Searched defs:server (Results 1 - 25 of 63) sorted by relevance

123

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dtgtname.c37 krb5_tgtname(krb5_context context, const krb5_data *server, const krb5_data *client, krb5_principal *tgtprinc) argument
41 server->length, server->data,
H A Dmk_req.c37 server specifies the principal of the server to receive the message; if
38 credentials are not present in the credentials cache for this server, the
59 krb5_principal server; local
64 KRB5_NT_SRV_HST, &server);
70 if ((retval = krb5_copy_principal(context, server, &creds.server)))
89 krb5_free_principal(context, server);
H A Drd_req.c40 * server specifies the expected server's name for the ticket.
54 const krb5_data *inbuf, krb5_const_principal server,
96 server, keytab, ap_req_options, ticket);
53 krb5_rd_req(krb5_context context, krb5_auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
H A Drecvauth.c49 krb5_principal server,
137 if (server) {
139 krb5_princ_component(context, server, 0), &rcache);
150 problem = krb5_rd_req(context, auth_context, &inbuf, server,
166 if(server)
167 error.server = server;
171 (void) krb5_parse_name(context, "????", &error.server);
191 krb5_free_principal(context, error.server);
232 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int3 argument
44 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument
239 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
[all...]
H A Dsendauth.c50 krb5_principal server, krb5_flags ap_req_options,
112 if ((retval = krb5_copy_principal(context, server,
113 &creds.server)))
122 krb5_free_principal(context, creds.server);
48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
H A Dfwd_tgt.c45 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument
83 } else if (server) { /* must server be non-NULL when rhost is given? */
89 retval = krb5_copy_principal (context, server, &in.server);
109 if ((retval = krb5_build_principal_ext(context, &creds.server,
158 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) {
163 if (krb5_princ_size(context, server) < 2){
168 rhost = malloc(server->data[1].length+1);
174 memcpy(rhost, server
[all...]
H A Dgic_keytab.c226 char * server = NULL; local
244 retval = krb5_unparse_name( context, creds->server, &server);
247 server_princ = creds->server;
251 0, server, opts,
254 krb5_free_unparsed_name( context, server);
258 krb5_free_principal(context, creds->server);
261 creds->server = server_princ;
H A Dvfy_increds.c50 if (krb5_principal_compare(context, princ, creds.server))
81 get_vfy_cred(krb5_context context, krb5_creds *creds, krb5_principal server, argument
94 /* If the creds are for the server principal, we're set, just do a mk_req.
98 if (krb5_principal_compare(context, server, creds->server)) {
107 * client princ realm must be the same as the server princ's realm used
123 * the server's.
125 if (!krb5_realm_compare(context, creds->client, server)) {
156 in_creds.server = server;
298 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server, krb5_keytab keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument
[all...]
H A Dgic_pwd.c496 Attempts to get an initial ticket for creds->client to use server
497 creds->server, (realm is taken from creds->client), with options
524 char * server; local
543 retval = krb5_unparse_name( context, creds->server, &server);
548 server_princ = creds->server;
552 0, server, opts,
555 krb5_free_unparsed_name( context, server);
560 krb5_free_principal( context, creds->server);
563 creds->server
[all...]
H A Dwalk_rtree.c43 * server realm during hierarchical traversal.
55 const krb5_data *server,
62 const krb5_data *server,
68 const krb5_data *server,
75 const krb5_data *server,
102 const krb5_data *server,
109 if (client->data == NULL || server->data == NULL) {
111 if (client->data == NULL && server->data == NULL) {
116 "client and server"));
129 "server"));
100 krb5_walk_realm_tree( krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **tree, int realm_sep) argument
213 rtree_capath_tree(krb5_context context, const krb5_data *client, const krb5_data *server, char **vals, krb5_principal **rettree) argument
277 rtree_capath_vals(krb5_context context, const krb5_data *client, const krb5_data *server, char ***vals) argument
329 rtree_hier_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **rettree, int sep) argument
378 rtree_hier_realms(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_data **realms, size_t *nrealms, int sep) argument
[all...]
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dwkssvc_clnt.c31 wkssvc_getinfo(char *server, char *domain, wksta_info_t *info) argument
40 if (server == NULL || domain == NULL || info == NULL)
45 if (ndr_rpc_bind(&handle, server, domain, user, "Workstation") != 0)
H A Ddssetup_clnt.c134 dssetup_query_domain_info(char *server, char *domain, smb_domain_t *dinfo) argument
145 if (lsa_query_primary_domain_info(server, domain, dinfo) == 0)
150 if (ndr_rpc_bind(&handle, server, domain, NULL, "DSSETUP") != 0) {
153 rc = ndr_rpc_bind(&handle, server, domain, user, "DSSETUP");
H A Dlsalib.c133 * Obtains the primary domain SID and name from the specified server
141 lsa_query_primary_domain_info(char *server, char *domain, argument
150 if ((lsar_open(server, domain, user, &domain_handle)) != 0)
161 * Obtains the account domain SID and name from the current server
169 lsa_query_account_domain_info(char *server, char *domain, argument
178 if ((lsar_open(server, domain, user, &domain_handle)) != 0)
191 * Obtains the DNS domain info from the specified server
199 lsa_query_dns_domain_info(char *server, char *domain, smb_domain_t *info) argument
207 if ((lsar_open(server, domain, user, &domain_handle)) != 0)
234 lsa_enum_trusted_domains(char *server, cha argument
370 lsa_list_privs(char *server, char *domain) argument
[all...]
H A Dsamlib.c60 sam_create_trust_account(char *server, char *domain) argument
