/titanic_50/usr/src/lib/libpkg/common/ |
H A D | pkgserv.c | 250 PKGserver server; in pkgopenserver_i() local 285 server = malloc(sizeof (*server)); in pkgopenserver_i() 287 if (server == NULL) in pkgopenserver_i() 290 server->fp = NULL; in pkgopenserver_i() 291 server->onetime = readonly; in pkgopenserver_i() 294 server->door = open(pkgdoor, O_RDWR); in pkgopenserver_i() 296 if (server->door >= 0) { in pkgopenserver_i() 297 if (door_info(server->door, &di) == 0 && di.di_target >= 0) { in pkgopenserver_i() 300 server->buflen = 1024; in pkgopenserver_i() 301 server->curbuf = malloc(1024); in pkgopenserver_i() [all …]
|
/titanic_50/usr/src/cmd/sendmail/aux/ |
H A D | etrn.pl | 53 my $server = shift(@ARGV); 55 die $usage unless $server; 122 (!defined($name)) && die "gethostbyname failed, unknown host $server"; 131 &alarm("sending 'quit' to $server"); 152 ($name, my $thataddr) = (gethostbyname($server))[0, 4]; 153 (!defined($name)) && die "gethostbyname failed, unknown host $server"; 159 print "server = $server\n" if (defined($verbose)); 160 &alarm("connect to $server"); 162 die "cannot connect to $server: $ERRNO\n"; 168 &alarm("greeting with $server"); [all …]
|
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | walk_rtree.c | 122 krb5_walk_realm_tree(krb5_context context, const krb5_data *client, const krb5_data *server, krb5_p… in krb5_walk_realm_tree() argument 144 printf(" server is %s\n",server->data); in krb5_walk_realm_tree() 147 if (!(client->data && server->data)) { in krb5_walk_realm_tree() 149 if (!client->data && !server->data) { in krb5_walk_realm_tree() 171 if ((cap_server = (char *)malloc(server->length + 1)) == NULL) { in krb5_walk_realm_tree() 175 strncpy(cap_server, server->data, server->length); in krb5_walk_realm_tree() 176 cap_server[server->length] = '\0'; in krb5_walk_realm_tree() 203 slen = server->length; in krb5_walk_realm_tree() 206 com_sdot = scp = server->data + slen - 1; in krb5_walk_realm_tree() 227 client->data, server->data); in krb5_walk_realm_tree() [all …]
|
H A D | gc_frm_kdc.c | 177 krb5_principal client, krb5_principal server, 258 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str); in tr_dbg() 321 krb5_princ_realm(ctx, src), &mcreds->server); in tgt_mcred() 339 krb5_principal client, krb5_principal server) in init_rtree() argument 345 krb5_princ_realm(ts->ctx, server), in init_rtree() 470 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) { in find_nxt_kdc() 473 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name); in find_nxt_kdc() 486 r1 = krb5_princ_component(ts->ctx, ts->nxt_tgt->server, 1); in find_nxt_kdc() 569 if (!(krb5_principal_compare(ts->ctx, tgtq->server, tmp_out_cred->server))) { in try_kdc() 611 retval = krb5_tgtname(ts->ctx, rdst, rsrc, &mcreds->server); in kdc_mcred() [all …]
|
H A D | vfy_increds.c | 34 if (krb5_principal_compare(context, princ, creds.server)) in krb5_cc_copy_creds_except() 75 krb5_principal server; in krb5_verify_init_creds() local 85 server = NULL; in krb5_verify_init_creds() 94 server = server_arg; in krb5_verify_init_creds() 96 KRB5_NT_SRV_HST, &server)) in krb5_verify_init_creds() 116 (ret = krb5_kt_get_entry(context, keytab, server, 0, 0, &kte))) { in krb5_verify_init_creds() 150 if (krb5_principal_compare(context, server, creds->server)) { in krb5_verify_init_creds() 178 in_creds.server = server; in krb5_verify_init_creds() 201 if ((ret = krb5_rd_req(context, &authcon, &ap_req, server, keytab, in krb5_verify_init_creds() 218 creds->server)) != NULL)) { in krb5_verify_init_creds() [all …]
