/osnet-11/usr/src/lib/gss_mechs/mech_krb5/profile/ |
H A D | prof_solaris.c | 321 * errcode_t k5_profile_add_domain_mapping(profile_t profile, char *domain, 325 * where domain is the domain name of the associated realm name 326 * where realm is the corresponding realm name for the domain 329 k5_profile_add_domain_mapping(profile_t profile, char *domain, char *realm) argument 334 if (profile == NULL || domain == NULL || realm == NULL) 338 hierarchy[1] = domain; 355 * where realm is the corresponding realm name for the domain 356 * Note: for the remove function, all matching domain - realm mappings 364 char **domains = NULL, **domain local [all...] |
/osnet-11/usr/src/lib/libadr/common/ |
H A D | adr_name.c | 40 * (the beginning of which happens to be the domain name). This greatly 161 adr_name_strcpy(adr_name_t *name, int length, const char *domain) argument 168 int count = strlcpy(loc, domain, end - loc); 191 adr_name_create(const char *domain, int n, argument 198 int length = strlen(domain) + 1; 201 if (!adr_name_strcpy(result, length, domain)) { 210 adr_name_vcreate(const char *domain, int n, ...) argument 216 int length = strlen(domain) + 1; 222 if (!adr_name_strcpy(result, length, domain)) { 460 * domain [all...] |
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | domain.c | 18 SM_RCSID("@(#)$Id: domain.c,v 8.204 2010/06/29 15:35:33 ca Exp $ (with name server)") 20 SM_RCSID("@(#)$Id: domain.c,v 8.204 2010/06/29 15:35:33 ca Exp $ (without name server)") 159 ** GETMXRR -- get MX resource records for a domain 780 char **domain; local 805 ** Initialize domain search list. If there is at least one 808 ** domain (e.g., vse.CS.Berkeley.EDU). Note that there is no 826 ** domain to search the unmodified name first. 827 ** If name does not end with a dot and search up local domain 828 ** tree desired, append each local domain component to the 829 ** search list; if name contains no dots and default domain [all...] |
/osnet-11/usr/src/lib/nsswitch/ad/common/ |
H A D | getpwnam.c | 56 const char *name, const char *domain, 72 if (domain == NULL) 73 domain = WK_DOMAIN; 75 name, domain, "x", uid, gid, gecos, homedir, shell) + 1; 96 name, domain, "x", uid, gid, gecos, homedir, shell); 183 char **name_v, **dn_v, *domain = NULL; local 202 /* Get domain */ 206 domain = adutils_dn2dns(dn_v[0]); 270 if (update_buffer(be, argp, name_v[0], domain, uid, gid, 279 free(domain); 55 update_buffer(ad_backend_ptr be, nss_XbyY_args_t *argp, const char *name, const char *domain, uid_t uid, gid_t gid, const char *gecos, const char *homedir, const char *shell) argument [all...] |
/osnet-11/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_name.c | 87 * Convert an encoded domain name to printable ascii as per RFC1035. 189 * Convert a ascii string into an encoded domain name as per RFC1035. 198 *\li Enforces label and domain length limits. 207 * Convert a ascii string into an encoded domain name as per RFC1035. 215 * Enforces label and domain length limits. 350 *\li Enforces label and domain length limits. 398 * Unpack a domain name from a message, source may be compressed. 412 * Unpack a domain name from a message, source may be compressed. 435 /* Fetch next label in domain name. */ 495 * Pack domain nam 920 dn_find(const u_char *domain, const u_char *msg, const u_char * const *dnptrs, const u_char * const *lastdnptr) argument [all...] |
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_auth.c | 324 * and the NETBIOS name of the domain. 428 char *domain, 462 if (!domain) 465 if ((uppercase_dom = strdup(domain)) == NULL) 600 char *domain, 615 dest[0] = domain; 616 if ((dest[1] = strdup(domain)) == NULL) 632 * For Windows Server 2003, the domain name needs to be included and 633 * converted to uppercase. For Vista, the domain name needs to be 731 char *domain, 425 smb_auth_set_info(char *username, char *password, unsigned char *ntlm_hash, char *domain, unsigned char *srv_challenge_key, int srv_challenge_len, int lmcomp_lvl, smb_auth_info_t *auth) argument 594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument 793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument 832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument [all...] |
