Searched refs:service (Results 1 - 25 of 129) sorted by relevance

123456

/freebsd-10.0-release/usr.sbin/service/
H A DMakefile3 SCRIPTS=service.sh
4 MAN= service.8
/freebsd-10.0-release/etc/pam.d/
H A Dconvert.pl44 my $service;
59 foreach $service (keys(%SERVICES)) {
61 if (sysopen(FILE, $service, O_RDONLY)) {
69 sysopen(FILE, $service, O_RDWR|O_CREAT|O_TRUNC)
70 or die("$service: $!\n");
74 print(FILE "# PAM configuration for the \"$service\" service\n");
77 next unless exists($SERVICES{$service}->{$type});
80 print(FILE join("\n", @{$SERVICES{$service}->{$type}}, ""));
83 warn("$service\
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dget_port.c38 const char *service,
44 if ((sp = roken_getservbyname (service, proto)) == NULL) {
46 krb5_warnx(context, "%s/%s unknown service, using default port %d",
47 service, proto, default_port);
37 krb5_getportbyname(krb5_context context, const char *service, const char *proto, int default_port) argument
H A Dverify_user.c42 const char *service,
50 ret = krb5_sname_to_principal (context, NULL, service, KRB5_NT_SRV_HST,
86 * If `secure', also verify against local service key for `service'.
96 opt->service = "host";
137 krb5_verify_opt_set_service(krb5_verify_opt *opt, const char *service) argument
139 opt->service = service;
180 OPT(service, "host"), cred);
224 const char *service)
37 verify_common(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds cred) argument
219 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
243 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
[all...]
/freebsd-10.0-release/kerberos5/libexec/
H A DMakefile3 SUBDIR= digest-service ipropd-master ipropd-slave hprop hpropd kadmind kdc \
/freebsd-10.0-release/crypto/heimdal/appl/test/
H A Dtest_locl.h81 extern char *service;
87 int client_doit (const char *hostname, int port, const char *service,
88 int (*func)(int, const char *hostname, const char *service));
H A Dtcp_server.c40 proto (int sock, const char *service) argument
69 service,
156 doit (int port, const char *service) argument
160 return proto (STDIN_FILENO, service);
167 return doit (port, service);
H A Dnt_gss_server.c53 char *service = SERVICE; variable
58 { "service", 's', arg_string, &service, "service to use", "service" },
68 proto (int sock, const char *service) argument
156 doit (int port, const char *service) argument
185 return proto (sock2, service);
243 return doit (port, service);
H A Dtcp_client.c40 proto (int sock, const char *hostname, const char *service) argument
61 service,
131 return client_doit (argv[argc], port, service, proto);
H A Dnt_gss_client.c46 proto (int sock, const char *hostname, const char *service) argument
61 "%s@%s", service, hostname);
72 "Error importing name `%s@%s':\n", service, hostname);
166 return client_doit (argv[argc], port, service, proto);
/freebsd-10.0-release/usr.sbin/unbound/local-setup/
H A Dlocal-unbound-setup.sh42 service=""
64 : ${service:=local_unbound}
162 echo "unbound_service=\"${service}\""
164 echo "unbound_restart=\"service ${service} reload\""
235 echo " -s service name of unbound service"
274 service="$OPTARG"
332 elif ! service "${service}" enable
[all...]
/freebsd-10.0-release/contrib/openpam/lib/libpam/
H A Dpam_start.c65 pam_start(const char *service, argument
77 if ((r = pam_set_item(ph, PAM_SERVICE, service)) != PAM_SUCCESS)
87 if ((r = openpam_configure(ph, service)) != PAM_SUCCESS)
90 openpam_log(PAM_LOG_DEBUG, "pam_start(\"%s\") succeeded", service);
109 * The =service argument specifies the name of the policy to apply, and is
H A Dopenpam_configure.c59 * Validate a service name.
150 * service and facility, or -1 if a system error occurred or a syntax
155 const char *service,
183 /* check service name if necessary */
185 strcmp(wordv[i++], service) != 0) {
210 "%s(%d): missing or invalid service name",
342 const char *service,
372 ret = openpam_parse_chain(pamh, service, facility,
378 * Locates the policy file for a given service and reads the given chains
382 * service an
154 openpam_parse_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility, FILE *f, const char *filename, openpam_style_t style) argument
341 openpam_load_file(pam_handle_t *pamh, const char *service, pam_facility_t facility, const char *filename, openpam_style_t style) argument
386 openpam_load_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility) argument
448 openpam_configure(pam_handle_t *pamh, const char *service) argument
[all...]
H A Dopenpam_impl.h87 const char *service; member in struct:pam_policy
108 char *service; member in struct:pam_handle
/freebsd-10.0-release/contrib/openpam/bin/openpam_dump_policy/
H A Dopenpam_dump_policy.c48 openpam_chain_name(const char *service, pam_facility_t fclt) argument
53 if (asprintf(&name, "pam_%s_%s", service, facility) == -1)
