Searched defs:server (Results 26 - 50 of 63) sorted by relevance

123

/osnet-11/usr/src/lib/libsasl/lib/
H A Ddlopen.c490 int server,
614 path_info = server ? gctx->splug_path_info : gctx->cplug_path_info;
634 if (server) {
489 _sasl_load_plugins(_sasl_global_context_t *gctx, int server, const add_plugin_list_t *entrypoints, const sasl_callback_t *getpath_cb, const sasl_callback_t *verifyfile_cb) argument
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_doorclnt.c301 * buf (output) - fully-qualified hostname of the AD server found
306 * B_TRUE if an AD server is found. Otherwise, returns B_FALSE;
315 smb_string_t server; local
326 bzero(&server, sizeof (smb_string_t));
332 &server, smb_string_xdr);
337 if (server.buf != NULL) {
338 if (*server.buf != '\0') {
339 (void) strlcpy(buf, server.buf, buflen);
343 xdr_free(smb_string_xdr, (char *)&server);
H A Dsmb_info.c619 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument
621 if (fqdn == NULL || server == NULL || passwd == NULL)
624 if ((*server == '\0') || (*passwd == '\0'))
630 if (smb_config_setstr(SMB_CI_KPASSWD_SRV, server) != 0)
740 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
747 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dlsar_clnt.c144 * required to access LSA resources on a remote server. The server
154 lsar_open(char *server, char *domain, char *username, argument
161 rc = ndr_rpc_bind(lsa_handle, server, domain, username, "LSARPC");
168 arg.servername = ndr_rpc_derive_nbhandle(lsa_handle, server);
328 * the infoClass returned from the server is not one of the supported
689 * This function is only valid if the remote RPC server is a domain
912 * This function is only valid if the remote RPC server is a domain
1186 * LUID used by a remote server to represent it. The handle here is
1231 * This function the means to map the LUID used by a remote server t
[all...]
H A Dsrvsvc_clnt.c28 * srvsvc interface allows a client to query a server for information
29 * on shares, sessions, connections and files on the server. Some
59 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument
63 if (server == NULL || domain == NULL) {
67 server = di.d_dc;
71 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") < 0)
152 srvsvc_net_share_enum(char *server, char *domain, uint32_t level, argument
172 if (srvsvc_open(server, domain, user, &handle) != 0)
179 arg.servername = ndr_rpc_derive_nbhandle(&handle, server);
237 srvsvc_net_share_get_info(char *server, cha argument
331 srvsvc_net_files_enum(char *server, char *domain, char *basepath, char *username, uint32_t level, srvsvc_list_t *sl) argument
456 srvsvc_net_connect_enum(char *server, char *domain, char *qualifier, uint32_t level, srvsvc_list_t *sl) argument
580 srvsvc_net_session_enum(char *server, char *domain, char *clientname, char *username, uint32_t level, srvsvc_list_t *sl) argument
660 srvsvc_net_server_getinfo(char *server, char *domain, srvsvc_server_info_t *svinfo) argument
799 srvsvc_net_remote_tod(char *server, char *domain, struct timeval *tv, struct tm *tm) argument
884 srvsvc_net_test(char *server, char *domain, char *netname) argument
[all...]
H A Dnetr_clnt.c100 netlogon_setup_auth(char *server, char *domain) argument
105 if (netr_open(server, domain, &netr_handle) != 0)
108 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT);
382 * We store the remote server information, which is used to drive Windows
386 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument
392 if (ndr_rpc_bind(netr_handle, server, domain, user, "NETR") < 0)
417 * pipe on a domain controller(server) should have already been opened.
425 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument
440 ndr_rpc_format_nbhandle(server, netr_info->server,
1041 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_authreq_t *authreq, smb_authinfo_t *authinfo) argument
[all...]
H A Dntsvcs_clnt.c65 * Server info cache is protected by readers/writer lock. Currently, server
160 * Initialize the RPC client interface: create the server info cache.
