/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | tgtname.c | 37 krb5_tgtname(krb5_context context, const krb5_data *server, const krb5_data *client, krb5_principal *tgtprinc) argument 41 server->length, server->data,
|
H A D | mk_req.c | 37 server specifies the principal of the server to receive the message; if 38 credentials are not present in the credentials cache for this server, the 59 krb5_principal server; local 64 KRB5_NT_SRV_HST, &server); 70 if ((retval = krb5_copy_principal(context, server, &creds.server))) 89 krb5_free_principal(context, server);
|
H A D | gc_frm_kdc.c | 178 krb5_principal client, krb5_principal server, 261 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str); 304 * krbtgt/realm_of(DST)@realm_of(SRC) as the server principal. Zeroes 324 krb5_princ_realm(ctx, src), &mcreds->server); 342 krb5_principal client, krb5_principal server) 348 krb5_princ_realm(ts->ctx, server), 476 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) { 479 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name); 484 "expectations: server '%s' " 492 "expectations: server principa 341 init_rtree(struct tr_state *ts, krb5_principal client, krb5_principal server) argument 764 do_traversal(krb5_context ctx, krb5_ccache ccache, krb5_principal client, krb5_principal server, krb5_creds *out_cc_tgt, krb5_creds **out_tgt, krb5_creds ***out_kdc_tgts, int *tgtptr_isoffpath) argument 849 chase_offpath(struct tr_state *ts, krb5_principal client, krb5_principal server) argument 992 krb5_principal client, server, supplied_server, out_supplied_server; local [all...] |
H A D | walk_rtree.c | 43 * server realm during hierarchical traversal. 55 const krb5_data *server, 62 const krb5_data *server, 68 const krb5_data *server, 75 const krb5_data *server, 102 const krb5_data *server, 109 if (client->data == NULL || server->data == NULL) { 111 if (client->data == NULL && server->data == NULL) { 116 "client and server")); 129 "server")); 100 krb5_walk_realm_tree( krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **tree, int realm_sep) argument 213 rtree_capath_tree(krb5_context context, const krb5_data *client, const krb5_data *server, char **vals, krb5_principal **rettree) argument 277 rtree_capath_vals(krb5_context context, const krb5_data *client, const krb5_data *server, char ***vals) argument 329 rtree_hier_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **rettree, int sep) argument 378 rtree_hier_realms(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_data **realms, size_t *nrealms, int sep) argument [all...] |
H A D | recvauth.c | 49 krb5_principal server, 137 if (server) { 139 krb5_princ_component(context, server, 0), &rcache); 150 problem = krb5_rd_req(context, auth_context, &inbuf, server, 166 if(server) 167 error.server = server; 171 (void) krb5_parse_name(context, "????", &error.server); 191 krb5_free_principal(context, error.server); 232 krb5_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int3 argument 44 recvauth_common(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data *version) argument 239 krb5_recvauth_version(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *version) argument [all...] |
H A D | vfy_increds.c | 50 if (krb5_principal_compare(context, princ, creds.server)) 81 get_vfy_cred(krb5_context context, krb5_creds *creds, krb5_principal server, argument 94 /* If the creds are for the server principal, we're set, just do a mk_req. 98 if (krb5_principal_compare(context, server, creds->server)) { 107 * client princ realm must be the same as the server princ's realm used 123 * the server's. 125 if (!krb5_realm_compare(context, creds->client, server)) { 156 in_creds.server = server; 298 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server, krb5_keytab keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument [all...] |
H A D | fwd_tgt.c | 45 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument 83 } else if (server) { /* must server be non-NULL when rhost is given? */ 89 retval = krb5_copy_principal (context, server, &in.server); 109 if ((retval = krb5_build_principal_ext(context, &creds.server, 158 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) { 163 if (krb5_princ_size(context, server) < 2){ 168 rhost = malloc(server->data[1].length+1); 174 memcpy(rhost, server [all...] |
H A D | get_creds.c | 39 client identified by in_creds->client, the server identified by 40 in_creds->server, with options options, expiration date specified in 66 if (!in_creds || !in_creds->server || !in_creds->client) 84 mcreds->server = in_creds->server; 95 ret = krb5_get_tgs_ktypes(context, mcreds->server, &ktypes); 311 krb5_creds in_creds; /* only client and server need to be filled in */ 317 in_creds.server = NULL; 327 if ((ret = krb5_parse_name(context, in_tkt_service, &in_creds.server))) 330 /* stuff the client realm into the server principa [all...] |
H A D | gc_via_tkt.c | 56 if ((retval = krb5_copy_principal(context, pkdcrep->enc_part2->server, 57 &(*ppcreds)->server))) 109 if (!krb5_principal_compare(context, dec_rep->ticket->server, 110 dec_rep->enc_part2->server)) 115 if (krb5_principal_compare(context, dec_rep->ticket->server, 116 in_cred->server)) 122 /* in_cred server differs from ticket returned, but ticket 127 krb5int_dbgref_dump_principal("gc_via_tkt: in_cred",in_cred->server); 128 krb5int_dbgref_dump_principal("gc_via_tkt: encoded server",dec_rep->enc_part2->server); [all...] |
