/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | inform.c | 72 ipaddr_t server; local 77 * to the server's IP address, which will be the broadcast 97 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server); 98 if (!send_pkt(dsmp, dpkt, server, stop_informing)) {
|
H A D | renew.c | 202 * server address. We know the renew timer has already been cancelled 434 * a server ID, as we still think our server might be 469 ipaddr_t server; local 499 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server); 500 return (send_pkt(dsmp, dpkt, server, stop_extending));
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/rdist/ |
H A D | server.c | 29 * If we want to write *to* the client rdist program, *from* the server 30 * side (server-side child `rdist -Server' process exec'ed off of in.rshd), 81 server() function 103 error("server: expected control record\n"); 147 error("server: too many 'E's\n"); 201 error("server: options not delimited\n"); 220 error("server: unknown command '%s'\n", cp); 1310 * Check the current directory (initialized by the 'T' command to server())
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 229 "host", KRB5_NT_SRV_HST, &creds.server))) { 250 krb5_princ_set_realm(telnet_context, creds.server, &rdata); 273 if ((retval = krb5_get_tgs_ktypes(telnet_context, creds.server, 390 "telnet: Sent Kerberos V5 credentials to server\r\n")); 623 krb5_principal server = 0; local 646 "host", KRB5_NT_SRV_HST, &server); 650 "Kerberos V5: could not make server " 666 server, ccache, forward_flags & OPTS_FORWARDABLE_CREDS, 684 "Forwarded local Kerberos V5 credentials to server\r\n")); 688 if (server) [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNS.c | 715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100. 716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another 717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox. 720 // the cached copy at our local caching server will already have expired, so the server will be forced 721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds. 1046 // The records might already be registered with the server and hence could have NAT state. 1709 // from the server. In that case, if the records have been part of a group update, clear the 2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration 3893 // Reset unansweredQueries so that we don't penalize this server late 10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 27 * remote login server: 114 krb5_principal server, 400 krb5_principal server; local 403 KRB5_NT_SRV_HST, &server); 408 krb5_princ_component(krb_context, server, 0), 410 krb5_free_principal(krb_context, server); 650 "server lacks privilege"); 665 fatal(f, "This server only supports Kerberos V5"); 881 krb5_principal server, /* IN */ 925 server, flag 878 krb5_compat_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fdp, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_int32 *auth_sys, krb5_data *version) argument [all...] |
H A D | in.rshd.c | 38 * remote shell server: 909 error("Fork (to start shell) failed on server. " 1452 krb5_principal server; local 1455 KRB5_NT_SRV_HST, &server); 1460 krb5_princ_component(bsd_context, server, 0), 1462 krb5_free_principal(bsd_context, server);
|
H A D | in.telnetd.c | 43 * Telnet server. 534 krb5_principal server; local 570 &server); 576 server, 0), 580 server); 615 ticket->server, 0)->length < MAXPRINCLEN) { 619 ticket->server, 0)->data, 621 ticket->server, 0)->length); 623 ticket->server, 0)->length] = '\0'; 774 0, 0, KRB5_NT_SRV_HST, &server); [all...] |
/illumos-gate/usr/src/cmd/dtrace/test/tst/common/mib/ |
H A D | tst.tcp.ksh | 79 server() function 143 server &
|
/illumos-gate/usr/src/cmd/fm/fmadm/common/ |
H A D | faulty.c | 194 char *server; member in struct:host_id 271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument 279 if (server == NULL) 280 server = "-"; 285 hostp->hostid.server && 286 strcmp(hostp->hostid.server, server) == 0 && 303 hostp->hostid.server = strdup(server); 317 char *platform = NULL, *chassis = NULL, *server local [all...] |
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/ |
