/freebsd-10.0-release/usr.sbin/service/ |
H A D | Makefile | 3 SCRIPTS=service.sh 4 MAN= service.8
|
/freebsd-10.0-release/etc/pam.d/ |
H A D | convert.pl | 44 my $service; 59 foreach $service (keys(%SERVICES)) { 61 if (sysopen(FILE, $service, O_RDONLY)) { 69 sysopen(FILE, $service, O_RDWR|O_CREAT|O_TRUNC) 70 or die("$service: $!\n"); 74 print(FILE "# PAM configuration for the \"$service\" service\n"); 77 next unless exists($SERVICES{$service}->{$type}); 80 print(FILE join("\n", @{$SERVICES{$service}->{$type}}, "")); 83 warn("$service\ [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | get_port.c | 38 const char *service, 44 if ((sp = roken_getservbyname (service, proto)) == NULL) { 46 krb5_warnx(context, "%s/%s unknown service, using default port %d", 47 service, proto, default_port); 37 krb5_getportbyname(krb5_context context, const char *service, const char *proto, int default_port) argument
|
H A D | verify_user.c | 42 const char *service, 50 ret = krb5_sname_to_principal (context, NULL, service, KRB5_NT_SRV_HST, 86 * If `secure', also verify against local service key for `service'. 96 opt->service = "host"; 137 krb5_verify_opt_set_service(krb5_verify_opt *opt, const char *service) argument 139 opt->service = service; 180 OPT(service, "host"), cred); 224 const char *service) 37 verify_common(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds cred) argument 219 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 243 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
/freebsd-10.0-release/kerberos5/libexec/ |
H A D | Makefile | 3 SUBDIR= digest-service ipropd-master ipropd-slave hprop hpropd kadmind kdc \
|
/freebsd-10.0-release/crypto/heimdal/appl/test/ |
H A D | test_locl.h | 81 extern char *service; 87 int client_doit (const char *hostname, int port, const char *service, 88 int (*func)(int, const char *hostname, const char *service));
|
H A D | tcp_server.c | 40 proto (int sock, const char *service) argument 69 service, 156 doit (int port, const char *service) argument 160 return proto (STDIN_FILENO, service); 167 return doit (port, service);
|
H A D | nt_gss_server.c | 53 char *service = SERVICE; variable 58 { "service", 's', arg_string, &service, "service to use", "service" }, 68 proto (int sock, const char *service) argument 156 doit (int port, const char *service) argument 185 return proto (sock2, service); 243 return doit (port, service);
|
H A D | tcp_client.c | 40 proto (int sock, const char *hostname, const char *service) argument 61 service, 131 return client_doit (argv[argc], port, service, proto);
|
H A D | nt_gss_client.c | 46 proto (int sock, const char *hostname, const char *service) argument 61 "%s@%s", service, hostname); 72 "Error importing name `%s@%s':\n", service, hostname); 166 return client_doit (argv[argc], port, service, proto);
|
/freebsd-10.0-release/usr.sbin/unbound/local-setup/ |
H A D | local-unbound-setup.sh | 42 service="" 64 : ${service:=local_unbound} 162 echo "unbound_service=\"${service}\"" 164 echo "unbound_restart=\"service ${service} reload\"" 235 echo " -s service name of unbound service" 274 service="$OPTARG" 332 elif ! service "${service}" enable [all...] |
/freebsd-10.0-release/contrib/openpam/lib/libpam/ |
H A D | pam_start.c | 65 pam_start(const char *service, argument 77 if ((r = pam_set_item(ph, PAM_SERVICE, service)) != PAM_SUCCESS) 87 if ((r = openpam_configure(ph, service)) != PAM_SUCCESS) 90 openpam_log(PAM_LOG_DEBUG, "pam_start(\"%s\") succeeded", service); 109 * The =service argument specifies the name of the policy to apply, and is
|
H A D | openpam_configure.c | 59 * Validate a service name. 150 * service and facility, or -1 if a system error occurred or a syntax 155 const char *service, 183 /* check service name if necessary */ 185 strcmp(wordv[i++], service) != 0) { 210 "%s(%d): missing or invalid service name", 342 const char *service, 372 ret = openpam_parse_chain(pamh, service, facility, 378 * Locates the policy file for a given service and reads the given chains 382 * service an 154 openpam_parse_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility, FILE *f, const char *filename, openpam_style_t style) argument 341 openpam_load_file(pam_handle_t *pamh, const char *service, pam_facility_t facility, const char *filename, openpam_style_t style) argument 386 openpam_load_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility) argument 448 openpam_configure(pam_handle_t *pamh, const char *service) argument [all...] |
H A D | openpam_impl.h | 87 const char *service; member in struct:pam_policy 108 char *service; member in struct:pam_handle
|
/freebsd-10.0-release/contrib/openpam/bin/openpam_dump_policy/ |
