Searched defs:client (Results 1 - 25 of 44) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dtgtname.c37 krb5_tgtname(krb5_context context, const krb5_data *server, const krb5_data *client, krb5_principal *tgtprinc) argument
39 return krb5_build_principal_ext(context, tgtprinc, client->length, client->data,
H A Dsendauth.c49 krb5_pointer fd, char *appl_version, krb5_principal client,
115 if (client)
116 retval = krb5_copy_principal(context, client,
117 &creds.client);
120 &creds.client);
48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
H A Dfwd_tgt.c45 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument
92 retval = krb5_copy_principal (context, client, &in.client);
106 if ((retval = krb5_copy_principal(context, client, &creds.client)))
110 client->realm.length,
111 client->realm.data,
114 client->realm.length,
115 client->realm.data,
127 /* tgt->client mus
[all...]
H A Dget_creds.c39 client identified by in_creds->client, the server identified by
66 if (!in_creds || !in_creds->server || !in_creds->client)
85 mcreds->client = in_creds->client;
307 krb5_principal client, krb5_ccache ccache,
311 krb5_creds in_creds; /* only client and server need to be filled in */
320 in_creds.client = client;
330 /* stuff the client real
306 validate_or_renew_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service, int validate) argument
379 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument
386 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument
[all...]
H A Dgic_keytab.c40 krb5_principal client,
69 if ((ret = krb5_kt_get_entry(context, keytab, client,
100 krb5_principal client,
121 * If "client" was constructed from krb5_sname_to_princ() it may
125 * in the keytab which matches the client can be used for the client's
128 if (krb5_is_referral_realm(&client->realm)) {
130 ret = krb5_kt_find_realm(context, keytab, client, &realm);
132 krb5_free_data_contents(context, &client->realm);
133 client
39 get_as_key_keytab(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
98 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab arg_keytab, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument
[all...]
H A Dmk_req_ext.c214 in_creds->client, checksump,
250 (*auth_context)->authentp->client = NULL;
277 krb5_principal client, krb5_checksum *cksum,
287 authent->client = client;
354 * list sent by the client, it SHOULD be the last on the list;
276 generate_authenticator(krb5_context context, krb5_authenticator *authent, krb5_principal client, krb5_checksum *cksum, krb5_key key, krb5_ui_4 seq_number, krb5_authdata **authorization, krb5_authdata_context ad_context, krb5_enctype *desired_etypes, krb5_enctype tkt_enctype) argument
H A Dgic_pwd.c30 krb5_principal client,
68 if ((ret = krb5_unparse_name(context, client, &clientstr)))
90 if ((ret = krb5_principal2salt(context, client, &defsalt)))
134 krb5_principal client,
151 return (__krb5_get_init_creds_password(context, creds, client, password,
164 krb5_principal client,
213 ret = krb5int_get_init_creds(context, creds, client, prompter, data,
245 ret2 = krb5int_get_init_creds(context, creds, client, prompter, data,
382 ret = krb5int_get_init_creds(context, creds, client, prompter, data,
496 Attempts to get an initial ticket for creds->client t
29 krb5_get_as_key_password(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
132 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument
162 __krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument
[all...]
H A Dwalk_rtree.c42 * Structure to help with finding the common suffix between client and
54 const krb5_data *client,
61 const krb5_data *client,
67 const krb5_data *client,
74 const krb5_data *client,
101 const krb5_data *client,
109 if (client->data == NULL || server->data == NULL) {
111 if (client->data == NULL && server->data == NULL) {
116 "client and server"));
118 if (client
100 krb5_walk_realm_tree( krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **tree, int realm_sep) argument
213 rtree_capath_tree(krb5_context context, const krb5_data *client, const krb5_data *server, char **vals, krb5_principal **rettree) argument
277 rtree_capath_vals(krb5_context context, const krb5_data *client, const krb5_data *server, char ***vals) argument
329 rtree_hier_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **rettree, int sep) argument
378 rtree_hier_realms(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_data **realms, size_t *nrealms, int sep) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/preauth/
H A Dfast_factor.h5 * Returns failure if the client library does not support FAST.
