Searched defs:server (Results 1 - 25 of 153) sorted by last modified time

1234567

/illumos-gate/usr/src/uts/common/io/mac/
H A Dmac_protect.c57 * A DHCP handshake between client and server typically requires at least
62 * 2. OFFER - server responds to client with an IP address and
65 * 4. ACK - server verifies that the requested address matches
100 * If the server never responds with an ACK, there is a timer that is set after
310 uint16_t offset_and_flags, client, server; local
336 server = htons(IPPORT_BOOTPS);
337 if (udph->uh_sport != client && udph->uh_sport != server &&
338 udph->uh_dport != client && udph->uh_dport != server)
809 uint16_t hdrlen, client, server; local
839 server
[all...]
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs4_srv.c120 * RFS4_MINLEN_RDDIR_BUF: minimum length of buffer server will provide to
274 rfs4_servinst_t *rfs4_cur_servinst = NULL; /* current server instance */
512 * to be used as the write verifier returned from the server
514 * whenever the server reboots. Of secondary importance, it
520 * loaded. It is assumed that an NFS server will not be able
524 * time the server reboots and minimize the chances that two
544 /* Used to manage create/destroy of server state */
547 /* Used to manage access to server instance linked list */
628 * Indicates if server instance is within the
721 * Create a new server instanc
9819 char *server, *path, *symbuf; local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DmDNS.c715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100.
716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another
717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox.
720 // the cached copy at our local caching server will already have expired, so the server will be forced
721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds.
1046 // The records might already be registered with the server and hence could have NAT state.
1709 // from the server. In that case, if the records have been part of a group update, clear the
2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration
3893 // Reset unansweredQueries so that we don't penalize this server late
10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument
[all...]
/illumos-gate/usr/src/cmd/fm/fmadm/common/
H A Dfaulty.c194 char *server; member in struct:host_id
271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument
279 if (server == NULL)
280 server = "-";
285 hostp->hostid.server &&
286 strcmp(hostp->hostid.server, server) == 0 &&
303 hostp->hostid.server = strdup(server);
317 char *platform = NULL, *chassis = NULL, *server local
[all...]
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/
H A Dip.c64 char *ipc_name; /* The name of the server or interface */
122 static char *ip_port; /* port to connect to (or bind to if server) */
720 ip_create_cinfo(char *server, boolean_t accept) argument
732 if (server != NULL) {
733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP);
744 if (server != NULL) {
745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port);
756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr);
774 ip_setup_addr(char *server, boolean_t accept) argument
777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep
798 ip_setup_addrs(char *server, boolean_t accept) argument
[all...]
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/
H A Dhc.c253 char *prod, *psn, *csn, *server; local
291 if (nvlist_lookup_string(auth, FM_FMRI_AUTH_SERVER, &server)
294 FM_FMRI_AUTH_SERVER, TOPO_PROP_IMMUTABLE, server,
/illumos-gate/usr/src/uts/common/fs/doorfs/
H A Ddoor_sys.c508 door_server_t *st; /* server thread door_data */
512 /* destructor for data returned by a kernel server */
593 * Check for in-kernel door server.
610 * Call kernel door server. Arguments are passed and
614 * structure pointers. It's the server function's
619 * files. When a reference is passed to a kernel server,
620 * it is the server's responsibility to release the reference
621 * (by calling closef). When the server includes a
623 * the call (the server must duplicate the reference if
664 * Get a server threa
2238 struct proc *server = d->door_target; local
2427 door_args(kthread_t *server, int is_private) argument
[all...]
/illumos-gate/usr/src/uts/common/smbsrv/
H A Dnetrauth.h124 char server[MAXHOSTNAMELEN]; /* Current DC, FQDN */ member in struct:netr_info
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dget_in_tkt.c46 Attempts to get an initial ticket for creds->client to use server
47 creds->server, (realm is taken from creds->client), with options
335 || !krb5_principal_compare(context, as_reply->enc_part2->server, request->server)
336 || !krb5_principal_compare(context, as_reply->ticket->server, request->server)
397 krb5_principal server; local
400 server = NULL;
406 if (!creds->server)
407 if ((retval = krb5_copy_principal(context, as_reply->enc_part2->server,
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Ddfs.c550 dfs_link_add(const char *path, const char *server, const char *share, argument
600 if (dfs_target_find(info.i_targets, ntargets, server, share) != -1) {
613 dfs_target_init(&info.i_targets[ntargets], server, share,
627 * 'server' and 'share' parameters specify a target, so if they are NULL
632 dfs_link_remove(const char *path, const char *server, const char *share) argument
644 if (server == NULL && share == NULL) {
659 idx = dfs_target_find(info.i_targets, info.i_ntargets, server, share);
855 * This is the function that is called by smbd door server to
1494 * server:share:state:class:rank
1541 * :server
1614 dfs_target_find(dfs_target_t *targets, uint32_t ntargets, const char *server, const char *share) argument
[all...]
