Searched refs:kmd (Results 1 – 6 of 6) sorted by relevance
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 103 krb5_module_data_t *kmd = NULL; in pam_sm_authenticate() local 133 err = pam_get_data(pamh, KRB5_DATA, (const void **)&kmd); in pam_sm_authenticate() 144 if (kmd != NULL) { in pam_sm_authenticate() 145 if (++(kmd->auth_calls) > 2) { in pam_sm_authenticate() 159 krb5_cleanup(pamh, kmd, err); in pam_sm_authenticate() 163 kmd = NULL; in pam_sm_authenticate() 164 } else if (kmd->auth_calls == 2 && in pam_sm_authenticate() 165 kmd->auth_status == PAM_SUCCESS) { in pam_sm_authenticate() 209 if (kmd == NULL) { in pam_sm_authenticate() 210 kmd = calloc(1, sizeof (krb5_module_data_t)); in pam_sm_authenticate() [all …]
|
H A D | krb5_setcred.c | 72 krb5_module_data_t *kmd = NULL; in pam_sm_setcred() local 107 if (pam_get_data(pamh, KRB5_DATA, (const void **)&kmd) != PAM_SUCCESS) { in pam_sm_setcred() 111 kmd); in pam_sm_setcred() 122 kmd = calloc(1, sizeof (krb5_module_data_t)); in pam_sm_setcred() 124 if (kmd == NULL) in pam_sm_setcred() 133 kmd->auth_status = PAM_AUTHINFO_UNAVAIL; in pam_sm_setcred() 136 kmd, &krb5_cleanup)) != PAM_SUCCESS) { in pam_sm_setcred() 137 free(kmd); in pam_sm_setcred() 152 if (kmd == NULL) { in pam_sm_setcred() 165 pam_strerror(pamh, kmd->auth_status)); in pam_sm_setcred() [all …]
|
H A D | krb5_acct_mgmt.c | 57 krb5_module_data_t *kmd, in fetch_princ_entry() argument 72 password = kmd->password; in fetch_princ_entry() 73 context = kmd->kcontext; in fetch_princ_entry() 170 krb5_module_data_t *kmd, in exp_warn() argument 185 password = kmd->password; in exp_warn() 198 if (code = krb5_init_secure_context(&kmd->kcontext)) { in exp_warn() 206 if (code = krb5_timeofday(kmd->kcontext, &now)) { in exp_warn() 215 if (kmd->expiration != 0) { in exp_warn() 216 expiration = kmd->expiration; in exp_warn() 219 if ((err = fetch_princ_entry(kmd, user, &prent, debug)) in exp_warn() [all …]
|
H A D | krb5_password.c | 62 krb5_module_data_t *kmd, in set_ccname() argument 72 login_result, kmd->env ? kmd->env : "<null>"); in set_ccname() 74 if (kmd->env) { in set_ccname() 82 if ((result = pam_putenv(pamh, kmd->env)) in set_ccname() 95 free(kmd->env); in set_ccname() 96 kmd->env = NULL; in set_ccname() 110 krb5_module_data_t *kmd, in get_set_creds() argument 117 if (!kmd || kmd->age_status != PAM_NEW_AUTHTOK_REQD) in get_set_creds() 126 login_result = attempt_krb5_auth(pamh, kmd, user, &newpass, 0); in get_set_creds() 143 set_ccname(pamh, kmd, login_result, debug); in get_set_creds() [all …]
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | kmem.c | 4029 kmem_reset_reclaim_threshold(kmem_defrag_t *kmd) in kmem_reset_reclaim_threshold() argument 4031 kmd->kmd_reclaim_numer = 1; in kmem_reset_reclaim_threshold() 4043 kmem_adjust_reclaim_threshold(kmem_defrag_t *kmd, int direction) in kmem_adjust_reclaim_threshold() argument 4047 if (kmd->kmd_reclaim_numer < (KMEM_VOID_FRACTION - 1)) { in kmem_adjust_reclaim_threshold() 4048 kmd->kmd_reclaim_numer++; in kmem_adjust_reclaim_threshold() 4052 if (kmd->kmd_reclaim_numer > 1) { in kmem_adjust_reclaim_threshold() 4053 kmd->kmd_reclaim_numer--; in kmem_adjust_reclaim_threshold() 5377 kmem_defrag_t *kmd; in kmem_cache_scan() local 5383 kmd = cp->cache_defrag; in kmem_cache_scan() 5384 if (kmd->kmd_consolidate > 0) { in kmem_cache_scan() [all …]
|
/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/ |
H A D | kmem.c | 2658 kmem_log_data_t *kmd) in kmem_log_walk() argument 2661 kmem_log_cpu_t *kmc = kmd->kmd_cpu; in kmem_log_walk() 2669 if (kmd->kmd_addr) { in kmem_log_walk() 2681 if (kmd->kmd_addr < (uintptr_t)b->bc_addr || in kmem_log_walk() 2682 kmd->kmd_addr >= (uintptr_t)b->bc_addr + bufsize) in kmem_log_walk() 2709 kmem_log_data_t kmd; in kmem_log() local 2754 kmd.kmd_addr = 0; in kmem_log() 2755 kmd.kmd_cpu = kmc; in kmem_log() 2787 kmd.kmd_addr = addr; in kmem_log() 2795 (void) kmem_log_walk(addr, &b, &kmd); in kmem_log() [all …]
|