/osnet-11/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 479 CLIENT *client; local 499 client = clnt_tp_create(nisbuf->master, YPPASSWDPROG, 504 client = clnt_create(nisbuf->master, YPPASSWDPROG, 506 if (client == NULL) 507 client = clnt_create(nisbuf->master, YPPASSWDPROG, 511 if (client == NULL) { 513 "passwdutil.so: couldn't create client to YP master"); 520 ans = CLNT_CALL(client, YPPASSWDPROC_UPDATE, xdr_yppasswd, 532 (void) clnt_destroy(client);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | s4u_creds.c | 45 krb5_principal client, 70 krb5_principal client; local 75 if (in_creds->client == NULL && subject_cert == NULL) { 79 if (in_creds->client != NULL && 80 krb5_princ_type(context, in_creds->client) != 83 return krb5_copy_principal(context, in_creds->client, canon_user); 101 if (in_creds->client != NULL) 102 client = in_creds->client; 110 client 43 krb5_get_as_key_noop( krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument [all...] |
H A D | gc_frm_kdc.c | 178 krb5_principal client, krb5_principal server, 303 * Resulting credential has CLIENT as the client principal, and 310 tgt_mcred(krb5_context ctx, krb5_principal client, argument 319 retval = krb5_copy_principal(ctx, client, &mcreds->client); 342 krb5_principal client, krb5_principal server) 347 retval = krb5_walk_realm_tree(ts->ctx, krb5_princ_realm(ts->ctx, client), 370 * Prime CUR_TGT with the cached TGT of the client's local realm. 373 retr_local_tgt(struct tr_state *ts, krb5_principal client) argument 379 retval = tgt_mcred(ts->ctx, client, clien 341 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument 597 kdc_mcred(struct tr_state *ts, krb5_principal client, krb5_creds *mcreds) argument 630 next_closest_tgt(struct tr_state *ts, krb5_principal client) argument 764 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts, int *tgtptr_isoffpath) argument 849 chase_offpath(struct tr_state *ts, krb5_principal client, krb5_principal server) argument 992 krb5_principal client, server, supplied_server, out_supplied_server; local [all...] |
H A D | get_in_tkt.c | 60 Attempts to get an initial ticket for creds->client to use server 61 creds->server, (realm is taken from creds->client), with options 294 * Use salt corresponding to the client principal supplied by 297 * as_reply->client later in verify_as_reply. 299 if ((retval = krb5_principal2salt(context, as_reply->client, &salt))) 336 if (!krb5_principal_compare_any_realm(context, request->client, 406 (krb5_princ_type(context, request->client) == 414 as_reply->client, 421 (!krb5_principal_compare(context, as_reply->client, request->client) || 494 krb5_principal client; local 1072 build_in_tkt_name(krb5_context context, char *in_tkt_service, krb5_const_principal client, krb5_principal *server) argument 1402 krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context *pctx) argument 2313 krb5int_get_init_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_prompter_fct prompter, void *prompter_data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_gic_get_as_key_fct gak_fct, void *gak_data, int *use_master, krb5_kdc_rep **as_reply) argument [all...] |
H A D | preauth2.c | 721 if ((ret = ((*gak_fct)(context, request->client, 883 if ((ret = (gak_fct)(context, request->client, *etype, prompter, 952 if ((ret = krb5_principal2salt(context, request->client, 990 if (ret = krb5_principal2salt(context, request->client, 1122 /* If we don't have a client cert, we're done */ 1123 if(request->client == NULL) { 1124 kdcPkinitDebug("No request->client; aborting PKINIT\n"); 1127 krtn = krb5_unparse_name(context, request->client, &client_principal); 1134 kdcPkinitDebug("No client cert; aborting PKINIT\n"); 1231 krb5_principal client) 1229 local_kdc_cert_match(krb5_context context, krb5_data *signer_cert, krb5_principal client) argument 1724 krb5_principal client; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/ |
H A D | rc_dfl.c | 88 h += *rep->client; 103 (strcmp(old->client, new1->client) == 0) && 205 ta->rep.client = ta->rep.server = ta->rep.msghash = NULL; 206 if (!(ta->rep.client = strdup(rep->client))) 216 if (ta->rep.client) 217 free(ta->rep.client); 295 free(q->rep.client); 388 if (rp->client) 444 char *msghash = NULL, *client = NULL, *server = NULL, *str, *end; local [all...] |
/osnet-11/usr/src/lib/libwrap/ |