H A Dlsalib.c133 * Obtains the primary domain SID and name from the specified server
141 lsa_query_primary_domain_info(char *server, char *domain, argument
150 status = lsar_open(server, domain, user, &domain_handle);
162 * Obtains the account domain SID and name from the current server
170 lsa_query_account_domain_info(char *server, char *domain, argument
179 status = lsar_open(server, domain, user, &domain_handle);
193 * Obtains the DNS domain info from the specified server
201 lsa_query_dns_domain_info(char *server, char *domain, smb_domain_t *info) argument
209 status = lsar_open(server, domain, user, &domain_handle);
230 lsa_enum_trusted_domains(char *server, cha argument
270 lsa_enum_trusted_domains_ex(char *server, char *domain, smb_trusted_domains_t *info) argument
421 lsa_list_privs(char *server, char *domain) argument
[all...]
H A Dlsar_clnt.c93 lsar_open(char *server, char *domain, char *username, argument
98 if (server == NULL || domain == NULL)
104 status = lsar_open_policy2(server, domain, username, domain_handle);
113 * LSA resources on a remote server. The server name supplied here does
121 lsar_open_policy2(char *server, char *domain, char *user, argument
129 status = ndr_rpc_bind(lsa_handle, server, domain, user, "LSARPC");
136 len = strlen(server) + 4;
143 (void) snprintf((char *)arg.servername, len, "\\\\%s", server);
289 * the infoClass returned from the server i
[all...]
H A Dmlsvc_client.c75 * NT_STATUS_BAD_NETWORK_PATH (get server addr)
85 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument
96 if (handle == NULL || server == NULL || server[0] == '\0' ||
107 * try to get the actual server version, but that RPC
128 * server, user, domain. It may return any of:
129 * NT_STATUS_BAD_NETWORK_PATH (get server addr)
133 status = smbrdr_ctx_new(&ctx, server, domain, username);
137 server, domain, username,
140 smb_ddiscover_bad_dc(server);
613 ndr_srvsvc_timecheck(char *server, char *domain) argument
[all...]
H A Dmlsvc_domain.c445 smb_ddiscover_qinfo(char *domain, char *server, smb_domainex_t *dxi) argument
450 ret = lsa_query_dns_domain_info(server, domain, &dxi->d_primary);
456 tmp = lsa_query_primary_domain_info(server, domain, &dxi->d_primary);
464 smb_ddiscover_enum_trusted(domain, server, dxi);
474 smb_ddiscover_enum_trusted(char *domain, char *server, smb_domainex_t *dxi) argument
480 status = lsa_enum_trusted_domains_ex(server, domain, list);
482 (void) lsa_enum_trusted_domains(server, domain, list);
H A Dmlsvc_util.c62 mlsvc_netlogon(char *server, char *domain) argument
67 status = netr_open(server, domain, &netr_handle);
70 "for domain %s (%s)", server, domain,
75 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT);
78 "credential chain with DC: %s (%s)", server,
143 * Ditto the SMB server domain.
161 "smbd: failed to locate AD server for domain %s (%s)",
168 * so that admin will know which AD server we were talking to.
171 syslog(LOG_INFO, "smbd: found AD server %s", dxi.d_dci.dc_name);
174 * Domain discovery needs to authenticate with the AD server
311 char *server = dxi->d_dci.dc_name; local
424 mlsvc_disconnect(const char *server) argument
[all...]
H A Dnetr_auth.c74 * pipe on a domain controller(server) should have already been opened.
82 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument
97 /* server is our DC. Note: normally an FQDN. */
98 (void) snprintf(netr_info->server, sizeof (netr_info->server),
99 "\\\\%s", server);
130 * We store the remote server information, which is used to drive Windows
136 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument
143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR");
172 arg.servername = (unsigned char *)netr_info->server;
[all...]