H A D | smb_info.c | 206 * If the hostname has been fully-qualified for some reason, the domain 255 char domain[MAXHOSTNAMELEN]; local 258 domain[0] = '\0'; 264 if (smb_getdomainname_dns(domain, MAXHOSTNAMELEN) != 0) 270 if (domain[0] == '\0') { 275 (void) snprintf(buf, buflen, "%s.%s", hostname, domain); 280 * Returns NETBIOS name of the domain if the system is in domain 302 * Returns fully-qualified DNS name of the AD domain. 304 * The domain nam [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ctx.c | 151 char domain[SMB_PI_MAX_DOMAIN]; local 178 (void) smb_config_getstr(SMB_CI_DOMAIN_NB, domain, 179 sizeof (domain)); 181 if (*domain != '\0') 182 (void) smbfs_ctx_setdomain(ctx, domain, FALSE); 221 * Default domain, user, ... 420 * "user@domain" or "domain/user" or "domain\\user" 421 * and return pointers to the domain an 1041 smbfs_set_default_domain(const char *domain) argument [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_browser.c | 101 * primarily the domain they are in and the services that they are running 111 * For the purposes of this specification, a domain is simply a name with 114 * the scope of a search when they query browser servers. Every domain has 116 * manages various activities within the domain. 118 * One browser for each domain on a subnet is designated the Local Master 119 * Browser for that domain. Servers in its domain on the subnet register 122 * information about its domain on its subnet. If there are other subnets 124 * domain's Domain Master Browser; it registers with it, and uses it to 144 * Local Master Browsers for its domain, askin 1300 smb_browser_netlogon(char *domain, char *dc, uint32_t dc_len, uint32_t *ipaddr) argument [all...] |
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | request.c | 1270 dn2servers( LDAP *ld, char *dn ) /* dn can also be a domain.... */ 1272 char *p, *domain, *host, *server_dn, **dxs; local 1276 if (( domain = strrchr( dn, '@' )) != NULL ) { 1277 ++domain; 1279 domain = dn; 1282 if (( dxs = nsldapi_getdxbyname( domain )) == NULL ) {
|
/osnet-11/usr/src/lib/libnisdb/yptol/ |
H A D | dit_access.c | 121 read_from_dit(char *map, char *domain, datum *key, datum *value) argument 134 if (0 == strcasecmp(domain, ypDomains.domainLabels[count])) { 146 if (TRUE == singleReadFromDIT(map, domain, key, value, &res)) 184 * Pointer to domain name 197 write_to_dit(char *map, char *domain, datum key, datum value, argument 211 if (0 == strcasecmp(domain, ypDomains.domainLabels[count])) { 223 res = singleWriteToDIT(map, domain, &key, &value, replace); 282 /* Get the mapping structure corresponding to `map.domain' */ 283 table_map = mappingFromMap(map->map_name, map->domain, &res); 287 "Get TTL request could not access map %s in domain 402 get_passwd_list(bool_t adjunct, char *domain) argument 970 get_mapping_map_list(char *domain) argument 1084 make_nis_container(char *map_name, char *domain, bool_t init_containers) argument 1153 make_nis_domain(char *domain, bool_t init_containers) argument [all...] |
H A D | dit_access_utils.c | 59 * Returns 'map,domain.' 62 getFullMapName(char *map, char *domain) { argument 65 if (map == 0 || domain == 0) { 69 scat(myself, F, domain, ".")); 251 int *nv, char *domain, bool_t readonly, int *statP) { 271 if (addCol2RuleValue(vt_string, N2LDOMAIN, domain, strlen(domain), 410 domain, statP); 492 * ("(%s,%s,%s)", host, user, domain), 497 * (i.e host, user, domain, grou 250 datumToRuleValue(datum *key, datum *value, __nis_table_mapping_t *t, int *nv, char *domain, bool_t readonly, int *statP) argument 509 addSplitFieldValues(__nis_table_mapping_t *t, __nis_rule_value_t *rv, __nis_rule_value_t *trv, int numVals, char *domain) argument 648 buildNISRuleValue(__nis_table_mapping_t *t, __nis_rule_value_t *rv, char *domain) argument 943 mappingFromMap(char *map, char *domain, int *statP) argument 1011 singleReadFromDIT(char *map, char *domain, datum *key, datum *value, int *statP) argument 1214 singleWriteToDIT(char *map, char *domain, datum *key, datum *value, bool_t replace) argument 1610 makeNISObject(char *domain, char *dn) argument 1884 addNISObject(char *domain, char *dn, int *ldap_rc) argument [all...] |
