Searched refs:server (Results 26 - 50 of 284) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/lib/libwrap/
H A Dtli.c9 * server endpoint. In addition, it provides methods to map a transport
74 static struct sockaddr_gen server; local
96 if (request->server->unit != 0) {
97 memcpy(&server, request->server->unit->addr.buf,
99 request->server->unit->addr.buf));
100 request->server->sin = &server;
101 sockgen_simplify(&server);
121 if (request->server
130 struct t_unitdata *server; local
[all...]
H A Dupdate.c61 request->server->sin = va_arg(ap, struct sockaddr_gen *);
81 ptr = request->server->name;
84 ptr = request->server->addr;
111 request->server->request = request;
H A Dpercent_x.c67 ch == 'A' ? eval_hostaddr(request->server) :
71 ch == 'H' ? eval_hostinfo(request->server) :
73 ch == 'N' ? eval_hostname(request->server) :
H A Dsocket.c10 * socket address and port, the server socket address and port. In addition,
87 static struct sockaddr_gen server; local
120 * Determine the server binding. This is used for client username
121 * lookups, and for access control rules that trigger on the server
125 len = sizeof(server);
126 if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) {
130 sockgen_simplify(&server);
131 request->server->sin = &server;
190 * may be a transient problem or a botched name server setu
[all...]
/illumos-gate/usr/src/cmd/svc/milestone/
H A Dnet-netmask49 server=`/usr/bin/ypwhich 2>/dev/null`
50 [ $? -eq 0 -a -n "$server" ] && return 0 || sleep 1
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/
H A Dksmb.c49 gettext("Usage: %s [ -d fqdn ] [ -s server ]\n"), whoami);
63 char c, fqdn[MAXHOSTNAMELEN], server[MAXHOSTNAMELEN]; local
83 (void) strncpy(server, optarg, sizeof (server));
126 ret = smb_setdomainprops(fqdn, server, newpw);
/illumos-gate/usr/src/uts/common/inet/ilb/
H A Dilb.c91 * The rule taskq is for processing rule and server removal. When a user
92 * land rule/server removal request comes in, a taskq is dispatched after
93 * removing the rule/server from all related hashes. This taskq will wait
94 * until all references to the rule/server are gone before removing it.
144 /* Back end server handling routines. */
246 ilb_server_t *server)
260 server->iser_name, cname_buf, KSTAT_TYPE_NAMED,
265 bcopy(&template, &server->iser_kstat, sizeof (template));
266 ksp->ks_data = &server->iser_kstat;
269 kstat_named_setstr(&server
245 ilb_server_kstat_init(netstackid_t stackid, ilb_rule_t *rule, ilb_server_t *server) argument
760 ilb_server_t *server; local
1213 ilb_server_t *server; local
1401 ilb_server_t *server = (ilb_server_t *)arg; local
1418 ilb_server_t *server; local
1673 ilb_server_t *server; local
1956 ilb_server_t *server; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsmbrdr_glue.c56 * Disconnects the session with given server.
62 smbrdr_disconnect(const char *server) argument
78 * asks for this server+user (immediately after this returns),
102 * Get the SMB server's configuration stuff and
106 smbrdr_ctx_new(struct smb_ctx **ctx_p, char *server, argument
114 assert(server != NULL);
118 if (server[0] == '\0')
125 * Set server, share, domain, user
128 (void) smb_ctx_setfullserver(ctx, server);
H A Dsamlib.c80 sam_remove_trust_account(char *server, char *domain) argument
87 return (sam_delete_account(server, domain, account_name));
95 * server.
100 sam_delete_account(char *server, char *domain_name, char *account_name) argument
114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument
178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
209 * Query a remote server to get the list of local domains that it
215 sam_get_local_domains(char *server, char *domain_name) argument
224 rc = samr_open(server, domain_nam
285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument
[all...]