H A Dnetr_logon.c230 char server[MAXHOSTNAMELEN]; local
251 (*netr_global_info.server != '\0')) {
252 (void) snprintf(server, sizeof (server),
254 if (strncasecmp(netr_global_info.server,
255 server, strlen(server)) != 0)
376 char *server, smb_logon_t *user_info, smb_token_t *token)
393 * Should we get the server and hostname from netr_info?
396 len = strlen(server)
375 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_logon_t *user_info, smb_token_t *token) argument
[all...]
H A Dsamlib.c80 sam_remove_trust_account(char *server, char *domain) argument
87 return (sam_delete_account(server, domain, account_name));
95 * server.
100 sam_delete_account(char *server, char *domain_name, char *account_name) argument
114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument
178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
209 * Query a remote server to get the list of local domains that it
215 sam_get_local_domains(char *server, char *domain_name) argument
224 rc = samr_open(server, domain_nam
285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument
[all...]
H A Dsamr_clnt.c68 * Wrapper round samr_connect to ensure that we connect using the server
70 * supply a server name and a domain name.
78 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument
84 if (server == NULL || domain == NULL) {
87 server = di.d_dci.dc_name;
94 status = samr_connect(server, domain, username, access_mask,
104 * Connect to the SAMR service on the specified server (domain controller).
112 * Try the calls from most recent to oldest until the server responds with
117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument
130 status = ndr_rpc_bind(samr_handle, server, domai
158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
198 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
245 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
966 samr_change_password( mlsvc_handle_t *handle, char *server, char *account, struct samr_encr_passwd *newpw, struct samr_encr_hash *oldpw) argument
[all...]
H A Dsmbrdr_glue.c56 * Disconnects the session with given server.
62 smbrdr_disconnect(const char *server) argument
78 * asks for this server+user (immediately after this returns),
102 * Get the SMB server's configuration stuff and
106 smbrdr_ctx_new(struct smb_ctx **ctx_p, char *server, argument
114 assert(server != NULL);
118 if (server[0] == '\0')
125 * Set server, share, domain, user
128 (void) smb_ctx_setfullserver(ctx, server);
H A Dsrvsvc_clnt.c29 * srvsvc interface allows a client to query a server for information
30 * on shares, sessions, connections and files on the server. Some
58 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument
62 if (server == NULL || domain == NULL) {
66 server = di.d_dci.dc_name;
73 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") != 0)
94 srvsvc_net_share_get_info(char *server, char *domain, char *netname) argument
112 if (srvsvc_open(server, domain, user, &handle) != 0)
118 len = strlen(server) + 4;
125 (void) snprintf((char *)arg.servername, len, "\\\\%s", server);
185 srvsvc_net_session_enum(char *server, char *domain, char *netname) argument
251 srvsvc_net_connect_enum(char *server, char *domain, char *netname, int level) argument
355 srvsvc_net_server_getinfo(char *server, char *domain, srvsvc_server_info_t *svinfo) argument
488 srvsvc_net_remote_tod(char *server, char *domain, struct timeval *tv, struct tm *tm) argument
549 srvsvc_net_test(char *server, char *domain, char *netname) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_doorclnt.c218 * buf (output) - fully-qualified hostname of the AD server found
223 * B_TRUE if an AD server is found. Otherwise, returns B_FALSE;
232 smb_string_t server; local
243 bzero(&server, sizeof (smb_string_t));
249 &server, smb_string_xdr);
254 if (server.buf != NULL) {
255 if (*server.buf != '\0') {
256 (void) strlcpy(buf, server.buf, buflen);
260 xdr_free(smb_string_xdr, (char *)&server);
H A Dsmb_info.c526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument
528 if (server == NULL || passwd == NULL)
531 if ((*server == '\0') || (*passwd == '\0'))
537 if (smb_config_set(SMB_CI_KPASSWD_SRV, server) != 0)
664 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
671 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb_dispatch.c612 smb_server_t *server; local
618 server = session->s_server;
694 sds = &server->sv_disp_stats1[sr->smb_com];
1182 * used in parallel with other client/server operations. The mpx sub-
/illumos-gate/usr/src/cmd/mdb/common/modules/ip/
H A Dip.c1992 { "ilb_servers", "walk server in a given ilb_rule_t",
3234 ilb_server_t server; local
3237 if (mdb_vread(&server, sizeof (server), wsp->walk_addr) == -1) {
3241 status = wsp->walk_callback(wsp->walk_addr, &server, wsp->walk_cbdata);
3244 if ((wsp->walk_addr = (uintptr_t)server.iser_next) == NULL)

Completed in 153 milliseconds

1234567