32 struct _krb5_db_entry_new *client,
37 retval = get_entry(context, request, client, krb5plugin_preauth_fast_armor,
42 get_entry(context, request, client,
29 fast_kdc_get_armor_key(krb5_context context, preauth_get_entry_data_proc get_entry, krb5_kdc_req *request, struct _krb5_db_entry_new *client, krb5_keyblock **armor_key) argument
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dauth_none.c39 * Creates a client authentication handle for passing "null"
100 authnone_marshal(AUTH *client, XDR *xdrs) argument
121 authnone_verf(AUTH *client) argument
127 authnone_validate(AUTH *client, struct opaque_auth *opaque) argument
134 authnone_refresh(AUTH *client, void *dummy) argument
141 authnone_destroy(AUTH *client) argument
H A Dclnt_simple.c38 * Simplified front end to client rpc.
61 CLIENT *client; /* Client handle */ member in struct:rpc_call_private
75 if (rcp->client)
76 CLNT_DESTROY(rcp->client);
82 * This is the simplified interface to the client rpc layer.
83 * The client handle is not destroyed here and is reused for
129 if (rcp->client)
130 CLNT_DESTROY(rcp->client);
134 rcp->client = clnt_create(host, prognum, versnum, nettype);
136 if (rcp->client
[all...]
H A Dclnt_raw.c37 * Interface to create an rpc client and server in the same process.
71 * Create a client handle for memory based rpc.
79 CLIENT *client; local
106 client = &clp->client_object;
125 * Set xdrmem for client/server shared buffer
130 * create client handle
132 client->cl_ops = clnt_raw_ops();
133 client->cl_auth = authnone_create();
135 return (client);
H A Dpmap_clnt.c133 CLIENT *client; local
137 client = clntudp_bufcreate(address, PMAPPROG, PMAPVERS, timeout,
139 if (client != NULL) {
144 if (CLNT_CALL(client, PMAPPROC_GETPORT, (xdrproc_t)xdr_pmap,
148 clnt_geterr(client, &rpc_createerr.cf_error);
152 CLNT_DESTROY(client);
168 CLIENT *client; local
173 client = clnttcp_create(address, PMAPPROG, PMAPVERS, &fd, 50, 500);
174 if (client != NULL) {
175 if (CLNT_CALL(client, PMAPPROC_DUM
200 CLIENT *client; local
[all...]
/osnet-11/usr/src/lib/libnsl/yp/
H A Dyp_update.c66 CLIENT *client; local
93 client = clnt_create(ypmaster, YPU_PROG, YPU_VERS, "circuit_n");
94 if (client == NULL) {
98 clnt_pcreateerror("client create failed");
106 clnt_destroy(client);
110 client->cl_auth = authdes_seccreate(ypmastername, WINDOW,
113 if (client->cl_auth == NULL) {
115 clnt_destroy(client);
127 clnt_control(client, CLSET_TIMEOUT, (char *)&total);
128 stat = clnt_call(client, pro
[all...]
/osnet-11/usr/src/lib/libwrap/
H A Dsocket.c6 * This module determines the type of socket (datagram, stream), the client
83 static struct sockaddr_gen client; local
92 * Look up the client host address. Hal R. Brand <BRAND@addvax.llnl.gov>
93 * suggested how to get the client host info in case of UDP connections:
95 * really should verify that client.sin_family gets the value AF_INET,
100 len = sizeof(client);
101 if (getpeername(fd, (struct sockaddr *) & client, &len) < 0) {
103 len = sizeof(client);
105 (struct sockaddr *) & client, &len) < 0) {
106 tcpd_warn("can't get client addres
[all...]
H A Dtli.c10 * the transport address of a client host, and the transport address of a
77 static struct sockaddr_gen client; local
93 if (request->client->unit != 0) {
94 memcpy(&client, request->client->unit->addr.buf,
96 request->client->unit->addr.buf));
97 request->client->sin = &client;
98 sockgen_simplify(&client);
123 if (request->client
135 struct t_unitdata *client; local
[all...]
