/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | tgtname.c | 37 krb5_tgtname(krb5_context context, const krb5_data *server, const krb5_data *client, krb5_principal *tgtprinc) argument 39 return krb5_build_principal_ext(context, tgtprinc, client->length, client->data,
|
H A D | sendauth.c | 49 krb5_pointer fd, char *appl_version, krb5_principal client, 115 if (client) 116 retval = krb5_copy_principal(context, client, 117 &creds.client); 120 &creds.client); 48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
|
H A D | fwd_tgt.c | 45 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data *outbuf) argument 92 retval = krb5_copy_principal (context, client, &in.client); 106 if ((retval = krb5_copy_principal(context, client, &creds.client))) 110 client->realm.length, 111 client->realm.data, 114 client->realm.length, 115 client->realm.data, 127 /* tgt->client mus [all...] |
H A D | get_creds.c | 39 client identified by in_creds->client, the server identified by 66 if (!in_creds || !in_creds->server || !in_creds->client) 85 mcreds->client = in_creds->client; 307 krb5_principal client, krb5_ccache ccache, 311 krb5_creds in_creds; /* only client and server need to be filled in */ 320 in_creds.client = client; 330 /* stuff the client real 306 validate_or_renew_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service, int validate) argument 379 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument 386 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument [all...] |
H A D | gic_keytab.c | 40 krb5_principal client, 69 if ((ret = krb5_kt_get_entry(context, keytab, client, 100 krb5_principal client, 121 * If "client" was constructed from krb5_sname_to_princ() it may 125 * in the keytab which matches the client can be used for the client's 128 if (krb5_is_referral_realm(&client->realm)) { 130 ret = krb5_kt_find_realm(context, keytab, client, &realm); 132 krb5_free_data_contents(context, &client->realm); 133 client 39 get_as_key_keytab(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument 98 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab arg_keytab, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument [all...] |
H A D | mk_req_ext.c | 214 in_creds->client, checksump, 250 (*auth_context)->authentp->client = NULL; 277 krb5_principal client, krb5_checksum *cksum, 287 authent->client = client; 354 * list sent by the client, it SHOULD be the last on the list; 276 generate_authenticator(krb5_context context, krb5_authenticator *authent, krb5_principal client, krb5_checksum *cksum, krb5_key key, krb5_ui_4 seq_number, krb5_authdata **authorization, krb5_authdata_context ad_context, krb5_enctype *desired_etypes, krb5_enctype tkt_enctype) argument
|
H A D | gic_pwd.c | 30 krb5_principal client, 68 if ((ret = krb5_unparse_name(context, client, &clientstr))) 90 if ((ret = krb5_principal2salt(context, client, &defsalt))) 134 krb5_principal client, 151 return (__krb5_get_init_creds_password(context, creds, client, password, 164 krb5_principal client, 213 ret = krb5int_get_init_creds(context, creds, client, prompter, data, 245 ret2 = krb5int_get_init_creds(context, creds, client, prompter, data, 382 ret = krb5int_get_init_creds(context, creds, client, prompter, data, 496 Attempts to get an initial ticket for creds->client t 29 krb5_get_as_key_password(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument 132 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument 162 __krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument [all...] |
H A D | walk_rtree.c | 42 * Structure to help with finding the common suffix between client and 54 const krb5_data *client, 61 const krb5_data *client, 67 const krb5_data *client, 74 const krb5_data *client, 101 const krb5_data *client, 109 if (client->data == NULL || server->data == NULL) { 111 if (client->data == NULL && server->data == NULL) { 116 "client and server")); 118 if (client 100 krb5_walk_realm_tree( krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **tree, int realm_sep) argument 213 rtree_capath_tree(krb5_context context, const krb5_data *client, const krb5_data *server, char **vals, krb5_principal **rettree) argument 277 rtree_capath_vals(krb5_context context, const krb5_data *client, const krb5_data *server, char ***vals) argument 329 rtree_hier_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_principal **rettree, int sep) argument 378 rtree_hier_realms(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_data **realms, size_t *nrealms, int sep) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/ |