H A D | tcpd.h | 102 struct host_info client[1]; /* client endpoint info */ member in struct:request_info 144 extern void fromhost(); /* get/validate client host info */ 152 extern void rfc931(); /* client name from RFC 931 daemon */ 192 #define RQ_USER 3 /* client user name */ 193 #define RQ_CLIENT_NAME 4 /* client host name */ 194 #define RQ_CLIENT_ADDR 5 /* client host address */ 195 #define RQ_CLIENT_SIN 6 /* client endpoint (internal) */ 204 * name, address, and client user lookup methods. The request_info and 208 extern char *eval_user(); /* client use [all...] |
/osnet-11/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_subr.c | 675 CLIENT *client; local 692 client = __nis_clnt_create(RPC_ANYFD, nc, uaddr, 0, 0, 694 if (!client) 697 (void) clnt_control(client, CLSET_FD_CLOSE, NULL); 708 (void) clnt_control(client, CLSET_RETRY_TIMEOUT, (char *)&tv); 717 clnt_st = clnt_call(client, RPCBPROC_GETADDR, xdr_rpcb, (char *)&parms, 721 clnt_destroy(client); 747 (void) clnt_control(client, CLGET_SVC_ADDR, (char *)&remote); 765 clnt_destroy(client); 773 clnt_destroy(client); [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | key_call.c | 767 CLIENT *client; /* Client handle */ member in struct:key_call_private 769 int fd; /* client handle fd */ 770 dev_t rdev; /* device client handle is using */ 781 if (kcp != NULL && kcp->client != NULL) { 783 clnt_destroy(kcp->client); 817 * if pid has changed, destroy client and rebuild 818 * or if stale is '1' then destroy client and rebuild 820 if (kcp->client && 822 clnt_destroy(kcp->client); 823 kcp->client [all...] |
H A D | rpcb_clnt.c | 290 * This routine will return a client handle that is connected to the 303 * If tp is NULL, use default timeout to get a client handle. 309 CLIENT *client = NULL; local 327 client = _clnt_tli_create_timed(RPC_ANYFD, nconf, addr, 329 if (client != NULL) { 332 * case where a client handle is created 353 return (client); 381 fprintf(stderr, "rpcbind client routines: diagnostics :\n"); 414 client = _clnt_tli_create_timed(RPC_ANYFD, nconf, addr, RPCBPROG, 416 if (client) 502 CLIENT *client; local 555 CLIENT *client; local 706 CLIENT *client = NULL; local 1088 CLIENT *client; local 1143 CLIENT *client; local 1206 CLIENT *client = NULL; local 1263 CLIENT *client; local 1293 CLIENT *client; local [all...] |
/osnet-11/usr/src/lib/libdns_sd/java/com/apple/dnssd/ |
H A D | DNSSD.java | 185 Note: When the desired results have been returned, the client MUST terminate the resolve by 196 The interface on which to resolve the service. The client should 239 computer name is used (this name is communicated to the client via 262 browsing, but will cause a name conflict if another client tries to 287 computer name is used (this name is communicated to the client via 297 browsing, but will cause a name conflict if another client tries to 591 protected DNSSDService _makeBrowser( int flags, int ifIndex, String regType, String domain, BrowseListener client) argument 594 return new AppleBrowser( flags, ifIndex, regType, domain, client); 598 String domain, ResolveListener client) 601 return new AppleResolver( flags, ifIndex, serviceName, regType, domain, client); 597 _resolve( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener client) argument 604 _register( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, TXTRecord txtRecord, RegisterListener client) argument 618 _queryRecord( int flags, int ifIndex, String serviceName, int rrtype, int rrclass, QueryListener client) argument 737 AppleBrowser( int flags, int ifIndex, String regType, String domain, BrowseListener client) argument 752 AppleResolver( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener client) argument 804 AppleRegistration( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, byte[] txtRecord, RegisterListener client) argument 868 AppleQuery( int flags, int ifIndex, String serviceName, int rrtype, int rrclass, QueryListener client) argument 884 AppleDomainEnum( int flags, int ifIndex, DomainListener client) argument [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_acl.c | 884 __kadm5_get_priv(void *server_handle, long *privs, gss_name_t client) 899 if (GSS_ERROR(major = gss_display_name(&minor, client, &caller_buff, 873 __kadm5_get_priv(void *server_handle, long *privs, gss_name_t client) argument
