/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | tgtname.c | 37 krb5_tgtname(krb5_context context, const krb5_data *server, const krb5_data *client, krb5_principal *tgtprinc) argument 41 server->length, server->data,
|
H A D | mk_req.c | 37 server specifies the principal of the server to receive the message; if 38 credentials are not present in the credentials cache for this server, the 59 krb5_principal server; local 64 KRB5_NT_SRV_HST, &server); 70 if ((retval = krb5_copy_principal(context, server, &creds.server))) 89 krb5_free_principal(context, server);
|
H A D | rd_req.c | 40 * server specifies the expected server's name for the ticket. 54 const krb5_data *inbuf, krb5_const_principal server, 96 server, keytab, ap_req_options, ticket); 53 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
|
H A D | recvauth.c | 49 krb5_principal server, 137 if (server) { 139 krb5_princ_component(context, server, 0), &rcache); 150 problem = krb5_rd_req(context, auth_context, &inbuf, server, 166 if(server) 167 error.server = server; 171 (void) krb5_parse_name(context, "????", &error.server); 191 krb5_free_principal(context, error.server); 232 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int3 argument 44 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument 239 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument [all...] |
H A D | sendauth.c | 50 krb5_principal server, krb5_flags ap_req_options, 112 if ((retval = krb5_copy_principal(context, server, 113 &creds.server))) 122 krb5_free_principal(context, creds.server); 48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
|
H A D | fwd_tgt.c | 45 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument 83 } else if (server) { /* must server be non-NULL when rhost is given? */ 89 retval = krb5_copy_principal (context, server, &in.server); 109 if ((retval = krb5_build_principal_ext(context, &creds.server, 158 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) { 163 if (krb5_princ_size(context, server) < 2){ 168 rhost = malloc(server->data[1].length+1); 174 memcpy(rhost, server [all...] |
H A D | gic_keytab.c | 226 char * server = NULL; local 244 retval = krb5_unparse_name( context, creds->server, &server); 247 server_princ = creds->server; 251 0, server, opts, 254 krb5_free_unparsed_name( context, server); 258 krb5_free_principal(context, creds->server); 261 creds->server = server_princ;
|
H A D | vfy_increds.c | 50 if (krb5_principal_compare(context, princ, creds.server)) 81 get_vfy_cred(krb5_context context, krb5_creds *creds, krb5_principal server, argument 94 /* If the creds are for the server principal, we're set, just do a mk_req. 98 if (krb5_principal_compare(context, server, creds->server)) { 107 * client princ realm must be the same as the server princ's realm used 123 * the server's. 125 if (!krb5_realm_compare(context, creds->client, server)) { 156 in_creds.server = server; 298 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server, krb5_keytab keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument [all...] |
H A D | gic_pwd.c | 496 Attempts to get an initial ticket for creds->client to use server 497 creds->server, (realm is taken from creds->client), with options 524 char * server; local 543 retval = krb5_unparse_name( context, creds->server, &server); 548 server_princ = creds->server; 552 0, server, opts, 555 krb5_free_unparsed_name( context, server); 560 krb5_free_principal( context, creds->server); 563 creds->server [all...] |
H A D | walk_rtree.c | 43 * server realm during hierarchical traversal. 55 const krb5_data *server, 62 const krb5_data *server, 68 const krb5_data *server, 75 const krb5_data *server, 102 const krb5_data *server, 109 if (client->data == NULL || server->data == NULL) { 111 if (client->data == NULL && server->data == NULL) { 116 "client and server")); 129 "server")); 100 krb5_walk_realm_tree( krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **tree, int realm_sep) argument 213 rtree_capath_tree(krb5_context context, const krb5_data *client, const krb5_data *server, char **vals, krb5_principal **rettree) argument 277 rtree_capath_vals(krb5_context context, const krb5_data *client, const krb5_data *server, char ***vals) argument 329 rtree_hier_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **rettree, int sep) argument 378 rtree_hier_realms(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_data **realms, size_t *nrealms, int sep) argument [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | wkssvc_clnt.c | 31 wkssvc_getinfo(char *server, char *domain, wksta_info_t *info) argument 40 if (server == NULL || domain == NULL || info == NULL) 45 if (ndr_rpc_bind(&handle, server, domain, user, "Workstation") != 0)
|
H A D | dssetup_clnt.c | 134 dssetup_query_domain_info(char *server, char *domain, smb_domain_t *dinfo) argument 145 if (lsa_query_primary_domain_info(server, domain, dinfo) == 0) 150 if (ndr_rpc_bind(&handle, server, domain, NULL, "DSSETUP") != 0) { 153 rc = ndr_rpc_bind(&handle, server, domain, user, "DSSETUP");
|
H A D | lsalib.c | 133 * Obtains the primary domain SID and name from the specified server 141 lsa_query_primary_domain_info(char *server, char *domain, argument 150 if ((lsar_open(server, domain, user, &domain_handle)) != 0) 161 * Obtains the account domain SID and name from the current server 169 lsa_query_account_domain_info(char *server, char *domain, argument 178 if ((lsar_open(server, domain, user, &domain_handle)) != 0) 191 * Obtains the DNS domain info from the specified server 199 lsa_query_dns_domain_info(char *server, char *domain, smb_domain_t *info) argument 207 if ((lsar_open(server, domain, user, &domain_handle)) != 0) 234 lsa_enum_trusted_domains(char *server, cha argument 370 lsa_list_privs(char *server, char *domain) argument [all...] |