H A D | openpam_dump_policy.c | 48 openpam_chain_name(const char *service, pam_facility_t fclt) argument 53 if (asprintf(&name, "pam_%s_%s", service, facility) == -1) 121 openpam_dump_policy(const char *service) argument 129 if ((ret = openpam_configure(pamh, service)) != PAM_SUCCESS) 133 if ((name = openpam_chain_name(service, fclt)) == NULL) 141 printf("static pam_policy_t pam_%s_policy = {\n", service); 142 printf("\t.service = \"%s\",\n", service); 150 if ((name = openpam_chain_name(service, fclt)) == NULL)
|
/freebsd-10.0-release/sbin/resolvconf/ |
H A D | Makefile | 20 # our service(8) is in /usr/sbin, we can use it, here. 23 RESTARTCMD= /usr/sbin/service ${CMD1} \&\& /usr/sbin/service ${CMD2}
|
/freebsd-10.0-release/crypto/heimdal/kdc/ |
H A D | log.c | 40 const char *service, 45 s = krb5_config_get_strings(context, NULL, service, "logging", NULL); 47 s = krb5_config_get_strings(context, NULL, "logging", service, NULL); 39 kdc_openlog(krb5_context context, const char *service, krb5_kdc_configuration *config) argument
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth2.c | 192 char *service = packet_get_cstring(&len); local 198 if (strcmp(service, "ssh-userauth") == 0) { 205 /* XXX all other service requests are denied */ 209 packet_put_cstring(service); 213 debug("bad service request %s", service); 214 packet_disconnect("bad service request %s", service); 216 free(service); 225 char *user, *service, *metho local [all...] |
/freebsd-10.0-release/sys/dev/hyperv/utilities/ |
H A D | hv_util.c | 88 * Receive buffer pointers. There is one buffer per utility service. The 381 struct hv_vmbus_service* service; local 386 service = device_get_softc(dev); 387 receive_buffer_offset = service - &service_table[0]; 388 device_printf(dev, "Hyper-V Service attaching: %s\n", service->name); 392 if (service->init != NULL) { 393 ret = service->init(service); 402 service->callback, hv_dev->channel); 421 struct hv_vmbus_service* service; local [all...] |
/freebsd-10.0-release/contrib/tcp_wrappers/ |
H A D | inetcf.c | 45 * Structure with everything we know about a service. 64 char *service; local 108 service = strtok(buf, whitespace); /* service */ 109 if (service == 0 || *service == '#') 111 if (STR_NE(service, "stream") && STR_NE(service, "dgram")) 123 if (path[0] == '?') /* IRIX optional service */ 198 tcpd_warn("%s may be an insecure service", tcpd_proc_nam [all...] |
/freebsd-10.0-release/contrib/serf/auth/ |
H A D | auth_spnego.h | 66 * SERVICE is name of Kerberos service name. Usually 'HTTP'. HOSTNAME is 92 const char *service,
|
/freebsd-10.0-release/include/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon5317 106 * Structure used to enforce a particular QOP and service. 144 const char *mechanism, rpc_gss_service_t service, const char *qop, 146 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, 155 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
|
/freebsd-10.0-release/contrib/openpam/bin/pamtest/ |
H A D | pamtest.c | 99 pt_start(const char *service, const char *user) argument 104 pt_verbose("pam_start(%s, %s)", service, user); 105 if ((pame = pam_start(service, user, &pamc, &pamh)) != PAM_SUCCESS) 106 pt_error(pame, "pam_start(%s)", service); 273 fprintf(stderr, "usage: pamtest %s service command ...\n", 321 const char *service = NULL; local 384 service = *argv; 389 if (service == NULL) 390 service = "pamtest"; 404 if ((pame = pt_start(service, use [all...] |
/freebsd-10.0-release/sys/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon10937 106 * Structure used to enforce a particular QOP and service. 153 rpc_gss_service_t service); 157 const char *mechanism, rpc_gss_service_t service, 161 rpc_gss_service_t service, const char *qop); 215 gss_OID mech_oid, rpc_gss_service_t service) 221 mech_oid, service); 236 rpc_gss_service_t service, cons 214 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal, gss_OID mech_oid, rpc_gss_service_t service) argument 234 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 249 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument [all...] |
/freebsd-10.0-release/usr.sbin/bluetooth/sdpcontrol/ |
H A D | search.c | 67 * which each data element is a UUID representing the service classes that 68 * a given service record conforms to. The UUIDs are listed in order from 70 * must contain at least one service class UUID. 150 * highest layer protocol used to gain access to the service. If it is possible 152 * service, the ProtocolDescriptorList takes the form of a data element 376 * information about a Bluetooth profile to which the service represented by 377 * this service record conforms. Each profile descriptor is a data element 497 uint16_t service; local 508 service = SDP_SERVICE_CLASS_COMMON_ISDN_ACCESS; 512 service [all...] |