/freebsd-9.3-release/usr.sbin/service/ |
H A D | Makefile | 3 SCRIPTS=service.sh 4 MAN= service.8
|
/freebsd-9.3-release/etc/pam.d/ |
H A D | convert.pl | 44 my $service; 59 foreach $service (keys(%SERVICES)) { 61 if (sysopen(FILE, $service, O_RDONLY)) { 69 sysopen(FILE, $service, O_RDWR|O_CREAT|O_TRUNC) 70 or die("$service: $!\n"); 74 print(FILE "# PAM configuration for the \"$service\" service\n"); 77 next unless exists($SERVICES{$service}->{$type}); 80 print(FILE join("\n", @{$SERVICES{$service}->{$type}}, "")); 83 warn("$service\ [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | get_port.c | 40 const char *service, 46 if ((sp = roken_getservbyname (service, proto)) == NULL) { 48 krb5_warnx(context, "%s/%s unknown service, using default port %d", 49 service, proto, default_port); 39 krb5_getportbyname(krb5_context context, const char *service, const char *proto, int default_port) argument
|
H A D | verify_user.c | 44 const char *service, 52 ret = krb5_sname_to_principal (context, NULL, service, KRB5_NT_SRV_HST, 88 * If `secure', also verify against local service key for `service'. 98 opt->service = "host"; 138 krb5_verify_opt_set_service(krb5_verify_opt *opt, const char *service) argument 140 opt->service = service; 181 OPT(service, "host"), cred); 229 const char *service) 39 verify_common(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds cred) argument 224 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 248 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
/freebsd-9.3-release/contrib/ntp/include/ |
H A D | intreswork.h | 19 const char *service, 25 const char *service, void *context);
|
/freebsd-9.3-release/crypto/heimdal/appl/test/ |
H A D | test_locl.h | 81 extern char *service; 87 int client_doit (const char *hostname, int port, const char *service, 88 int (*func)(int, const char *hostname, const char *service));
|
H A D | tcp_server.c | 40 proto (int sock, const char *service) argument 69 service, 156 doit (int port, const char *service) argument 160 return proto (STDIN_FILENO, service); 167 return doit (port, service);
|
H A D | tcp_client.c | 40 proto (int sock, const char *hostname, const char *service) argument 61 service, 131 return client_doit (argv[argc], port, service, proto);
|
H A D | nt_gss_client.c | 46 proto (int sock, const char *hostname, const char *service) argument 61 "%s@%s", service, hostname); 72 "Error importing name `%s@%s':\n", service, hostname); 166 return client_doit (argv[argc], port, service, proto);
|
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/ |
H A D | naptr_35.h | 33 char *service; member in struct:dns_rdata_naptr
|
/freebsd-9.3-release/contrib/openpam/lib/libpam/ |
H A D | pam_start.c | 65 pam_start(const char *service, argument 77 if ((r = pam_set_item(ph, PAM_SERVICE, service)) != PAM_SUCCESS) 87 if ((r = openpam_configure(ph, service)) != PAM_SUCCESS) 90 openpam_log(PAM_LOG_DEBUG, "pam_start(\"%s\") succeeded", service); 109 * The =service argument specifies the name of the policy to apply, and is
|
H A D | openpam_configure.c | 59 * Validate a service name. 150 * service and facility, or -1 if a system error occurred or a syntax 155 const char *service, 183 /* check service name if necessary */ 185 strcmp(wordv[i++], service) != 0) { 210 "%s(%d): missing or invalid service name", 342 const char *service, 372 ret = openpam_parse_chain(pamh, service, facility, 378 * Locates the policy file for a given service and reads the given chains 382 * service an 154 openpam_parse_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility, FILE *f, const char *filename, openpam_style_t style) argument 341 openpam_load_file(pam_handle_t *pamh, const char *service, pam_facility_t facility, const char *filename, openpam_style_t style) argument 386 openpam_load_chain(pam_handle_t *pamh, const char *service, pam_facility_t facility) argument 448 openpam_configure(pam_handle_t *pamh, const char *service) argument [all...] |
H A D | openpam_impl.h | 87 const char *service; member in struct:pam_policy 108 char *service; member in struct:pam_handle
|
/freebsd-9.3-release/contrib/openpam/bin/openpam_dump_policy/ |
H A D | openpam_dump_policy.c | 48 openpam_chain_name(const char *service, pam_facility_t fclt) argument 53 if (asprintf(&name, "pam_%s_%s", service, facility) == -1) 121 openpam_dump_policy(const char *service) argument 129 if ((ret = openpam_configure(pamh, service)) != PAM_SUCCESS) 133 if ((name = openpam_chain_name(service, fclt)) == NULL) 141 printf("static pam_policy_t pam_%s_policy = {\n", service); 142 printf("\t.service = \"%s\",\n", service); 150 if ((name = openpam_chain_name(service, fclt)) == NULL)
|
/freebsd-9.3-release/sbin/resolvconf/ |
H A D | Makefile | 20 # our service(8) is in /usr/sbin, we can use it, here. 23 RESTARTCMD= /usr/sbin/service ${CMD1} \&\& /usr/sbin/service ${CMD2}
|
/freebsd-9.3-release/crypto/heimdal/tests/gss/ |