H A D | ip.c | 64 char *ipc_name; /* The name of the server or interface */ 122 static char *ip_port; /* port to connect to (or bind to if server) */ 720 ip_create_cinfo(char *server, boolean_t accept) argument 732 if (server != NULL) { 733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP); 744 if (server != NULL) { 745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port); 756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr); 774 ip_setup_addr(char *server, boolean_t accept) argument 777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep 798 ip_setup_addrs(char *server, boolean_t accept) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/clear_locks/ |
H A D | clear_locks.c | 142 gettext("Clearing locks held for NFS client %s on server %s\n"), 147 gettext("Clearing locks held for NFS client %s on server %s\n"), 158 * Request that host 'server' free all locks held by 162 share_zap(char *client, char *server) argument 169 rslt = rpc_call(server, NLM_PROG, NLM_VERSX, NLM_FREE_ALL, 177 client, server);
|
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/ |
H A D | srvenum.c | 44 * Its purpose is to test the ability to connect to a server, 84 /* server name, length 14 vv ... */ 87 /* UNC server here, i.e.: "\\192.168.1.6" */ 98 static char *server; variable 105 printf("usage: srvenum [-d domain][-u user][-p passwd] server\n"); 140 server = argv[optind]; 159 * Set server, share, domain, user 162 smb_ctx_setfullserver(ctx, server); 185 * Resolve the server address, 200 server, erro [all...] |
H A D | srvinfo.c | 44 * Its purpose is to test the ability to connect to a server, 50 * requesting a server info via RPC over /pipe/srvsvc and 73 /* This is a srvsvc "get server info" call, in two parts */ 84 /* server name, length 14 vv ... */ 87 /* UNC server here, i.e.: "\\192.168.1.6" */ 91 static char *server; variable 98 printf("usage: srvinfo [-d domain][-u user][-p passwd] server\n"); 133 server = argv[optind]; 152 * Set server, share, domain, user 155 smb_ctx_setfullserver(ctx, server); [all...] |
H A D | tconn.c | 47 static char *server; variable 52 printf("usage: tconn [-d domain][-u user][-p passwd] server\n"); 93 server = argv[optind]; 112 * Set server, share, domain, user 115 smb_ctx_setfullserver(ctx, server); 140 * Resolve the server address,
|
/illumos-gate/usr/src/cmd/gss/gssd/ |
H A D | gssd_clnt_stubs.c | 40 #define clnt_pcreateerror(srv) printf("Cannot connect to server on %s\n", srv) 64 char *server = "localhost"; variable 99 clnt_pcreateerror(server); 308 clnt_pcreateerror(server); 320 clnt_pcreateerror(server); 483 clnt_pcreateerror(server); 597 clnt_pcreateerror(server); 862 clnt_pcreateerror(server); 1103 clnt_pcreateerror(server); 1158 clnt_pcreateerror(server); [all...] |
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | hald_dbus.c | 4295 local_server_handle_connection (DBusServer *server, argument 4337 /* setup a server listening on a socket so we can do point to point 4342 HAL_ERROR (("Cannot create D-BUS server")); 4346 HAL_INFO (("local server is listening at %s", server_addr));
|
H A D | hald_runner.c | 141 handle_connection(DBusServer *server, argument 160 /* dbus_server_unref(server); */ 174 DBusServer *server = NULL; local 186 server = dbus_server_listen(DBUS_SERVER_ADDRESS, &err); 187 if (server == NULL) { 188 HAL_ERROR (("Cannot create D-BUS server for the runner")); 192 dbus_server_setup_with_g_main(server, NULL); 193 dbus_server_set_new_connection_function(server, handle_connection, 198 server_addr = dbus_server_get_address (server); 230 if (server ! [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksmb.c | 49 gettext("Usage: %s [ -d fqdn ] [ -s server ]\n"), whoami); 63 char c, fqdn[MAXHOSTNAMELEN], server[MAXHOSTNAMELEN]; local 83 (void) strncpy(server, optarg, sizeof (server)); 126 ret = smb_setdomainprops(fqdn, server, newpw);
|
/illumos-gate/usr/src/cmd/krb5/kadmin/server/ |
