/freebsd-10-stable/usr.sbin/service/ |
H A D | Makefile | 3 SCRIPTS=service.sh 4 MAN= service.8
|
/freebsd-10-stable/etc/pam.d/ |
H A D | convert.pl | 44 my $service; 59 foreach $service (keys(%SERVICES)) { 61 if (sysopen(FILE, $service, O_RDONLY)) { 69 sysopen(FILE, $service, O_RDWR|O_CREAT|O_TRUNC) 70 or die("$service: $!\n"); 74 print(FILE "# PAM configuration for the \"$service\" service\n"); 77 next unless exists($SERVICES{$service}->{$type}); 80 print(FILE join("\n", @{$SERVICES{$service}->{$type}}, "")); 83 warn("$service\ [all...] |
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | get_port.c | 38 const char *service, 44 if ((sp = roken_getservbyname (service, proto)) == NULL) { 46 krb5_warnx(context, "%s/%s unknown service, using default port %d", 47 service, proto, default_port); 37 krb5_getportbyname(krb5_context context, const char *service, const char *proto, int default_port) argument
|
H A D | verify_user.c | 42 const char *service, 50 ret = krb5_sname_to_principal (context, NULL, service, KRB5_NT_SRV_HST, 86 * If `secure', also verify against local service key for `service'. 96 opt->service = "host"; 137 krb5_verify_opt_set_service(krb5_verify_opt *opt, const char *service) argument 139 opt->service = service; 180 OPT(service, "host"), cred); 224 const char *service) 37 verify_common(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds cred) argument 219 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 243 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
/freebsd-10-stable/contrib/ntp/include/ |
H A D | intreswork.h | 19 const char *service, 25 const char *service, void *context);
|
/freebsd-10-stable/etc/periodic/daily/ |
H A D | 480.leapfile-ntpd | 19 (sleep $(jot -r 1 0 3600); service ntpd onefetch) & 22 service ntpd onefetch
|
/freebsd-10-stable/crypto/heimdal/appl/test/ |
H A D | test_locl.h | 81 extern char *service; 87 int client_doit (const char *hostname, int port, const char *service, 88 int (*func)(int, const char *hostname, const char *service));
|
H A D | tcp_server.c | 40 proto (int sock, const char *service) argument 69 service, 156 doit (int port, const char *service) argument 160 return proto (STDIN_FILENO, service); 167 return doit (port, service);
|
H A D | nt_gss_server.c | 53 char *service = SERVICE; variable 58 { "service", 's', arg_string, &service, "service to use", "service" }, 68 proto (int sock, const char *service) argument 156 doit (int port, const char *service) argument 185 return proto (sock2, service); 243 return doit (port, service);
|
H A D | tcp_client.c | 40 proto (int sock, const char *hostname, const char *service) argument 61 service, 131 return client_doit (argv[argc], port, service, proto);
|
H A D | nt_gss_client.c | 46 proto (int sock, const char *hostname, const char *service) argument 61 "%s@%s", service, hostname); 72 "Error importing name `%s@%s':\n", service, hostname); 166 return client_doit (argv[argc], port, service, proto);
|
/freebsd-10-stable/contrib/openpam/lib/libpam/ |
H A D | pam_start.c | 65 pam_start(const char *service, argument 77 if ((r = pam_set_item(ph, PAM_SERVICE, service)) != PAM_SUCCESS) 87 if ((r = openpam_configure(ph, service)) != PAM_SUCCESS) 90 openpam_log(PAM_LOG_DEBUG, "pam_start(\"%s\") succeeded", service); 109 * The =service argument specifies the name of the policy to apply, and is
|
H A D | openpam_configure.c | 59 * Validate a service name. 150 * service and facility, or -1 if a system error occurred or a syntax 155 const char *service, 183 /* check service name if necessary */ 185 strcmp(wordv[i++], service) != 0) { 210 "%s(%d): missing or invalid service name", 342 const char *service, 372 ret = openpam_parse_chain(pamh, service, facility, 378 * Locates the policy file for a given service and reads the given chains 382 * service an 154 openpam_parse_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility, FILE *f, const char *filename, openpam_style_t style) argument 341 openpam_load_file(pam_handle_t *pamh, const char *service, pam_facility_t facility, const char *filename, openpam_style_t style) argument 386 openpam_load_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility) argument 448 openpam_configure(pam_handle_t *pamh, const char *service) argument [all...] |
/freebsd-10-stable/kerberos5/libexec/ |
H A D | Makefile | 5 SUBDIR= digest-service ipropd-master ipropd-slave hprop hpropd kdc \
|
/freebsd-10-stable/contrib/openpam/bin/openpam_dump_policy/ |