|
H A D | recvauth.c | 51 krb5_principal server, in recvauth_common() argument 159 if (server) { in recvauth_common() 161 krb5_princ_component(context, server, 0), &rcache); in recvauth_common() 172 problem = krb5_rd_req(context, auth_context, &inbuf, server, in recvauth_common() 188 if(server) in recvauth_common() 189 error.server = server; in recvauth_common() 193 (void) krb5_parse_name(context, "????", &error.server); in recvauth_common() 214 krb5_free_principal(context, error.server); in recvauth_common() 256 …ntext *auth_context, krb5_pointer fd, char *appl_version, krb5_principal server, krb5_int32 flags,… in krb5_recvauth() argument 259 server, flags, keytab, ticket, 0); in krb5_recvauth() [all …]
|
H A D | rd_req.c | 49 …auth_context *auth_context, const krb5_data *inbuf, krb5_const_principal server, krb5_keytab keyta… in krb5_rd_req() argument 82 if (!server) { in krb5_rd_req() 83 server = request->ticket->server; in krb5_rd_req() 88 && server) { in krb5_rd_req() 90 krb5_princ_component(context,server,0), &(*auth_context)->rcache))) in krb5_rd_req() 101 retval = krb5_rd_req_decoded(context, auth_context, request, server, in krb5_rd_req()
|
H A D | gc_via_tkt.c | 55 if ((retval = krb5_copy_principal(context, pkdcrep->enc_part2->server, in krb5_kdcrep2creds() 56 &(*ppcreds)->server))) in krb5_kdcrep2creds() 107 if (!krb5_principal_compare(context, dec_rep->ticket->server, in check_reply_server() 108 dec_rep->enc_part2->server)) in check_reply_server() 113 if (krb5_principal_compare(context, dec_rep->ticket->server, in check_reply_server() 114 in_cred->server)) in check_reply_server() 125 krb5int_dbgref_dump_principal("gc_via_tkt: in_cred",in_cred->server); in check_reply_server() 126 krb5int_dbgref_dump_principal("gc_via_tkt: encoded server",dec_rep->enc_part2->server); in check_reply_server() 134 if (!IS_TGS_PRINC(context, in_cred->server) || in check_reply_server() 135 !IS_TGS_PRINC(context, dec_rep->ticket->server)) { in check_reply_server() [all …]
|
H A D | fwd_tgt.c | 41 …context auth_context, char *rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, i… in krb5_fwd_tgt_creds() argument 79 } else if (server) { /* must server be non-NULL when rhost is given? */ in krb5_fwd_tgt_creds() 85 retval = krb5_copy_principal (context, server, &in.server); in krb5_fwd_tgt_creds() 105 if ((retval = krb5_build_principal_ext(context, &creds.server, in krb5_fwd_tgt_creds() 151 if (krb5_princ_type(context, server) != KRB5_NT_SRV_HST) { in krb5_fwd_tgt_creds() 156 if (krb5_princ_size(context, server) < 2){ in krb5_fwd_tgt_creds() 161 rhost = malloc(server->data[1].length+1); in krb5_fwd_tgt_creds() 168 (void) memcpy(rhost, server->data[1].data, server->data[1].length); in krb5_fwd_tgt_creds() 169 rhost[server->data[1].length] = '\0'; in krb5_fwd_tgt_creds()
|
H A D | rd_req_dec.c | 83 if ((retval = krb5_kt_get_entry(context, keytab, req->ticket->server, in krb5_rd_req_decrypt_tkt_part() 102 krb5_principal princ = (krb5_principal) req->ticket->server; in krb5_rd_req_decrypt_tkt_part() 147 const krb5_ap_req *req, krb5_const_principal server, in krb5_rd_req_decoded_opt() argument 156 if (server && krb5_is_referral_realm(&server->realm)) { in krb5_rd_req_decoded_opt() 158 princ_data = *server; in krb5_rd_req_decoded_opt() 159 server = &princ_data; in krb5_rd_req_decoded_opt() 166 if (server && !krb5_principal_compare(context, server, req->ticket->server)) { in krb5_rd_req_decoded_opt() 168 if (krb5_unparse_name(context, server, &wanted_name) == 0 in krb5_rd_req_decoded_opt() 169 && krb5_unparse_name(context, req->ticket->server, &found_name) == 0) in krb5_rd_req_decoded_opt() 275 server)); in krb5_rd_req_decoded_opt() [all …]