H A D | fast_factor.h | 5 * Returns failure if the client library does not support FAST. 32 struct _krb5_db_entry_new *client, 37 retval = get_entry(context, request, client, krb5plugin_preauth_fast_armor, 42 get_entry(context, request, client, 29 fast_kdc_get_armor_key(krb5_context context, preauth_get_entry_data_proc get_entry, krb5_kdc_req *request, struct _krb5_db_entry_new *client, krb5_keyblock **armor_key) argument
|
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | auth_none.c | 39 * Creates a client authentication handle for passing "null" 100 authnone_marshal(AUTH *client, XDR *xdrs) argument 121 authnone_verf(AUTH *client) argument 127 authnone_validate(AUTH *client, struct opaque_auth *opaque) argument 134 authnone_refresh(AUTH *client, void *dummy) argument 141 authnone_destroy(AUTH *client) argument
|
H A D | clnt_simple.c | 38 * Simplified front end to client rpc. 61 CLIENT *client; /* Client handle */ member in struct:rpc_call_private 75 if (rcp->client) 76 CLNT_DESTROY(rcp->client); 82 * This is the simplified interface to the client rpc layer. 83 * The client handle is not destroyed here and is reused for 129 if (rcp->client) 130 CLNT_DESTROY(rcp->client); 134 rcp->client = clnt_create(host, prognum, versnum, nettype); 136 if (rcp->client [all...] |
H A D | clnt_raw.c | 37 * Interface to create an rpc client and server in the same process. 71 * Create a client handle for memory based rpc. 79 CLIENT *client; local 106 client = &clp->client_object; 125 * Set xdrmem for client/server shared buffer 130 * create client handle 132 client->cl_ops = clnt_raw_ops(); 133 client->cl_auth = authnone_create(); 135 return (client);
|
H A D | pmap_clnt.c | 133 CLIENT *client; local 137 client = clntudp_bufcreate(address, PMAPPROG, PMAPVERS, timeout, 139 if (client != NULL) { 144 if (CLNT_CALL(client, PMAPPROC_GETPORT, (xdrproc_t)xdr_pmap, 148 clnt_geterr(client, &rpc_createerr.cf_error); 152 CLNT_DESTROY(client); 168 CLIENT *client; local 173 client = clnttcp_create(address, PMAPPROG, PMAPVERS, &fd, 50, 500); 174 if (client != NULL) { 175 if (CLNT_CALL(client, PMAPPROC_DUM 200 CLIENT *client; local [all...] |
/osnet-11/usr/src/lib/libnsl/yp/ |
H A D | yp_update.c | 66 CLIENT *client; local 93 client = clnt_create(ypmaster, YPU_PROG, YPU_VERS, "circuit_n"); 94 if (client == NULL) { 98 clnt_pcreateerror("client create failed"); 106 clnt_destroy(client); 110 client->cl_auth = authdes_seccreate(ypmastername, WINDOW, 113 if (client->cl_auth == NULL) { 115 clnt_destroy(client); 127 clnt_control(client, CLSET_TIMEOUT, (char *)&total); 128 stat = clnt_call(client, pro [all...] |
/osnet-11/usr/src/lib/libwrap/ |
H A D | socket.c | 6 * This module determines the type of socket (datagram, stream), the client 83 static struct sockaddr_gen client; local 92 * Look up the client host address. Hal R. Brand <BRAND@addvax.llnl.gov> 93 * suggested how to get the client host info in case of UDP connections: 95 * really should verify that client.sin_family gets the value AF_INET, 100 len = sizeof(client); 101 if (getpeername(fd, (struct sockaddr *) & client, &len) < 0) { 103 len = sizeof(client); 105 (struct sockaddr *) & client, &len) < 0) { 106 tcpd_warn("can't get client addres [all...] |
H A D | tli.c | 10 * the transport address of a client host, and the transport address of a 77 static struct sockaddr_gen client; local 93 if (request->client->unit != 0) { 94 memcpy(&client, request->client->unit->addr.buf, 96 request->client->unit->addr.buf)); 97 request->client->sin = &client; 98 sockgen_simplify(&client); 123 if (request->client 135 struct t_unitdata *client; local [all...] |
/osnet-11/usr/src/lib/rad/pykstat/common/ |
H A D | rad.py | 29 import rad.client as client namespace 46 ctlname = client.Name(_RAD_KSTAT_DOMAIN, [("type", "Control")]) 71 rad.client.RadConnection: the private connection 80 client.Name(_RAD_KSTAT_DOMAIN, [("type", "Kstat"), 99 o = self._rc.list_objects(client.Name(_RAD_KSTAT_DOMAIN, keys))