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 68 krb5_principal client, krb5_principal server, 105 /* If we don't have a client, we're done */ 106 if (request->client == NULL) { 107 pkiDebug("No request->client; aborting PKINIT\n"); 146 nonce, &cksum, request->client, request->server, &out_data); 225 krb5_principal client, 294 /* create client-side DH keys */ 353 if (krb5_principal_compare_any_realm(context, client, 775 /* client after KDC reply */ 1063 reqctx->idctx, 1, request->client); 218 pkinit_as_req_create(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_timestamp ctsec, krb5_int32 cusec, krb5_ui_4 nonce, const krb5_checksum * cksum, krb5_principal client, krb5_principal server, krb5_data ** as_req) argument [all...] |
H A D | pkinit_srv.c | 108 struct _krb5_db_entry_new * client, 122 client, &armor_key); 124 /* Don't advertise PKINIT if the client used FAST. */ 131 * don't tell the client that we support pkinit! 145 krb5_principal client, 166 /* XXX Verify this is consistent with client side XXX */ 185 krb5_unparse_name(context, client, &client_string); 191 pkiDebug("%s: Comparing client '%s' to pkinit san value '%s'\n", 195 if (krb5_principal_compare(context, princs[i], client)) { 219 pkiDebug("%s: Comparing client ' 106 pkinit_server_get_edata(krb5_context context, krb5_kdc_req * request, struct _krb5_db_entry_new * client, struct _krb5_db_entry_new * server, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, krb5_pa_data * data) argument 142 verify_client_san(krb5_context context, pkinit_kdc_context plgctx, pkinit_kdc_req_context reqctx, krb5_principal client, int *valid_san) argument 296 pkinit_server_verify_padata(krb5_context context, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_enc_tkt_part * enc_tkt_reply, krb5_pa_data * data, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context, krb5_data **e_data, krb5_authdata ***authz_data) argument 667 pkinit_server_return_padata(krb5_context context, krb5_pa_data * padata, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_kdc_rep * reply, struct _krb5_key_data * client_key, krb5_keyblock * encrypting_key, krb5_pa_data ** send_pa, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context) argument [all...] |
/osnet-11/usr/src/lib/libradproto/common/ |
H A D | radclient.c | 106 rc_stop(rc_conn_t *client) argument 108 (void) pthread_mutex_lock(&client->rrc_rlock); 109 if (!client->rrc_closed) { 110 client->rrc_closed = B_TRUE; 111 (void) pthread_cond_broadcast(&client->rrc_cv); 114 adr_stream_close(client->rrc_stream); 116 (void) pthread_mutex_unlock(&client->rrc_rlock); 122 rc_conn_t *client = read_handle; local 123 int res = adr_stream_read(client->rrc_stream, buf, len); 125 rc_stop(client); 132 rc_conn_t *client = write_handle; local 204 rc_rele(rc_conn_t *client) argument 240 rc_conn_t *client = zalloc(sizeof (rc_conn_t)); local 283 radclient_read(rc_conn_t *client, message_wrapper_t **mwp) argument 302 rc_queue_event(rc_conn_t *client, message_wrapper_t *mw) argument 311 rc_queue_response(rc_conn_t *client, message_wrapper_t *mw) argument 321 find_response(rc_conn_t *client, long long serial) argument 331 rc_dequeue_response(rc_conn_t *client, long long serial) argument 386 rc_set_threaded(rc_conn_t *client, boolean_t threaded) argument 396 rc_thread(rc_conn_t *client) argument 444 rc_wait(rc_conn_t *client, long long serial) argument [all...] |
/osnet-11/usr/src/lib/fm/topo/libtopo/common/ |
H A D | topo_mod.c | 772 * Generate client occupant path from the iport di_node, target port and 789 di_node_t client = DI_NODE_NIL; local 813 /* find matching client node */ 816 /* do we have a client? */ 817 client = di_path_client_node(path_node); 818 if (client == DI_NODE_NIL) { 819 topo_mod_dprintf(mod, "%s: No client\n", __func__); 860 client_devfs_path = di_devfs_path(client); 862 /* oc_path is the client devfs path */
|
/osnet-11/usr/src/lib/libbsm/common/ |
H A D | adt_token.c | 914 uint32_t client; local 918 client = ((union convert *)p_data)->tuint32; 920 if (client == 0 && required == 0) { 923 DPRINTF((" client=%u\n", client)); 924 (void) au_write(event->ae_event_handle, au_to_xclient(client));
|
H A D | au_to.c | 1397 au_to_xclient(uint32_t client) argument 1408 adr_int32(&adr, (int32_t *)&client, 1);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | kdb.h | 116 /* Is AS-REQ (client referrals only) */ 174 krb5_timestamp expiration; /* When the client expires */ 332 krb5_db_entry *client; /* DB entry for client principal */ member in struct:_kdb_sign_auth_data_req 358 krb5_db_entry *client; member in struct:_kdb_check_policy_as_req 385 krb5_db_entry *client; member in struct:_kdb_audit_as_req 394 krb5_const_principal client; member in struct:_kdb_audit_tgs_req 404 krb5_const_principal client; member in struct:_kdb_check_allowed_to_delegate_req
|