/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | cred.c | 57 dh_principal netname; local 85 if ((netname = dh_keyopts.get_principal()) == NULL) 94 strncmp(netname, (char *)principal, MAXNETNAMELEN) != 0) { 95 Free(netname); 102 Free(netname); 110 dh_cred->principal = netname; 119 Free(netname); 126 Free(netname);
|
H A D | context_establish.c | 186 * name. netname will point to the users rpc netname. It is up to the 187 * caller to free the netname. 195 dh_principal *netname /* Cred owner */) 199 *netname = NULL; 212 * Get the netname. 215 if ((*netname = dh_keyopts.get_principal()) == NULL) { 228 strcmp(*netname, cred->principal) != 0) { 229 free(*netname); 236 free(*netname); 370 dh_principal netname = NULL; local 654 create_context(OM_uint32 *minor, dh_gss_context_t *gss_ctx, dh_principal netname, dh_principal target, gss_channel_bindings_t channel, OM_uint32 flags_req, OM_uint32 time_req, OM_uint32 *flags_rec, OM_uint32 *time_rec, gss_buffer_t results ) argument 894 dh_principal netname; local [all...] |
H A D | name.c | 45 /* Diffie-Hellman ONC RPC netname name type */ 136 * Routine that takes a netname as a character string and assigns it 162 char netname[MAXNETNAMELEN+1]; local 164 if (!user2netname(netname, uid, NULL)) { 168 return (do_netname_nametype(minor, netname, output)); 190 char netname[MAXNETNAMELEN+1]; local 257 if (!host2netname(netname, node, domain)) { 263 return (do_netname_nametype(minor, netname, output)); 277 if (!user2netname(netname, pwd.pw_uid, domain)) { 283 return (do_netname_nametype(minor, netname, outpu 298 char netname[MAXNETNAMELEN+1]; local 586 char *netname = (char *)pname; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_template.c | 237 char netname[MAXNETNAMELEN+1]; local 239 if (getnetname(netname)) 240 return (strdup(netname));
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getkeyent.c | 166 char netname[SEARCHFILTERLEN]; local 172 * We need to break it down to find if this is a netname for host 175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname)) 179 domain = strchr(netname, '@'); 184 if ((p = strchr(netname, '.')) == NULL)
|
H A D | getnetent.c | 205 char netname[SEARCHFILTERLEN]; local 208 if (_ldap_filter_name(netname, argp->key.name, sizeof (netname)) != 0) 212 _F_GETNETBYNAME, netname); 217 _F_GETNETBYNAME_SSD, netname);
|
/osnet-11/usr/src/lib/nsswitch/nis/common/ |
H A D | getgrent.c | 262 char netname[MAXNETNAMELEN + 1]; local 270 * Need to build up the netname for the user manually. Can't use 274 * Note that "root" has no user netname so return in error. 280 if (snprintf(netname, MAXNETNAMELEN + 1, "unix.%d@%s", 285 if ((res = _nss_nis_ypmatch(domain, "netid.byname", netname,
|
/osnet-11/usr/src/lib/pam_modules/dhkeys/ |
H A D | key_call_uid.c | 159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, argument 166 arg.st_netname = (char *)netname; 214 tmp.st_netname = (char *)netname;
|
H A D | dhkeys.c | 87 * Get the secret key for the given netname, key length, and algorithm 97 const char *netname, /* in */ 119 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) { 125 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0, 142 "for '%s'."), keylen, algtype, netname); 160 * int establish_key(pamh, flags, debug, netname) 181 * (credentials not needed) if netname could not be created; 187 * This routine returns the user's netname in "netname". 195 establish_key(pam_handle_t *pamh, int flags, int debug, char *netname) argument 95 get_and_set_seckey( pam_handle_t *pamh, const char *netname, keylen_t keylen, algtype_t algtype, const char *pw, uid_t uid, gid_t gid, int *get_seckey_cnt, int *good_pw_cnt, int *set_seckey_cnt, int flags, int debug) argument 491 char netname[MAXNETNAMELEN + 1]; local [all...] |
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 251 * Arg netname can be NULL for 192-0. 259 const char netname[], /* in */ 320 if (netname) 321 (void) passwd2des_g(passwd, netname, 322 (int)strlen(netname), &key, FALSE); 364 * Arg netname can be NULL for 192-0. 372 const char netname[], /* in */ 395 if (netname) 396 (void) passwd2des_g(passwd, netname, 397 (int)strlen(netname), 254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
