/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | common.c | 6 /* common.c - Functions that are common to server and clinet 564 /* We can fake it because we *are* the server */ 587 int server) 600 if (server) { 926 "Tried to set realm on non-server connection"); 928 sasl_seterror(conn, 0, "Tried to set realm on non-server connection"); 1151 case SASL_BADSERV: s = gettext("server failed mutual authentication step"); 1155 /* -- server only codes -- */ 1174 case SASL_UNAVAIL: s = gettext("remote authentication server unavailable"); 1232 case SASL_BADSERV: return "server faile 585 _sasl_common_init(_sasl_global_context_t *gctx, sasl_global_callbacks_t *global_callbacks, int server) argument [all...] |
/illumos-gate/usr/src/lib/libshell/common/sh/ |
H A D | io.c | 207 inetopen(const char* path, int server, Inetintr_f onintr, void* handle) argument 288 if (server && !bind(fd, p->ai_addr, p->ai_addrlen) && !listen(fd, 5) || !server && !connect(fd, p->ai_addr, p->ai_addrlen))
|
/illumos-gate/usr/src/lib/libsldap/common/ |
H A D | ns_common.c | 843 * For version 2, default server list could be 857 * Get server address(es) and go through them. 873 /* Get preferred server list and sort servers based on that. */ 933 gettext("Unable to generate a new server list " 1028 * Sort the serverlist based on the preferred server list. 1083 * if the preferred server list is empty, 1084 * just return a copy of the server list 1095 * if the server list is empty, 1096 * just return a copy of the preferred server list 1116 * throw out preferred servers not on server lis 2306 __s_api_removeServer(const char *server) argument [all...] |
H A D | ns_connmgmt.c | 89 "libsldap: unable to start the server monitor thread (%s)") 91 "libsldap: server down reported by ldap_cachemgr") 739 /* stop the server status/config-change monitor thread */ 1076 * compare to see if the server and credential for authentication match 1080 is_server_cred_matched(const char *server, const ns_cred_t *cred, argument 1085 /* check server first */ 1086 if (server != NULL && *server != 0) { 1087 if (strcasecmp(server, cp->serverAddr) != 0) 1142 * In two cases, it should be closed. If a preferred server i 1267 match_conn_mt(ns_conn_user_t *cu, ns_conn_mt_t **cmt, ns_conn_mt_state_t st, const char *server, const ns_cred_t *cred) argument 1381 __s_api_conn_mt_get(const char *server, const int flags, const ns_cred_t *cred, Connection **session, ns_ldap_error_t **errorp, ns_conn_user_t *cu) argument [all...] |
H A D | ns_standalone.c | 141 * will establish a connection to the server specified by 692 * a buffer containing server info in the following format: 850 /* Get the whole list of naming contexts residing on the server */ 860 * If the root DSE was not found, the server does 1004 * If the root DSE was not found, the server does 1080 * from a specified server. 1083 * server - a structure describing a server to connect to and 1084 * a DUAProfile to be obtained from the server, 1086 * the server 1097 __ns_ldap_getConnectionInfoFromDUA(const ns_dir_server_t *server, const ns_cred_t *cred, char **dua_profile, char **dir_base_dn, ns_ldap_error_t **errorp) argument 1562 dir_server_t *server = (dir_server_t *)param; local 2165 dir_server_t *server = NULL; local [all...] |
H A D | ns_sldap.h | 88 * LDAP server. 95 * LDAP server. 341 * Structure for holding the response returned by server for 353 * Structure used to hold the response from the server for 522 * NS_LDAP_SERVER: the consumer application has specified a directory server 532 * This structure describes an LDAP server specified by a client application. 535 char *server; /* A directory server's IP */ member in struct:ns_dir_server 536 uint16_t port; /* A directory server's port. */ 539 /* by the specified server 561 ns_dir_server_t server; member in union:ns_standalone_conf::__anon4008 [all...] |
H A D | ns_internal.h | 184 /* Password management related error message from iDS ldap server */ 555 * Server side sort type. Orginally the server side sort 558 * know which server side sort will work with the 621 /* server list position */ 710 * __s_api_requestServer. The routine that requests a new server 714 char *server; member in struct:ns_server_info 758 int __s_api_requestServer(const char *request, const char *server, 799 const char *server, 898 int __s_api_removeServer(const char *server); 899 void __s_api_removeBadServers(char **server); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 27 * remote login server: 114 krb5_principal server, 400 krb5_principal server; local 403 KRB5_NT_SRV_HST, &server); 408 krb5_princ_component(krb_context, server, 0), 410 krb5_free_principal(krb_context, server); 650 "server lacks privilege"); 665 fatal(f, "This server only supports Kerberos V5"); 881 krb5_principal server, /* IN */ 925 server, flag 878 krb5_compat_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fdp, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_int32 *auth_sys, krb5_data *version) argument [all...] |
