Searched defs:client (Results 26 - 44 of 44) sorted by relevance

12

/osnet-11/usr/src/lib/passwdutil/
H A Dnis_attr.c479 CLIENT *client; local
499 client = clnt_tp_create(nisbuf->master, YPPASSWDPROG,
504 client = clnt_create(nisbuf->master, YPPASSWDPROG,
506 if (client == NULL)
507 client = clnt_create(nisbuf->master, YPPASSWDPROG,
511 if (client == NULL) {
513 "passwdutil.so: couldn't create client to YP master");
520 ans = CLNT_CALL(client, YPPASSWDPROC_UPDATE, xdr_yppasswd,
532 (void) clnt_destroy(client);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Ds4u_creds.c45 krb5_principal client,
70 krb5_principal client; local
75 if (in_creds->client == NULL && subject_cert == NULL) {
79 if (in_creds->client != NULL &&
80 krb5_princ_type(context, in_creds->client) !=
83 return krb5_copy_principal(context, in_creds->client, canon_user);
101 if (in_creds->client != NULL)
102 client = in_creds->client;
110 client
43 krb5_get_as_key_noop( krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
[all...]
H A Dgc_frm_kdc.c178 krb5_principal client, krb5_principal server,
303 * Resulting credential has CLIENT as the client principal, and
310 tgt_mcred(krb5_context ctx, krb5_principal client, argument
319 retval = krb5_copy_principal(ctx, client, &mcreds->client);
342 krb5_principal client, krb5_principal server)
347 retval = krb5_walk_realm_tree(ts->ctx, krb5_princ_realm(ts->ctx, client),
370 * Prime CUR_TGT with the cached TGT of the client's local realm.
373 retr_local_tgt(struct tr_state *ts, krb5_principal client) argument
379 retval = tgt_mcred(ts->ctx, client, clien
341 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument
597 kdc_mcred(struct tr_state *ts, krb5_principal client, krb5_creds *mcreds) argument
630 next_closest_tgt(struct tr_state *ts, krb5_principal client) argument
764 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts, int *tgtptr_isoffpath) argument
849 chase_offpath(struct tr_state *ts, krb5_principal client, krb5_principal server) argument
992 krb5_principal client, server, supplied_server, out_supplied_server; local
[all...]
H A Dget_in_tkt.c60 Attempts to get an initial ticket for creds->client to use server
61 creds->server, (realm is taken from creds->client), with options
294 * Use salt corresponding to the client principal supplied by
297 * as_reply->client later in verify_as_reply.
299 if ((retval = krb5_principal2salt(context, as_reply->client, &salt)))
336 if (!krb5_principal_compare_any_realm(context, request->client,
406 (krb5_princ_type(context, request->client) ==
414 as_reply->client,
421 (!krb5_principal_compare(context, as_reply->client, request->client) ||
494 krb5_principal client; local
1072 build_in_tkt_name(krb5_context context, char *in_tkt_service, krb5_const_principal client, krb5_principal *server) argument
1402 krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context *pctx) argument
2313 krb5int_get_init_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_prompter_fct prompter, void *prompter_data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_gic_get_as_key_fct gak_fct, void *gak_data, int *use_master, krb5_kdc_rep **as_reply) argument
[all...]
H A Dpreauth2.c721 if ((ret = ((*gak_fct)(context, request->client,
883 if ((ret = (gak_fct)(context, request->client, *etype, prompter,
952 if ((ret = krb5_principal2salt(context, request->client,
990 if (ret = krb5_principal2salt(context, request->client,
1122 /* If we don't have a client cert, we're done */
1123 if(request->client == NULL) {
1124 kdcPkinitDebug("No request->client; aborting PKINIT\n");
1127 krtn = krb5_unparse_name(context, request->client, &client_principal);
1134 kdcPkinitDebug("No client cert; aborting PKINIT\n");
1231 krb5_principal client)
1229 local_kdc_cert_match(krb5_context context, krb5_data *signer_cert, krb5_principal client) argument
1724 krb5_principal client; local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/
H A Drc_dfl.c88 h += *rep->client;
103 (strcmp(old->client, new1->client) == 0) &&
205 ta->rep.client = ta->rep.server = ta->rep.msghash = NULL;
206 if (!(ta->rep.client = strdup(rep->client)))
216 if (ta->rep.client)
217 free(ta->rep.client);
295 free(q->rep.client);
388 if (rp->client)
444 char *msghash = NULL, *client = NULL, *server = NULL, *str, *end; local
[all...]
