Searched defs:server (Results 1 - 25 of 153) sorted by path

1234567

/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/
H A Dinform.c72 ipaddr_t server; local
77 * to the server's IP address, which will be the broadcast
97 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server);
98 if (!send_pkt(dsmp, dpkt, server, stop_informing)) {
H A Drenew.c202 * server address. We know the renew timer has already been cancelled
434 * a server ID, as we still think our server might be
469 ipaddr_t server; local
499 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server);
500 return (send_pkt(dsmp, dpkt, server, stop_extending));
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/rdist/
H A Dserver.c29 * If we want to write *to* the client rdist program, *from* the server
30 * side (server-side child `rdist -Server' process exec'ed off of in.rshd),
81 server() function
103 error("server: expected control record\n");
147 error("server: too many 'E's\n");
201 error("server: options not delimited\n");
220 error("server: unknown command '%s'\n", cp);
1310 * Check the current directory (initialized by the 'T' command to server())
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dkerberos5.c229 "host", KRB5_NT_SRV_HST, &creds.server))) {
250 krb5_princ_set_realm(telnet_context, creds.server, &rdata);
273 if ((retval = krb5_get_tgs_ktypes(telnet_context, creds.server,
390 "telnet: Sent Kerberos V5 credentials to server\r\n"));
623 krb5_principal server = 0; local
646 "host", KRB5_NT_SRV_HST, &server);
650 "Kerberos V5: could not make server "
666 server, ccache, forward_flags & OPTS_FORWARDABLE_CREDS,
684 "Forwarded local Kerberos V5 credentials to server\r\n"));
688 if (server)
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DmDNS.c715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100.
716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another
717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox.
720 // the cached copy at our local caching server will already have expired, so the server will be forced
721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds.
1046 // The records might already be registered with the server and hence could have NAT state.
1709 // from the server. In that case, if the records have been part of a group update, clear the
2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration
3893 // Reset unansweredQueries so that we don't penalize this server late
10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rlogind.c27 * remote login server:
114 krb5_principal server,
400 krb5_principal server; local
403 KRB5_NT_SRV_HST, &server);
408 krb5_princ_component(krb_context, server, 0),
410 krb5_free_principal(krb_context, server);
650 "server lacks privilege");
665 fatal(f, "This server only supports Kerberos V5");
881 krb5_principal server, /* IN */
925 server, flag
878 krb5_compat_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fdp, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_int32 *auth_sys, krb5_data *version) argument
[all...]
H A Din.rshd.c38 * remote shell server:
909 error("Fork (to start shell) failed on server. "
1452 krb5_principal server; local
1455 KRB5_NT_SRV_HST, &server);
1460 krb5_princ_component(bsd_context, server, 0),
1462 krb5_free_principal(bsd_context, server);
H A Din.telnetd.c43 * Telnet server.
534 krb5_principal server; local
570 &server);
576 server, 0),
580 server);
615 ticket->server, 0)->length < MAXPRINCLEN) {
619 ticket->server, 0)->data,
621 ticket->server, 0)->length);
623 ticket->server, 0)->length] = '\0';
774 0, 0, KRB5_NT_SRV_HST, &server);
[all...]
/illumos-gate/usr/src/cmd/dtrace/test/tst/common/mib/
H A Dtst.tcp.ksh79 server() function
143 server &
/illumos-gate/usr/src/cmd/fm/fmadm/common/
H A Dfaulty.c194 char *server; member in struct:host_id
271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument
279 if (server == NULL)
280 server = "-";
285 hostp->hostid.server &&
286 strcmp(hostp->hostid.server, server) == 0 &&
303 hostp->hostid.server = strdup(server);
317 char *platform = NULL, *chassis = NULL, *server local
[all...]
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/
H A Dip.c64 char *ipc_name; /* The name of the server or interface */
122 static char *ip_port; /* port to connect to (or bind to if server) */
720 ip_create_cinfo(char *server, boolean_t accept) argument
732 if (server != NULL) {
733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP);
744 if (server != NULL) {
745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port);
756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr);
774 ip_setup_addr(char *server, boolean_t accept) argument
777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep
798 ip_setup_addrs(char *server, boolean_t accept) argument
[all...]
