/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | dlopen.c | 490 int server, 614 path_info = server ? gctx->splug_path_info : gctx->cplug_path_info; 634 if (server) { 489 _sasl_load_plugins(_sasl_global_context_t *gctx, int server, const add_plugin_list_t *entrypoints, const sasl_callback_t *getpath_cb, const sasl_callback_t *verifyfile_cb) argument
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_doorclnt.c | 301 * buf (output) - fully-qualified hostname of the AD server found 306 * B_TRUE if an AD server is found. Otherwise, returns B_FALSE; 315 smb_string_t server; local 326 bzero(&server, sizeof (smb_string_t)); 332 &server, smb_string_xdr); 337 if (server.buf != NULL) { 338 if (*server.buf != '\0') { 339 (void) strlcpy(buf, server.buf, buflen); 343 xdr_free(smb_string_xdr, (char *)&server);
|
H A D | smb_info.c | 619 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument 621 if (fqdn == NULL || server == NULL || passwd == NULL) 624 if ((*server == '\0') || (*passwd == '\0')) 630 if (smb_config_setstr(SMB_CI_KPASSWD_SRV, server) != 0) 740 syslog(LOG_DEBUG, "Found %s name server\n", ipstr); 747 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | lsar_clnt.c | 144 * required to access LSA resources on a remote server. The server 154 lsar_open(char *server, char *domain, char *username, argument 161 rc = ndr_rpc_bind(lsa_handle, server, domain, username, "LSARPC"); 168 arg.servername = ndr_rpc_derive_nbhandle(lsa_handle, server); 328 * the infoClass returned from the server is not one of the supported 689 * This function is only valid if the remote RPC server is a domain 912 * This function is only valid if the remote RPC server is a domain 1186 * LUID used by a remote server to represent it. The handle here is 1231 * This function the means to map the LUID used by a remote server t [all...] |
H A D | srvsvc_clnt.c | 28 * srvsvc interface allows a client to query a server for information 29 * on shares, sessions, connections and files on the server. Some 59 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument 63 if (server == NULL || domain == NULL) { 67 server = di.d_dc; 71 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") < 0) 152 srvsvc_net_share_enum(char *server, char *domain, uint32_t level, argument 172 if (srvsvc_open(server, domain, user, &handle) != 0) 179 arg.servername = ndr_rpc_derive_nbhandle(&handle, server); 237 srvsvc_net_share_get_info(char *server, cha argument 331 srvsvc_net_files_enum(char *server, char *domain, char *basepath, char *username, uint32_t level, srvsvc_list_t *sl) argument 456 srvsvc_net_connect_enum(char *server, char *domain, char *qualifier, uint32_t level, srvsvc_list_t *sl) argument 580 srvsvc_net_session_enum(char *server, char *domain, char *clientname, char *username, uint32_t level, srvsvc_list_t *sl) argument 660 srvsvc_net_server_getinfo(char *server, char *domain, srvsvc_server_info_t *svinfo) argument 799 srvsvc_net_remote_tod(char *server, char *domain, struct timeval *tv, struct tm *tm) argument 884 srvsvc_net_test(char *server, char *domain, char *netname) argument [all...] |
H A D | netr_clnt.c | 100 netlogon_setup_auth(char *server, char *domain) argument 105 if (netr_open(server, domain, &netr_handle) != 0) 108 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT); 382 * We store the remote server information, which is used to drive Windows 386 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument 392 if (ndr_rpc_bind(netr_handle, server, domain, user, "NETR") < 0) 417 * pipe on a domain controller(server) should have already been opened. 425 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument 440 ndr_rpc_format_nbhandle(server, netr_info->server, 1041 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_authreq_t *authreq, smb_authinfo_t *authinfo) argument [all...] |