73 status = sam_create_account(server, domain, account_name,
84 status = sam_check_user(server, domain, account_name);
104 sam_create_account(char *server, char *domain_name, char *account_name, argument
119 rc = samr_open(server, domain_name, user, SAM_CONNECT_CREATE_ACCOUNT,
129 sid = sam_get_domain_sid(&samr_handle, server, domain_name);
172 sam_remove_trust_account(char *server, char *domain) argument
179 return (sam_delete_account(server, domain, account_name));
187 * server.
192 sam_delete_account(char *server, cha argument
245 sam_check_user(char *server, char *domain_name, char *account_name) argument
304 sam_lookup_name(char *server, char *domain_name, char *account_name, DWORD *rid_ret) argument
356 sam_get_local_domains(char *server, char *domain_name) argument
410 sam_get_domain_sid(mlsvc_handle_t *samr_handle, char *server, char *domain_name) argument
[all...]
H A Dsamr_clnt.c71 * Wrapper round samr_connect to ensure that we connect using the server
73 * supply a server name and a domain name.
81 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument
87 if (server == NULL || domain == NULL) {
91 server = di.d_dc;
95 rc = samr_connect(server, domain, username, access_mask, samr_handle);
103 * Connect to the SAMR service on the specified server (domain controller).
111 * Try the calls from most recent to oldest until the server responds with
116 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument
129 if (ndr_rpc_bind(samr_handle, server, domai
155 samr_connect1(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
198 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
235 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
279 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
[all...]
/osnet-11/usr/src/lib/libwrap/
H A Dsocket.c7 * socket address and port, the server socket address and port. In addition,
84 static struct sockaddr_gen server; local
117 * Determine the server binding. This is used for client username
118 * lookups, and for access control rules that trigger on the server
122 len = sizeof(server);
123 if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) {
127 sockgen_simplify(&server);
128 request->server->sin = &server;
187 * may be a transient problem or a botched name server setu
[all...]
H A Dtli.c11 * server endpoint. In addition, it provides methods to map a transport
78 static struct sockaddr_gen server; local
100 if (request->server->unit != 0) {
101 memcpy(&server, request->server->unit->addr.buf,
103 request->server->unit->addr.buf));
104 request->server->sin = &server;
105 sockgen_simplify(&server);
125 if (request->server
134 struct t_unitdata *server; local
[all...]
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dsvc_raw.c35 * Interface to create an rpc client and server in the same UNIX process.
58 SVCXPRT *server; member in struct:svc_raw_private
99 if ((srp->server = svc_xprt_alloc()) == NULL) {
110 srp->server->xp_fd = FD_SETSIZE;
111 srp->server->xp_port = 0;
112 srp->server->xp_ops = svc_raw_ops();
113 srp->server->xp_verf.oa_base = srp->verf_body;
115 xprt_register(srp->server);
117 return (srp->server);
/osnet-11/usr/src/lib/libstmfproxy/common/
H A Dstmftransport.c75 pt_socket_connect(int server_node, char *server) argument
132 if ((inet_aton(server, &sin.sin_addr)) == 0) {
133 if ((hp = gethostbyname(server)) != NULL) {
138 "Cannot get IP address for %s", server);
166 "Cannot connect %s - %d", server, errno);
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_connect.c291 char server[NB_NAMELEN]; local
319 (void) strlcpy(server, name, sizeof (server));
320 DPRINT("given name: %s", server);
330 server[0] = '\0';
332 &sin.sin_addr, server, workgroup);
333 if (nberr == 0 && server[0] != '\0') {
335 DPRINT("found name: %s", server);
336 (void) strlcpy(ctx->ct_srvname, server,
340 (void) strlcpy(server, "*SMBSERVE
[all...]
/osnet-11/usr/src/lib/libpkg/common/
H A Dsrchcfile.c101 * - our door to the database server.
125 srchcfile(struct cfent *ept, char *path, PKGserver server) argument
232 curbuf = pkggetentry_named(server, path, &linelen, &cpath_len);
234 curbuf = pkggetentry(server, &linelen, &cpath_len);
/osnet-11/usr/src/lib/libdscfg/common/
H A Dcfg_lockdmsg.c42 static daemonaddr_t server; variable
75 (struct sockaddr *)&server, sizeof (server));
315 (void) memcpy(&(server.sin_addr.s_addr), *(hp->h_addr_list),
316 sizeof (server.sin_addr));
317 server.sin_port = htons(server_port);
318 server.sin_family = hp->h_addrtype;
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c291 krb5_principal server; local
322 if (code = krb5_build_principal_ext(kmd->kcontext, &server,
332 code = krb5_renew_tgt(kmd, me, server, flag);
334 krb5_free_principal(kmd->kcontext, server);
349 * This code will update the credential matching "server" in the user's
364 krb5_principal server,
386 server, &creds.server))) {
361 krb5_renew_tgt( krb5_module_data_t *kmd, krb5_principal me, krb5_principal server, int flag) argument
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_netlogon.c47 static void smb_netlogon_query(struct name_entry *server, char *mailbox,
79 smb_netlogon_request(struct name_entry *server, char *domain) argument
100 smb_netlogon_samlogon(server, MAILSLOT_NETLOGON_SAMLOGON_RDC,
103 smb_netlogon_query(server, MAILSLOT_NETLOGON_RDC, domain);
269 smb_netlogon_query(struct name_entry *server, argument
316 smb_netlogon_send(server, domain, buffer, offset + announce_len);
346 smb_netlogon_samlogon(struct name_entry *server, argument
424 smb_netlogon_send(server, domain, buffer, offset + announce_len);
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/
H A Dencrypted_challenge_main.c180 struct _krb5_db_entry_new *server,
178 kdc_include_padata(krb5_context context, krb5_kdc_req *request, struct _krb5_db_entry_new *client, struct _krb5_db_entry_new *server, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, krb5_pa_data *data) argument

Completed in 46 milliseconds

123