H A Dmlsvc_util.c62 mlsvc_netlogon(char *server, char *domain) argument
67 status = netr_open(server, domain, &netr_handle);
70 "for domain %s (%s)", server, domain,
75 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT);
78 "credential chain with DC: %s (%s)", server,
143 * Ditto the SMB server domain.
161 "smbd: failed to locate AD server for domain %s (%s)",
168 * so that admin will know which AD server we were talking to.
171 syslog(LOG_INFO, "smbd: found AD server %s", dxi.d_dci.dc_name);
174 * Domain discovery needs to authenticate with the AD server
311 char *server = dxi->d_dci.dc_name; local
424 mlsvc_disconnect(const char *server) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dvfy_increds.c34 if (krb5_principal_compare(context, princ, creds.server))
75 krb5_principal server; local
85 server = NULL;
94 server = server_arg;
96 KRB5_NT_SRV_HST, &server))
99 /* first, check if the server is in the keytab. If not, there's
116 (ret = krb5_kt_get_entry(context, keytab, server, 0, 0, &kte))) {
147 /* If the creds are for the server principal, we're set, just do
150 if (krb5_principal_compare(context, server, creds->server)) {
[all...]
H A Drecvauth.c51 krb5_principal server,
159 if (server) {
161 krb5_princ_component(context, server, 0), &rcache);
172 problem = krb5_rd_req(context, auth_context, &inbuf, server,
188 if(server)
189 error.server = server;
193 (void) krb5_parse_name(context, "????", &error.server);
214 krb5_free_principal(context, error.server);
256 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int3 argument
46 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument
263 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
[all...]
H A Drd_req_dec.c47 * server specifies the expected server's name for the ticket; if NULL, then
48 * any server will be accepted if the key can be found, and the caller should
52 * server names
83 if ((retval = krb5_kt_get_entry(context, keytab, req->ticket->server,
102 krb5_principal princ = (krb5_principal) req->ticket->server;
147 const krb5_ap_req *req, krb5_const_principal server,
156 if (server && krb5_is_referral_realm(&server->realm)) {
158 princ_data = *server;
146 krb5_rd_req_decoded_opt(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket, int check_valid_flag) argument
502 krb5_rd_req_decoded(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
516 krb5_rd_req_decoded_anyflag(krb5_context context, krb5_auth_context *auth_context, const krb5_ap_req *req, krb5_const_principal server, krb5_keytab keytab, krb5_flags *ap_req_options, krb5_ticket **ticket) argument
[all...]
H A Dfwd_tgt.c41 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument
79 } else if (server) { /* must server be non-NULL when rhost is given? */
85 retval = krb5_copy_principal (context, server, &in.server);
105 if ((retval = krb5_build_principal_ext(context, &creds.server,
151 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) {
156 if (krb5_princ_size(context, server) < 2){
161 rhost = malloc(server->data[1].length+1);
168 (void) memcpy(rhost, server
[all...]
H A Dget_creds.c41 client identified by in_creds->client, the server identified by
42 in_creds->server, with options options, expiration date specified in
63 if (!in_creds || !in_creds->server || !in_creds->client)
92 mcreds->server = in_creds->server;
103 ret = krb5_get_tgs_ktypes (context, mcreds->server, &ktypes);
293 krb5_creds in_creds; /* only client and server need to be filled in */
299 in_creds.server = NULL;
309 if ((ret = krb5_parse_name(context, in_tkt_service, &in_creds.server)))
312 /* stuff the client realm into the server principa
[all...]
H A Dgc_via_tkt.c55 if ((retval = krb5_copy_principal(context, pkdcrep->enc_part2->server,
56 &(*ppcreds)->server)))
107 if (!krb5_principal_compare(context, dec_rep->ticket->server,
108 dec_rep->enc_part2->server))
113 if (krb5_principal_compare(context, dec_rep->ticket->server,
114 in_cred->server))
120 /* in_cred server differs from ticket returned, but ticket
125 krb5int_dbgref_dump_principal("gc_via_tkt: in_cred",in_cred->server);
126 krb5int_dbgref_dump_principal("gc_via_tkt: encoded server",dec_rep->enc_part2->server);
[all...]
