Searched refs:server (Results 1 - 25 of 284) sorted by path

1234567891011>>

/illumos-gate/usr/src/cmd/cmd-inet/common/
H A Dkcmd.c157 KRB5_NT_SRV_HST, &get_cred->server);
169 krb5_princ_realm(bsd_context, get_cred->server)->data);
170 krb5_princ_set_realm_length(bsd_context, get_cred->server,
172 krb5_princ_set_realm_data(bsd_context, get_cred->server,
328 * pass it over the socket to the server, and obtain mutual
332 kcmd_version, ret_cred->client, ret_cred->server,
338 " to server: %s\n"),
349 " sent from server: %s\n"),
373 ret_cred->client, ret_cred->server,
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/
H A Dinform.c72 ipaddr_t server; local
77 * to the server's IP address, which will be the broadcast
97 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server);
98 if (!send_pkt(dsmp, dpkt, server, stop_informing)) {
H A Drenew.c202 * server address. We know the renew timer has already been cancelled
434 * a server ID, as we still think our server might be
469 ipaddr_t server; local
499 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server);
500 return (send_pkt(dsmp, dpkt, server, stop_extending));
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dauth.c171 * This is set by scan_authfile if a client matches, but server doesn't
1554 * that we could possibly use for authenticating `client' on `server'.
1559 have_chap_secret(client, server, need_ip, lacks_ipp)
1561 char *server;
1577 if (server != NULL && server[0] == '\0')
1578 server = NULL;
1580 ret = scan_authfile(f, client, server, NULL, &addrs, NULL, filename);
1596 * for authenticating the given client on the given server.
1605 get_secret(unit, client, server, secre
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/
H A Drcp.c620 0, /* No server seq # */
845 0, /* No server seq # */
2158 if (krb5_parse_name(bsd_context, pname_data.data, &creds.server))
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/rdist/
H A DMakefile28 OBJS= docmd.o expand.o lookup.o main.o server.o
H A Dmain.c41 int iamremote; /* act as remote server for transfering files */
371 server();
H A Dserver.c29 * If we want to write *to* the client rdist program, *from* the server
30 * side (server-side child `rdist -Server' process exec'ed off of in.rshd),
81 server() function
103 error("server: expected control record\n");
147 error("server: too many 'E's\n");
201 error("server: options not delimited\n");
220 error("server: unknown command '%s'\n", cp);
1310 * Check the current directory (initialized by the 'T' command to server())
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dencrypt.c189 encrypt_verbose = !server;
H A Dkerberos5.c229 "host", KRB5_NT_SRV_HST, &creds.server))) {
250 krb5_princ_set_realm(telnet_context, creds.server, &rdata);
273 if ((retval = krb5_get_tgs_ktypes(telnet_context, creds.server,
390 "telnet: Sent Kerberos V5 credentials to server\r\n"));
623 krb5_principal server = 0; local
646 "host", KRB5_NT_SRV_HST, &server);
650 "Kerberos V5: could not make server "
666 server, ccache, forward_flags & OPTS_FORWARDABLE_CREDS,
684 "Forwarded local Kerberos V5 credentials to server\r\n"));
688 if (server)
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DmDNS.c715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100.
716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another
717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox.
720 // the cached copy at our local caching server will already have expired, so the server will be forced
721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds.
1046 // The records might already be registered with the server and hence could have NAT state.
1709 // from the server. In that case, if the records have been part of a group update, clear the
2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration
3893 // Reset unansweredQueries so that we don't penalize this server late
10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rlogind.c27 * remote login server:
114 krb5_principal server,
400 krb5_principal server; local
403 KRB5_NT_SRV_HST, &server);
408 krb5_princ_component(krb_context, server, 0),
410 krb5_free_principal(krb_context, server);
650 "server lacks privilege");
665 fatal(f, "This server only supports Kerberos V5");
881 krb5_principal server, /* IN */
925 server, flag
878 krb5_compat_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fdp, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_int32 *auth_sys, krb5_data *version) argument
[all...]
H A Din.rshd.c38 * remote shell server:
