Searched defs:server (Results 26 - 50 of 153) sorted by relevance

1234567

/illumos-gate/usr/src/cmd/listen/
H A Dlssmb.c35 * lssmb.c: Contains all code specific to the MS-NET file server.
102 char **argv; /* server arguments */
104 char *server = *argv; /* path of server */ local
170 * There are a few kinds of arguments that I will pass to the server:
201 * the full pathname of the executable server file.
204 args[0] = server;
228 * first arg is server path, so we ignore that.
313 char **argv; /* server arguments */
/illumos-gate/usr/src/cmd/svr4pkg/installf/
H A Ddofinal.c57 dofinal(PKGserver server, VFP_T *vfpo, int rmflag, char *myclass, char *prog) argument
73 if (pkgopenfilter(server, pkginst) != 0)
76 while (n = srchcfile(&(entry.cf_ent), "*", server)) {
90 /* Restore original server-relative path, if needed */
97 pkgclosefilter(server);
163 /* tp is the server-relative path */
167 /* entry has the server-relative path */
179 * server. Otherwise, ok to do final
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drecvauth.c51 krb5_principal server,
159 if (server) {
161 krb5_princ_component(context, server, 0), &rcache);
172 problem = krb5_rd_req(context, auth_context, &inbuf, server,
188 if(server)
189 error.server = server;
193 (void) krb5_parse_name(context, "????", &error.server);
214 krb5_free_principal(context, error.server);
256 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int3 argument
46 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument
263 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
[all...]
H A Dsendauth.c47 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
109 if ((retval = krb5_copy_principal(context, server,
110 &creds.server)))
119 krb5_free_principal(context, creds.server);
H A Dvfy_increds.c34 if (krb5_principal_compare(context, princ, creds.server))
75 krb5_principal server; local
85 server = NULL;
94 server = server_arg;
96 KRB5_NT_SRV_HST, &server))
99 /* first, check if the server is in the keytab. If not, there's
116 (ret = krb5_kt_get_entry(context, keytab, server, 0, 0, &kte))) {
147 /* If the creds are for the server principal, we're set, just do
150 if (krb5_principal_compare(context, server, creds->server)) {
[all...]
H A Dfwd_tgt.c41 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument
79 } else if (server) { /* must server be non-NULL when rhost is given? */
85 retval = krb5_copy_principal (context, server, &in.server);
105 if ((retval = krb5_build_principal_ext(context, &creds.server,
151 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) {
156 if (krb5_princ_size(context, server) < 2){
161 rhost = malloc(server->data[1].length+1);
168 (void) memcpy(rhost, server
[all...]
H A Dgic_keytab.c215 char * server = NULL; local
233 retval = krb5_unparse_name( context, creds->server, &server);
236 server_princ = creds->server;
241 0, server, opte,
244 krb5_free_unparsed_name( context, server);
249 if (creds->server)
250 krb5_free_principal( context, creds->server);
254 creds->server = server_princ;
H A Dwalk_rtree.c40 * Client to server paths are defined. There are n**2 possible
42 * or server need be present in its krb5.conf file. (n entries or 2*n
78 * If no client-to-server path is found, the default hierarchical path
84 * client's realm to server's realm must be given. The modifications
104 * function takes a client and server realm name and returns the set
111 * both the client and server realms. In general, the pointer scp and
112 * ccp are used to walk through the client and server realms. The
117 * the client or server strings. I think this only happens when there
122 krb5_walk_realm_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **tree, int realm_branch_char) argument
144 printf(" server i
[all...]
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dkeychain.c265 " server/user: %s/%s\n",
296 smbfs_default_dom_usr(const char *home, const char *server, argument
306 if (server) {
307 err = smb_ctx_setfullserver(ctx, server);
H A Dconnect.c297 char server[NB_NAMELEN]; local
325 strlcpy(server, name, sizeof (server));
326 DPRINT("given name: %s", server);
336 server[0] = '\0';
338 &sin.sin_addr, server, workgroup);
339 if (nberr == 0 && server[0] != '\0') {
341 DPRINT("found name: %s", server);
342 strlcpy(ctx->ct_srvname, server,
346 strlcpy(server, "*SMBSERVE
[all...]
/illumos-gate/usr/src/lib/libstmfproxy/common/
H A Dstmftransport.c75 pt_socket_connect(int server_node, char *server) argument
132 if ((inet_aton(server, &sin.sin_addr)) == 0) {
133 if ((hp = gethostbyname(server)) != NULL) {
138 "Cannot get IP address for %s", server);
166 "Cannot connect %s - %d", server, errno);
/illumos-gate/usr/src/lib/libwrap/
H A Dtli.c9 * server endpoint. In addition, it provides methods to map a transport
74 static struct sockaddr_gen server; local
96 if (request->server->unit != 0) {