|
/osnet-11/usr/src/lib/rad/pysmf/common/ |
H A D | rad.py | 29 import rad.client as client namespace 41 _RAD_SMF_MASTER = client.Name(_RAD_SMF_DOMAIN, [_RAD_TYPE_MASTER]) 74 rad.client.RadConnection: the private connection 86 """ Convert service and/or instance to a rad.client.Name """ 94 return client.Name(_RAD_SMF_DOMAIN, kvs) 98 """ Convert an FMRI object to a rad.client.Name """ 103 """ Look up a service/instance object by rad.client.Name """
|
/osnet-11/usr/src/lib/libidmap/common/ |
H A D | directory_client.c | 61 CLIENT *client; member in struct:directory 80 d->client = clnt_door_create(IDMAP_PROG, IDMAP_V1, 0); 81 if (d->client == NULL) { 111 if (d->client != NULL) 112 clnt_destroy(d->client); 157 cs = directory_get_common_1(sl_ids, types, sl_attrs, &dr, d->client); 163 clnt_sperror(d->client, ""), NULL);
|
H A D | utils.c | 45 CLIENT *client; member in struct:idmap_handle 51 NULL, /* client */ 187 * State of the connection is maintained through the "client" and "failed" 190 * client failed 202 * "failed" to "false". Readers are allowed to use the "client" pointer, 204 * failure. The "client" pointer is only valid while one holds a reader 249 assert(idmap_handle.client == NULL); 266 clntstat = clnt_call(idmap_handle.client, procnum, inproc, in, 268 rc = _idmap_rpc2stat(clntstat, idmap_handle.client); 328 idmap_handle.client [all...] |
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_kmod.c | 359 smb_kmod_session_close(const char *client, const char *username) argument 366 if (client != NULL) 367 (void) strlcpy(ioc.client, client, MAXNAMELEN);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 114 * Retry using client's realm if service has referral realm. 117 mcreds->server->realm = mcreds->client->realm; 203 krb5_principal client; local 209 ret = krb5_cc_get_principal(context, id, &client); 224 krb5_free_principal(context, client); 227 ret = krb5_copy_principal(context, client, &cred->client); 228 krb5_free_principal(context, client);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 84 krb5_move_ccache(krb5_context kcontext, krb5_principal client, argument 111 mcreds.client = client; 113 krb5_princ_realm(kcontext, client)->length, 114 krb5_princ_realm(kcontext, client)->data, 116 krb5_princ_realm(kcontext, client)->length, 117 krb5_princ_realm(kcontext, client)->data, 170 retval = krb5_cc_initialize(kcontext, ccache, client);
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | chgpwd.c | 68 krb5_principal client, target = NULL; local 280 "Failed getting client internet address", 313 "Failed storing client internet address", 343 client = ticket->enc_part2->client; 374 ret = krb5_unparse_name(context, client, &clientstr); 405 client, ptr, NULL, strresult, sizeof (strresult)); 495 "Failed storing client and server internet addresses", 539 krberror.client = NULL; 677 * A related problem in the server, but not the client, i [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 74 retval = gak_fct(context, request->client, 101 * Per draft 11 of the preauth framework, the client MAY but is not 179 struct _krb5_db_entry_new *client, 186 retval = fast_kdc_get_armor_key(context, get_entry_proc, request, client, &armor_key); 196 kdc_verify_preauth(krb5_context context, struct _krb5_db_entry_new *client, argument 219 retval = fast_kdc_get_armor_key(context, get_entry_proc, request, client, &armor_key); 236 retval = get_entry_proc(context, request, client, 278 * If this fails, we won't generate a reply to the client. That 279 * may cause the client to fail, but at this point the KDC has 308 struct _krb5_db_entry_new *client, krb5_dat 178 kdc_include_padata(krb5_context context, krb5_kdc_req *request, struct _krb5_db_entry_new *client, struct _krb5_db_entry_new *server, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, krb5_pa_data *data) argument 307 kdc_return_preauth(krb5_context context, krb5_pa_data *padata, struct _krb5_db_entry_new *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, struct _krb5_key_data *client_keys, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, void **pa_request_context) argument [all...] |