H A D | server_stubs.c | 148 * Purpose: Check a server handle and return a com_err code if it is 153 * handle The server handle. 165 * Purpose: Constructs a server handle suitable for passing into the 166 * server library API functions, by folding the client's API version 167 * and calling principal into the server handle returned by 177 * Returns a pointer to allocated storage containing the server 234 * Purpose: Create printable representations of the client and server 244 * Unparses the client and server names into client_name and 450 char *server, 460 slen = strlen(server); 446 log_unauth( char *op, char *target, char *client, char *server, char *addr) argument 473 log_done( char *op, char *target, const char *errmsg, char *client, char *server, char *addr) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 63 krb5_db_entry client, server; local 121 if (!request->server) { 126 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) { 154 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server, 174 if ((errcode = validate_as_request(request, client, server, 185 if ((useenctype = select_session_keytype(kdc_context, &server, 201 ticket_reply.server = request->server; 241 tmp_server_times = (long long) enc_tkt_reply.times.starttime + server [all...] |
H A D | do_tgs_req.c | 70 krb5_db_entry server; local 112 if ((retval = setup_server_realm(request->server))) 121 if ((errcode = krb5_unparse_name(kdc_context, request->server, &sname))) { 159 /* XXX make sure server here has the proper realm...taken from AP_REQ 163 if ((errcode = krb5_db_get_principal(kdc_context, request->server, &server, 179 if (firstpass && krb5_is_tgs_principal(request->server) == TRUE) { 180 if (krb5_princ_size(kdc_context, request->server) == 2) { 182 krb5_princ_component(kdc_context, request->server, 1); 188 krb5_db_free_principal(kdc_context, &server, nprinc 810 find_alternate_tgs(krb5_kdc_req *request, krb5_db_entry *server, krb5_boolean *more, int *nprincs, const krb5_fulladdr *from, char *cname) argument [all...] |
H A D | kdc_preauth.c | 115 krb5_db_entry *client, krb5_db_entry *server, 121 krb5_db_entry *client, krb5_db_entry *server, 184 krb5_db_entry *client, krb5_db_entry *server, 771 krb5_db_entry *server, 782 if (isflagset(server->attributes, KRB5_KDB_PWCHANGE_SERVICE) && 808 krb5_db_entry *server, krb5_data *e_data) 839 retval = (ap->get_edata)(kdc_context, request, client, server, 1397 krb5_db_entry *client, krb5_db_entry *server, 1484 krb5_db_entry *client, krb5_db_entry *server, 1496 return etype_info_helper(context, request, client, server, pa_dat 770 missing_required_preauth(krb5_db_entry *client, krb5_db_entry *server, krb5_enc_tkt_part *enc_tkt_reply) argument 807 get_preauth_hint_list(krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, krb5_data *e_data) argument 1396 etype_info_helper(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, krb5_pa_data *pa_data, int etype_info2) argument 1483 get_etype_info(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument 1500 get_etype_info2(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument 1856 get_sam_edata(krb5_context context, krb5_kdc_req *request, krb5_db_entry *client, krb5_db_entry *server, preauth_get_entry_data_proc sam_get_entry_data, void *pa_system_context, krb5_pa_data *pa_data) argument [all...] |
H A D | kdc_util.c | 232 /* If the "server" principal in the ticket is not something 242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != 244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, 278 apreq->ticket->server, 298 apreq, apreq->ticket->server, 389 krb5_db_entry server; local 396 if ((retval = krb5_db_get_principal(kdc_context, ticket->server, 397 &server, &nprincs, 402 krb5_db_free_principal(kdc_context, &server, nprincs); 407 krb5_db_free_principal(kdc_context, &server, nprinc 567 add_to_transited(krb5_data *tgt_trans, krb5_data *new_trans, krb5_principal tgs, krb5_principal client, krb5_principal server) argument 849 validate_as_request(register krb5_kdc_req *request, krb5_db_entry client, krb5_db_entry server, krb5_timestamp kdc_time, const char **status) argument 1123 validate_tgs_request(register krb5_kdc_req *request, krb5_db_entry server, krb5_ticket *ticket, krb5_timestamp kdc_time, const char **status) argument 1431 select_session_keytype(krb5_context context, krb5_db_entry *server, int nktypes, krb5_enctype *ktype) argument [all...] |
H A D | policy.c | 37 krb5_db_entry server, krb5_timestamp kdc_time, 55 against_local_policy_tgs(register krb5_kdc_req *request, krb5_db_entry server, argument 36 against_local_policy_as(register krb5_kdc_req *request, krb5_db_entry client, krb5_db_entry server, krb5_timestamp kdc_time, const char **status) argument
|