H A D | in.telnetd.c | 43 * Telnet server. 534 krb5_principal server; local 570 &server); 576 server, 0), 580 server); 615 ticket->server, 0)->length < MAXPRINCLEN) { 619 ticket->server, 0)->data, 621 ticket->server, 0)->length); 623 ticket->server, 0)->length] = '\0'; 774 0, 0, KRB5_NT_SRV_HST, &server); [all...] |
/illumos-gate/usr/src/cmd/modload/ |
H A D | drvsubr.c | 1080 * All this stuff is to support a server installing 1081 * drivers on diskless clients. When on the server 1283 * do this here to support add_drv on server for diskless clients 2165 update_name_to_major(char *driver_name, major_t *major_num, int server) argument 2238 * In a server case (with -b option), we can't use modctl() to find 2242 * if (server) 2247 if (server) {
|
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | hald_dbus.c | 4295 local_server_handle_connection (DBusServer *server, argument 4337 /* setup a server listening on a socket so we can do point to point 4342 HAL_ERROR (("Cannot create D-BUS server")); 4346 HAL_INFO (("local server is listening at %s", server_addr));
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 115 krb5_db_entry *client, krb5_db_entry *server, 121 krb5_db_entry *client, krb5_db_entry *server, 184 krb5_db_entry *client, krb5_db_entry *server, 771 krb5_db_entry *server, 782 if (isflagset(server->attributes, KRB5_KDB_PWCHANGE_SERVICE) && 808 krb5_db_entry *server, krb5_data *e_data) 839 retval = (ap->get_edata)(kdc_context, request, client, server, 1397 krb5_db_entry *client, krb5_db_entry *server, 1484 krb5_db_entry *client, krb5_db_entry *server, 1496 return etype_info_helper(context, request, client, server, pa_dat 770 missing_required_preauth(krb5_db_entry *client, krb5_db_entry *server, krb5_enc_tkt_part *enc_tkt_reply) argument 807 get_preauth_hint_list(krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, krb5_data *e_data) argument 1396 etype_info_helper(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, krb5_pa_data *pa_data, int etype_info2) argument 1483 get_etype_info(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument 1500 get_etype_info2(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument 1856 get_sam_edata(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc sam_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument [all...] |
/illumos-gate/usr/src/cmd/ldapcachemgr/ |
H A D | cachemgr_getldap.c | 83 * server list refresh delay when in "no server" mode 160 * The status of a server to be removed. It can be up or down. 432 * getldap_serverInfo_refresh thread is refreshing the server list 441 * The original server_info_t has one copy of server info. When libsldap 442 * makes door call GETLDAPSERVER to get the server info and getldap_get_rootDSE 443 * is updating the server info, it would hit a unprotected window in 444 * getldap_rootDSE. The door call will not get server info and libsldap 537 /* initialize the server info element */ 545 * The previous server statu 892 server_info_t *server = NULL; local [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_stub_vnops.c | 423 * actual attributes from the server in the mirror mount case, 602 * same server fs as sdvp, or for a different server fs. 917 /* check if the current server is responding */ 930 /* current server did not respond */ 950 * server, here, and remove it from the list if it is not 951 * responding. This has the side-effect of that server then 958 * If the current server was down, loop indefinitely until we find 959 * at least one responsive server. 973 * We've already tried the current server, abov 1254 nfs4_callmapid(utf8string *server, struct nfs_fsl_info *resp) argument [all...] |
H A D | nfs4_subr.c | 391 * Client and server are in different DNS domains 427 nfs4_server_t *server; local 436 * Happens once per client <-> server pair. 442 server = find_nfs4_server(mi); 443 if (server == NULL) { 448 if (!(server->s_flags & N4S_BADOWNER_DEBUG)) { 451 " the server: %s domain.\n" 454 server->s_flags |= N4S_BADOWNER_DEBUG; 456 mutex_exit(&server->s_lock); 457 nfs4_server_rele(server); [all...] |
H A D | nfs_dlinet.c | 397 * Call mount daemon on server `sa' to mount path. 399 * returned from the server. 402 mountnfs(struct netbuf *sa, char *server, argument 425 server, path); 446 "mountnfs: %s:%s mount server not responding", 447 server, path); 477 * Call mount daemon on server `sa' to mount path. 479 * returned from the server. 482 mountnfs3(struct netbuf *sa, char *server, argument 510 server, pat [all...] |
