/illumos-gate/usr/src/lib/libwrap/ |
H A D | tli.c | 9 * server endpoint. In addition, it provides methods to map a transport 74 static struct sockaddr_gen server; local 96 if (request->server->unit != 0) { 97 memcpy(&server, request->server->unit->addr.buf, 99 request->server->unit->addr.buf)); 100 request->server->sin = &server; 101 sockgen_simplify(&server); 121 if (request->server 130 struct t_unitdata *server; local [all...] |
H A D | update.c | 61 request->server->sin = va_arg(ap, struct sockaddr_gen *); 81 ptr = request->server->name; 84 ptr = request->server->addr; 111 request->server->request = request;
|
H A D | percent_x.c | 67 ch == 'A' ? eval_hostaddr(request->server) : 71 ch == 'H' ? eval_hostinfo(request->server) : 73 ch == 'N' ? eval_hostname(request->server) :
|
H A D | socket.c | 10 * socket address and port, the server socket address and port. In addition, 87 static struct sockaddr_gen server; local 120 * Determine the server binding. This is used for client username 121 * lookups, and for access control rules that trigger on the server 125 len = sizeof(server); 126 if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) { 130 sockgen_simplify(&server); 131 request->server->sin = &server; 190 * may be a transient problem or a botched name server setu [all...] |
/illumos-gate/usr/src/cmd/svc/milestone/ |
H A D | net-netmask | 49 server=`/usr/bin/ypwhich 2>/dev/null` 50 [ $? -eq 0 -a -n "$server" ] && return 0 || sleep 1
|
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksmb.c | 49 gettext("Usage: %s [ -d fqdn ] [ -s server ]\n"), whoami); 63 char c, fqdn[MAXHOSTNAMELEN], server[MAXHOSTNAMELEN]; local 83 (void) strncpy(server, optarg, sizeof (server)); 126 ret = smb_setdomainprops(fqdn, server, newpw);
|
/illumos-gate/usr/src/uts/common/inet/ilb/ |
H A D | ilb.c | 91 * The rule taskq is for processing rule and server removal. When a user 92 * land rule/server removal request comes in, a taskq is dispatched after 93 * removing the rule/server from all related hashes. This taskq will wait 94 * until all references to the rule/server are gone before removing it. 144 /* Back end server handling routines. */ 246 ilb_server_t *server) 260 server->iser_name, cname_buf, KSTAT_TYPE_NAMED, 265 bcopy(&template, &server->iser_kstat, sizeof (template)); 266 ksp->ks_data = &server->iser_kstat; 269 kstat_named_setstr(&server 245 ilb_server_kstat_init(netstackid_t stackid, ilb_rule_t *rule, ilb_server_t *server) argument 760 ilb_server_t *server; local 1213 ilb_server_t *server; local 1401 ilb_server_t *server = (ilb_server_t *)arg; local 1418 ilb_server_t *server; local 1673 ilb_server_t *server; local 1956 ilb_server_t *server; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | smbrdr_glue.c | 56 * Disconnects the session with given server. 62 smbrdr_disconnect(const char *server) argument 78 * asks for this server+user (immediately after this returns), 102 * Get the SMB server's configuration stuff and 106 smbrdr_ctx_new(struct smb_ctx **ctx_p, char *server, argument 114 assert(server != NULL); 118 if (server[0] == '\0') 125 * Set server, share, domain, user 128 (void) smb_ctx_setfullserver(ctx, server);
|
H A D | samlib.c | 80 sam_remove_trust_account(char *server, char *domain) argument 87 return (sam_delete_account(server, domain, account_name)); 95 * server. 100 sam_delete_account(char *server, char *domain_name, char *account_name) argument 114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument 178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 209 * Query a remote server to get the list of local domains that it 215 sam_get_local_domains(char *server, char *domain_name) argument 224 rc = samr_open(server, domain_nam 285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument [all...] |
H A D | mlsvc_util.c | 62 mlsvc_netlogon(char *server, char *domain) argument 67 status = netr_open(server, domain, &netr_handle); 70 "for domain %s (%s)", server, domain, 75 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT); 78 "credential chain with DC: %s (%s)", server, 143 * Ditto the SMB server domain. 161 "smbd: failed to locate AD server for domain %s (%s)", 168 * so that admin will know which AD server we were talking to. 171 syslog(LOG_INFO, "smbd: found AD server %s", dxi.d_dci.dc_name); 174 * Domain discovery needs to authenticate with the AD server 311 char *server = dxi->d_dci.dc_name; local 424 mlsvc_disconnect(const char *server) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | vfy_increds.c | 34 if (krb5_principal_compare(context, princ, creds.server)) 75 krb5_principal server; local 85 server = NULL; 94 server = server_arg; 96 KRB5_NT_SRV_HST, &server)) 99 /* first, check if the server is in the keytab. If not, there's 116 (ret = krb5_kt_get_entry(context, keytab, server, 0, 0, &kte))) { 147 /* If the creds are for the server principal, we're set, just do 150 if (krb5_principal_compare(context, server, creds->server)) { [all...] |
H A D | recvauth.c | 51 krb5_principal server, 159 if (server) { 161 krb5_princ_component(context, server, 0), &rcache); 172 problem = krb5_rd_req(context, auth_context, &inbuf, server, 188 if(server) 189 error.server = server; 193 (void) krb5_parse_name(context, "????", &error.server); 214 krb5_free_principal(context, error.server); 256 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int3 argument 46 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument 263 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument [all...] |
