/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | mlsvc_client.c | 75 * NT_STATUS_BAD_NETWORK_PATH (get server addr) 85 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument 96 if (handle == NULL || server == NULL || server[0] == '\0' || 107 * try to get the actual server version, but that RPC 128 * server, user, domain. It may return any of: 129 * NT_STATUS_BAD_NETWORK_PATH (get server addr) 133 status = smbrdr_ctx_new(&ctx, server, domain, username); 137 server, domain, username, 140 smb_ddiscover_bad_dc(server); 613 ndr_srvsvc_timecheck(char *server, char *domain) argument [all...] |
H A D | mlsvc_domain.c | 445 smb_ddiscover_qinfo(char *domain, char *server, smb_domainex_t *dxi) argument 450 ret = lsa_query_dns_domain_info(server, domain, &dxi->d_primary); 456 tmp = lsa_query_primary_domain_info(server, domain, &dxi->d_primary); 464 smb_ddiscover_enum_trusted(domain, server, dxi); 474 smb_ddiscover_enum_trusted(char *domain, char *server, smb_domainex_t *dxi) argument 480 status = lsa_enum_trusted_domains_ex(server, domain, list); 482 (void) lsa_enum_trusted_domains(server, domain, list);
|
H A D | netr_auth.c | 74 * pipe on a domain controller(server) should have already been opened. 82 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument 97 /* server is our DC. Note: normally an FQDN. */ 98 (void) snprintf(netr_info->server, sizeof (netr_info->server), 99 "\\\\%s", server); 130 * We store the remote server information, which is used to drive Windows 136 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument 143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR"); 172 arg.servername = (unsigned char *)netr_info->server; [all...] |
H A D | netr_logon.c | 230 char server[MAXHOSTNAMELEN]; local 251 (*netr_global_info.server != '\0')) { 252 (void) snprintf(server, sizeof (server), 254 if (strncasecmp(netr_global_info.server, 255 server, strlen(server)) != 0) 376 char *server, smb_logon_t *user_info, smb_token_t *token) 393 * Should we get the server and hostname from netr_info? 396 len = strlen(server) 375 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_logon_t *user_info, smb_token_t *token) argument [all...] |
H A D | samlib.c | 80 sam_remove_trust_account(char *server, char *domain) argument 87 return (sam_delete_account(server, domain, account_name)); 95 * server. 100 sam_delete_account(char *server, char *domain_name, char *account_name) argument 114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument 178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 209 * Query a remote server to get the list of local domains that it 215 sam_get_local_domains(char *server, char *domain_name) argument 224 rc = samr_open(server, domain_nam 285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument [all...] |
H A D | lsar_clnt.c | 93 lsar_open(char *server, char *domain, char *username, argument 98 if (server == NULL || domain == NULL) 104 status = lsar_open_policy2(server, domain, username, domain_handle); 113 * LSA resources on a remote server. The server name supplied here does 121 lsar_open_policy2(char *server, char *domain, char *user, argument 129 status = ndr_rpc_bind(lsa_handle, server, domain, user, "LSARPC"); 136 len = strlen(server) + 4; 143 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); 289 * the infoClass returned from the server i [all...] |
H A D | samr_clnt.c | 68 * Wrapper round samr_connect to ensure that we connect using the server 70 * supply a server name and a domain name. 78 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument 84 if (server == NULL || domain == NULL) { 87 server = di.d_dci.dc_name; 94 status = samr_connect(server, domain, username, access_mask, 104 * Connect to the SAMR service on the specified server (domain controller). 