Searched defs:server (Results 76 - 100 of 153) sorted by relevance

1234567

/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dmlsvc_client.c75 * NT_STATUS_BAD_NETWORK_PATH (get server addr)
85 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument
96 if (handle == NULL || server == NULL || server[0] == '\0' ||
107 * try to get the actual server version, but that RPC
128 * server, user, domain. It may return any of:
129 * NT_STATUS_BAD_NETWORK_PATH (get server addr)
133 status = smbrdr_ctx_new(&ctx, server, domain, username);
137 server, domain, username,
140 smb_ddiscover_bad_dc(server);
613 ndr_srvsvc_timecheck(char *server, char *domain) argument
[all...]
H A Dmlsvc_domain.c445 smb_ddiscover_qinfo(char *domain, char *server, smb_domainex_t *dxi) argument
450 ret = lsa_query_dns_domain_info(server, domain, &dxi->d_primary);
456 tmp = lsa_query_primary_domain_info(server, domain, &dxi->d_primary);
464 smb_ddiscover_enum_trusted(domain, server, dxi);
474 smb_ddiscover_enum_trusted(char *domain, char *server, smb_domainex_t *dxi) argument
480 status = lsa_enum_trusted_domains_ex(server, domain, list);
482 (void) lsa_enum_trusted_domains(server, domain, list);
H A Dnetr_auth.c74 * pipe on a domain controller(server) should have already been opened.
82 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument
97 /* server is our DC. Note: normally an FQDN. */
98 (void) snprintf(netr_info->server, sizeof (netr_info->server),
99 "\\\\%s", server);
130 * We store the remote server information, which is used to drive Windows
136 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument
143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR");
172 arg.servername = (unsigned char *)netr_info->server;
[all...]
H A Dnetr_logon.c230 char server[MAXHOSTNAMELEN]; local
251 (*netr_global_info.server != '\0')) {
252 (void) snprintf(server, sizeof (server),
254 if (strncasecmp(netr_global_info.server,
255 server, strlen(server)) != 0)
376 char *server, smb_logon_t *user_info, smb_token_t *token)
393 * Should we get the server and hostname from netr_info?
396 len = strlen(server)
375 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_logon_t *user_info, smb_token_t *token) argument
[all...]
H A Dsamlib.c80 sam_remove_trust_account(char *server, char *domain) argument
87 return (sam_delete_account(server, domain, account_name));
95 * server.
100 sam_delete_account(char *server, char *domain_name, char *account_name) argument
114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument
178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
209 * Query a remote server to get the list of local domains that it
215 sam_get_local_domains(char *server, char *domain_name) argument
224 rc = samr_open(server, domain_nam
285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument
[all...]
H A Dlsar_clnt.c93 lsar_open(char *server, char *domain, char *username, argument
98 if (server == NULL || domain == NULL)
104 status = lsar_open_policy2(server, domain, username, domain_handle);
113 * LSA resources on a remote server. The server name supplied here does
121 lsar_open_policy2(char *server, char *domain, char *user, argument
129 status = ndr_rpc_bind(lsa_handle, server, domain, user, "LSARPC");
136 len = strlen(server) + 4;
143 (void) snprintf((char *)arg.servername, len, "\\\\%s", server);
289 * the infoClass returned from the server i
[all...]
H A Dsamr_clnt.c68 * Wrapper round samr_connect to ensure that we connect using the server
70 * supply a server name and a domain name.
78 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument
84 if (server == NULL || domain == NULL) {
87 server = di.d_dci.dc_name;
94 status = samr_connect(server, domain, username, access_mask,
104 * Connect to the SAMR service on the specified server (domain controller).