H A D | shim_changepasswd.c | 163 char domain[MAXNETNAMELEN+1]; local 203 * Get the domain name. This is tricky because a N2L server may be 211 /* Got a domain list ... process all the domains */ 224 * There was no domain list in the mapping file. The 226 * up the domain returned by getdomainname(). Fall back to the 229 if (0 > getdomainname(domain, MAXNETNAMELEN+1)) { 231 "Could not get any domain info"); 233 /* Got one domain ... process it. */ 234 ans = proc_domain(&yppwd, root_on_master, domain); 247 * DESCRIPTION: Process a request for one domain 256 proc_domain(struct yppasswd *yppwd, bool_t root_on_master, char *domain) argument 299 proc_request(struct yppasswd *yppwd, struct passwd_entry *old_pwd, bool_t root_on_master, char *domain) argument 376 proc_maps(char *domain, struct passwd_entry *pwd) argument 426 proc_map_list(char **map_list, char *domain, struct passwd_entry *pwd, bool_t adjunct_flag) argument 640 modify_ent(struct yppasswd *yppwd, struct passwd_entry *old_ent, bool_t root_on_master, char *domain) argument 1052 get_old_info(char *name, char *domain) argument 1126 put_new_info(struct passwd_entry *pwd, char *domain) argument 1167 get_old_shadow(char *name, char *domain) argument 1275 write_shadow_info(char *domain, struct spwd *sp) argument [all...] |
/osnet-11/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_subr.c | 79 nis_name n2) /* See if these are the same domain */ 141 char domain[LN_BUFSIZE]; member in struct:local_names 181 if (sysinfo(SI_SRPC_DOMAIN, ln->domain, LN_BUFSIZE) < 0) 184 if (ln->domain[strlen(ln->domain)-1] != '.') 185 (void) strcat(ln->domain, "."); 191 * hostname, strip off the domain part. We always use the local 197 if (ln->domain[0] != '.') 199 ln->rpcdomain = strdup(ln->domain); 200 (void) strcat(ln->host, ln->domain); [all...] |
/osnet-11/usr/src/lib/libnsl/yp/ |
H A D | yp_bind.c | 103 * It also protects all of the fields within a domain binding except 105 * A better implementation might try to serialize each domain separately, 106 * but normally we're only dealing with one domain (the default) anyway. 107 * To avoid one thread freeing a domain binding while another is using 140 * domain name field equal to the passed domain name, and removes it if found. 141 * The domain-server binding will not exist after the call to this function. 148 __yp_unbind_nolock(char *domain) argument 153 if ((domain == NULL) || (strlen(domain) 186 yp_unbind(char *domain) argument 232 check_binding(char *domain, struct dom_binding **binding) argument 281 __yp_add_binding_netid(char *domain, char *addr, char *netid) argument 346 __yp_add_binding(char *domain, char *addr) argument 367 load_dom_binding(struct ypbind_resp *ypbind_res, char *domain, int *err) argument 465 load_dom_binding_rsvdport(struct ypbind_binding *dom_binding, char *domain, int *err) argument 535 __yp_dobind_cflookup( char *domain, struct dom_binding **binding, int hardlookup) argument 672 __yp_dobind( char *domain, struct dom_binding **binding) argument 705 __yp_dobind_rsvdport_cflookup( char *domain, struct dom_binding **binding, int hardlookup) argument 828 __yp_dobind_rsvdport( char *domain, struct dom_binding **binding) argument 841 yp_bind(char *domain) argument 889 yp_get_default_domain(char **domain) argument 904 char *domain; local 1108 get_cached_domain(char *domain) argument [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | netr_clnt.c | 100 netlogon_setup_auth(char *server, char *domain) argument 105 if (netr_open(server, domain, &netr_handle) != 0) 287 * Determines if the given user is the domain Administrator or a 314 * Abort impending domain logon requests. 328 * This is the entry point for authenticating domain users. 379 * Open an authenticated session to the NETLOGON pipe on a domain controller 386 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument 392 if (ndr_rpc_bind(netr_handle, server, domain, user, "NETR") < 0) 417 * pipe on a domain controller(server) should have already been opened. 1014 * at the domain controlle [all...] |