/osnet-11/usr/src/lib/rad/pykstat/common/
H A Drad.py29 import rad.client as client namespace
46 ctlname = client.Name(_RAD_KSTAT_DOMAIN, [("type", "Control")])
71 rad.client.RadConnection: the private connection
80 client.Name(_RAD_KSTAT_DOMAIN, [("type", "Kstat"),
99 o = self._rc.list_objects(client.Name(_RAD_KSTAT_DOMAIN, keys))
/osnet-11/usr/src/lib/rad/pysmf/common/
H A Drad.py29 import rad.client as client namespace
41 _RAD_SMF_MASTER = client.Name(_RAD_SMF_DOMAIN, [_RAD_TYPE_MASTER])
74 rad.client.RadConnection: the private connection
86 """ Convert service and/or instance to a rad.client.Name """
94 return client.Name(_RAD_SMF_DOMAIN, kvs)
98 """ Convert an FMRI object to a rad.client.Name """
103 """ Look up a service/instance object by rad.client.Name """
/osnet-11/usr/src/lib/libidmap/common/
H A Ddirectory_client.c61 CLIENT *client; member in struct:directory
80 d->client = clnt_door_create(IDMAP_PROG, IDMAP_V1, 0);
81 if (d->client == NULL) {
111 if (d->client != NULL)
112 clnt_destroy(d->client);
157 cs = directory_get_common_1(sl_ids, types, sl_attrs, &dr, d->client);
163 clnt_sperror(d->client, ""), NULL);
H A Dutils.c45 CLIENT *client; member in struct:idmap_handle
51 NULL, /* client */
187 * State of the connection is maintained through the "client" and "failed"
190 * client failed
202 * "failed" to "false". Readers are allowed to use the "client" pointer,
204 * failure. The "client" pointer is only valid while one holds a reader
249 assert(idmap_handle.client == NULL);
266 clntstat = clnt_call(idmap_handle.client, procnum, inproc, in,
268 rc = _idmap_rpc2stat(clntstat, idmap_handle.client);
328 idmap_handle.client
[all...]
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_kmod.c359 smb_kmod_session_close(const char *client, const char *username) argument
366 if (client != NULL)
367 (void) strlcpy(ioc.client, client, MAXNAMELEN);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dccfns.c114 * Retry using client's realm if service has referral realm.
117 mcreds->server->realm = mcreds->client->realm;
203 krb5_principal client; local
209 ret = krb5_cc_get_principal(context, id, &client);
224 krb5_free_principal(context, client);
227 ret = krb5_copy_principal(context, client, &cred->client);
228 krb5_free_principal(context, client);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dkuserok.c84 krb5_move_ccache(krb5_context kcontext, krb5_principal client, argument
111 mcreds.client = client;
113 krb5_princ_realm(kcontext, client)->length,
114 krb5_princ_realm(kcontext, client)->data,
116 krb5_princ_realm(kcontext, client)->length,
117 krb5_princ_realm(kcontext, client)->data,
170 retval = krb5_cc_initialize(kcontext, ccache, client);
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dchgpwd.c68 krb5_principal client, target = NULL; local
280 "Failed getting client internet address",
313 "Failed storing client internet address",
343 client = ticket->enc_part2->client;
374 ret = krb5_unparse_name(context, client, &clientstr);
405 client, ptr, NULL, strresult, sizeof (strresult));
495 "Failed storing client and server internet addresses",
539 krberror.client = NULL;
677 * A related problem in the server, but not the client, i
[all...]
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/
H A Dencrypted_challenge_main.c74 retval = gak_fct(context, request->client,
101 * Per draft 11 of the preauth framework, the client MAY but is not
179 struct _krb5_db_entry_new *client,
186 retval = fast_kdc_get_armor_key(context, get_entry_proc, request, client, &armor_key);
196 kdc_verify_preauth(krb5_context context, struct _krb5_db_entry_new *client, argument
219 retval = fast_kdc_get_armor_key(context, get_entry_proc, request, client, &armor_key);
236 retval = get_entry_proc(context, request, client,
278 * If this fails, we won't generate a reply to the client. That
279 * may cause the client to fail, but at this point the KDC has
308 struct _krb5_db_entry_new *client, krb5_dat
178 kdc_include_padata(krb5_context context, krb5_kdc_req *request, struct _krb5_db_entry_new *client, struct _krb5_db_entry_new *server, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, krb5_pa_data *data) argument
307 kdc_return_preauth(krb5_context context, krb5_pa_data *padata, struct _krb5_db_entry_new *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, struct _krb5_key_data *client_keys, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, void **pa_request_context) argument
[all...]

Completed in 45 milliseconds

12