/illumos-gate/usr/src/uts/common/io/mac/ |
H A D | mac_protect.c | 57 * A DHCP handshake between client and server typically requires at least 62 * 2. OFFER - server responds to client with an IP address and 65 * 4. ACK - server verifies that the requested address matches 100 * If the server never responds with an ACK, there is a timer that is set after 310 uint16_t offset_and_flags, client, server; local 336 server = htons(IPPORT_BOOTPS); 337 if (udph->uh_sport != client && udph->uh_sport != server && 338 udph->uh_dport != client && udph->uh_dport != server) 809 uint16_t hdrlen, client, server; local 839 server [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_srv.c | 120 * RFS4_MINLEN_RDDIR_BUF: minimum length of buffer server will provide to 274 rfs4_servinst_t *rfs4_cur_servinst = NULL; /* current server instance */ 512 * to be used as the write verifier returned from the server 514 * whenever the server reboots. Of secondary importance, it 520 * loaded. It is assumed that an NFS server will not be able 524 * time the server reboots and minimize the chances that two 544 /* Used to manage create/destroy of server state */ 547 /* Used to manage access to server instance linked list */ 628 * Indicates if server instance is within the 721 * Create a new server instanc 9819 char *server, *path, *symbuf; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNS.c | 715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100. 716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another 717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox. 720 // the cached copy at our local caching server will already have expired, so the server will be forced 721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds. 1046 // The records might already be registered with the server and hence could have NAT state. 1709 // from the server. In that case, if the records have been part of a group update, clear the 2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration 3893 // Reset unansweredQueries so that we don't penalize this server late 10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument [all...] |
/illumos-gate/usr/src/cmd/fm/fmadm/common/ |
H A D | faulty.c | 194 char *server; member in struct:host_id 271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument 279 if (server == NULL) 280 server = "-"; 285 hostp->hostid.server && 286 strcmp(hostp->hostid.server, server) == 0 && 303 hostp->hostid.server = strdup(server); 317 char *platform = NULL, *chassis = NULL, *server local [all...] |
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/ |
H A D | ip.c | 64 char *ipc_name; /* The name of the server or interface */ 122 static char *ip_port; /* port to connect to (or bind to if server) */ 720 ip_create_cinfo(char *server, boolean_t accept) argument 732 if (server != NULL) { 733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP); 744 if (server != NULL) { 745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port); 756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr); 774 ip_setup_addr(char *server, boolean_t accept) argument 777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep 798 ip_setup_addrs(char *server, boolean_t accept) argument [all...] |
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/ |
H A D | hc.c | 253 char *prod, *psn, *csn, *server; local 291 if (nvlist_lookup_string(auth, FM_FMRI_AUTH_SERVER, &server) 294 FM_FMRI_AUTH_SERVER, TOPO_PROP_IMMUTABLE, server,
|
/illumos-gate/usr/src/uts/common/fs/doorfs/ |
H A D | door_sys.c | 508 door_server_t *st; /* server thread door_data */ 512 /* destructor for data returned by a kernel server */ 593 * Check for in-kernel door server. 610 * Call kernel door server. Arguments are passed and 614 * structure pointers. It's the server function's 619 * files. When a reference is passed to a kernel server, 620 * it is the server's responsibility to release the reference 621 * (by calling closef). When the server includes a 623 * the call (the server must duplicate the reference if 664 * Get a server threa 2238 struct proc *server = d->door_target; local 2427 door_args(kthread_t *server, int is_private) argument [all...] |
/illumos-gate/usr/src/uts/common/smbsrv/ |
H A D | netrauth.h | 124 char server[MAXHOSTNAMELEN]; /* Current DC, FQDN */ member in struct:netr_info