H A D | openpam_dump_policy.c | 48 openpam_chain_name(const char *service, pam_facility_t fclt) argument 53 if (asprintf(&name, "pam_%s_%s", service, facility) == -1) 121 openpam_dump_policy(const char *service) argument 129 if ((ret = openpam_configure(pamh, service)) != PAM_SUCCESS) 133 if ((name = openpam_chain_name(service, fclt)) == NULL) 141 printf("static pam_policy_t pam_%s_policy = {\n", service); 142 printf("\t.service = \"%s\",\n", service); 150 if ((name = openpam_chain_name(service, fclt)) == NULL)
|
/freebsd-10-stable/sbin/resolvconf/ |
H A D | Makefile | 21 # our service(8) is in /usr/sbin, we can use it, here. 24 RESTARTCMD= /usr/sbin/service ${CMD1} \&\& /usr/sbin/service ${CMD2}
|
/freebsd-10-stable/crypto/heimdal/kdc/ |
H A D | log.c | 40 const char *service, 45 s = krb5_config_get_strings(context, NULL, service, "logging", NULL); 47 s = krb5_config_get_strings(context, NULL, "logging", service, NULL); 39 kdc_openlog(krb5_context context, const char *service, krb5_kdc_configuration *config) argument
|
/freebsd-10-stable/usr.sbin/unbound/local-setup/ |
H A D | local-unbound-setup.sh | 46 service="" 72 : ${service:=local_unbound} 181 echo "unbound_service=\"${service}\"" 183 echo "unbound_restart=\"service ${service} reload\"" 291 echo " -s service name of unbound service" 339 service="$OPTARG" 414 elif ! service "${service}" enable [all...] |
/freebsd-10-stable/crypto/openssh/ |
H A D | auth2.c | 185 char *service = packet_get_cstring(&len); local 191 if (strcmp(service, "ssh-userauth") == 0) { 198 /* XXX all other service requests are denied */ 202 packet_put_cstring(service); 206 debug("bad service request %s", service); 207 packet_disconnect("bad service request %s", service); 209 free(service); 219 char *user, *service, *metho local [all...] |
/freebsd-10-stable/contrib/tcp_wrappers/ |
H A D | inetcf.c | 45 * Structure with everything we know about a service. 64 char *service; local 108 service = strtok(buf, whitespace); /* service */ 109 if (service == 0 || *service == '#') 111 if (STR_NE(service, "stream") && STR_NE(service, "dgram")) 123 if (path[0] == '?') /* IRIX optional service */ 198 tcpd_warn("%s may be an insecure service", tcpd_proc_nam [all...] |
/freebsd-10-stable/contrib/openpam/bin/pamtest/ |
H A D | pamtest.c | 99 pt_start(const char *service, const char *user) argument 104 pt_verbose("pam_start(%s, %s)", service, user); 105 if ((pame = pam_start(service, user, &pamc, &pamh)) != PAM_SUCCESS) 106 pt_error(pame, "pam_start(%s)", service); 273 fprintf(stderr, "usage: pamtest %s service command ...\n", 321 const char *service = NULL; local 384 service = *argv; 389 if (service == NULL) 390 service = "pamtest"; 404 if ((pame = pt_start(service, use [all...] |
/freebsd-10-stable/contrib/serf/auth/ |
H A D | auth_spnego.h | 66 * SERVICE is name of Kerberos service name. Usually 'HTTP'. HOSTNAME is 93 const char *service,
|
/freebsd-10-stable/include/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon5603 106 * Structure used to enforce a particular QOP and service. 144 const char *mechanism, rpc_gss_service_t service, const char *qop, 146 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, 155 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
|
/freebsd-10-stable/sys/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon11439 106 * Structure used to enforce a particular QOP and service. 153 rpc_gss_service_t service); 157 const char *mechanism, rpc_gss_service_t service, 161 rpc_gss_service_t service, const char *qop); 215 gss_OID mech_oid, rpc_gss_service_t service) 221 mech_oid, service); 236 rpc_gss_service_t service, cons 214 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal, gss_OID mech_oid, rpc_gss_service_t service) argument 234 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 249 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument [all...] |
/freebsd-10-stable/usr.sbin/bluetooth/sdpcontrol/ |
H A D | search.c | 67 * which each data element is a UUID representing the service classes that 68 * a given service record conforms to. The UUIDs are listed in order from 70 * must contain at least one service class UUID. 156 * highest layer protocol used to gain access to the service. If it is possible 158 * service, the ProtocolDescriptorList takes the form of a data element 397 * information about a Bluetooth profile to which the service represented by 398 * this service record conforms. Each profile descriptor is a data element 531 uint16_t service; local 542 service = SDP_SERVICE_CLASS_COMMON_ISDN_ACCESS; 546 service [all...] |