/osnet-11/usr/src/lib/libwrap/
H A Dtcpd.h102 struct host_info client[1]; /* client endpoint info */ member in struct:request_info
144 extern void fromhost(); /* get/validate client host info */
152 extern void rfc931(); /* client name from RFC 931 daemon */
192 #define RQ_USER 3 /* client user name */
193 #define RQ_CLIENT_NAME 4 /* client host name */
194 #define RQ_CLIENT_ADDR 5 /* client host address */
195 #define RQ_CLIENT_SIN 6 /* client endpoint (internal) */
204 * name, address, and client user lookup methods. The request_info and
208 extern char *eval_user(); /* client use
[all...]
/osnet-11/usr/src/lib/libnsl/nis/gen/
H A Dnis_subr.c675 CLIENT *client; local
692 client = __nis_clnt_create(RPC_ANYFD, nc, uaddr, 0, 0,
694 if (!client)
697 (void) clnt_control(client, CLSET_FD_CLOSE, NULL);
708 (void) clnt_control(client, CLSET_RETRY_TIMEOUT, (char *)&tv);
717 clnt_st = clnt_call(client, RPCBPROC_GETADDR, xdr_rpcb, (char *)&parms,
721 clnt_destroy(client);
747 (void) clnt_control(client, CLGET_SVC_ADDR, (char *)&remote);
765 clnt_destroy(client);
773 clnt_destroy(client);
[all...]
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dkey_call.c767 CLIENT *client; /* Client handle */ member in struct:key_call_private
769 int fd; /* client handle fd */
770 dev_t rdev; /* device client handle is using */
781 if (kcp != NULL && kcp->client != NULL) {
783 clnt_destroy(kcp->client);
817 * if pid has changed, destroy client and rebuild
818 * or if stale is '1' then destroy client and rebuild
820 if (kcp->client &&
822 clnt_destroy(kcp->client);
823 kcp->client
[all...]
H A Drpcb_clnt.c290 * This routine will return a client handle that is connected to the
303 * If tp is NULL, use default timeout to get a client handle.
309 CLIENT *client = NULL; local
327 client = _clnt_tli_create_timed(RPC_ANYFD, nconf, addr,
329 if (client != NULL) {
332 * case where a client handle is created
353 return (client);
381 fprintf(stderr, "rpcbind client routines: diagnostics :\n");
414 client = _clnt_tli_create_timed(RPC_ANYFD, nconf, addr, RPCBPROG,
416 if (client)
502 CLIENT *client; local
555 CLIENT *client; local
706 CLIENT *client = NULL; local
1088 CLIENT *client; local
1143 CLIENT *client; local
1206 CLIENT *client = NULL; local
1263 CLIENT *client; local
1293 CLIENT *client; local
[all...]
/osnet-11/usr/src/lib/libdns_sd/java/com/apple/dnssd/
H A DDNSSD.java185 Note: When the desired results have been returned, the client MUST terminate the resolve by
196 The interface on which to resolve the service. The client should
239 computer name is used (this name is communicated to the client via
262 browsing, but will cause a name conflict if another client tries to
287 computer name is used (this name is communicated to the client via
297 browsing, but will cause a name conflict if another client tries to
591 protected DNSSDService _makeBrowser( int flags, int ifIndex, String regType, String domain, BrowseListener client) argument
594 return new AppleBrowser( flags, ifIndex, regType, domain, client);
598 String domain, ResolveListener client)
601 return new AppleResolver( flags, ifIndex, serviceName, regType, domain, client);
597 _resolve( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener client) argument
604 _register( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, TXTRecord txtRecord, RegisterListener client) argument
618 _queryRecord( int flags, int ifIndex, String serviceName, int rrtype, int rrclass, QueryListener client) argument
737 AppleBrowser( int flags, int ifIndex, String regType, String domain, BrowseListener client) argument
752 AppleResolver( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener client) argument
804 AppleRegistration( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, byte[] txtRecord, RegisterListener client) argument
868 AppleQuery( int flags, int ifIndex, String serviceName, int rrtype, int rrclass, QueryListener client) argument
884 AppleDomainEnum( int flags, int ifIndex, DomainListener client) argument
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dserver_acl.c884 __kadm5_get_priv(void *server_handle, long *privs, gss_name_t client)
899 if (GSS_ERROR(major = gss_display_name(&minor, client, &caller_buff,
873 __kadm5_get_priv(void *server_handle, long *privs, gss_name_t client) argument
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_clnt.c68 krb5_principal client, krb5_principal server,
105 /* If we don't have a client, we're done */
106 if (request->client == NULL) {
107 pkiDebug("No request->client; aborting PKINIT\n");
146 nonce, &cksum, request->client, request->server, &out_data);
225 krb5_principal client,
294 /* create client-side DH keys */
353 if (krb5_principal_compare_any_realm(context, client,
775 /* client after KDC reply */
1063 reqctx->idctx, 1, request->client);
218 pkinit_as_req_create(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_timestamp ctsec, krb5_int32 cusec, krb5_ui_4 nonce, const krb5_checksum * cksum, krb5_principal client, krb5_principal server, krb5_data ** as_req) argument
[all...]