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_in_tkt.c | 46 Attempts to get an initial ticket for creds->client to use server 47 creds->server, (realm is taken from creds->client), with options 335 || !krb5_principal_compare(context, as_reply->enc_part2->server, request->server) 336 || !krb5_principal_compare(context, as_reply->ticket->server, request->server) 397 krb5_principal server; local 400 server = NULL; 406 if (!creds->server) 407 if ((retval = krb5_copy_principal(context, as_reply->enc_part2->server, [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | dfs.c | 550 dfs_link_add(const char *path, const char *server, const char *share, argument 600 if (dfs_target_find(info.i_targets, ntargets, server, share) != -1) { 613 dfs_target_init(&info.i_targets[ntargets], server, share, 627 * 'server' and 'share' parameters specify a target, so if they are NULL 632 dfs_link_remove(const char *path, const char *server, const char *share) argument 644 if (server == NULL && share == NULL) { 659 idx = dfs_target_find(info.i_targets, info.i_ntargets, server, share); 855 * This is the function that is called by smbd door server to 1494 * server:share:state:class:rank 1541 * :server 1614 dfs_target_find(dfs_target_t *targets, uint32_t ntargets, const char *server, const char *share) argument [all...] |
H A D | lsalib.c | 133 * Obtains the primary domain SID and name from the specified server 141 lsa_query_primary_domain_info(char *server, char *domain, argument 150 status = lsar_open(server, domain, user, &domain_handle); 162 * Obtains the account domain SID and name from the current server 170 lsa_query_account_domain_info(char *server, char *domain, argument 179 status = lsar_open(server, domain, user, &domain_handle); 193 * Obtains the DNS domain info from the specified server 201 lsa_query_dns_domain_info(char *server, char *domain, smb_domain_t *info) argument 209 status = lsar_open(server, domain, user, &domain_handle); 230 lsa_enum_trusted_domains(char *server, cha argument 270 lsa_enum_trusted_domains_ex(char *server, char *domain, smb_trusted_domains_t *info) argument 421 lsa_list_privs(char *server, char *domain) argument [all...] |
H A D | lsar_clnt.c | 93 lsar_open(char *server, char *domain, char *username, argument 98 if (server == NULL || domain == NULL) 104 status = lsar_open_policy2(server, domain, username, domain_handle); 113 * LSA resources on a remote server. The server name supplied here does 121 lsar_open_policy2(char *server, char *domain, char *user, argument 129 status = ndr_rpc_bind(lsa_handle, server, domain, user, "LSARPC"); 136 len = strlen(server) + 4; 143 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); 289 * the infoClass returned from the server i [all...] |
H A D | mlsvc_client.c | 75 * NT_STATUS_BAD_NETWORK_PATH (get server addr) 85 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument 96 if (handle == NULL || server == NULL || server[0] == '\0' || 107 * try to get the actual server version, but that RPC 128 * server, user, domain. It may return any of: 129 * NT_STATUS_BAD_NETWORK_PATH (get server addr) 133 status = smbrdr_ctx_new(&ctx, server, domain, username); 137 server, domain, username, 140 smb_ddiscover_bad_dc(server); 613 ndr_srvsvc_timecheck(char *server, char *domain) argument [all...] |
H A D | mlsvc_domain.c | 445 smb_ddiscover_qinfo(char *domain, char *server, smb_domainex_t *dxi) argument 450 ret = lsa_query_dns_domain_info(server, domain, &dxi->d_primary); 456 tmp = lsa_query_primary_domain_info(server, domain, &dxi->d_primary); 464 smb_ddiscover_enum_trusted(domain, server, dxi); 474 smb_ddiscover_enum_trusted(char *domain, char *server, smb_domainex_t *dxi) argument 480 status = lsa_enum_trusted_domains_ex(server, domain, list); 482 (void) lsa_enum_trusted_domains(server, domain, list);
|
H A D | mlsvc_util.c | 62 mlsvc_netlogon(char *server, char *domain) argument 67 status = netr_open(server, domain, &netr_handle); 70 "for domain %s (%s)", server, domain, 75 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT); 78 "credential chain with DC: %s (%s)", server, 143 * Ditto the SMB server domain. 161 "smbd: failed to locate AD server for domain %s (%s)", 168 * so that admin will know which AD server we were talking to. 171 syslog(LOG_INFO, "smbd: found AD server %s", dxi.d_dci.dc_name); 174 * Domain discovery needs to authenticate with the AD server 311 char *server = dxi->d_dci.dc_name; local 424 mlsvc_disconnect(const char *server) argument [all...] |
H A D | netr_auth.c | 74 * pipe on a domain controller(server) should have already been opened. 82 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument 97 /* server is our DC. Note: normally an FQDN. */ 98 (void) snprintf(netr_info->server, sizeof (netr_info->server), 99 "\\\\%s", server); 130 * We store the remote server information, which is used to drive Windows 136 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument 143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR"); 172 arg.servername = (unsigned char *)netr_info->server; [all...] |
