Searched refs:server (Results 1 - 25 of 146) sorted by relevance

123456

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dtgtname.c37 krb5_tgtname(krb5_context context, const krb5_data *server, const krb5_data *client, krb5_principal *tgtprinc) argument
41 server->length, server->data,
H A Dmk_req.c37 server specifies the principal of the server to receive the message; if
38 credentials are not present in the credentials cache for this server, the
59 krb5_principal server; local
64 KRB5_NT_SRV_HST, &server);
70 if ((retval = krb5_copy_principal(context, server, &creds.server)))
89 krb5_free_principal(context, server);
H A Dgc_frm_kdc.c178 krb5_principal client, krb5_principal server,
261 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str);
304 * krbtgt/realm_of(DST)@realm_of(SRC) as the server principal. Zeroes
324 krb5_princ_realm(ctx, src), &mcreds->server);
342 krb5_principal client, krb5_principal server)
348 krb5_princ_realm(ts->ctx, server),
476 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) {
479 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name);
484 "expectations: server '%s' "
492 "expectations: server principa
341 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument
764 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts, int *tgtptr_isoffpath) argument
849 chase_offpath(struct tr_state *ts, krb5_principal client, krb5_principal server) argument
992 krb5_principal client, server, supplied_server, out_supplied_server; local
[all...]
H A Dwalk_rtree.c43 * server realm during hierarchical traversal.
55 const krb5_data *server,
62 const krb5_data *server,
68 const krb5_data *server,
75 const krb5_data *server,
102 const krb5_data *server,
109 if (client->data == NULL || server->data == NULL) {
111 if (client->data == NULL && server->data == NULL) {
116 "client and server"));
129 "server"));
100 krb5_walk_realm_tree( krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **tree, int realm_sep) argument
213 rtree_capath_tree(krb5_context context, const krb5_data *client, const krb5_data *server, char **vals, krb5_principal **rettree) argument
277 rtree_capath_vals(krb5_context context, const krb5_data *client, const krb5_data *server, char ***vals) argument
329 rtree_hier_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **rettree, int sep) argument
378 rtree_hier_realms(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_data **realms, size_t *nrealms, int sep) argument
[all...]
H A Drecvauth.c49 krb5_principal server,
137 if (server) {
139 krb5_princ_component(context, server, 0), &rcache);
150 problem = krb5_rd_req(context, auth_context, &inbuf, server,
166 if(server)
167 error.server = server;
171 (void) krb5_parse_name(context, "????", &error.server);
191 krb5_free_principal(context, error.server);
232 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int3 argument
44 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument
239 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument
[all...]
H A Dvfy_increds.c50 if (krb5_principal_compare(context, princ, creds.server))
81 get_vfy_cred(krb5_context context, krb5_creds *creds, krb5_principal server, argument
94 /* If the creds are for the server principal, we're set, just do a mk_req.
98 if (krb5_principal_compare(context, server, creds->server)) {
107 * client princ realm must be the same as the server princ's realm used
123 * the server's.
125 if (!krb5_realm_compare(context, creds->client, server)) {
156 in_creds.server = server;
298 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server, krb5_keytab keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument
[all...]
H A Dfwd_tgt.c45 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument
83 } else if (server) { /* must server be non-NULL when rhost is given? */
89 retval = krb5_copy_principal (context, server, &in.server);
109 if ((retval = krb5_build_principal_ext(context, &creds.server,
158 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) {
163 if (krb5_princ_size(context, server) < 2){
168 rhost = malloc(server->data[1].length+1);
174 memcpy(rhost, server
[all...]
H A Dget_creds.c39 client identified by in_creds->client, the server identified by
40 in_creds->server, with options options, expiration date specified in
66 if (!in_creds || !in_creds->server || !in_creds->client)
84 mcreds->server = in_creds->server;
95 ret = krb5_get_tgs_ktypes(context, mcreds->server, &ktypes);
311 krb5_creds in_creds; /* only client and server need to be filled in */
317 in_creds.server = NULL;
327 if ((ret = krb5_parse_name(context, in_tkt_service, &in_creds.server)))
330 /* stuff the client realm into the server principa
[all...]
H A Dgc_via_tkt.c56 if ((retval = krb5_copy_principal(context, pkdcrep->enc_part2->server,
57 &(*ppcreds)->server)))
109 if (!krb5_principal_compare(context, dec_rep->ticket->server,
110 dec_rep->enc_part2->server))
115 if (krb5_principal_compare(context, dec_rep->ticket->server,
116 in_cred->server))
122 /* in_cred server differs from ticket returned, but ticket
127 krb5int_dbgref_dump_principal("gc_via_tkt: in_cred",in_cred->server);
128 krb5int_dbgref_dump_principal("gc_via_tkt: encoded server",dec_rep->enc_part2->server);
[all...]
H A Dcopy_creds.c71 retval = krb5_copy_principal(context, incred->server, &tempcred->server);