H A D | copy_creds.c | 71 retval = krb5_copy_principal(context, incred->server, &tempcred->server); 110 krb5_free_principal(context, tempcred->server);
|
H A D | srv_dec_tkt.c | 60 realm, &ticket->server->realm); 86 ticket->server, 113 krb5_free_principal(context, ticket->server); 114 ticket->server = tmp;
|
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | pkgserv.c | 254 PKGserver server; local 289 server = malloc(sizeof (*server)); 291 if (server == NULL) 294 server->fp = NULL; 295 server->onetime = readonly; 298 server->door = open(pkgdoor, O_RDWR); 300 if (server->door >= 0) { 301 if (door_info(server->door, &di) == 0 && di.di_target >= 0) { 304 server 467 pkgcloseserver(PKGserver server) argument 580 void *server; local 603 pkgservercommitfile(VFP_T *a_vfp, PKGserver server) argument 654 pkgopenfilter(PKGserver server, const char *filt) argument 691 pkgclosefilter(PKGserver server) argument 703 pkggetentry(PKGserver server, int *len, int *pathlen) argument 733 pkggetentry_named(PKGserver server, const char *path, int *len, int *pathlen) argument [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | samlib.c | 60 sam_create_trust_account(char *server, char *domain) argument 73 status = sam_create_account(server, domain, account_name, 84 status = sam_check_user(server, domain, account_name); 104 sam_create_account(char *server, char *domain_name, char *account_name, argument 119 rc = samr_open(server, domain_name, user, SAM_CONNECT_CREATE_ACCOUNT, 129 sid = sam_get_domain_sid(&samr_handle, server, domain_name); 172 sam_remove_trust_account(char *server, char *domain) argument 179 return (sam_delete_account(server, domain, account_name)); 187 * server. 192 sam_delete_account(char *server, cha argument 245 sam_check_user(char *server, char *domain_name, char *account_name) argument 304 sam_lookup_name(char *server, char *domain_name, char *account_name, DWORD *rid_ret) argument 356 sam_get_local_domains(char *server, char *domain_name) argument 410 sam_get_domain_sid(mlsvc_handle_t *samr_handle, char *server, char *domain_name) argument [all...] |
H A D | wkssvc_clnt.c | 31 wkssvc_getinfo(char *server, char *domain, wksta_info_t *info) argument 40 if (server == NULL || domain == NULL || info == NULL) 45 if (ndr_rpc_bind(&handle, server, domain, user, "Workstation") != 0)
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/ |
H A D | rc_common.c | 17 h += *rep->server; 29 (strcmp(old->server, new1->server) == 0)) { /* always true */
|
H A D | rc_conv.c | 28 if ((retval = krb5_unparse_name(context, auth->ticket->server, &rep->server))) 32 free(rep->server);
|
/osnet-11/usr/src/lib/libstmfproxy/common/ |
H A D | libstmfproxy.h | 36 void *(*stmf_proxy_connect)(int server_node, char *server);
|
/osnet-11/usr/src/lib/libwrap/ |
H A D | tli.c | 11 * server endpoint. In addition, it provides methods to map a transport 78 static struct sockaddr_gen server; local 100 if (request->server->unit != 0) { 101 memcpy(&server, request->server->unit->addr.buf, 103 request->server->unit->addr.buf)); 104 request->server->sin = &server; 105 sockgen_simplify(&server); 125 if (request->server 134 struct t_unitdata *server; local [all...] |
H A D | update.c | 61 request->server->sin = va_arg(ap, struct sockaddr_gen *); 81 ptr = request->server->name; 84 ptr = request->server->addr; 111 request->server->request = request;
|
H A D | percent_x.c | 67 ch == 'A' ? eval_hostaddr(request->server) : 71 ch == 'H' ? eval_hostinfo(request->server) : 73 ch == 'N' ? eval_hostname(request->server) :
|
H A D | socket.c | 7 * socket address and port, the server socket address and port. In addition, 84 static struct sockaddr_gen server; local 117 * Determine the server binding. This is used for client username 118 * lookups, and for access control rules that trigger on the server 122 len = sizeof(server); 123 if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) { 127 sockgen_simplify(&server); 128 request->server->sin = &server; 187 * may be a transient problem or a botched name server setu [all...] |
H A D | eval.c | 56 if (request->sink == 0 && request->client->sin && request->server->sin) 57 rfc931(request->client->sin, request->server->sin, request->user); 127 /* eval_server - return string with as much about the server as we know */ 133 char *host = eval_hostinfo(request->server);
|
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | svc_raw.c | 35 * Interface to create an rpc client and server in the same UNIX process. 58 SVCXPRT *server; member in struct:svc_raw_private 99 if ((srp->server = svc_xprt_alloc()) == NULL) { 110 srp->server->xp_fd = FD_SETSIZE; 111 srp->server->xp_port = 0; 112 srp->server->xp_ops = svc_raw_ops(); 113 srp->server->xp_verf.oa_base = srp->verf_body; 115 xprt_register(srp->server); 117 return (srp->server);
|
/osnet-11/usr/src/lib/libsasl/ |
H A D | Makefile | 46 lib/external.c lib/server.c lib/seterror.c \ 87 lib/server.c+ \ 97 < lib/server.c > lib/server.c+ 98 $(MV) lib/server.c+ lib/server.c 118 lib/server.c \ 137 < lib/server.c | $(SED) -e "/EXPORT DELETE/d" \ 138 > lib/server.c+ 139 $(MV) lib/server [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_connect.c | 291 char server[NB_NAMELEN]; local 319 (void) strlcpy(server, name, sizeof (server)); 320 DPRINT("given name: %s", server); 330 server[0] = '\0'; 332 &sin.sin_addr, server, workgroup); 333 if (nberr == 0 && server[0] != '\0') { 335 DPRINT("found name: %s", server); 336 (void) strlcpy(ctx->ct_srvname, server, 340 (void) strlcpy(server, "*SMBSERVE [all...] |