112 * Try the calls from most recent to oldest until the server responds with
117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument
130 status = ndr_rpc_bind(samr_handle, server, domai
158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
198 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
245 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
966 samr_change_password( mlsvc_handle_t *handle, char *server, char *account, struct samr_encr_passwd *newpw, struct samr_encr_hash *oldpw) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_doorclnt.c218 * buf (output) - fully-qualified hostname of the AD server found
223 * B_TRUE if an AD server is found. Otherwise, returns B_FALSE;
232 smb_string_t server; local
243 bzero(&server, sizeof (smb_string_t));
249 &server, smb_string_xdr);
254 if (server.buf != NULL) {
255 if (*server.buf != '\0') {
256 (void) strlcpy(buf, server.buf, buflen);
260 xdr_free(smb_string_xdr, (char *)&server);
H A Dsmb_info.c526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument
528 if (server == NULL || passwd == NULL)
531 if ((*server == '\0') || (*passwd == '\0'))
537 if (smb_config_set(SMB_CI_KPASSWD_SRV, server) != 0)
664 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
671 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c508 krb5_principal server = NULL, serverp = NULL; local
569 if (code = krb5_build_principal_ext(kmd->kcontext, &server,
583 if (code = krb5_copy_principal(kmd->kcontext, server,
584 &my_creds->server)) {
588 serverp = my_creds->server;
958 if (server)
959 krb5_free_principal(kmd->kcontext, server);
967 * function. mycreds->[client|server] could also be NULL in case
976 if (serverp && my_creds->server && serverp != my_creds->server)
[all...]
/illumos-gate/usr/src/lib/print/libprint/common/
H A Dns.h77 char *server; /* server name */ member in struct:ns_bsd_addr
103 NSL_ERR_CONNECT = 7, /* LDAP server connect failed */
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgic_pwd.c555 Attempts to get an initial ticket for creds->client to use server
556 creds->server, (realm is taken from creds->client), with options
583 char * server; local
605 retval = krb5_unparse_name( context, creds->server, &server);
610 server_princ = creds->server;
615 0, server, opte,
618 krb5_free_unparsed_name( context, server);
623 if (creds->server)
624 krb5_free_principal( context, creds->server);
[all...]
H A Dgc_frm_kdc.c177 krb5_principal client, krb5_principal server,
258 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str);
301 * krbtgt/realm_of(DST)@realm_of(SRC) as the server principal. Zeroes
321 krb5_princ_realm(ctx, src), &mcreds->server);
339 krb5_principal client, krb5_principal server)
345 krb5_princ_realm(ts->ctx, server),
470 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) {
473 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name);
477 "KDC reply did not match expectations: server '%s' principal size should be 2"),
483 "KDC reply did not match expectations: server principa
338 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument
766 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts) argument
867 krb5_principal client, server, supplied_server, out_supplied_server; local
[all...]
H A Dpac.c689 const krb5_keyblock *server)
731 ret = krb5_c_verify_checksum(context, server, KRB5_KEYUSAGE_APP_DATA_CKSUM,
804 const krb5_keyblock *server,
809 if (server == NULL) {
813 ret = k5_pac_verify_server_checksum(context, pac, server);
1022 /* Generate the server checksum over the entire PAC */
1042 /* Generate the privsvr checksum over the server checksum buffer */
687 k5_pac_verify_server_checksum(krb5_context context, const krb5_pac pac, const krb5_keyblock *server) argument
800 krb5_pac_verify(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument
/illumos-gate/usr/src/lib/libsasl/lib/
H A Ddlopen.c490 int server,
614 path_info = server ? gctx->splug_path_info : gctx->cplug_path_info;
634 if (server) {
489 _sasl_load_plugins(_sasl_global_context_t *gctx, int server, const add_plugin_list_t *entrypoints, const sasl_callback_t *getpath_cb, const sasl_callback_t *verifyfile_cb) argument
/illumos-gate/usr/src/lib/libwrap/
H A Dtcpd.h109 struct host_info server[1]; /* server endpoint info */ member in struct:request_info
198 #define RQ_DAEMON 2 /* server process (argv[0]) */
203 #define RQ_SERVER_NAME 7 /* server host name */
204 #define RQ_SERVER_ADDR 8 /* server host address */
205 #define RQ_SERVER_SIN 9 /* server endpoint (internal) */
/illumos-gate/usr/src/cmd/ypcmd/
H A Dypwhich.c38 * This is a user command which tells which yp server is being used by a
39 * given machine, or which yp server is the master for a named map.