110 krb5_free_principal(context, tempcred->server);
H A Dsrv_dec_tkt.c60 realm, &ticket->server->realm);
86 ticket->server,
113 krb5_free_principal(context, ticket->server);
114 ticket->server = tmp;
/osnet-11/usr/src/lib/libpkg/common/
H A Dpkgserv.c254 PKGserver server; local
289 server = malloc(sizeof (*server));
291 if (server == NULL)
294 server->fp = NULL;
295 server->onetime = readonly;
298 server->door = open(pkgdoor, O_RDWR);
300 if (server->door >= 0) {
301 if (door_info(server->door, &di) == 0 && di.di_target >= 0) {
304 server
467 pkgcloseserver(PKGserver server) argument
580 void *server; local
603 pkgservercommitfile(VFP_T *a_vfp, PKGserver server) argument
654 pkgopenfilter(PKGserver server, const char *filt) argument
691 pkgclosefilter(PKGserver server) argument
703 pkggetentry(PKGserver server, int *len, int *pathlen) argument
733 pkggetentry_named(PKGserver server, const char *path, int *len, int *pathlen) argument
[all...]
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dsamlib.c60 sam_create_trust_account(char *server, char *domain) argument
73 status = sam_create_account(server, domain, account_name,
84 status = sam_check_user(server, domain, account_name);
104 sam_create_account(char *server, char *domain_name, char *account_name, argument
119 rc = samr_open(server, domain_name, user, SAM_CONNECT_CREATE_ACCOUNT,
129 sid = sam_get_domain_sid(&samr_handle, server, domain_name);
172 sam_remove_trust_account(char *server, char *domain) argument
179 return (sam_delete_account(server, domain, account_name));
187 * server.
192 sam_delete_account(char *server, cha argument
245 sam_check_user(char *server, char *domain_name, char *account_name) argument
304 sam_lookup_name(char *server, char *domain_name, char *account_name, DWORD *rid_ret) argument
356 sam_get_local_domains(char *server, char *domain_name) argument
410 sam_get_domain_sid(mlsvc_handle_t *samr_handle, char *server, char *domain_name) argument
[all...]
H A Dwkssvc_clnt.c31 wkssvc_getinfo(char *server, char *domain, wksta_info_t *info) argument
40 if (server == NULL || domain == NULL || info == NULL)
45 if (ndr_rpc_bind(&handle, server, domain, user, "Workstation") != 0)
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/
H A Drc_common.c17 h += *rep->server;
29 (strcmp(old->server, new1->server) == 0)) { /* always true */
H A Drc_conv.c28 if ((retval = krb5_unparse_name(context, auth->ticket->server, &rep->server)))
32 free(rep->server);
/osnet-11/usr/src/lib/libstmfproxy/common/
H A Dlibstmfproxy.h36 void *(*stmf_proxy_connect)(int server_node, char *server);
/osnet-11/usr/src/lib/libwrap/
H A Dtli.c11 * server endpoint. In addition, it provides methods to map a transport
78 static struct sockaddr_gen server; local
100 if (request->server->unit != 0) {
101 memcpy(&server, request->server->unit->addr.buf,
103 request->server->unit->addr.buf));
104 request->server->sin = &server;
105 sockgen_simplify(&server);
125 if (request->server
134 struct t_unitdata *server; local
[all...]
H A Dupdate.c61 request->server->sin = va_arg(ap, struct sockaddr_gen *);
81 ptr = request->server->name;
84 ptr = request->server->addr;
111 request->server->request = request;
H A Dpercent_x.c67 ch == 'A' ? eval_hostaddr(request->server) :
71 ch == 'H' ? eval_hostinfo(request->server) :
73 ch == 'N' ? eval_hostname(request->server) :
H A Dsocket.c7 * socket address and port, the server socket address and port. In addition,
84 static struct sockaddr_gen server; local
117 * Determine the server binding. This is used for client username
118 * lookups, and for access control rules that trigger on the server
122 len = sizeof(server);
123 if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) {
127 sockgen_simplify(&server);
128 request->server->sin = &server;
187 * may be a transient problem or a botched name server setu
[all...]
H A Deval.c56 if (request->sink == 0 && request->client->sin && request->server->sin)
57 rfc931(request->client->sin, request->server->sin, request->user);
127 /* eval_server - return string with as much about the server as we know */
133 char *host = eval_hostinfo(request->server);
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dsvc_raw.c35 * Interface to create an rpc client and server in the same UNIX process.
58 SVCXPRT *server; member in struct:svc_raw_private
99 if ((srp->server = svc_xprt_alloc()) == NULL) {
110 srp->server->xp_fd = FD_SETSIZE;
111 srp->server->xp_port = 0;
112 srp->server->xp_ops = svc_raw_ops();
113 srp->server->xp_verf.oa_base = srp->verf_body;
115 xprt_register(srp->server);
117 return (srp->server);
/osnet-11/usr/src/lib/libsasl/
H A DMakefile46 lib/external.c lib/server.c lib/seterror.c \
87 lib/server.c+ \
97 < lib/server.c > lib/server.c+
98 $(MV) lib/server.c+ lib/server.c
118 lib/server.c \
137 < lib/server.c | $(SED) -e "/EXPORT DELETE/d" \
138 > lib/server.c+
139 $(MV) lib/server
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_connect.c291 char server[NB_NAMELEN]; local
319 (void) strlcpy(server, name, sizeof (server));
320 DPRINT("given name: %s", server);
330 server[0] = '\0';
332 &sin.sin_addr, server, workgroup);
333 if (nberr == 0 && server[0] != '\0') {
335 DPRINT("found name: %s", server);
336 (void) strlcpy(ctx->ct_srvname, server,
340 (void) strlcpy(server, "*SMBSERVE
[all...]

Completed in 80 milliseconds

123456