Home
last modified time | relevance | path

Searched refs:kmd (Results 1 – 6 of 6) sorted by relevance

/titanic_41/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c105 krb5_module_data_t *kmd = NULL; in pam_sm_authenticate() local
135 err = pam_get_data(pamh, KRB5_DATA, (const void**)&kmd); in pam_sm_authenticate()
146 if (kmd != NULL) { in pam_sm_authenticate()
147 if (++(kmd->auth_calls) > 2) { in pam_sm_authenticate()
161 krb5_cleanup(pamh, kmd, err); in pam_sm_authenticate()
165 kmd = NULL; in pam_sm_authenticate()
166 } else if (kmd->auth_calls == 2 && in pam_sm_authenticate()
167 kmd->auth_status == PAM_SUCCESS) { in pam_sm_authenticate()
211 if (kmd == NULL) { in pam_sm_authenticate()
212 kmd = calloc(1, sizeof (krb5_module_data_t)); in pam_sm_authenticate()
[all …]
H A Dkrb5_setcred.c74 krb5_module_data_t *kmd = NULL; in pam_sm_setcred() local
109 if (pam_get_data(pamh, KRB5_DATA, (const void**)&kmd) != PAM_SUCCESS) { in pam_sm_setcred()
113 kmd); in pam_sm_setcred()
124 kmd = calloc(1, sizeof (krb5_module_data_t)); in pam_sm_setcred()
126 if (kmd == NULL) in pam_sm_setcred()
135 kmd->auth_status = PAM_AUTHINFO_UNAVAIL; in pam_sm_setcred()
138 kmd, &krb5_cleanup)) != PAM_SUCCESS) { in pam_sm_setcred()
139 free(kmd); in pam_sm_setcred()
154 if (kmd == NULL) { in pam_sm_setcred()
167 pam_strerror(pamh, kmd->auth_status)); in pam_sm_setcred()
[all …]
H A Dkrb5_acct_mgmt.c55 krb5_module_data_t *kmd, in fetch_princ_entry() argument
70 password = kmd->password; in fetch_princ_entry()
71 context = kmd->kcontext; in fetch_princ_entry()
168 krb5_module_data_t *kmd, in exp_warn() argument
183 password = kmd->password; in exp_warn()
196 if (code = krb5_init_secure_context(&kmd->kcontext)) { in exp_warn()
204 if (code = krb5_timeofday(kmd->kcontext, &now)) { in exp_warn()
213 if (kmd->expiration != 0) { in exp_warn()
214 expiration = kmd->expiration; in exp_warn()
217 if ((err = fetch_princ_entry(kmd, user, &prent, debug)) in exp_warn()
[all …]
H A Dkrb5_password.c60 krb5_module_data_t *kmd, in set_ccname() argument
70 login_result, kmd->env ? kmd->env : "<null>"); in set_ccname()
72 if (kmd->env) { in set_ccname()
80 if ((result = pam_putenv(pamh, kmd->env)) in set_ccname()
93 free(kmd->env); in set_ccname()
94 kmd->env = NULL; in set_ccname()
108 krb5_module_data_t *kmd, in get_set_creds() argument
115 if (!kmd || kmd->age_status != PAM_NEW_AUTHTOK_REQD) in get_set_creds()
124 login_result = attempt_krb5_auth(pamh, kmd, user, &newpass, 0); in get_set_creds()
141 set_ccname(pamh, kmd, login_result, debug); in get_set_creds()
[all …]
/titanic_41/usr/src/uts/common/os/
H A Dkmem.c3971 kmem_reset_reclaim_threshold(kmem_defrag_t *kmd) in kmem_reset_reclaim_threshold() argument
3973 kmd->kmd_reclaim_numer = 1; in kmem_reset_reclaim_threshold()
3985 kmem_adjust_reclaim_threshold(kmem_defrag_t *kmd, int direction) in kmem_adjust_reclaim_threshold() argument
3989 if (kmd->kmd_reclaim_numer < (KMEM_VOID_FRACTION - 1)) { in kmem_adjust_reclaim_threshold()
3990 kmd->kmd_reclaim_numer++; in kmem_adjust_reclaim_threshold()
3994 if (kmd->kmd_reclaim_numer > 1) { in kmem_adjust_reclaim_threshold()
3995 kmd->kmd_reclaim_numer--; in kmem_adjust_reclaim_threshold()
5439 kmem_defrag_t *kmd; in kmem_cache_scan() local
5445 kmd = cp->cache_defrag; in kmem_cache_scan()
5446 if (kmd->kmd_consolidate > 0) { in kmem_cache_scan()
[all …]
/titanic_41/usr/src/cmd/mdb/common/modules/genunix/
H A Dkmem.c2657 kmem_log_data_t *kmd) in kmem_log_walk() argument
2660 kmem_log_cpu_t *kmc = kmd->kmd_cpu; in kmem_log_walk()
2668 if (kmd->kmd_addr) { in kmem_log_walk()
2680 if (kmd->kmd_addr < (uintptr_t)b->bc_addr || in kmem_log_walk()
2681 kmd->kmd_addr >= (uintptr_t)b->bc_addr + bufsize) in kmem_log_walk()
2708 kmem_log_data_t kmd; in kmem_log() local
2753 kmd.kmd_addr = NULL; in kmem_log()
2754 kmd.kmd_cpu = kmc; in kmem_log()
2786 kmd.kmd_addr = addr; in kmem_log()
2794 (void) kmem_log_walk(addr, &b, &kmd); in kmem_log()
[all …]