H A D | samlib.c | 60 sam_create_trust_account(char *server, char *domain) argument 73 status = sam_create_account(server, domain, account_name, 84 status = sam_check_user(server, domain, account_name); 104 sam_create_account(char *server, char *domain_name, char *account_name, argument 119 rc = samr_open(server, domain_name, user, SAM_CONNECT_CREATE_ACCOUNT, 129 sid = sam_get_domain_sid(&samr_handle, server, domain_name); 172 sam_remove_trust_account(char *server, char *domain) argument 179 return (sam_delete_account(server, domain, account_name)); 187 * server. 192 sam_delete_account(char *server, cha argument 245 sam_check_user(char *server, char *domain_name, char *account_name) argument 304 sam_lookup_name(char *server, char *domain_name, char *account_name, DWORD *rid_ret) argument 356 sam_get_local_domains(char *server, char *domain_name) argument 410 sam_get_domain_sid(mlsvc_handle_t *samr_handle, char *server, char *domain_name) argument [all...] |
H A D | samr_clnt.c | 71 * Wrapper round samr_connect to ensure that we connect using the server 73 * supply a server name and a domain name. 81 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument 87 if (server == NULL || domain == NULL) { 91 server = di.d_dc; 95 rc = samr_connect(server, domain, username, access_mask, samr_handle); 103 * Connect to the SAMR service on the specified server (domain controller). 111 * Try the calls from most recent to oldest until the server responds with 116 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument 129 if (ndr_rpc_bind(samr_handle, server, domai 155 samr_connect1(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 198 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 235 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 279 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument [all...] |
/osnet-11/usr/src/lib/libwrap/ |
H A D | socket.c | 7 * socket address and port, the server socket address and port. In addition, 84 static struct sockaddr_gen server; local 117 * Determine the server binding. This is used for client username 118 * lookups, and for access control rules that trigger on the server 122 len = sizeof(server); 123 if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) { 127 sockgen_simplify(&server); 128 request->server->sin = &server; 187 * may be a transient problem or a botched name server setu [all...] |
H A D | tli.c | 11 * server endpoint. In addition, it provides methods to map a transport 78 static struct sockaddr_gen server; local 100 if (request->server->unit != 0) { 101 memcpy(&server, request->server->unit->addr.buf, 103 request->server->unit->addr.buf)); 104 request->server->sin = &server; 105 sockgen_simplify(&server); 125 if (request->server 134 struct t_unitdata *server; local [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | svc_raw.c | 35 * Interface to create an rpc client and server in the same UNIX process. 58 SVCXPRT *server; member in struct:svc_raw_private 99 if ((srp->server = svc_xprt_alloc()) == NULL) { 110 srp->server->xp_fd = FD_SETSIZE; 111 srp->server->xp_port = 0; 112 srp->server->xp_ops = svc_raw_ops(); 113 srp->server->xp_verf.oa_base = srp->verf_body; 115 xprt_register(srp->server); 117 return (srp->server);
|
/osnet-11/usr/src/lib/libstmfproxy/common/ |
H A D | stmftransport.c | 75 pt_socket_connect(int server_node, char *server) argument 132 if ((inet_aton(server, &sin.sin_addr)) == 0) { 133 if ((hp = gethostbyname(server)) != NULL) { 138 "Cannot get IP address for %s", server); 166 "Cannot connect %s - %d", server, errno);
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_connect.c | 291 char server[NB_NAMELEN]; local 319 (void) strlcpy(server, name, sizeof (server)); 320 DPRINT("given name: %s", server); 330 server[0] = '\0'; 332 &sin.sin_addr, server, workgroup); 333 if (nberr == 0 && server[0] != '\0') { 335 DPRINT("found name: %s", server); 336 (void) strlcpy(ctx->ct_srvname, server, 340 (void) strlcpy(server, "*SMBSERVE [all...] |
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | srchcfile.c | 101 * - our door to the database server. 125 srchcfile(struct cfent *ept, char *path, PKGserver server) argument 232 curbuf = pkggetentry_named(server, path, &linelen, &cpath_len); 234 curbuf = pkggetentry(server, &linelen, &cpath_len);
|
/osnet-11/usr/src/lib/libdscfg/common/ |
H A D | cfg_lockdmsg.c | 42 static daemonaddr_t server; variable 75 (struct sockaddr *)&server, sizeof (server)); 315 (void) memcpy(&(server.sin_addr.s_addr), *(hp->h_addr_list), 316 sizeof (server.sin_addr)); 317 server.sin_port = htons(server_port); 318 server.sin_family = hp->h_addrtype;
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_setcred.c | 291 krb5_principal server; local 322 if (code = krb5_build_principal_ext(kmd->kcontext, &server, 332 code = krb5_renew_tgt(kmd, me, server, flag); 334 krb5_free_principal(kmd->kcontext, server); 349 * This code will update the credential matching "server" in the user's 364 krb5_principal server, 386 server, &creds.server))) { 361 krb5_renew_tgt( krb5_module_data_t *kmd, krb5_principal me, krb5_principal server, int flag) argument
|
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_netlogon.c | 47 static void smb_netlogon_query(struct name_entry *server, char *mailbox, 79 smb_netlogon_request(struct name_entry *server, char *domain) argument 100 smb_netlogon_samlogon(server, MAILSLOT_NETLOGON_SAMLOGON_RDC, 103 smb_netlogon_query(server, MAILSLOT_NETLOGON_RDC, domain); 269 smb_netlogon_query(struct name_entry *server, argument 316 smb_netlogon_send(server, domain, buffer, offset + announce_len); 346 smb_netlogon_samlogon(struct name_entry *server, argument 424 smb_netlogon_send(server, domain, buffer, offset + announce_len);
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 180 struct _krb5_db_entry_new *server, 178 kdc_include_padata(krb5_context context, krb5_kdc_req *request, struct _krb5_db_entry_new *client, struct _krb5_db_entry_new *server, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, krb5_pa_data *data) argument
|