/illumos-gate/usr/src/cmd/fs.d/nfs/clear_locks/
H A Dclear_locks.c142 gettext("Clearing locks held for NFS client %s on server %s\n"),
147 gettext("Clearing locks held for NFS client %s on server %s\n"),
158 * Request that host 'server' free all locks held by
162 share_zap(char *client, char *server) argument
169 rslt = rpc_call(server, NLM_PROG, NLM_VERSX, NLM_FREE_ALL,
177 client, server);
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/
H A Dsrvenum.c44 * Its purpose is to test the ability to connect to a server,
84 /* server name, length 14 vv ... */
87 /* UNC server here, i.e.: "\\192.168.1.6" */
98 static char *server; variable
105 printf("usage: srvenum [-d domain][-u user][-p passwd] server\n");
140 server = argv[optind];
159 * Set server, share, domain, user
162 smb_ctx_setfullserver(ctx, server);
185 * Resolve the server address,
200 server, erro
[all...]
H A Dsrvinfo.c44 * Its purpose is to test the ability to connect to a server,
50 * requesting a server info via RPC over /pipe/srvsvc and
73 /* This is a srvsvc "get server info" call, in two parts */
84 /* server name, length 14 vv ... */
87 /* UNC server here, i.e.: "\\192.168.1.6" */
91 static char *server; variable
98 printf("usage: srvinfo [-d domain][-u user][-p passwd] server\n");
133 server = argv[optind];
152 * Set server, share, domain, user
155 smb_ctx_setfullserver(ctx, server);
[all...]
H A Dtconn.c47 static char *server; variable
52 printf("usage: tconn [-d domain][-u user][-p passwd] server\n");
93 server = argv[optind];
112 * Set server, share, domain, user
115 smb_ctx_setfullserver(ctx, server);
140 * Resolve the server address,
/illumos-gate/usr/src/cmd/gss/gssd/
H A Dgssd_clnt_stubs.c40 #define clnt_pcreateerror(srv) printf("Cannot connect to server on %s\n", srv)
64 char *server = "localhost"; variable
99 clnt_pcreateerror(server);
308 clnt_pcreateerror(server);
320 clnt_pcreateerror(server);
483 clnt_pcreateerror(server);
597 clnt_pcreateerror(server);
862 clnt_pcreateerror(server);
1103 clnt_pcreateerror(server);
1158 clnt_pcreateerror(server);
[all...]
/illumos-gate/usr/src/cmd/hal/hald/
H A Dhald_dbus.c4295 local_server_handle_connection (DBusServer *server, argument
4337 /* setup a server listening on a socket so we can do point to point
4342 HAL_ERROR (("Cannot create D-BUS server"));
4346 HAL_INFO (("local server is listening at %s", server_addr));
H A Dhald_runner.c141 handle_connection(DBusServer *server, argument
160 /* dbus_server_unref(server); */
174 DBusServer *server = NULL; local
186 server = dbus_server_listen(DBUS_SERVER_ADDRESS, &err);
187 if (server == NULL) {
188 HAL_ERROR (("Cannot create D-BUS server for the runner"));
192 dbus_server_setup_with_g_main(server, NULL);
193 dbus_server_set_new_connection_function(server, handle_connection,
198 server_addr = dbus_server_get_address (server);
230 if (server !
[all...]
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/
H A Dksmb.c49 gettext("Usage: %s [ -d fqdn ] [ -s server ]\n"), whoami);
63 char c, fqdn[MAXHOSTNAMELEN], server[MAXHOSTNAMELEN]; local
83 (void) strncpy(server, optarg, sizeof (server));
126 ret = smb_setdomainprops(fqdn, server, newpw);
/illumos-gate/usr/src/cmd/krb5/kadmin/server/
H A Dserver_stubs.c148 * Purpose: Check a server handle and return a com_err code if it is
153 * handle The server handle.