47 * and will not attempt to choose a particular yp server. On the
99 host if specified, is the machine whose NIS server is to be found.\n\
344 * This tries to find the name of the server to which the binder in question
430 char *server = local
433 if (strcmp(server, nullstring) == 0) {
493 fprintf(stdout, "%s\n", server);
561 struct in_addr *server; local
599 server
[all...]
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/
H A DNS.c209 char *server; /* server name */ member in struct:ns_bsd_addr
347 addr->server = (char *)printserver;
/illumos-gate/usr/src/cmd/hal/hald/
H A Dhald_runner.c141 handle_connection(DBusServer *server, argument
160 /* dbus_server_unref(server); */
174 DBusServer *server = NULL; local
186 server = dbus_server_listen(DBUS_SERVER_ADDRESS, &err);
187 if (server == NULL) {
188 HAL_ERROR (("Cannot create D-BUS server for the runner"));
192 dbus_server_setup_with_g_main(server, NULL);
193 dbus_server_set_new_connection_function(server, handle_connection,
198 server_addr = dbus_server_get_address (server);
230 if (server !
[all...]
/illumos-gate/usr/src/cmd/svr4pkg/libinst/
H A Dpkgdbmerg.c116 pkgdbmerg(PKGserver server, VFP_T *tmpvfp, struct cfextra **extlist) argument
213 n = srchcfile(&cf_ent, el_ent->cf_ent.path, server);
336 * "shared" by a server, in which case we need to
351 * If object is provided by a server, allocate an
452 * fs_tab[] anyway. We check for a server object
608 * coming from a server, we need to note that
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_dispatch.c612 smb_server_t *server; local
618 server = session->s_server;
694 sds = &server->sv_disp_stats1[sr->smb_com];
1182 * used in parallel with other client/server operations. The mpx sub-
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/
H A Dtopo_mod.c821 char *server = NULL; local
836 FM_FMRI_AUTH_SERVER, &server, &err);
847 if (server == NULL) {
848 server = topo_mod_server(mod);
854 if (!prod && !server && !csn && !psn) {
868 if (server != NULL) {
869 err |= nvlist_add_string(auth, FM_FMRI_AUTH_SERVER, server);
870 topo_mod_strfree(mod, server);
/illumos-gate/usr/src/lib/fm/topo/modules/sun4v/sun4vpi/
H A Dpi_subr.c870 * Get the server hostname (the ID as far as the topo authority is
986 char *server = NULL; local
1151 /* server-id */
1163 server = pi_get_serverid(mod);
1164 if (server == NULL) {
1165 topo_mod_dprintf(mod, "pi_set_auth: server "
1175 server = topo_mod_strdup(mod, val);
1182 if (server != NULL) {
1184 FM_FMRI_AUTH_SERVER, TOPO_PROP_IMMUTABLE, server,
1194 topo_mod_strfree(mod, server);
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_init.c329 char *server = handle->params.admin_server; local
338 server = handle->params.kpasswd_server;
340 hp = gethostbyname(server);
344 "bad server name\n"));
386 "unable to open connection to ADMIN server "
599 char *server = NULL; local
759 &creds.server))) {
761 "could not parse server "
773 (gss_name_t *)&creds.server);
782 serverp = creds.server;
[all...]
/illumos-gate/usr/src/lib/libpkg/common/
H A Dpkgserv.c250 PKGserver server; local
285 server = malloc(sizeof (*server));
287 if (server == NULL)
290 server->fp = NULL;
291 server->onetime = readonly;
294 server->door = open(pkgdoor, O_RDWR);
296 if (server->door >= 0) {
297 if (door_info(server->door, &di) == 0 && di.di_target >= 0) {
300 server
464 pkgcloseserver(PKGserver server) argument
577 void *server; local
600 pkgservercommitfile(VFP_T *a_vfp, PKGserver server) argument
651 pkgopenfilter(PKGserver server, const char *filt) argument
688 pkgclosefilter(PKGserver server) argument
700 pkggetentry(PKGserver server, int *len, int *pathlen) argument
730 pkggetentry_named(PKGserver server, const char *path, int *len, int *pathlen) argument
[all...]

Completed in 165 milliseconds

1234567