177 * Terminate the RPC client interface: flush and destroy the server info
309 * The server name must be resolvable by the smb/client, which will extract
310 * it from the UNC path and use it to open a socket to the server.
315 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument
330 if (handle == NULL || server == NULL || domain == NULL)
376 * because the SRVSVC is used to get the server info.
377 * None of the SRVSVC calls depend on the server info.
396 if (ndr_svinfo_lookup(server, domai
531 ndr_rpc_uncgen(const char *server, const char *endpoint, char *buf, size_t len) argument
625 ndr_rpc_format_nbhandle(const char *server, char *buf, size_t buflen) argument
642 ndr_rpc_derive_nbhandle(mlsvc_handle_t *handle, const char *server) argument
986 ndr_svinfo_lookup(const char *server, const char *domain, srvsvc_server_info_t *svinfo) argument
1020 ndr_svinfo_update(const char *server, const char *domain, const srvsvc_server_info_t *svinfo) argument
1068 ndr_svinfo_match(const char *server, const char *domain, const ndr_svinfo_t *svi) argument
1112 srvsvc_timecheck(char *server, char *domain) argument
[all...]
H A Ddfs.c559 dfs_ns_addlink(const char *name, dfs_path_t *dfspath, const char *server, argument
573 status = dfs_link_add(fspath, server, share, cmnt, flags, &newlink,
611 const char *server, const char *share, uint32_t ns_type)
619 status = dfs_link_remove(dfspath->p_fspath, server, share, ns_type);
890 * the server MAY choose to verify whether the link target exists.
891 * If DFS_RESTORE_VOLUME is specified, the server MUST NOT perform
893 * exist, the server MUST fail the call with NERR_NetNameNotFound.
897 dfs_link_add(const char *path, const char *server, const char *share, argument
963 if (dfs_target_find(info.i_targets, ntargets, server, share) != -1) {
976 dfs_target_init(&info.i_targets[ntargets], server, shar
610 dfs_ns_removelink(const char *name, dfs_path_t *dfspath, const char *server, const char *share, uint32_t ns_type) argument
995 dfs_link_remove(const char *path, const char *server, const char *share, uint32_t ns_type) argument
1717 dfs_target_find(dfs_target_t *targets, uint32_t ntargets, const char *server, const char *share) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drd_req_dec.c53 * server specifies the expected server's name for the ticket; if NULL, then
54 * any server will be accepted if the key can be found, and the caller should
58 * server names
92 krb5_const_principal server, krb5_keytab keytab,
104 if (server != NULL || keytab->ops->start_seq_get == NULL) {
106 server != NULL ? server : req->ticket->server,
140 * We overwrite ticket->server t
91 rd_req_decrypt_tkt_part(krb5_context context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_keyblock *key) argument
256 rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument
726 krb5_rd_req_decoded_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
741 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
757 krb5_rd_req_decoded_anyflag_ext(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, const krb5_data *raw_req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
773 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
H A Dgc_frm_kdc.c178 krb5_principal client, krb5_principal server,
261 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str);
304 * krbtgt/realm_of(DST)@realm_of(SRC) as the server principal. Zeroes
324 krb5_princ_realm(ctx, src), &mcreds->server);
342 krb5_principal client, krb5_principal server)
348 krb5_princ_realm(ts->ctx, server),
476 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) {
479 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name);
484 "expectations: server '%s' "
492 "expectations: server principa
341 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument
764 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts, int *tgtptr_isoffpath) argument
849 chase_offpath(struct tr_state *ts, krb5_principal client, krb5_principal server) argument
992 krb5_principal client, server, supplied_server, out_supplied_server; local
[all...]