H A D | ntsvcs_clnt.c | 65 * Server info cache is protected by readers/writer lock. Currently, server 160 * Initialize the RPC client interface: create the server info cache. 177 * Terminate the RPC client interface: flush and destroy the server info 309 * The server name must be resolvable by the smb/client, which will extract 310 * it from the UNC path and use it to open a socket to the server. 315 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument 330 if (handle == NULL || server == NULL || domain == NULL) 376 * because the SRVSVC is used to get the server info. 377 * None of the SRVSVC calls depend on the server info. 396 if (ndr_svinfo_lookup(server, domai 531 ndr_rpc_uncgen(const char *server, const char *endpoint, char *buf, size_t len) argument 625 ndr_rpc_format_nbhandle(const char *server, char *buf, size_t buflen) argument 642 ndr_rpc_derive_nbhandle(mlsvc_handle_t *handle, const char *server) argument 986 ndr_svinfo_lookup(const char *server, const char *domain, srvsvc_server_info_t *svinfo) argument 1020 ndr_svinfo_update(const char *server, const char *domain, const srvsvc_server_info_t *svinfo) argument 1068 ndr_svinfo_match(const char *server, const char *domain, const ndr_svinfo_t *svi) argument 1112 srvsvc_timecheck(char *server, char *domain) argument [all...] |
H A D | dfs.c | 559 dfs_ns_addlink(const char *name, dfs_path_t *dfspath, const char *server, argument 573 status = dfs_link_add(fspath, server, share, cmnt, flags, &newlink, 611 const char *server, const char *share, uint32_t ns_type) 619 status = dfs_link_remove(dfspath->p_fspath, server, share, ns_type); 890 * the server MAY choose to verify whether the link target exists. 891 * If DFS_RESTORE_VOLUME is specified, the server MUST NOT perform 893 * exist, the server MUST fail the call with NERR_NetNameNotFound. 897 dfs_link_add(const char *path, const char *server, const char *share, argument 963 if (dfs_target_find(info.i_targets, ntargets, server, share) != -1) { 976 dfs_target_init(&info.i_targets[ntargets], server, shar 610 dfs_ns_removelink(const char *name, dfs_path_t *dfspath, const char *server, const char *share, uint32_t ns_type) argument 995 dfs_link_remove(const char *path, const char *server, const char *share, uint32_t ns_type) argument 1717 dfs_target_find(dfs_target_t *targets, uint32_t ntargets, const char *server, const char *share) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | rd_req_dec.c | 53 * server specifies the expected server's name for the ticket; if NULL, then 54 * any server will be accepted if the key can be found, and the caller should 58 * server names 92 krb5_const_principal server, krb5_keytab keytab, 104 if (server != NULL || keytab->ops->start_seq_get == NULL) { 106 server != NULL ? server : req->ticket->server, 140 * We overwrite ticket->server t 91 rd_req_decrypt_tkt_part(krb5_context context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_keyblock *key) argument 256 rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument 726 krb5_rd_req_decoded_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 741 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 757 krb5_rd_req_decoded_anyflag_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 773 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
H A D | gc_frm_kdc.c | 178 krb5_principal client, krb5_principal server, 261 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str); 304 * krbtgt/realm_of(DST)@realm_of(SRC) as the server principal. Zeroes 324 krb5_princ_realm(ctx, src), &mcreds->server); 342 krb5_principal client, krb5_principal server) 348 krb5_princ_realm(ts->ctx, server), 476 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) { 479 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name); 484 "expectations: server '%s' " 492 "expectations: server principa 341 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument 764 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts, int *tgtptr_isoffpath) argument 849 chase_offpath(struct tr_state *ts, krb5_principal client, krb5_principal server) argument 992 krb5_principal client, server, supplied_server, out_supplied_server; local [all...] |