909 error("Fork (to start shell) failed on server. "
1452 krb5_principal server; local
1455 KRB5_NT_SRV_HST, &server);
1460 krb5_princ_component(bsd_context, server, 0),
1462 krb5_free_principal(bsd_context, server);
H A Din.telnetd.c43 * Telnet server.
534 krb5_principal server; local
570 &server);
576 server, 0),
580 server);
615 ticket->server, 0)->length < MAXPRINCLEN) {
619 ticket->server, 0)->data,
621 ticket->server, 0)->length);
623 ticket->server, 0)->length] = '\0';
774 0, 0, KRB5_NT_SRV_HST, &server);
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dnfs4_xdr.c303 if (!xdr_array(xdrs, (char **)&objp->server.server_val,
304 (uint_t *)&objp->server.server_len, ~0,
H A Dsnoop_nfs4.c4371 for (i = 0; i < fsl->server.server_len; i++)
4372 sprintf(get_line(0, 0), "server: %s",
4373 utf8localize(&fsl->server.server_val[i]));
4645 sprintf(get_line(0, 0), "Access Time (set to server time)");
4719 "Modification Time (set to server time)");
/illumos-gate/usr/src/cmd/dtrace/test/tst/common/mib/
H A Dtst.tcp.ksh79 server() function
143 server &
/illumos-gate/usr/src/cmd/fm/fmadm/common/
H A Dfaulty.c194 char *server; member in struct:host_id
271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument
279 if (server == NULL)
280 server = "-";
285 hostp->hostid.server &&
286 strcmp(hostp->hostid.server, server) == 0 &&
303 hostp->hostid.server = strdup(server);
317 char *platform = NULL, *chassis = NULL, *server local
[all...]
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/
H A Dip.c64 char *ipc_name; /* The name of the server or interface */
122 static char *ip_port; /* port to connect to (or bind to if server) */
720 ip_create_cinfo(char *server, boolean_t accept) argument
732 if (server != NULL) {
733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP);
744 if (server != NULL) {
745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port);
756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr);
774 ip_setup_addr(char *server, boolean_t accept) argument
777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep
798 ip_setup_addrs(char *server, boolean_t accept) argument
[all...]
/illumos-gate/usr/src/cmd/fs.d/nfs/clear_locks/
H A Dclear_locks.c142 gettext("Clearing locks held for NFS client %s on server %s\n"),
147 gettext("Clearing locks held for NFS client %s on server %s\n"),
158 * Request that host 'server' free all locks held by
162 share_zap(char *client, char *server) argument
169 rslt = rpc_call(server, NLM_PROG, NLM_VERSX, NLM_FREE_ALL,
177 client, server);
/illumos-gate/usr/src/cmd/fs.d/nfs/lib/
H A Dref_subr.c143 for (j = 0; j < fs->server.server_len; j++) {
144 s = utf8_to_str(&fs->server.server_val[j], &l, NULL);
283 objp->server.server_val = NULL;
286 if (!xdr_array(xdrs, (char **)&objp->server.server_val,
287 (uint_t *)&objp->server.server_len, ~0,
/illumos-gate/usr/src/cmd/fs.d/nfs/rp_basic/
H A Dlibnfs_basic.c194 fsl_array[i].server.server_len = 1;
195 fsl_array[i].server.server_val =
197 if (fsl_array[i].server.server_val == NULL) {
204 server.server_val);
209 fsl_array[i].server.server_val);
242 * server:/path pair and should discard the server and
247 free(fsl_array[i].server.server_val);
248 fsl_array[i].server.server_val = NULL;
249 fsl_array[i].server
[all...]
/illumos-gate/usr/src/cmd/fs.d/nfs/svc/
H A DMakefile30 MANIFEST= server.xml client.xml rquota.xml mapid.xml nlockmgr.xml \
32 SVCMETHOD= nfs-server nfs-client nlockmgr
H A Dnfs-server29 # Start/stop processes required for server NFS
69 # The NFS server is not supported in a local zone
71 /usr/sbin/svcadm disable -t svc:/network/nfs/server
72 echo "The NFS server is not supported in a local zone"
90 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server
99 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server
126 # NFS related services are RPC. nfs/server has nfsd which has
130 # - nfs/server which has nfsd and mountd
134 # server, if nfs/client is enabled we'll treat them as client
140 NFS_FMRI="svc:/network/nfs/server
[all...]
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/
H A Dsrvenum.c44 * Its purpose is to test the ability to connect to a server,
84 /* server name, length 14 vv ... */
87 /* UNC server here, i.e.: "\\192.168.1.6" */
98 static char *server; variable
105 printf("usage: srvenum [-d domain][-u user][-p passwd] server\n");
140 server = argv[optind];
159 * Set server, share, domain, user
162 smb_ctx_setfullserver(ctx, server);
185 * Resolve the server address,
200 server, erro
[all...]

Completed in 162 milliseconds

1234567891011>>