H A Dget_in_tkt.c60 Attempts to get an initial ticket for creds->client to use server
61 creds->server, (realm is taken from creds->client), with options
401 * We only allow the AS-REP server name to be changed if the
410 canon_ok = IS_TGS_PRINC(context, request->server) &&
411 IS_TGS_PRINC(context, as_reply->enc_part2->server);
422 !krb5_principal_compare(context, as_reply->enc_part2->server, request->server)))
423 || !krb5_principal_compare(context, as_reply->enc_part2->server, as_reply->ticket->server)
495 krb5_principal server; local
621 rewrite_server_realm(krb5_context context, krb5_const_principal old_server, const krb5_data *realm, krb5_boolean tgs, krb5_principal *server) argument
1072 build_in_tkt_name(krb5_context context, char *in_tkt_service, krb5_const_principal client, krb5_principal *server) argument
[all...]
H A Dpac.c653 const krb5_keyblock *server)
699 ret = krb5_c_verify_checksum(context, server,
775 const krb5_keyblock *server,
780 if (server == NULL)
783 ret = k5_pac_verify_server_checksum(context, pac, server);
999 /* Generate the server checksum over the entire PAC */
1020 /* Generate the privsvr checksum over the server checksum buffer */
1240 { PAC_SERVER_CHECKSUM, { KV5M_DATA, STRLENOF("urn:mspac:server-checksum"), "urn:mspac:server-checksum" } },
651 k5_pac_verify_server_checksum(krb5_context context, const krb5_pac pac, const krb5_keyblock *server) argument
771 krb5_pac_verify(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/
H A Drc_dfl.c87 h += *rep->server;
104 (strcmp(old->server, new1->server) == 0)) { /* always true */
205 ta->rep.client = ta->rep.server = ta->rep.msghash = NULL;
208 if (!(ta->rep.server = strdup(rep->server)))
218 if (ta->rep.server)
219 free(ta->rep.server);
296 free(q->rep.server);
390 if (rp->server)
444 char *msghash = NULL, *client = NULL, *server = NULL, *str, *end; local
[all...]
/osnet-11/usr/src/cmd/hal/hald/
H A Dhald_runner.c141 handle_connection(DBusServer *server, argument
160 /* dbus_server_unref(server); */
174 DBusServer *server = NULL; local
186 server = dbus_server_listen(DBUS_SERVER_ADDRESS, &err);
187 if (server == NULL) {
188 HAL_ERROR (("Cannot create D-BUS server for the runner"));
192 dbus_server_setup_with_g_main(server, NULL);
193 dbus_server_set_new_connection_function(server, handle_connection,
198 server_addr = dbus_server_get_address (server);
230 if (server !
[all...]
/osnet-11/usr/src/lib/libwrap/
H A Dtcpd.h103 struct host_info server[1]; /* server endpoint info */ member in struct:request_info
191 #define RQ_DAEMON 2 /* server process (argv[0]) */
196 #define RQ_SERVER_NAME 7 /* server host name */
197 #define RQ_SERVER_ADDR 8 /* server host address */
198 #define RQ_SERVER_SIN 9 /* server endpoint (internal) */
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c508 krb5_principal server = NULL, serverp = NULL; local
569 if (code = krb5_build_principal_ext(kmd->kcontext, &server,
583 if (code = krb5_copy_principal(kmd->kcontext, server,
584 &my_creds->server)) {
588 serverp = my_creds->server;
955 if (server)
956 krb5_free_principal(kmd->kcontext, server);
964 * function. mycreds->[client|server] could also be NULL in case
973 if (serverp && my_creds->server && serverp != my_creds->server)
[all...]