|
H A D | get_creds.c | 63 if (!in_creds || !in_creds->server || !in_creds->client) in krb5_get_credentials_core() 92 mcreds->server = in_creds->server; in krb5_get_credentials_core() 103 ret = krb5_get_tgs_ktypes (context, mcreds->server, &ktypes); in krb5_get_credentials_core() 299 in_creds.server = NULL; in krb5_validate_or_renew_creds() 309 if ((ret = krb5_parse_name(context, in_tkt_service, &in_creds.server))) in krb5_validate_or_renew_creds() 314 if (in_creds.server->realm.length < in_creds.client->realm.length) in krb5_validate_or_renew_creds() 315 if ((in_creds.server->realm.data = in krb5_validate_or_renew_creds() 316 (char *) realloc(in_creds.server->realm.data, in krb5_validate_or_renew_creds() 322 in_creds.server->realm.length = in_creds.client->realm.length; in krb5_validate_or_renew_creds() 323 memcpy(in_creds.server->realm.data, in_creds.client->realm.data, in krb5_validate_or_renew_creds() [all …]
|
H A D | mk_req.c | 64 krb5_principal server; in krb5_mk_req() local 69 KRB5_NT_SRV_HST, &server); in krb5_mk_req() 75 if ((retval = krb5_copy_principal(context, server, &creds.server))) in krb5_mk_req() 96 krb5_free_principal(context, server); in krb5_mk_req()
|
H A D | gic_keytab.c | 215 char * server = NULL; in krb5_get_in_tkt_with_keytab() local 233 retval = krb5_unparse_name( context, creds->server, &server); in krb5_get_in_tkt_with_keytab() 236 server_princ = creds->server; in krb5_get_in_tkt_with_keytab() 241 0, server, opte, in krb5_get_in_tkt_with_keytab() 244 krb5_free_unparsed_name( context, server); in krb5_get_in_tkt_with_keytab() 249 if (creds->server) in krb5_get_in_tkt_with_keytab() 250 krb5_free_principal( context, creds->server); in krb5_get_in_tkt_with_keytab() 254 creds->server = server_princ; in krb5_get_in_tkt_with_keytab()
|
/titanic_50/usr/src/cmd/print/scripts/ |
H A D | lpadmin | 71 svcadm ${1} -s svc:/application/print/server:default 80 lp_server=${server:-${HOST}} 194 server=${OPTARG} 198 if [[ ! -n "${server}" ]] ; then 199 server=${HOST} 204 if [[ -n "${printer}" || -n "${server}" || \ 254 if [[ ! -n "${device}" && ! -n "${server}" && ! -n "${delete}" && \ 271 case "${server}" in 273 uri=${server} 274 rem_printer=$(expr "${server}" : ".*://.*/\([^/]*\)") [all …]
|
/titanic_50/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | srvsvc_clnt.c | 58 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) in srvsvc_open() argument 62 if (server == NULL || domain == NULL) { in srvsvc_open() 66 server = di.d_dci.dc_name; in srvsvc_open() 73 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") != 0) in srvsvc_open() 94 srvsvc_net_share_get_info(char *server, char *domain, char *netname) in srvsvc_net_share_get_info() argument 112 if (srvsvc_open(server, domain, user, &handle) != 0) in srvsvc_net_share_get_info() 118 len = strlen(server) + 4; in srvsvc_net_share_get_info() 125 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); in srvsvc_net_share_get_info() 185 srvsvc_net_session_enum(char *server, char *domain, char *netname) in srvsvc_net_session_enum() argument 201 rc = srvsvc_open(server, domain, user, &handle); in srvsvc_net_session_enum() [all …]
|