H A D | check-spnego.in | 128 --name-type=hostbased-service host@host.test.h5l.se || \ 136 --name-type=hostbased-service \ 142 --name-type=hostbased-service host@host.test.h5l.se 2> /dev/null && \ 146 --name-type=hostbased-service host@host.test.h5l.se 2> /dev/null && \ 164 --name-type=hostbased-service \ 174 --name-type=hostbased-service \ 184 --name-type=hostbased-service \ 194 --name-type=hostbased-service \
|
H A D | check-context.in | 110 ${context} --name-type=hostbased-service host@lucid.test.h5l.se || \ 138 --name-type=hostbased-service host@lucid.test.h5l.se || \ 144 --name-type=hostbased-service host@lucid.test.h5l.se || \ 150 --name-type=hostbased-service host@lucid.test.h5l.se || \ 156 --name-type=hostbased-service host@lucid.test.h5l.se || \ 169 --name-type=hostbased-service host@lucid.test.h5l.se || \ 176 # --name-type=hostbased-service \
|
/freebsd-9.3-release/crypto/heimdal/lib/45/ |
H A D | mk_req.c | 68 const char *service, const char *instance, const char *realm, 73 char *service, char *instance, char *realm, 86 code = krb_get_cred(service, instance, realm, &cr); 88 code = get_ad_tkt((char *)service, 91 code = krb_get_cred(service, instance, realm, &cr); 67 krb_mk_req(KTEXT authent, const char *service, const char *instance, const char *realm, int32_t checksum) argument
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | auth2.c | 187 char *service = packet_get_cstring(&len); local 193 if (strcmp(service, "ssh-userauth") == 0) { 200 /* XXX all other service requests are denied */ 204 packet_put_cstring(service); 208 debug("bad service request %s", service); 209 packet_disconnect("bad service request %s", service); 211 free(service); 220 char *user, *service, *metho local [all...] |
/freebsd-9.3-release/contrib/tcp_wrappers/ |
H A D | inetcf.c | 45 * Structure with everything we know about a service. 64 char *service; local 108 service = strtok(buf, whitespace); /* service */ 109 if (service == 0 || *service == '#') 111 if (STR_NE(service, "stream") && STR_NE(service, "dgram")) 123 if (path[0] == '?') /* IRIX optional service */ 198 tcpd_warn("%s may be an insecure service", tcpd_proc_nam [all...] |
/freebsd-9.3-release/include/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon4989 106 * Structure used to enforce a particular QOP and service. 144 const char *mechanism, rpc_gss_service_t service, const char *qop, 146 bool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, 155 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
|
/freebsd-9.3-release/contrib/openpam/bin/pamtest/ |
H A D | pamtest.c | 99 pt_start(const char *service, const char *user) argument 104 pt_verbose("pam_start(%s, %s)", service, user); 105 if ((pame = pam_start(service, user, &pamc, &pamh)) != PAM_SUCCESS) 106 pt_error(pame, "pam_start(%s)", service); 273 fprintf(stderr, "usage: pamtest %s service command ...\n", 321 const char *service = NULL; local 384 service = *argv; 389 if (service == NULL) 390 service = "pamtest"; 404 if ((pame = pt_start(service, use [all...] |
/freebsd-9.3-release/usr.sbin/bluetooth/sdpcontrol/ |
H A D | search.c | 67 * which each data element is a UUID representing the service classes that 68 * a given service record conforms to. The UUIDs are listed in order from 70 * must contain at least one service class UUID. 150 * highest layer protocol used to gain access to the service. If it is possible 152 * service, the ProtocolDescriptorList takes the form of a data element 376 * information about a Bluetooth profile to which the service represented by 377 * this service record conforms. Each profile descriptor is a data element 497 uint16_t service; local 508 service = SDP_SERVICE_CLASS_COMMON_ISDN_ACCESS; 512 service [all...] |
/freebsd-9.3-release/usr.sbin/faithd/ |
H A D | tcp.c | 152 send_data(int s_rcv, int s_snd, const char *service __unused, int direction) 197 relay(int s_rcv, int s_snd, const char *service, int direction) argument 278 exit_success("terminating %s relay", service); 291 send_data(s_rcv, s_snd, service, direction); 296 tcp_relay(int s_src, int s_dst, const char *service) argument 298 syslog(LOG_INFO, "starting %s relay", service); 314 relay(s_src, s_dst, service, 1); 321 relay(s_dst, s_src, service, 0);
|
/freebsd-9.3-release/sys/rpc/ |
H A D | rpcsec_gss.h | 39 * Define the types of security service required for rpc_gss_seccreate(). 91 rpc_gss_service_t service; /* service type */ member in struct:__anon10366 106 * Structure used to enforce a particular QOP and service. 153 rpc_gss_service_t service); 157 rpc_gss_service_t service, const char *qop, 161 rpc_gss_service_t service, const char *qop); 213 gss_OID mech_oid, rpc_gss_service_t service) 219 mech_oid, service); 233 const char *mechanism, rpc_gss_service_t service, cons 212 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal, gss_OID mech_oid, rpc_gss_service_t service) argument 232 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 246 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument [all...] |