/osnet-11/usr/src/lib/libpkg/common/
H A Dpkgserv.c254 PKGserver server; local
289 server = malloc(sizeof (*server));
291 if (server == NULL)
294 server->fp = NULL;
295 server->onetime = readonly;
298 server->door = open(pkgdoor, O_RDWR);
300 if (server->door >= 0) {
301 if (door_info(server->door, &di) == 0 && di.di_target >= 0) {
304 server
467 pkgcloseserver(PKGserver server) argument
580 void *server; local
603 pkgservercommitfile(VFP_T *a_vfp, PKGserver server) argument
654 pkgopenfilter(PKGserver server, const char *filt) argument
691 pkgclosefilter(PKGserver server) argument
703 pkggetentry(PKGserver server, int *len, int *pathlen) argument
733 pkggetentry_named(PKGserver server, const char *path, int *len, int *pathlen) argument
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/
H A Dalt_prof.c507 * Parse out the port number from an admin_server setting. Modify server to
512 parse_admin_server_port(char *server, int *port, long *mask) argument
517 if (*server == '[' && (end = strchr(server + 1, ']')) != NULL) {
519 /* Shift the bracketed name or address back into server. */
520 memmove(server, server + 1, end - (server + 1));
524 end = server + strcspn(server, "
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_init.c341 char *server; local
344 server = strpbrk(service_name, "@");
345 if (!server) {
350 hp = gethostbyname(++server);
394 "unable to open connection to ADMIN server "
543 /* Drop down to v2 wire protocol if server does not support v3 */
581 char **server,
604 if (*server) {
605 free(*server);
606 *server
579 clean_up(kadm5_server_handle_t handle, enum init_type init_type, char **server, krb5_creds *creds, krb5_principal *clientp, krb5_principal *serverp, krb5_ccache *ccache) argument
645 char *server = NULL; local
[all...]
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_clnt.c52 * required when talking to a Longhorn server will go away
61 int longhorn = 0; /* Talking to a Longhorn server? */
68 krb5_principal client, krb5_principal server,
112 reqctx->idctx, request->server);
146 nonce, &cksum, request->client, request->server, &out_data);
226 krb5_principal server,
250 auth_pack9->pkAuthenticator.kdcName = server;
253 (unsigned char *)server->realm.data;
254 auth_pack9->pkAuthenticator.kdcRealm.length = server->realm.length;
474 * work if the server sen
218 pkinit_as_req_create(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_timestamp ctsec, krb5_int32 cusec, krb5_ui_4 nonce, const krb5_checksum * cksum, krb5_principal client, krb5_principal server, krb5_data ** as_req) argument
[all...]
H A Dpkinit_srv.c109 struct _krb5_db_entry_new * server,
134 request->server);
343 request->server);
624 * by the client and server. The existing session key meets these
724 request->server);
106 pkinit_server_get_edata(krb5_context context, krb5_kdc_req * request, struct _krb5_db_entry_new * client, struct _krb5_db_entry_new * server, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, krb5_pa_data * data) argument
/osnet-11/usr/src/grub/grub2/grub-core/net/
H A Ddns.c546 /* Connect to a next server. */
549 grub_dprintf("dns", "Contacting server %d\n", (int)i);
611 struct grub_net_network_level_address server; local
616 err = grub_net_resolve_address (args[1], &server);
620 err = grub_net_dns_lookup (args[0], &server, 1, &naddresses, &addresses, 0);
653 struct grub_net_network_level_address server; local
657 err = grub_net_resolve_address (args[0], &server);
661 return grub_net_add_dns_server (&server);
669 struct grub_net_network_level_address server; local
673 err = grub_net_resolve_address (args[1], &server);
[all...]
H A Dtcp.c537 grub_net_tcp_open (char *server, argument
560 err = grub_net_resolve_address (server, &addr);
/osnet-11/usr/src/lib/fm/libfmd_msg/common/
H A Dfmd_msg.c1318 char *platform, *server, *csn; local
1367 if (nvlist_lookup_string(auth, FM_FMRI_AUTH_V1_SERVER_NM, &server) != 0)
1368 server = (char *)FMD_MSG_MISSING;
1379 date, platform, csn, server, src_name, src_vers, uuid,
1390 date, platform, csn, server, src_name, src_vers, uuid,
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dinit_sec_context.c135 static krb5_error_code get_credentials(context, cred, server, now,
139 krb5_gss_name_t server;
152 in_creds.client = in_creds.server = NULL;
165 !krb5_principal_compare(context, cc_princ, server->princ)) {
176 mcreds.server = cc_princ;
194 in_creds.server = server->princ;
220 /* server did not support constrained delegation */
809 /* Handle a KRB_ERROR message from the server */
1168 krb5_principal server local
1336 krb5_principal server; local
[all...]

Completed in 150 milliseconds

123