H A D | ntsvcs_clnt.c | 66 * info cache is used to hold information about domain controllers. 78 * remote servers other than domain controllers, then entries for those remote 203 * Returns Kerberos realm from the passed domain name. 204 * Realm is obtained from the resolver by comparing the passed domain name with 205 * - the resolver domain name or 206 * - the first part of the resolver domain name. 210 ndr_rpc_get_realm(char *domain) argument 221 if (smb_strcasecmp(domain, buf, 0) != 0) { 225 if (smb_strcasecmp(domain, buf, 0) != 0) { 236 * requests to the domain controlle 283 ndr_rpc_setup_keychain(char *username, char *domain) argument 315 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, char *username, const char *service) argument 986 ndr_svinfo_lookup(const char *server, const char *domain, srvsvc_server_info_t *svinfo) argument 1020 ndr_svinfo_update(const char *server, const char *domain, const srvsvc_server_info_t *svinfo) argument 1068 ndr_svinfo_match(const char *server, const char *domain, const ndr_svinfo_t *svi) argument 1112 srvsvc_timecheck(char *server, char *domain) argument [all...] |
/osnet-11/usr/src/lib/libnwam/common/ |
H A D | libnwam_util.c | 645 /* check if domain names are correct, generalize for array of domains */ 649 char **domainvalues, *domain; local 662 domain = domainvalues[i]; 663 len = strlen(domain); 664 if (!isalnum(domain[0]) || !isalnum(domain[len-1])) 667 if (!isalnum(domain[j]) && 668 domain[j] != '.' && domain[j] != '-' && 669 domain[ [all...] |
/osnet-11/usr/src/lib/libdhcpdu/common/ |
H A D | rfc2136.c | 332 * its domain ... 373 * Find a name server for the supplied domain and return its IP address. 378 getNS(char *domain, struct in_addr *iap) argument 399 if (lookupNS(domain, iap)) { 400 dprint("getNS: found cached IP address for domain %s\n", 401 domain); 406 dprint("getNS(\"%s\"): res_ninit failed\n", domain); 410 alen = res_nquery(&res, domain, C_IN, T_NS, (uchar_t *)&abuf, 425 "(h_errno %d)\n", domain, h_errno); 433 domain, h_errn 564 cacheNS(char *domain, struct in_addr *iap, int ttl) argument 592 lookupNS(char *domain, struct in_addr *iap) argument [all...] |
/osnet-11/usr/src/lib/libdns_sd/common/ |
H A D | dnssd_clientstub.c | 109 <rdar://problem/3665304> Need SPI for LoginWindow to associate a UID with a Wide Area domain 590 const char *domain, 604 if (!name || !regtype || !domain || !callBack) return kDNSServiceErr_BadParam; 611 len += strlen(domain) + 1; 621 put_string(domain, &ptr); 759 const char *domain, 773 if (!domain) domain = ""; 778 len += strlen(domain) + 1; 786 put_string(domain, 583 DNSServiceResolve( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *name, const char *regtype, const char *domain, DNSServiceResolveReply callBack, void *context ) argument 753 DNSServiceBrowse( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *regtype, const char *domain, DNSServiceBrowseReply callBack, void *context ) argument 838 char name[256], regtype[kDNSServiceMaxDomainName], domain[kDNSServiceMaxDomainName]; local 852 DNSServiceRegister( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *name, const char *regtype, const char *domain, const char *host, uint16_t PortInNetworkByteOrder, uint16_t txtLen, const void *txtRecord, DNSServiceRegisterReply callBack, void *context ) argument 940 char domain[kDNSServiceMaxDomainName]; local [all...] |
/osnet-11/usr/src/lib/libdns_sd/java/com/apple/dnssd/ |
H A D | DNSSD.java | 81 String serviceName, String regType, String domain) {} 85 default browse domain(s). 97 /** If flag is set in a {@link DomainListener} callback, indicates that the result is the default domain. */ 119 /** Maximum length, in bytes, of a domain name represented as an escaped C-String. */ 145 @param domain 146 If non-null, specifies the domain on which to browse for services. 147 Most applications will not specify a domain, instead browsing on the 148 default domain(s). 158 public static DNSSDService browse( int flags, int ifIndex, String regType, String domain, BrowseListener listener) argument 160 { return getInstance()._makeBrowser( flags, ifIndex, regType, domain, listene 220 resolve( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener listener) argument 278 register( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, TXTRecord txtRecord, RegisterListener listener) argument 404 constructFullName( String serviceName, String regType, String domain) argument 477 _makeBrowser( int flags, int ifIndex, String regType, String domain, BrowseListener listener) argument 480 _resolve( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener listener) argument 484 _register( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, TXTRecord