H A D | netr_logon.c | 230 char server[MAXHOSTNAMELEN]; local 251 (*netr_global_info.server != '\0')) { 252 (void) snprintf(server, sizeof (server), 254 if (strncasecmp(netr_global_info.server, 255 server, strlen(server)) != 0) 376 char *server, smb_logon_t *user_info, smb_token_t *token) 393 * Should we get the server and hostname from netr_info? 396 len = strlen(server) 375 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_logon_t *user_info, smb_token_t *token) argument [all...] |
H A D | samlib.c | 80 sam_remove_trust_account(char *server, char *domain) argument 87 return (sam_delete_account(server, domain, account_name)); 95 * server. 100 sam_delete_account(char *server, char *domain_name, char *account_name) argument 114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument 178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 209 * Query a remote server to get the list of local domains that it 215 sam_get_local_domains(char *server, char *domain_name) argument 224 rc = samr_open(server, domain_nam 285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument [all...] |
H A D | samr_clnt.c | 68 * Wrapper round samr_connect to ensure that we connect using the server 70 * supply a server name and a domain name. 78 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument 84 if (server == NULL || domain == NULL) { 87 server = di.d_dci.dc_name; 94 status = samr_connect(server, domain, username, access_mask, 104 * Connect to the SAMR service on the specified server (domain controller). 112 * Try the calls from most recent to oldest until the server responds with 117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument 130 status = ndr_rpc_bind(samr_handle, server, domai 158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 198 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 245 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 966 samr_change_password( mlsvc_handle_t *handle, char *server, char *account, struct samr_encr_passwd *newpw, struct samr_encr_hash *oldpw) argument [all...] |
H A D | smbrdr_glue.c | 56 * Disconnects the session with given server. 62 smbrdr_disconnect(const char *server) argument 78 * asks for this server+user (immediately after this returns), 102 * Get the SMB server's configuration stuff and 106 smbrdr_ctx_new(struct smb_ctx **ctx_p, char *server, argument 114 assert(server != NULL); 118 if (server[0] == '\0') 125 * Set server, share, domain, user 128 (void) smb_ctx_setfullserver(ctx, server);
|
H A D | srvsvc_clnt.c | 29 * srvsvc interface allows a client to query a server for information 30 * on shares, sessions, connections and files on the server. Some 58 srvsvc_open(char *server, char *domain, char *username, mlsvc_handle_t *handle) argument 62 if (server == NULL || domain == NULL) { 66 server = di.d_dci.dc_name; 73 if (ndr_rpc_bind(handle, server, domain, username, "SRVSVC") != 0) 94 srvsvc_net_share_get_info(char *server, char *domain, char *netname) argument 112 if (srvsvc_open(server, domain, user, &handle) != 0) 118 len = strlen(server) + 4; 125 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); 185 srvsvc_net_session_enum(char *server, char *domain, char *netname) argument 251 srvsvc_net_connect_enum(char *server, char *domain, char *netname, int level) argument 355 srvsvc_net_server_getinfo(char *server, char *domain, srvsvc_server_info_t *svinfo) argument 488 srvsvc_net_remote_tod(char *server, char *domain, struct timeval *tv, struct tm *tm) argument 549 srvsvc_net_test(char *server, char *domain, char *netname) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_doorclnt.c | 218 * buf (output) - fully-qualified hostname of the AD server found 223 * B_TRUE if an AD server is found. Otherwise, returns B_FALSE; 232 smb_string_t server; local 243 bzero(&server, sizeof (smb_string_t)); 249 &server, smb_string_xdr); 254 if (server.buf != NULL) { 255 if (*server.buf != '\0') { 256 (void) strlcpy(buf, server.buf, buflen); 260 xdr_free(smb_string_xdr, (char *)&server);
|
H A D | smb_info.c | 526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument 528 if (server == NULL || passwd == NULL) 531 if ((*server == '\0') || (*passwd == '\0')) 537 if (smb_config_set(SMB_CI_KPASSWD_SRV, server) != 0) 664 syslog(LOG_DEBUG, "Found %s name server\n", ipstr); 671 syslog(LOG_DEBUG, "Found %s name server\n", ipstr);
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_dispatch.c | 612 smb_server_t *server; local 618 server = session->s_server; 694 sds = &server->sv_disp_stats1[sr->smb_com]; 1182 * used in parallel with other client/server operations. The mpx sub-
|
/illumos-gate/usr/src/cmd/mdb/common/modules/ip/ |
H A D | ip.c | 1992 { "ilb_servers", "walk server in a given ilb_rule_t", 3234 ilb_server_t server; local 3237 if (mdb_vread(&server, sizeof (server), wsp->walk_addr) == -1) { 3241 status = wsp->walk_callback(wsp->walk_addr, &server, wsp->walk_cbdata); 3244 if ((wsp->walk_addr = (uintptr_t)server.iser_next) == NULL)
|