H A D | get_in_tkt.c | 60 Attempts to get an initial ticket for creds->client to use server 61 creds->server, (realm is taken from creds->client), with options 401 * We only allow the AS-REP server name to be changed if the 410 canon_ok = IS_TGS_PRINC(context, request->server) && 411 IS_TGS_PRINC(context, as_reply->enc_part2->server); 422 !krb5_principal_compare(context, as_reply->enc_part2->server, request->server))) 423 || !krb5_principal_compare(context, as_reply->enc_part2->server, as_reply->ticket->server) 495 krb5_principal server; local 621 rewrite_server_realm(krb5_context context, krb5_const_principal old_server, const krb5_data *realm, krb5_boolean tgs, krb5_principal *server) argument 1072 build_in_tkt_name(krb5_context context, char *in_tkt_service, krb5_const_principal client, krb5_principal *server) argument [all...] |
H A D | pac.c | 653 const krb5_keyblock *server) 699 ret = krb5_c_verify_checksum(context, server, 775 const krb5_keyblock *server, 780 if (server == NULL) 783 ret = k5_pac_verify_server_checksum(context, pac, server); 999 /* Generate the server checksum over the entire PAC */ 1020 /* Generate the privsvr checksum over the server checksum buffer */ 1240 { PAC_SERVER_CHECKSUM, { KV5M_DATA, STRLENOF("urn:mspac:server-checksum"), "urn:mspac:server-checksum" } }, 651 k5_pac_verify_server_checksum(krb5_context context, const krb5_pac pac, const krb5_keyblock *server) argument 771 krb5_pac_verify(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/ |
H A D | rc_dfl.c | 87 h += *rep->server; 104 (strcmp(old->server, new1->server) == 0)) { /* always true */ 205 ta->rep.client = ta->rep.server = ta->rep.msghash = NULL; 208 if (!(ta->rep.server = strdup(rep->server))) 218 if (ta->rep.server) 219 free(ta->rep.server); 296 free(q->rep.server); 390 if (rp->server) 444 char *msghash = NULL, *client = NULL, *server = NULL, *str, *end; local [all...] |
/osnet-11/usr/src/cmd/hal/hald/ |
H A D | hald_runner.c | 141 handle_connection(DBusServer *server, argument 160 /* dbus_server_unref(server); */ 174 DBusServer *server = NULL; local 186 server = dbus_server_listen(DBUS_SERVER_ADDRESS, &err); 187 if (server == NULL) { 188 HAL_ERROR (("Cannot create D-BUS server for the runner")); 192 dbus_server_setup_with_g_main(server, NULL); 193 dbus_server_set_new_connection_function(server, handle_connection, 198 server_addr = dbus_server_get_address (server); 230 if (server ! [all...] |
/osnet-11/usr/src/lib/libwrap/ |
H A D | tcpd.h | 103 struct host_info server[1]; /* server endpoint info */ member in struct:request_info 191 #define RQ_DAEMON 2 /* server process (argv[0]) */ 196 #define RQ_SERVER_NAME 7 /* server host name */ 197 #define RQ_SERVER_ADDR 8 /* server host address */ 198 #define RQ_SERVER_SIN 9 /* server endpoint (internal) */
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 508 krb5_principal server = NULL, serverp = NULL; local 569 if (code = krb5_build_principal_ext(kmd->kcontext, &server, 583 if (code = krb5_copy_principal(kmd->kcontext, server, 584 &my_creds->server)) { 588 serverp = my_creds->server; 955 if (server) 956 krb5_free_principal(kmd->kcontext, server); 964 * function. mycreds->[client|server] could also be NULL in case 973 if (serverp && my_creds->server && serverp != my_creds->server) [all...] |
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | pkgserv.c | 254 PKGserver server; local 289 server = malloc(sizeof (*server)); 291 if (server == NULL) 294 server->fp = NULL; 295 server->onetime = readonly; 298 server->door = open(pkgdoor, O_RDWR); 300 if (server->door >= 0) { 301 if (door_info(server->door, &di) == 0 && di.di_target >= 0) { 304 server 467 pkgcloseserver(PKGserver server) argument 580 void *server; local 603 pkgservercommitfile(VFP_T *a_vfp, PKGserver server) argument 654 pkgopenfilter(PKGserver server, const char *filt) argument 691 pkgclosefilter(PKGserver server) argument 703 pkggetentry(PKGserver server, int *len, int *pathlen) argument 733 pkggetentry_named(PKGserver server, const char *path, int *len, int *pathlen) argument [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | alt_prof.c | 507 * Parse out the port number from an admin_server setting. Modify server to 512 parse_admin_server_port(char *server, int *port, long *mask) argument 517 if (*server == '[' && (end = strchr(server + 1, ']')) != NULL) { 519 /* Shift the bracketed name or address back into server. */ 520 memmove(server, server + 1, end - (server + 1)); 524 end = server + strcspn(server, " [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_init.c | 341 char *server; local 344 server = strpbrk(service_name, "@"); 345 if (!server) { 350 hp = gethostbyname(++server); 394 "unable to open connection to ADMIN server " 543 /* Drop down to v2 wire protocol if server does not support v3 */ 581 char **server, 604 if (*server) { 605 free(*server); 606 *server 579 clean_up(kadm5_server_handle_t handle, enum init_type init_type, char **server, krb5_creds *creds, krb5_principal *clientp, krb5_principal *serverp, krb5_ccache *ccache) argument 645 char *server = NULL; local [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 52 * required when talking to a Longhorn server will go away 61 int longhorn = 0; /* Talking to a Longhorn server? */ 68 krb5_principal client, krb5_principal server, 112 reqctx->idctx, request->server); 146 nonce, &cksum, request->client, request->server, &out_data); 226 krb5_principal server, 250 auth_pack9->pkAuthenticator.kdcName = server; 253 (unsigned char *)server->realm.data; 254 auth_pack9->pkAuthenticator.kdcRealm.length = server->realm.length; 474 * work if the server sen 218 pkinit_as_req_create(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_timestamp ctsec, krb5_int32 cusec, krb5_ui_4 nonce, const krb5_checksum * cksum, krb5_principal client, krb5_principal server, krb5_data ** as_req) argument [all...] |
H A D | pkinit_srv.c | 109 struct _krb5_db_entry_new * server, 134 request->server); 343 request->server); 624 * by the client and server. The existing session key meets these 724 request->server); 106 pkinit_server_get_edata(krb5_context context, krb5_kdc_req * request, struct _krb5_db_entry_new * client, struct _krb5_db_entry_new * server, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, krb5_pa_data * data) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/net/ |
H A D | dns.c | 546 /* Connect to a next server. */ 549 grub_dprintf("dns", "Contacting server %d\n", (int)i); 611 struct grub_net_network_level_address server; local 616 err = grub_net_resolve_address (args[1], &server); 620 err = grub_net_dns_lookup (args[0], &server, 1, &naddresses, &addresses, 0); 653 struct grub_net_network_level_address server; local 657 err = grub_net_resolve_address (args[0], &server); 661 return grub_net_add_dns_server (&server); 669 struct grub_net_network_level_address server; local 673 err = grub_net_resolve_address (args[1], &server); [all...] |
H A D | tcp.c | 537 grub_net_tcp_open (char *server, argument 560 err = grub_net_resolve_address (server, &addr);
|
/osnet-11/usr/src/lib/fm/libfmd_msg/common/ |
H A D | fmd_msg.c | 1318 char *platform, *server, *csn; local 1367 if (nvlist_lookup_string(auth, FM_FMRI_AUTH_V1_SERVER_NM, &server) != 0) 1368 server = (char *)FMD_MSG_MISSING; 1379 date, platform, csn, server, src_name, src_vers, uuid, 1390 date, platform, csn, server, src_name, src_vers, uuid,
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | init_sec_context.c | 135 static krb5_error_code get_credentials(context, cred, server, now, 139 krb5_gss_name_t server; 152 in_creds.client = in_creds.server = NULL; 165 !krb5_principal_compare(context, cc_princ, server->princ)) { 176 mcreds.server = cc_princ; 194 in_creds.server = server->princ; 220 /* server did not support constrained delegation */ 809 /* Handle a KRB_ERROR message from the server */ 1168 krb5_principal server local 1336 krb5_principal server; local [all...] |