txtRecord, RegisterListener listener) argument 498 _constructFullName( String serviceName, String regType, String domain) argument 591 _makeBrowser( int flags, int ifIndex, String regType, String domain, BrowseListener client) argument 597 _resolve( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener client) argument 604 _register( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, TXTRecord txtRecord, RegisterListener client) argument 631 _constructFullName( String serviceName, String regType, String domain) argument 660 ConstructName( String serviceName, String regType, String domain, String[] pOut) argument 737 AppleBrowser( int flags, int ifIndex, String regType, String domain, BrowseListener client) argument 747 CreateBrowser( int flags, int ifIndex, String regType, String domain) argument 752 AppleResolver( int flags, int ifIndex, String serviceName, String regType, String domain, ResolveListener client) argument 763 CreateResolver( int flags, int ifIndex, String serviceName, String regType, String domain) argument 804 AppleRegistration( int flags, int ifIndex, String serviceName, String regType, String domain, String host, int port, byte[] txtRecord, RegisterListener client) argument 830 BeginRegister( int ifIndex, int flags, String serviceName, String regType, String domain, String host, int port, byte[] txtRecord) argument [all...] |
/osnet-11/usr/src/lib/libidmap/common/ |
H A D | idmap_cache.c | 642 idmap_cache_lookup_winnamebyuid(char **name, char **domain, uid_t uid) argument 660 if (domain != NULL) { 662 *domain = 664 if (*domain != NULL) 670 *domain = NULL; 687 idmap_cache_lookup_winnamebygid(char **name, char **domain, gid_t gid) argument 705 if (domain != NULL) { 707 *domain = 709 if (*domain != NULL) 715 *domain 732 idmap_cache_lookup_uidbywinname(const char *name, const char *domain, uid_t *uid) argument 762 idmap_cache_lookup_gidbywinname(const char *name, const char *domain, gid_t *gid) argument 1194 idmap_cache_add_winname2uid(const char *name, const char *domain, uid_t uid, int direction) argument 1324 idmap_cache_add_winname2gid(const char *name, const char *domain, gid_t gid, int direction) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | dsa.c | 49 /* A structure used to hold domain parameters. */ 105 dsa_domain_t *domain, 249 int transient_key, dsa_domain_t *domain, gcry_mpi_t **ret_factors ) 288 if (domain->p && domain->q && domain->g) 291 p = mpi_copy (domain->p); 292 q = mpi_copy (domain->q); 293 g = mpi_copy (domain->g); 301 /* Generate new domain parameter 247 generate(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, int transient_key, dsa_domain_t *domain, gcry_mpi_t **ret_factors ) argument 397 generate_fips186(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, gcry_sexp_t deriveparms, int use_fips186_2, dsa_domain_t *domain, int *r_counter, void **r_seed, size_t *r_seedlen, gcry_mpi_t *r_h) argument 693 dsa_domain_t domain; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | dsa.c | 49 /* A structure used to hold domain parameters. */ 105 dsa_domain_t *domain, 249 int transient_key, dsa_domain_t *domain, gcry_mpi_t **ret_factors ) 288 if (domain->p && domain->q && domain->g) 291 p = mpi_copy (domain->p); 292 q = mpi_copy (domain->q); 293 g = mpi_copy (domain->g); 301 /* Generate new domain parameter 247 generate(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, int transient_key, dsa_domain_t *domain, gcry_mpi_t **ret_factors ) argument 397 generate_fips186(DSA_secret_key *sk, unsigned int nbits, unsigned int qbits, gcry_sexp_t deriveparms, int use_fips186_2, dsa_domain_t *domain, int *r_counter, void **r_seed, size_t *r_seedlen, gcry_mpi_t *r_h) argument 693 dsa_domain_t domain; local [all...] |
/osnet-11/usr/src/lib/libc/port/i18n/ |
H A D | gettext.h | 64 char *domain; /* domain name */ member in struct:domain_binding 115 uint32_t hashid; /* hashed value of the domain name */ 127 char *domain; /* key: domain name */ member in struct:nls_node 135 char *cur_domain; /* current domain */ 136 Dbinding *dbind; /* domain binding */ 147 char *domain; /* textdomain name */ member in struct:msg_pack 153 uint32_t hash_domain; /* hash ID of domain */ 154 uint32_t domain_len; /* length of domain */ [all...] |