H A D | samlib.c | 80 sam_remove_trust_account(char *server, char *domain) in sam_remove_trust_account() argument 87 return (sam_delete_account(server, domain, account_name)); in sam_remove_trust_account() 100 sam_delete_account(char *server, char *domain_name, char *account_name) in sam_delete_account() argument 114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, in sam_delete_account() 163 sam_lookup_name(char *server, char *domain_name, char *account_name, in sam_lookup_name() argument 178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, in sam_lookup_name() 215 sam_get_local_domains(char *server, char *domain_name) in sam_get_local_domains() argument 224 rc = samr_open(server, domain_name, user, SAM_ENUM_LOCAL_DOMAIN, in sam_get_local_domains() 286 char *server, in netr_change_password() argument 301 status = ndr_rpc_bind(&handle, server, "", "", "SAMR"); in netr_change_password() [all …]
|
/titanic_50/usr/src/uts/common/inet/ilb/ |
H A D | ilb.c | 246 ilb_server_t *server) in ilb_server_kstat_init() argument 260 server->iser_name, cname_buf, KSTAT_TYPE_NAMED, in ilb_server_kstat_init() 265 bcopy(&template, &server->iser_kstat, sizeof (template)); in ilb_server_kstat_init() 266 ksp->ks_data = &server->iser_kstat; in ilb_server_kstat_init() 269 kstat_named_setstr(&server->iser_kstat.ip_address, in ilb_server_kstat_init() 270 server->iser_ip_addr); in ilb_server_kstat_init() 272 ksp->ks_data_size += strlen(server->iser_ip_addr) + 1; in ilb_server_kstat_init() 760 ilb_server_t *server; in ilb_rule_del_common() local 771 while ((server = tmp_rule->ir_servers) != NULL) { in ilb_rule_del_common() 772 mutex_enter(&server->iser_lock); in ilb_rule_del_common() [all …]
|
/titanic_50/usr/src/lib/libwrap/ |
H A D | tli.c | 74 static struct sockaddr_gen server; local 96 if (request->server->unit != 0) { 97 memcpy(&server, request->server->unit->addr.buf, 99 request->server->unit->addr.buf)); 100 request->server->sin = &server; 101 sockgen_simplify(&server); 121 if (request->server->unit != 0) 122 t_free((char *) request->server->unit, T_UNITDATA); 130 struct t_unitdata *server; local 167 if ((server = (struct t_unitdata *) t_alloc(fd, T_UNITDATA, T_ADDR)) == 0) { [all …]
|
/titanic_50/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.c | 242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != in kdc_process_tgs_req() 244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, in kdc_process_tgs_req() 278 apreq->ticket->server, in kdc_process_tgs_req() 298 apreq, apreq->ticket->server, in kdc_process_tgs_req() 389 krb5_db_entry server; in kdc_get_server_key() local 396 if ((retval = krb5_db_get_principal(kdc_context, ticket->server, in kdc_get_server_key() 397 &server, &nprincs, in kdc_get_server_key() 402 krb5_db_free_principal(kdc_context, &server, nprincs); in kdc_get_server_key() 407 krb5_db_free_principal(kdc_context, &server, nprincs); in kdc_get_server_key() 408 if (!krb5_unparse_name(kdc_context, ticket->server, &sname)) { in kdc_get_server_key() [all …]
|
H A D | do_tgs_req.c | 70 krb5_db_entry server; in process_tgs_req() local 112 if ((retval = setup_server_realm(request->server))) in process_tgs_req() 121 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) { in process_tgs_req() 163 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server, in process_tgs_req() 179 if (firstpass && krb5_is_tgs_principal(request->server) == TRUE) { in process_tgs_req() 180 if (krb5_princ_size(kdc_context, request->server) == 2) { in process_tgs_req() 182 krb5_princ_component(kdc_context, request->server, 1); in process_tgs_req() 188 krb5_db_free_principal(kdc_context, &server, nprincs); in process_tgs_req() 189 find_alternate_tgs(request, &server, &more, &nprincs, in process_tgs_req() 196 krb5_db_free_principal(kdc_context, &server, nprincs); in process_tgs_req() [all …]