H A D | nfs4_srv.c | 120 * RFS4_MINLEN_RDDIR_BUF: minimum length of buffer server will provide to 274 rfs4_servinst_t *rfs4_cur_servinst = NULL; /* current server instance */ 512 * to be used as the write verifier returned from the server 514 * whenever the server reboots. Of secondary importance, it 520 * loaded. It is assumed that an NFS server will not be able 524 * time the server reboots and minimize the chances that two 544 /* Used to manage create/destroy of server state */ 547 /* Used to manage access to server instance linked list */ 628 * Indicates if server instance is within the 721 * Create a new server instanc 9819 char *server, *path, *symbuf; local [all...] |
/illumos-gate/usr/src/cmd/zoneadmd/ |
H A D | zoneadmd.c | 39 * - Implement a door server; clients (like zoneadm) connect to the door 40 * server and request zone state changes. The kernel is also a client of 41 * this door server. A request to halt or reboot the zone which originates 54 * - Act as a console server for zlogin -C processes; see comments in zcons.c 63 * reboot the service processor of a server without affecting the OS instance. 1180 * The main routine for the door server that deals with zone state transitions. 1184 server(void *cookie, char *args, size_t alen, door_desc_t *dp, function 1640 if ((zone_door = door_create(server, NULL, 2185 * Take the lock now, so that when the door server gets going, we 2260 * the UNREF, the door server wil [all...] |
/illumos-gate/usr/src/uts/common/fs/doorfs/ |
H A D | door_sys.c | 508 door_server_t *st; /* server thread door_data */ 512 /* destructor for data returned by a kernel server */ 593 * Check for in-kernel door server. 610 * Call kernel door server. Arguments are passed and 614 * structure pointers. It's the server function's 619 * files. When a reference is passed to a kernel server, 620 * it is the server's responsibility to release the reference 621 * (by calling closef). When the server includes a 623 * the call (the server must duplicate the reference if 664 * Get a server threa 2238 struct proc *server = d->door_target; local 2427 door_args(kthread_t *server, int is_private) argument [all...] |
/illumos-gate/usr/src/cmd/fm/fmadm/common/ |
H A D | faulty.c | 194 char *server; member in struct:host_id 271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument 279 if (server == NULL) 280 server = "-"; 285 hostp->hostid.server && 286 strcmp(hostp->hostid.server, server) == 0 && 303 hostp->hostid.server = strdup(server); 317 char *platform = NULL, *chassis = NULL, *server local [all...] |
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/ |
H A D | hc.c | 253 char *prod, *psn, *csn, *server; local 291 if (nvlist_lookup_string(auth, FM_FMRI_AUTH_SERVER, &server) 294 FM_FMRI_AUTH_SERVER, TOPO_PROP_IMMUTABLE, server,
|
/illumos-gate/usr/src/uts/common/io/mac/ |
H A D | mac_protect.c | 57 * A DHCP handshake between client and server typically requires at least 62 * 2. OFFER - server responds to client with an IP address and 65 * 4. ACK - server verifies that the requested address matches 100 * If the server never responds with an ACK, there is a timer that is set after 310 uint16_t offset_and_flags, client, server; local 336 server = htons(IPPORT_BOOTPS); 337 if (udph->uh_sport != client && udph->uh_sport != server && 338 udph->uh_dport != client && udph->uh_dport != server) 809 uint16_t hdrlen, client, server; local 839 server [all...] |
/illumos-gate/usr/src/cmd/mdb/common/modules/idm/ |
H A D | idm.c | 2875 mdb_printf("-s: Print iSNS server information\n"); 3085 iscsit_isns_svr_t server; local 3092 if (mdb_vread(&server, sizeof (iscsit_isns_svr_t), addr) != 3100 mdb_printf("iSNS server %p:\n", addr); 3102 ss = &server.svr_sa; 3113 server.svr_esi_interval); 3115 ((lbolt - server.svr_last_msg) / 100)); 3117 (server.svr_registered) ? "Yes" : "No"); 3119 server.svr_retry_count); 3121 (server [all...] |
/illumos-gate/usr/src/cmd/syslogd/ |
H A D | syslogd.c | 250 /* for managing door server threads */ 2661 if ((DoorFd = door_create(server, 0, 2695 DPRINT2(5, "open_door(%u): attached server() to %s\n", mythreadno, 2813 * the 'server' function that we export via the door. It does 2818 server(void *cookie, char *argp, size_t arg_size, function 2843 * Max number of door server threads for syslogd. Since door is used 2845 * server threads. 2850 * Manage door server thread pool. 4395 DPRINT2(5, "close_door(%u): detached server() from %s\n",
|
/illumos-gate/usr/src/cmd/mdb/common/modules/ip/ |
H A D | ip.c | 1992 { "ilb_servers", "walk server in a given ilb_rule_t", 3234 ilb_server_t server; local 3237 if (mdb_vread(&server, sizeof (server), wsp->walk_addr) == -1) { 3241 status = wsp->walk_callback(wsp->walk_addr, &server, wsp->walk_cbdata); 3244 if ((wsp->walk_addr = (uintptr_t)server.iser_next) == NULL)
|