H A D | publickey.c | 145 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 153 p = strchr(netname, '@'); 167 err = __yp_match_cflookup(domain, (char *)PKMAP, netname, 168 strlen(netname), &keyval, &keylen, 0); 218 * netname <whitespace> publickey:privatekey 225 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 252 PKFILE, netname); 259 PKFILE, netname); 263 if (strcasecmp(mkey, netname) == 0) { 268 PKFILE, netname); 307 __getpublickey_cached(char *netname, char *pkey, int *from_cache) argument 314 getpublickey(const char *netname, char *pkey) argument 320 __getpublickey_flush(const char *netname) argument 326 getsecretkey(const char *netname, char *skey, const char *passwd) argument 341 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument 419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 500 netname2hashname( const char *netname, char *hashname, int bufsiz, keylen_t keylen, algtype_t algtype) argument 533 __getpublickey_flush_g(const char *netname, keylen_t keylen, algtype_t algtype) argument 543 __getpublickey_cached_g(const char netname[], keylen_t keylen, algtype_t algtype, char *pkey, size_t pkeylen, int *from_cache) argument 609 getpublickey_g( const char *netname, int keylen, int algtype, char *pkey, size_t pkeylen) argument 624 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument [all...] |
/osnet-11/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_misc_proc.c | 94 * the gss-api-export-name OID, the Diffie-Hellman netname OID, and 107 * its conceivable that another mechanism backend will support the netname 160 * Try and get the official netname oid from mech_dh.so. 184 * char netname[MAXNETNAMELEN+1]) 186 * This routine attempts to extract the netname from an rpc_gss_principal_t 187 * which is in { gss-api-exorted-name } format. Return 0 if a netname was 203 __nis_gssprin2netname(rpc_gss_principal_t prin, char netname[MAXNETNAMELEN+1]) argument 234 * Check if we've got a netname. If we do we copy it 238 (void) strncpy(netname, 241 netname[MAXNETNAMELE [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | netnamer.c | 40 * netname utility routines convert from netnames to unix names (uid, gid) 76 * appears in netname.c 192 netname2user_files(int *err, char *netname, struct netid_userdata *argp) argument 237 if (strcasecmp(name, netname) == 0) { 256 netname2user_nis(int *err, char *netname, struct netid_userdata *argp) argument 263 domain = strchr(netname, '@'); 272 yperr = yp_match(domain, (char *)NETID, netname, strlen(netname), 297 * Build the uid and gid from the netname for users in LDAP. 299 * the netname t 306 netname2user_ldap(int *err, char *netname, struct netid_userdata *argp) argument [all...] |
H A D | key_call.c | 105 * the KEY_NET_GET call which expects the netname to be 609 * Input netname, secret and public keys (hex string representation) 615 * Stores the specified netname/pkey/skey triplet in the keyserv. 622 const char *netname, 633 arg.st_netname = (char *)netname; 677 tmp.st_netname = (char *)netname; 697 key_setnet_g(const char *netname, const char *skey, keylen_t skeylen, argument 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, 708 key_setnet_g_ruid(const char *netname, const char *skey, keylen_t skeylen, argument 711 return (key_setnet_g_ext(netname, ske 621 key_setnet_g_ext( const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, int use_ruid) argument [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | srvsvc_clnt.c | 237 srvsvc_net_share_get_info(char *server, char *domain, char *netname, argument 249 if (netname == NULL || si == NULL) 266 arg.netname = (LPTSTR)netname; 884 srvsvc_net_test(char *server, char *domain, char *netname) argument 890 (void) smb_tracef("%s %s %s", server, domain, netname); 908 if (srvsvc_net_share_get_info(server, domain, netname,
|
H A D | srvsvc_svc.c | 853 uint8_t *netname; local 860 status = smb_share_lookup((char *)param->netname, &si); 867 netname = (uint8_t *)NDR_STRDUP(mxa, si.shr_name); 873 if (netname == NULL || comment == NULL || info == NULL) { 883 info0->shi0_netname = netname; 889 info1->shi1_netname = netname; 904 info2->shi2_netname = netname; 916 info501->shi501_netname = netname; 932 info502->shi502_netname = netname; 960 info503->shi503_netname = netname; 2348 uint8_t *netname; local [all...] |