|
/titanic_50/usr/src/cmd/lp/cmd/scripts/ |
H A D | lpsched | 40 state=`svcprop -p restarter/state svc:/application/print/server:default` 51 /usr/sbin/svcadm enable -t svc:/application/print/server:default 64 select svc:/application/print/server:default 80 select svc:/application/print/server:default 91 select svc:/application/print/server:default 102 select svc:/application/print/server:default 113 select svc:/application/print/server:default 125 /usr/sbin/svcadm enable -t svc:/application/print/server:default
|
/titanic_50/usr/src/cmd/ssh/libssh/common/ |
H A D | kex.c | 294 kex->server = 1; in kex_setup() 317 choose_lang(char **lang, char *client, char *server) in choose_lang() argument 320 *lang = match_list(client, server, NULL); in choose_lang() 350 choose_enc(int is_server, Enc *enc, char *client, char *server) in choose_enc() argument 352 char *name = match_list(client, server, NULL); in choose_enc() 356 fatal(SERVER_ERR_MSG, client, server); in choose_enc() 358 fatal(CLIENT_ERR_MSG, client, server); in choose_enc() 373 choose_mac(Mac *mac, char *client, char *server) in choose_mac() argument 375 char *name = match_list(client, server, NULL); in choose_mac() 378 client, server); in choose_mac() [all …]
|
/titanic_50/usr/src/cmd/tcpd/ |
H A D | tcpdmatch.c | 63 char *server; local 113 if ((server = split_at(argv[optind], '@')) == 0) 114 server = unknown; 172 if (NOT_INADDR(server) == 0 || HOSTNAME_KNOWN(server)) { 173 if ((hp = find_inet_addr(server)) == 0) 187 if (STR_EQ(eval_hostname(request.server), unknown)) 189 eval_hostaddr(request.server)); 192 fprintf(stderr, "Error: %s has more than one address\n", server); 198 request_set(&request, RQ_SERVER_NAME, server, 0);
|
/titanic_50/usr/src/lib/libsldap/common/ |
H A D | ns_standalone.c | 1097 __ns_ldap_getConnectionInfoFromDUA(const ns_dir_server_t *server, in __ns_ldap_getConnectionInfoFromDUA() argument 1122 if (server == NULL) { in __ns_ldap_getConnectionInfoFromDUA() 1143 (void) strncpy(buffer, server->server, sizeof (buffer)); in __ns_ldap_getConnectionInfoFromDUA() 1151 if (server->port > 0) { in __ns_ldap_getConnectionInfoFromDUA() 1156 server->port); in __ns_ldap_getConnectionInfoFromDUA() 1165 if (domainname2baseDN(server->domainName ? in __ns_ldap_getConnectionInfoFromDUA() 1166 server->domainName : config_struct->domainName, in __ns_ldap_getConnectionInfoFromDUA() 1171 server->domainName ? in __ns_ldap_getConnectionInfoFromDUA() 1172 server->domainName : config_struct->domainName); in __ns_ldap_getConnectionInfoFromDUA() 1218 server->domainName ? in __ns_ldap_getConnectionInfoFromDUA() [all …]
|
/titanic_50/usr/src/cmd/ypcmd/ |
H A D | yppush.c | 113 struct server { struct 114 struct server *pnext; argument 125 static struct server *server_list = (struct server *)NULL; argument 126 static struct server *active_list = (struct server *)NULL; 233 static unsigned short send_message(struct server *ps, 243 static void print_state_msg(struct server *s, long e); 244 static void print_callback_msg(struct server *s); 537 struct server *ps; in add_server() 548 if ((ps = (struct server *)malloc((unsigned)sizeof (struct server))) in add_server() 549 == (struct server *)NULL) { in add_server() [all …]
|