121 openpam_dump_policy(const char *service) argument
129 if ((ret = openpam_configure(pamh, service)) != PAM_SUCCESS)
133 if ((name = openpam_chain_name(service, fclt)) == NULL)
141 printf("static pam_policy_t pam_%s_policy = {\n", service);
142 printf("\t.service = \"%s\",\n", service);
150 if ((name = openpam_chain_name(service, fclt)) == NULL)
/freebsd-10.0-release/sbin/resolvconf/
H A DMakefile20 # our service(8) is in /usr/sbin, we can use it, here.
23 RESTARTCMD= /usr/sbin/service ${CMD1} \&\& /usr/sbin/service ${CMD2}
/freebsd-10.0-release/crypto/heimdal/kdc/
H A Dlog.c40 const char *service,
45 s = krb5_config_get_strings(context, NULL, service, "logging", NULL);
47 s = krb5_config_get_strings(context, NULL, "logging", service, NULL);
39 kdc_openlog(krb5_context context, const char *service, krb5_kdc_configuration *config) argument
/freebsd-10.0-release/crypto/openssh/
H A Dauth2.c192 char *service = packet_get_cstring(&len); local
198 if (strcmp(service, "ssh-userauth") == 0) {
205 /* XXX all other service requests are denied */
209 packet_put_cstring(service);
213 debug("bad service request %s", service);
214 packet_disconnect("bad service request %s", service);
216 free(service);
225 char *user, *service, *metho local
[all...]
/freebsd-10.0-release/sys/dev/hyperv/utilities/
H A Dhv_util.c88 * Receive buffer pointers. There is one buffer per utility service. The
381 struct hv_vmbus_service* service; local
386 service = device_get_softc(dev);
387 receive_buffer_offset = service - &service_table[0];
388 device_printf(dev, "Hyper-V Service attaching: %s\n", service->name);
392 if (service->init != NULL) {
393 ret = service->init(service);
402 service->callback, hv_dev->channel);
421 struct hv_vmbus_service* service; local
[all...]
/freebsd-10.0-release/contrib/tcp_wrappers/
H A Dinetcf.c45 * Structure with everything we know about a service.
64 char *service; local
108 service = strtok(buf, whitespace); /* service */
109 if (service == 0 || *service == '#')
111 if (STR_NE(service, "stream") && STR_NE(service, "dgram"))
123 if (path[0] == '?') /* IRIX optional service */
198 tcpd_warn("%s may be an insecure service", tcpd_proc_nam
[all...]
/freebsd-10.0-release/contrib/serf/auth/
H A Dauth_spnego.h66 * SERVICE is name of Kerberos service name. Usually 'HTTP'. HOSTNAME is
92 const char *service,
/freebsd-10.0-release/include/rpc/
H A Drpcsec_gss.h39 * Define the types of security service required for rpc_gss_seccreate().
91 rpc_gss_service_t service; /* service type */ member in struct:__anon5317
106 * Structure used to enforce a particular QOP and service.
144 const char *mechanism, rpc_gss_service_t service, const char *qop,
146 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service,
155 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
/freebsd-10.0-release/contrib/openpam/bin/pamtest/
H A Dpamtest.c99 pt_start(const char *service, const char *user) argument
104 pt_verbose("pam_start(%s, %s)", service, user);
105 if ((pame = pam_start(service, user, &pamc, &pamh)) != PAM_SUCCESS)
106 pt_error(pame, "pam_start(%s)", service);
273 fprintf(stderr, "usage: pamtest %s service command ...\n",
321 const char *service = NULL; local
384 service = *argv;
389 if (service == NULL)
390 service = "pamtest";
404 if ((pame = pt_start(service, use
[all...]
/freebsd-10.0-release/sys/rpc/
H A Drpcsec_gss.h39 * Define the types of security service required for rpc_gss_seccreate().
91 rpc_gss_service_t service; /* service type */ member in struct:__anon10937
106 * Structure used to enforce a particular QOP and service.
153 rpc_gss_service_t service);
157 const char *mechanism, rpc_gss_service_t service,
161 rpc_gss_service_t service, const char *qop);
215 gss_OID mech_oid, rpc_gss_service_t service)
221 mech_oid, service);
236 rpc_gss_service_t service, cons
214 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal, gss_OID mech_oid, rpc_gss_service_t service) argument
234 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
249 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument
[all...]
/freebsd-10.0-release/usr.sbin/bluetooth/sdpcontrol/
H A Dsearch.c67 * which each data element is a UUID representing the service classes that
68 * a given service record conforms to. The UUIDs are listed in order from
70 * must contain at least one service class UUID.
150 * highest layer protocol used to gain access to the service. If it is possible
152 * service, the ProtocolDescriptorList takes the form of a data element
376 * information about a Bluetooth profile to which the service represented by
377 * this service record conforms. Each profile descriptor is a data element
497 uint16_t service; local
508 service = SDP_SERVICE_CLASS_COMMON_ISDN_ACCESS;
512 service
[all...]

Completed in 245 milliseconds

123456