112 * Try the calls from most recent to oldest until the server responds with 117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument 130 status = ndr_rpc_bind(samr_handle, server, domai 158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 198 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 245 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 966 samr_change_password( mlsvc_handle_t *handle, char *server, char *account, struct samr_encr_passwd *newpw, struct samr_encr_hash *oldpw) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_doorclnt.c | 218 * buf (output) - fully-qualified hostname of the AD server found 223 * B_TRUE if an AD server is found. Otherwise, returns B_FALSE; 232 smb_string_t server; local 243 bzero(&server, sizeof (smb_string_t)); 249 &server, smb_string_xdr); 254 if (server.buf != NULL) { 255 if (*server.buf != '\0') { 256 (void) strlcpy(buf, server.buf, buflen); 260 xdr_free(smb_string_xdr, (char *)&server);
|
H A D | smb_info.c | 526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument 528 if (server == NULL || passwd == NULL) 531 if ((*server == '\0') || (*passwd == '\0')) 537 if (smb_config_set(SMB_CI_KPASSWD_SRV, server) != 0) 664 syslog(LOG_DEBUG, "Found %s name server\n", ipstr); 671 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 508 krb5_principal server = NULL, serverp = NULL; local 569 if (code = krb5_build_principal_ext(kmd->kcontext, &server, 583 if (code = krb5_copy_principal(kmd->kcontext, server, 584 &my_creds->server)) { 588 serverp = my_creds->server; 958 if (server) 959 krb5_free_principal(kmd->kcontext, server); 967 * function. mycreds->[client|server] could also be NULL in case 976 if (serverp && my_creds->server && serverp != my_creds->server) [all...] |
/illumos-gate/usr/src/lib/print/libprint/common/ |
H A D | ns.h | 77 char *server; /* server name */ member in struct:ns_bsd_addr 103 NSL_ERR_CONNECT = 7, /* LDAP server connect failed */
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 555 Attempts to get an initial ticket for creds->client to use server 556 creds->server, (realm is taken from creds->client), with options 583 char * server; local 605 retval = krb5_unparse_name( context, creds->server, &server); 610 server_princ = creds->server; 615 0, server, opte, 618 krb5_free_unparsed_name( context, server); 623 if (creds->server) 624 krb5_free_principal( context, creds->server); [all...] |
H A D | gc_frm_kdc.c | 177 krb5_principal client, krb5_principal server, 258 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str); 301 * krbtgt/realm_of(DST)@realm_of(SRC) as the server principal. Zeroes 321 krb5_princ_realm(ctx, src), &mcreds->server); 339 krb5_principal client, krb5_principal server) 345 krb5_princ_realm(ts->ctx, server), 470 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) { 473 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name); 477 "KDC reply did not match expectations: server '%s' principal size should be 2"), 483 "KDC reply did not match expectations: server principa 338 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument 766 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts) argument 867 krb5_principal client, server, supplied_server, out_supplied_server; local [all...] |
H A D | pac.c | 689 const krb5_keyblock *server) 731 ret = krb5_c_verify_checksum(context, server, KRB5_KEYUSAGE_APP_DATA_CKSUM, 804 const krb5_keyblock *server, 809 if (server == NULL) { 813 ret = k5_pac_verify_server_checksum(context, pac, server); 1022 /* Generate the server checksum over the entire PAC */ 1042 /* Generate the privsvr checksum over the server checksum buffer */ 687 k5_pac_verify_server_checksum(krb5_context context, const krb5_pac pac, const krb5_keyblock *server) argument 800 krb5_pac_verify(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | dlopen.c | 490 int server, 614 path_info = server ? gctx->splug_path_info : gctx->cplug_path_info; 634 if (server) { 489 _sasl_load_plugins(_sasl_global_context_t *gctx, int server, const add_plugin_list_t *entrypoints, const sasl_callback_t *getpath_cb, const sasl_callback_t *verifyfile_cb) argument
|
/illumos-gate/usr/src/lib/libwrap/ |
H A D | tcpd.h | 109 struct host_info server[1]; /* server endpoint info */ member in struct:request_info 198 #define RQ_DAEMON 2 /* server process (argv[0]) */ 203 #define RQ_SERVER_NAME 7 /* server host name */ 204 #define RQ_SERVER_ADDR 8 /* server host address */ 205 #define RQ_SERVER_SIN 9 /* server endpoint (internal) */