97 memcpy(&server, request->server->unit->addr.buf,
99 request->server->unit->addr.buf));
100 request->server->sin = &server;
101 sockgen_simplify(&server);
121 if (request->server
130 struct t_unitdata *server; local
[all...]
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Dsvc_raw.c39 * Interface to create an rpc client and server in the same UNIX process.
62 SVCXPRT *server; member in struct:svc_raw_private
103 if ((srp->server = svc_xprt_alloc()) == NULL) {
114 srp->server->xp_fd = FD_SETSIZE;
115 srp->server->xp_port = 0;
116 srp->server->xp_ops = svc_raw_ops();
117 srp->server->xp_verf.oa_base = srp->verf_body;
119 xprt_register(srp->server);
121 return (srp->server);
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/
H A DNameService.java29 package com.sun.admin.pm.server;
45 // This constructor is used internally in the server package.
H A DPrinterUtil.java32 package com.sun.admin.pm.server;
H A DSysCommand.java32 package com.sun.admin.pm.server;
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/
H A Drenew.c202 * server address. We know the renew timer has already been cancelled
434 * a server ID, as we still think our server might be
469 ipaddr_t server; local
499 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server);
500 return (send_pkt(dsmp, dpkt, server, stop_extending));
/illumos-gate/usr/src/cmd/fs.d/nfs/clear_locks/
H A Dclear_locks.c142 gettext("Clearing locks held for NFS client %s on server %s\n"),
147 gettext("Clearing locks held for NFS client %s on server %s\n"),
158 * Request that host 'server' free all locks held by
162 share_zap(char *client, char *server) argument
169 rslt = rpc_call(server, NLM_PROG, NLM_VERSX, NLM_FREE_ALL,
177 client, server);
/illumos-gate/usr/src/cmd/tcpd/
H A Dtcpdmatch.c63 char *server; local
113 if ((server = split_at(argv[optind], '@')) == 0)
114 server = unknown;
167 * If a server hostname is specified, insist that the name maps to at
168 * most one address. eval_hostname() warns the user about name server
169 * problems, while using the request.server structure as a cache for host
172 if (NOT_INADDR(server) == 0 || HOSTNAME_KNOWN(server)) {
173 if ((hp = find_inet_addr(server)) == 0)
183 * Force evaluation of server hos
[all...]
/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dauthdesubr.c87 struct t_call *server; local
215 (char **)&server)) != 0) {
221 server->addr.len = addrp->len;
222 bcopy(addrp->buf, server->addr.buf, server->addr.len);
224 if ((error = t_kconnect(tiptr, server, NULL)) != 0) {
226 (void) t_kfree(tiptr, (char *)server, T_CALL);
230 (void) t_kfree(tiptr, (char *)server, T_CALL);
239 /* now read up to 4 bytes from the TIME server */
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dmlsvc_util.c62 mlsvc_netlogon(char *server, char *domain) argument
67 status = netr_open(server, domain, &netr_handle);
70 "for domain %s (%s)", server, domain,
75 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT);
78 "credential chain with DC: %s (%s)", server,
143 * Ditto the SMB server domain.
161 "smbd: failed to locate AD server for domain %s (%s)",
168 * so that admin will know which AD server we were talking to.
171 syslog(LOG_INFO, "smbd: found AD server %s", dxi.d_dci.dc_name);
174 * Domain discovery needs to authenticate with the AD server
311 char *server = dxi->d_dci.dc_name; local
424 mlsvc_disconnect(const char *server) argument
[all...]
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c291 krb5_principal server; local
322 if (code = krb5_build_principal_ext(kmd->kcontext, &server,
332 code = krb5_renew_tgt(kmd, me, server, flag);
334 krb5_free_principal(kmd->kcontext, server);
349 * This code will update the credential matching "server" in the user's
364 krb5_principal server,
386 server, &creds.server))) {
361 krb5_renew_tgt( krb5_module_data_t *kmd, krb5_principal me, krb5_principal server, int flag) argument
/illumos-gate/usr/src/lib/libdscfg/common/
H A Dcfg_lockdmsg.c42 static daemonaddr_t server; variable
75 (struct sockaddr *)&server, sizeof (server));
316 (void) memcpy(&(server.sin_addr.s_addr), *(hp->h_addr_list),
317 sizeof (server.sin_addr));
318 server.sin_port = htons(server_port);
319 server.sin_family = hp->h_addrtype;
/illumos-gate/usr/src/lib/libpkg/common/
H A Dsrchcfile.c101 * - our door to the database server.
125 srchcfile(struct cfent *ept, char *path, PKGserver server) argument
232 curbuf = pkggetentry_named(server, path, &linelen, &cpath_len);
234 curbuf = pkggetentry(server, &linelen, &cpath_len);
/illumos-gate/usr/src/cmd/ypcmd/
H A Dypset.c246 CLIENT *server, *client; local
255 * Open up a path to the server
258 if ((server = clnt_create(server_to_use, YPPROG, YPVERS,
265 nconf = getnetconfigent(server->cl_netid);
266 clnt_control(server, CLGET_SVC_ADDR, (char *)&nbuf);
317 (void) clnt_destroy(server);

Completed in 146 milliseconds

1234567