Searched refs:kmd (Results 1 – 6 of 6) sorted by relevance
/titanic_44/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 105 krb5_module_data_t *kmd = NULL; in pam_sm_authenticate() local 135 err = pam_get_data(pamh, KRB5_DATA, (const void**)&kmd); in pam_sm_authenticate() 146 if (kmd != NULL) { in pam_sm_authenticate() 147 if (++(kmd->auth_calls) > 2) { in pam_sm_authenticate() 161 krb5_cleanup(pamh, kmd, err); in pam_sm_authenticate() 165 kmd = NULL; in pam_sm_authenticate() 166 } else if (kmd->auth_calls == 2 && in pam_sm_authenticate() 167 kmd->auth_status == PAM_SUCCESS) { in pam_sm_authenticate() 211 if (kmd == NULL) { in pam_sm_authenticate() 212 kmd = calloc(1, sizeof (krb5_module_data_t)); in pam_sm_authenticate() [all …]
|
H A D | krb5_setcred.c | 74 krb5_module_data_t *kmd = NULL; in pam_sm_setcred() local 109 if (pam_get_data(pamh, KRB5_DATA, (const void**)&kmd) != PAM_SUCCESS) { in pam_sm_setcred() 113 kmd); in pam_sm_setcred() 124 kmd = calloc(1, sizeof (krb5_module_data_t)); in pam_sm_setcred() 126 if (kmd == NULL) in pam_sm_setcred() 135 kmd->auth_status = PAM_AUTHINFO_UNAVAIL; in pam_sm_setcred() 138 kmd, &krb5_cleanup)) != PAM_SUCCESS) { in pam_sm_setcred() 139 free(kmd); in pam_sm_setcred() 154 if (kmd == NULL) { in pam_sm_setcred() 167 pam_strerror(pamh, kmd->auth_status)); in pam_sm_setcred() [all …]
|
H A D | krb5_acct_mgmt.c | 55 krb5_module_data_t *kmd, in fetch_princ_entry() argument 70 password = kmd->password; in fetch_princ_entry() 71 context = kmd->kcontext; in fetch_princ_entry() 168 krb5_module_data_t *kmd, in exp_warn() argument 183 password = kmd->password; in exp_warn() 196 if (code = krb5_init_secure_context(&kmd->kcontext)) { in exp_warn() 204 if (code = krb5_timeofday(kmd->kcontext, &now)) { in exp_warn() 213 if (kmd->expiration != 0) { in exp_warn() 214 expiration = kmd->expiration; in exp_warn() 217 if ((err = fetch_princ_entry(kmd, user, &prent, debug)) in exp_warn() [all …]
|
H A D | krb5_password.c | 60 krb5_module_data_t *kmd, in set_ccname() argument 70 login_result, kmd->env ? kmd->env : "<null>"); in set_ccname() 72 if (kmd->env) { in set_ccname() 80 if ((result = pam_putenv(pamh, kmd->env)) in set_ccname() 93 free(kmd->env); in set_ccname() 94 kmd->env = NULL; in set_ccname() 108 krb5_module_data_t *kmd, in get_set_creds() argument 115 if (!kmd || kmd->age_status != PAM_NEW_AUTHTOK_REQD) in get_set_creds() 124 login_result = attempt_krb5_auth(pamh, kmd, user, &newpass, 0); in get_set_creds() 141 set_ccname(pamh, kmd, login_result, debug); in get_set_creds() [all …]
|
/titanic_44/usr/src/uts/common/os/ |
H A D | kmem.c | 3971 kmem_reset_reclaim_threshold(kmem_defrag_t *kmd) in kmem_reset_reclaim_threshold() argument 3973 kmd->kmd_reclaim_numer = 1; in kmem_reset_reclaim_threshold() 3985 kmem_adjust_reclaim_threshold(kmem_defrag_t *kmd, int direction) in kmem_adjust_reclaim_threshold() argument 3989 if (kmd->kmd_reclaim_numer < (KMEM_VOID_FRACTION - 1)) { in kmem_adjust_reclaim_threshold() 3990 kmd->kmd_reclaim_numer++; in kmem_adjust_reclaim_threshold() 3994 if (kmd->kmd_reclaim_numer > 1) { in kmem_adjust_reclaim_threshold() 3995 kmd->kmd_reclaim_numer--; in kmem_adjust_reclaim_threshold() 5439 kmem_defrag_t *kmd; in kmem_cache_scan() local 5445 kmd = cp->cache_defrag; in kmem_cache_scan() 5446 if (kmd->kmd_consolidate > 0) { in kmem_cache_scan() [all …]
|
/titanic_44/usr/src/cmd/mdb/common/modules/genunix/ |
H A D | kmem.c | 2657 kmem_log_data_t *kmd) in kmem_log_walk() argument 2660 kmem_log_cpu_t *kmc = kmd->kmd_cpu; in kmem_log_walk() 2668 if (kmd->kmd_addr) { in kmem_log_walk() 2680 if (kmd->kmd_addr < (uintptr_t)b->bc_addr || in kmem_log_walk() 2681 kmd->kmd_addr >= (uintptr_t)b->bc_addr + bufsize) in kmem_log_walk() 2708 kmem_log_data_t kmd; in kmem_log() local 2753 kmd.kmd_addr = NULL; in kmem_log() 2754 kmd.kmd_cpu = kmc; in kmem_log() 2786 kmd.kmd_addr = addr; in kmem_log() 2794 (void) kmem_log_walk(addr, &b, &kmd); in kmem_log() [all …]
|