|
/illumos-gate/usr/src/cmd/ypcmd/ |
H A D | ypwhich.c | 38 * This is a user command which tells which yp server is being used by a 39 * given machine, or which yp server is the master for a named map. 47 * and will not attempt to choose a particular yp server. On the 99 host if specified, is the machine whose NIS server is to be found.\n\ 344 * This tries to find the name of the server to which the binder in question 430 char *server = local 433 if (strcmp(server, nullstring) == 0) { 493 fprintf(stdout, "%s\n", server); 561 struct in_addr *server; local 599 server [all...] |
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/ |
H A D | NS.c | 209 char *server; /* server name */ member in struct:ns_bsd_addr 347 addr->server = (char *)printserver;
|
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | hald_runner.c | 141 handle_connection(DBusServer *server, argument 160 /* dbus_server_unref(server); */ 174 DBusServer *server = NULL; local 186 server = dbus_server_listen(DBUS_SERVER_ADDRESS, &err); 187 if (server == NULL) { 188 HAL_ERROR (("Cannot create D-BUS server for the runner")); 192 dbus_server_setup_with_g_main(server, NULL); 193 dbus_server_set_new_connection_function(server, handle_connection, 198 server_addr = dbus_server_get_address (server); 230 if (server ! [all...] |
/illumos-gate/usr/src/cmd/svr4pkg/libinst/ |
H A D | pkgdbmerg.c | 116 pkgdbmerg(PKGserver server, VFP_T *tmpvfp, struct cfextra **extlist) argument 213 n = srchcfile(&cf_ent, el_ent->cf_ent.path, server); 336 * "shared" by a server, in which case we need to 351 * If object is provided by a server, allocate an 452 * fs_tab[] anyway. We check for a server object 608 * coming from a server, we need to note that
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_dispatch.c | 612 smb_server_t *server; local 618 server = session->s_server; 694 sds = &server->sv_disp_stats1[sr->smb_com]; 1182 * used in parallel with other client/server operations. The mpx sub-
|
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/ |
H A D | topo_mod.c | 821 char *server = NULL; local 836 FM_FMRI_AUTH_SERVER, &server, &err); 847 if (server == NULL) { 848 server = topo_mod_server(mod); 854 if (!prod && !server && !csn && !psn) { 868 if (server != NULL) { 869 err |= nvlist_add_string(auth, FM_FMRI_AUTH_SERVER, server); 870 topo_mod_strfree(mod, server);
|
/illumos-gate/usr/src/lib/fm/topo/modules/sun4v/sun4vpi/ |
H A D | pi_subr.c | 870 * Get the server hostname (the ID as far as the topo authority is 986 char *server = NULL; local 1151 /* server-id */ 1163 server = pi_get_serverid(mod); 1164 if (server == NULL) { 1165 topo_mod_dprintf(mod, "pi_set_auth: server " 1175 server = topo_mod_strdup(mod, val); 1182 if (server != NULL) { 1184 FM_FMRI_AUTH_SERVER, TOPO_PROP_IMMUTABLE, server, 1194 topo_mod_strfree(mod, server); [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_init.c | 329 char *server = handle->params.admin_server; local 338 server = handle->params.kpasswd_server; 340 hp = gethostbyname(server); 344 "bad server name\n")); 386 "unable to open connection to ADMIN server " 599 char *server = NULL; local 759 &creds.server))) { 761 "could not parse server " 773 (gss_name_t *)&creds.server); 782 serverp = creds.server; [all...] |
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | pkgserv.c | 250 PKGserver server; local 285 server = malloc(sizeof (*server)); 287 if (server == NULL) 290 server->fp = NULL; 291 server->onetime = readonly; 294 server->door = open(pkgdoor, O_RDWR); 296 if (server->door >= 0) { 297 if (door_info(server->door, &di) == 0 && di.di_target >= 0) { 300 server 464 pkgcloseserver(PKGserver server) argument 577 void *server; local 600 pkgservercommitfile(VFP_T *a_vfp, PKGserver server) argument 651 pkgopenfilter(PKGserver server, const char *filt) argument 688 pkgclosefilter(PKGserver server) argument 700 pkggetentry(PKGserver server, int *len, int *pathlen) argument 730 pkggetentry_named(PKGserver server, const char *path, int *len, int *pathlen) argument [all...] |