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_util.c232 /* If the "server" principal in the ticket is not something
242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length !=
244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data,
278 apreq->ticket->server,
298 apreq, apreq->ticket->server,
389 krb5_db_entry server; local
396 if ((retval = krb5_db_get_principal(kdc_context, ticket->server,
397 &server, &nprincs,
402 krb5_db_free_principal(kdc_context, &server, nprincs);
407 krb5_db_free_principal(kdc_context, &server, nprinc
567 add_to_transited(krb5_data *tgt_trans, krb5_data *new_trans, krb5_principal tgs, krb5_principal client, krb5_principal server) argument
849 validate_as_request(register krb5_kdc_req *request, krb5_db_entry client, krb5_db_entry server, krb5_timestamp kdc_time, const char **status) argument
1123 validate_tgs_request(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, krb5_timestamp kdc_time, const char **status) argument
1431 select_session_keytype(krb5_context context, krb5_db_entry *server, int nktypes, krb5_enctype *ktype) argument
[all...]
H A Ddo_tgs_req.c70 krb5_db_entry server; local
112 if ((retval = setup_server_realm(request->server)))
121 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) {
159 /* XXX make sure server here has the proper realm...taken from AP_REQ
163 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server,
179 if (firstpass && krb5_is_tgs_principal(request->server) == TRUE) {
180 if (krb5_princ_size(kdc_context, request->server) == 2) {
182 krb5_princ_component(kdc_context, request->server, 1);
188 krb5_db_free_principal(kdc_context, &server, nprinc
810 find_alternate_tgs(krb5_kdc_req *request, krb5_db_entry *server, krb5_boolean *more, int *nprincs, const krb5_fulladdr *from, char *cname) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dccfns.c76 * If creds->server and the server in the decoded ticket differ,
79 s1 = creds->server;
83 s2 = tkt->server;
85 creds->server = s2;
87 creds->server = s1;
104 if (!krb5_is_referral_realm(&mcreds->server->realm))
110 tmprealm = mcreds->server->realm;
111 mcreds->server->realm = mcreds->client->realm;
113 mcreds->server
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/
H A Drc_common.h46 (strcmp((old)->server, (new)->server) == 0) ? CMP_REPLAY : CMP_HOHUM)
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Dsvc_raw.c39 * Interface to create an rpc client and server in the same UNIX process.
62 SVCXPRT *server; member in struct:svc_raw_private
103 if ((srp->server = svc_xprt_alloc()) == NULL) {
114 srp->server->xp_fd = FD_SETSIZE;
115 srp->server->xp_port = 0;
116 srp->server->xp_ops = svc_raw_ops();
117 srp->server->xp_verf.oa_base = srp->verf_body;
119 xprt_register(srp->server);
121 return (srp->server);
/illumos-gate/usr/src/lib/libsmbfs/netsmb/
H A Dsmb_keychain.h86 smbfs_default_dom_usr(const char *home, const char *server,
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/
H A DMakefile32 SUBDIRS = server client
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/
H A Dinform.c72 ipaddr_t server; local
77 * to the server's IP address, which will be the broadcast
97 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server);
98 if (!send_pkt(dsmp, dpkt, server, stop_informing)) {
/illumos-gate/usr/src/cmd/tcpd/
H A Dtcpdmatch.c63 char *server; local
113 if ((server = split_at(argv[optind], '@')) == 0)
114 server = unknown;
167 * If a server hostname is specified, insist that the name maps to at
168 * most one address. eval_hostname() warns the user about name server
169 * problems, while using the request.server structure as a cache for host
172 if (NOT_INADDR(server) == 0 || HOSTNAME_KNOWN(server)) {
173 if ((hp = find_inet_addr(server)) == 0)
183 * Force evaluation of server hos
[all...]

Completed in 139 milliseconds

1234567891011>>