H A Dpkinit_srv.c108 struct _krb5_db_entry_new * client,
122 client, &armor_key);
124 /* Don't advertise PKINIT if the client used FAST. */
131 * don't tell the client that we support pkinit!
145 krb5_principal client,
166 /* XXX Verify this is consistent with client side XXX */
185 krb5_unparse_name(context, client, &client_string);
191 pkiDebug("%s: Comparing client '%s' to pkinit san value '%s'\n",
195 if (krb5_principal_compare(context, princs[i], client)) {
219 pkiDebug("%s: Comparing client '
106 pkinit_server_get_edata(krb5_context context, krb5_kdc_req * request, struct _krb5_db_entry_new * client, struct _krb5_db_entry_new * server, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, krb5_pa_data * data) argument
142 verify_client_san(krb5_context context, pkinit_kdc_context plgctx, pkinit_kdc_req_context reqctx, krb5_principal client, int *valid_san) argument
296 pkinit_server_verify_padata(krb5_context context, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_enc_tkt_part * enc_tkt_reply, krb5_pa_data * data, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context, krb5_data **e_data, krb5_authdata ***authz_data) argument
667 pkinit_server_return_padata(krb5_context context, krb5_pa_data * padata, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_kdc_rep * reply, struct _krb5_key_data * client_key, krb5_keyblock * encrypting_key, krb5_pa_data ** send_pa, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context) argument
[all...]
/osnet-11/usr/src/lib/libradproto/common/
H A Dradclient.c106 rc_stop(rc_conn_t *client) argument
108 (void) pthread_mutex_lock(&client->rrc_rlock);
109 if (!client->rrc_closed) {
110 client->rrc_closed = B_TRUE;
111 (void) pthread_cond_broadcast(&client->rrc_cv);
114 adr_stream_close(client->rrc_stream);
116 (void) pthread_mutex_unlock(&client->rrc_rlock);
122 rc_conn_t *client = read_handle; local
123 int res = adr_stream_read(client->rrc_stream, buf, len);
125 rc_stop(client);
132 rc_conn_t *client = write_handle; local
204 rc_rele(rc_conn_t *client) argument
240 rc_conn_t *client = zalloc(sizeof (rc_conn_t)); local
283 radclient_read(rc_conn_t *client, message_wrapper_t **mwp) argument
302 rc_queue_event(rc_conn_t *client, message_wrapper_t *mw) argument
311 rc_queue_response(rc_conn_t *client, message_wrapper_t *mw) argument
321 find_response(rc_conn_t *client, long long serial) argument
331 rc_dequeue_response(rc_conn_t *client, long long serial) argument
386 rc_set_threaded(rc_conn_t *client, boolean_t threaded) argument
396 rc_thread(rc_conn_t *client) argument
444 rc_wait(rc_conn_t *client, long long serial) argument
[all...]
/osnet-11/usr/src/lib/fm/topo/libtopo/common/
H A Dtopo_mod.c772 * Generate client occupant path from the iport di_node, target port and
789 di_node_t client = DI_NODE_NIL; local
813 /* find matching client node */
816 /* do we have a client? */
817 client = di_path_client_node(path_node);
818 if (client == DI_NODE_NIL) {
819 topo_mod_dprintf(mod, "%s: No client\n", __func__);
860 client_devfs_path = di_devfs_path(client);
862 /* oc_path is the client devfs path */
/osnet-11/usr/src/lib/libbsm/common/
H A Dadt_token.c914 uint32_t client; local
918 client = ((union convert *)p_data)->tuint32;
920 if (client == 0 && required == 0) {
923 DPRINTF((" client=%u\n", client));
924 (void) au_write(event->ae_event_handle, au_to_xclient(client));
H A Dau_to.c1397 au_to_xclient(uint32_t client) argument
1408 adr_int32(&adr, (int32_t *)&client, 1);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dkdb.h116 /* Is AS-REQ (client referrals only) */
174 krb5_timestamp expiration; /* When the client expires */
332 krb5_db_entry *client; /* DB entry for client principal */ member in struct:_kdb_sign_auth_data_req
358 krb5_db_entry *client; member in struct:_kdb_check_policy_as_req
385 krb5_db_entry *client; member in struct:_kdb_audit_as_req
394 krb5_const_principal client; member in struct:_kdb_audit_tgs_req
404 krb5_const_principal client; member in struct:_kdb_check_allowed_to_delegate_req

Completed in 58 milliseconds

12