165 * Purpose: Constructs a server handle suitable for passing into the
166 * server library API functions, by folding the client's API version
167 * and calling principal into the server handle returned by
177 * Returns a pointer to allocated storage containing the server
234 * Purpose: Create printable representations of the client and server
244 * Unparses the client and server names into client_name and
450 char *server,
460 slen = strlen(server);
446 log_unauth( char *op, char *target, char *client, char *server, char *addr) argument
473 log_done( char *op, char *target, const char *errmsg, char *client, char *server, char *addr) argument
[all...]
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Ddo_as_req.c63 krb5_db_entry client, server; local
121 if (!request->server) {
126 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) {
154 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server,
174 if ((errcode = validate_as_request(request, client, server,
185 if ((useenctype = select_session_keytype(kdc_context, &server,
201 ticket_reply.server = request->server;
241 tmp_server_times = (long long) enc_tkt_reply.times.starttime + server
[all...]
H A Ddo_tgs_req.c70 krb5_db_entry server; local
112 if ((retval = setup_server_realm(request->server)))
121 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) {
159 /* XXX make sure server here has the proper realm...taken from AP_REQ
163 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server,
179 if (firstpass && krb5_is_tgs_principal(request->server) == TRUE) {
180 if (krb5_princ_size(kdc_context, request->server) == 2) {
182 krb5_princ_component(kdc_context, request->server, 1);
188 krb5_db_free_principal(kdc_context, &server, nprinc
810 find_alternate_tgs(krb5_kdc_req *request, krb5_db_entry *server, krb5_boolean *more, int *nprincs, const krb5_fulladdr *from, char *cname) argument
[all...]
H A Dkdc_preauth.c115 krb5_db_entry *client, krb5_db_entry *server,
121 krb5_db_entry *client, krb5_db_entry *server,
184 krb5_db_entry *client, krb5_db_entry *server,
771 krb5_db_entry *server,
782 if (isflagset(server->attributes, KRB5_KDB_PWCHANGE_SERVICE) &&
808 krb5_db_entry *server, krb5_data *e_data)
839 retval = (ap->get_edata)(kdc_context, request, client, server,
1397 krb5_db_entry *client, krb5_db_entry *server,
1484 krb5_db_entry *client, krb5_db_entry *server,
1496 return etype_info_helper(context, request, client, server, pa_dat
770 missing_required_preauth(krb5_db_entry *client, krb5_db_entry *server, krb5_enc_tkt_part *enc_tkt_reply) argument
807 get_preauth_hint_list(krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, krb5_data *e_data) argument
1396 etype_info_helper(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, krb5_pa_data *pa_data, int etype_info2) argument
1483 get_etype_info(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument
1500 get_etype_info2(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument
1856 get_sam_edata(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc sam_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument
[all...]
H A Dkdc_util.c232 /* If the "server" principal in the ticket is not something
242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length !=
244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data,
278 apreq->ticket->server,
298 apreq, apreq->ticket->server,
389 krb5_db_entry server; local
396 if ((retval = krb5_db_get_principal(kdc_context, ticket->server,
397 &server, &nprincs,
402 krb5_db_free_principal(kdc_context, &server, nprincs);
407 krb5_db_free_principal(kdc_context, &server, nprinc
567 add_to_transited(krb5_data *tgt_trans, krb5_data *new_trans, krb5_principal tgs, krb5_principal client, krb5_principal server) argument
849 validate_as_request(register krb5_kdc_req *request, krb5_db_entry client, krb5_db_entry server, krb5_timestamp kdc_time, const char **status) argument
1123 validate_tgs_request(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, krb5_timestamp kdc_time, const char **status) argument
1431 select_session_keytype(krb5_context context, krb5_db_entry *server, int nktypes, krb5_enctype *ktype) argument
[all...]
H A Dpolicy.c37 krb5_db_entry server, krb5_timestamp kdc_time,
55 against_local_policy_tgs(register krb5_kdc_req *request, krb5_db_entry server, argument
36 against_local_policy_as(register krb5_kdc_req *request, krb5_db_entry client, krb5_db_entry server, krb5_timestamp kdc_time, const char **status) argument

Completed in 209 milliseconds

1234567