H A D | rd_req_dec.c | 47 * server specifies the expected server's name for the ticket; if NULL, then 48 * any server will be accepted if the key can be found, and the caller should 52 * server names 83 if ((retval = krb5_kt_get_entry(context, keytab, req->ticket->server, 102 krb5_principal princ = (krb5_principal) req->ticket->server; 147 const krb5_ap_req *req, krb5_const_principal server, 156 if (server && krb5_is_referral_realm(&server->realm)) { 158 princ_data = *server; 146 krb5_rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument 502 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument 516 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument [all...] |
H A D | fwd_tgt.c | 41 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument 79 } else if (server) { /* must server be non-NULL when rhost is given? */ 85 retval = krb5_copy_principal (context, server, &in.server); 105 if ((retval = krb5_build_principal_ext(context, &creds.server, 151 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) { 156 if (krb5_princ_size(context, server) < 2){ 161 rhost = malloc(server->data[1].length+1); 168 (void) memcpy(rhost, server [all...] |
H A D | get_creds.c | 41 client identified by in_creds->client, the server identified by 42 in_creds->server, with options options, expiration date specified in 63 if (!in_creds || !in_creds->server || !in_creds->client) 92 mcreds->server = in_creds->server; 103 ret = krb5_get_tgs_ktypes (context, mcreds->server, &ktypes); 293 krb5_creds in_creds; /* only client and server need to be filled in */ 299 in_creds.server = NULL; 309 if ((ret = krb5_parse_name(context, in_tkt_service, &in_creds.server))) 312 /* stuff the client realm into the server principa [all...] |
H A D | gc_via_tkt.c | 55 if ((retval = krb5_copy_principal(context, pkdcrep->enc_part2->server, 56 &(*ppcreds)->server))) 107 if (!krb5_principal_compare(context, dec_rep->ticket->server, 108 dec_rep->enc_part2->server)) 113 if (krb5_principal_compare(context, dec_rep->ticket->server, 114 in_cred->server)) 120 /* in_cred server differs from ticket returned, but ticket 125 krb5int_dbgref_dump_principal("gc_via_tkt: in_cred",in_cred->server); 126 krb5int_dbgref_dump_principal("gc_via_tkt: encoded server",dec_rep->enc_part2->server); [all...] |
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.c | 232 /* If the "server" principal in the ticket is not something 242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != 244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, 278 apreq->ticket->server, 298 apreq, apreq->ticket->server, 389 krb5_db_entry server; local 396 if ((retval = krb5_db_get_principal(kdc_context, ticket->server, 397 &server, &nprincs, 402 krb5_db_free_principal(kdc_context, &server, nprincs); 407 krb5_db_free_principal(kdc_context, &server, nprinc 567 add_to_transited(krb5_data *tgt_trans, krb5_data *new_trans, krb5_principal tgs, krb5_principal client, krb5_principal server) argument 849 validate_as_request(register krb5_kdc_req *request, krb5_db_entry client, krb5_db_entry server, krb5_timestamp kdc_time, const char **status) argument 1123 validate_tgs_request(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, krb5_timestamp kdc_time, const char **status) argument 1431 select_session_keytype(krb5_context context, krb5_db_entry *server, int nktypes, krb5_enctype *ktype) argument [all...] |
H A D | do_tgs_req.c | 70 krb5_db_entry server; local 112 if ((retval = setup_server_realm(request->server))) 121 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) { 159 /* XXX make sure server here has the proper realm...taken from AP_REQ 163 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server, 179 if (firstpass && krb5_is_tgs_principal(request->server) == TRUE) { 180 if (krb5_princ_size(kdc_context, request->server) == 2) { 182 krb5_princ_component(kdc_context, request->server, 1); 188 krb5_db_free_principal(kdc_context, &server, nprinc 810 find_alternate_tgs(krb5_kdc_req *request, krb5_db_entry *server, krb5_boolean *more, int *nprincs, const krb5_fulladdr *from, char *cname) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 76 * If creds->server and the server in the decoded ticket differ, 79 s1 = creds->server; 83 s2 = tkt->server; 85 creds->server = s2; 87 creds->server = s1; 104 if (!krb5_is_referral_realm(&mcreds->server->realm)) 110 tmprealm = mcreds->server->realm; 111 mcreds->server->realm = mcreds->client->realm; 113 mcreds->server [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/ |
H A D | rc_common.h | 46 (strcmp((old)->server, (new)->server) == 0) ? CMP_REPLAY : CMP_HOHUM)
|
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | svc_raw.c | 39 * Interface to create an rpc client and server in the same UNIX process. 62 SVCXPRT *server; member in struct:svc_raw_private 103 if ((srp->server = svc_xprt_alloc()) == NULL) { 114 srp->server->xp_fd = FD_SETSIZE; 115 srp->server->xp_port = 0; 116 srp->server->xp_ops = svc_raw_ops(); 117 srp->server->xp_verf.oa_base = srp->verf_body; 119 xprt_register(srp->server); 121 return (srp->server);
|
/illumos-gate/usr/src/lib/libsmbfs/netsmb/ |
H A D | smb_keychain.h | 86 smbfs_default_dom_usr(const char *home, const char *server,
|
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/ |
H A D | Makefile | 32 SUBDIRS = server client
|
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | inform.c | 72 ipaddr_t server; local 77 * to the server's IP address, which will be the broadcast 97 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server); 98 if (!send_pkt(dsmp, dpkt, server, stop_informing)) {
|
/illumos-gate/usr/src/cmd/tcpd/ |
H A D | tcpdmatch.c | 63 char *server; local 113 if ((server = split_at(argv[optind], '@')) == 0) 114 server = unknown; 167 * If a server hostname is specified, insist that the name maps to at 168 * most one address. eval_hostname() warns the user about name server 169 * problems, while using the request.server structure as a cache for host 172 if (NOT_INADDR(server) == 0 || HOSTNAME_KNOWN(server)) { 173 if ((hp = find_inet_addr(server)) == 0) 183 * Force evaluation of server hos [all...] |