clnames, int flavor) argument
2176 check_client_old(share_t *sh, SVCXPRT *transp, struct netbuf **nb, struct nd_hostservlist **clnames, int flavor) argument
2295 is_wrongsec(share_t *sh, SVCXPRT *transp, struct netbuf **nb, struct nd_hostservlist **clnames, int flavor) argument
2341 check_client_new(share_t *sh, SVCXPRT *transp, struct netbuf **nb, struct nd_hostservlist **clnames, int flavor) argument
[all...]
/opensolaris-onvv-gate/usr/src/cmd/smserverd/
H A Dsmediad.c261 static int32_t scsi_format(int32_t fd, uint_t flavor, uint_t mode);
272 static int32_t scsi_ls120_format(uint_t fd, uint_t flavor, uint32_t capacity,
607 scsi_zip_format(int32_t fd, uint_t flavor, uint_t mode) argument
682 switch (flavor) {
724 flavor);
764 scsi_ls120_format(uint_t fd, uint_t flavor, uint32_t capacity, argument
802 switch (flavor) {
852 scsi_format(int32_t fd, uint_t flavor, uint_t mode) argument
935 switch (flavor) {
951 flavor);
3089 scsi_floppy_format(int32_t fd, uint_t flavor, uint_t mode) argument
[all...]
H A Dsmserver.h304 uint_t flavor; member in struct:smedia_reqformat
/opensolaris-onvv-gate/usr/src/lib/libsmedia/library/inc/
H A Dsmedia.h152 int smedia_format(smedia_handle_t handle, uint_t flavor, uint_t mode);
/opensolaris-onvv-gate/usr/src/cmd/fs.d/nfs/nfsstat/
H A Dnfsstat.c1037 char *flavor; local
1204 flavor = nfs_sec.sc_name;
1206 flavor = NULL;
1208 if (flavor != NULL)
1209 printf(",sec=%s", flavor);
/opensolaris-onvv-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetdfs.c907 uint32_t status, flavor; local
912 flavor = dfs_namespace_getflavor(path->p_unc.unc_share);
913 if (flavor == 0)
915 info.i_flavor = flavor;
1224 info300->flavor = DFS_VOLUME_FLAVOR_STANDALONE;
H A Ddfs.c421 * Determines the DFS namespace flavor.
432 /* get flavor info from state info (info level 2) */
1859 * type (root/link) and namespace flavor.
1863 uint32_t flavor)
1871 if (flavor == DFS_VOLUME_FLAVOR_STANDALONE) {
1862 dfs_isvalidpropflagmask(uint32_t propflag_mask, uint32_t type, uint32_t flavor) argument
/opensolaris-onvv-gate/usr/src/lib/libsmedia/plugins/floppy/common/
H A Df_format.c566 ft.flag = ((struct format_flags *)ip)->flavor;
/opensolaris-onvv-gate/usr/src/lib/libsmedia/plugins/scsi/common/
H A Ds_generic.c386 reqformat.flavor = ffl->flavor;
/opensolaris-onvv-gate/usr/src/uts/common/smbsrv/ndl/
H A Dnetdfs.ndl200 DWORD flavor;
/opensolaris-onvv-gate/usr/src/head/rpcsvc/
H A Dnfs4_prot.x101 NFS4ERR_WRONGSEC = 10016,/* wrong security flavor */
1294 union secinfo4 switch (uint32_t flavor) {
/opensolaris-onvv-gate/usr/src/uts/common/nfs/
H A Dnfs4_kprot.h1243 uint32_t flavor; member in struct:secinfo4

Completed in 286 milliseconds

12