/illumos-gate/usr/src/cmd/cmd-inet/common/ |
H A D | kcmd.c | 157 KRB5_NT_SRV_HST, &get_cred->server); 169 krb5_princ_realm(bsd_context, get_cred->server)->data); 170 krb5_princ_set_realm_length(bsd_context, get_cred->server, 172 krb5_princ_set_realm_data(bsd_context, get_cred->server, 328 * pass it over the socket to the server, and obtain mutual 332 kcmd_version, ret_cred->client, ret_cred->server, 338 " to server: %s\n"), 349 " sent from server: %s\n"), 373 ret_cred->client, ret_cred->server,
|
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | inform.c | 72 ipaddr_t server; local 77 * to the server's IP address, which will be the broadcast 97 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server); 98 if (!send_pkt(dsmp, dpkt, server, stop_informing)) {
|
H A D | renew.c | 202 * server address. We know the renew timer has already been cancelled 434 * a server ID, as we still think our server might be 469 ipaddr_t server; local 499 IN6_V4MAPPED_TO_IPADDR(&dsmp->dsm_server, server); 500 return (send_pkt(dsmp, dpkt, server, stop_extending));
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | auth.c | 171 * This is set by scan_authfile if a client matches, but server doesn't 1554 * that we could possibly use for authenticating `client' on `server'. 1559 have_chap_secret(client, server, need_ip, lacks_ipp) 1561 char *server; 1577 if (server != NULL && server[0] == '\0') 1578 server = NULL; 1580 ret = scan_authfile(f, client, server, NULL, &addrs, NULL, filename); 1596 * for authenticating the given client on the given server. 1605 get_secret(unit, client, server, secre [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ |
H A D | rcp.c | 620 0, /* No server seq # */ 845 0, /* No server seq # */ 2158 if (krb5_parse_name(bsd_context, pname_data.data, &creds.server))
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/rdist/ |
H A D | Makefile | 28 OBJS= docmd.o expand.o lookup.o main.o server.o
|
H A D | main.c | 41 int iamremote; /* act as remote server for transfering files */ 371 server();
|
H A D | server.c | 29 * If we want to write *to* the client rdist program, *from* the server 30 * side (server-side child `rdist -Server' process exec'ed off of in.rshd), 81 server() function 103 error("server: expected control record\n"); 147 error("server: too many 'E's\n"); 201 error("server: options not delimited\n"); 220 error("server: unknown command '%s'\n", cp); 1310 * Check the current directory (initialized by the 'T' command to server())
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | encrypt.c | 189 encrypt_verbose = !server;
|
H A D | kerberos5.c | 229 "host", KRB5_NT_SRV_HST, &creds.server))) { 250 krb5_princ_set_realm(telnet_context, creds.server, &rdata); 273 if ((retval = krb5_get_tgs_ktypes(telnet_context, creds.server, 390 "telnet: Sent Kerberos V5 credentials to server\r\n")); 623 krb5_principal server = 0; local 646 "host", KRB5_NT_SRV_HST, &server); 650 "Kerberos V5: could not make server " 666 server, ccache, forward_flags & OPTS_FORWARDABLE_CREDS, 684 "Forwarded local Kerberos V5 credentials to server\r\n")); 688 if (server) [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNS.c | 715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100. 716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another 717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox. 720 // the cached copy at our local caching server will already have expired, so the server will be forced 721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds. 1046 // The records might already be registered with the server and hence could have NAT state. 1709 // from the server. In that case, if the records have been part of a group update, clear the 2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration 3893 // Reset unansweredQueries so that we don't penalize this server late 10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 27 * remote login server: 114 krb5_principal server, 400 krb5_principal server; local 403 KRB5_NT_SRV_HST, &server); 408 krb5_princ_component(krb_context, server, 0), 410 krb5_free_principal(krb_context, server); 650 "server lacks privilege"); 665 fatal(f, "This server only supports Kerberos V5"); 881 krb5_principal server, /* IN */ 925 server, flag 878 krb5_compat_recvauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fdp, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket **ticket, krb5_int32 *auth_sys, krb5_data *version) argument [all...] |
H A D | in.rshd.c | 38 * remote shell server: 909 error("Fork (to start shell) failed on server. " 1452 krb5_principal server; local 1455 KRB5_NT_SRV_HST, &server); 1460 krb5_princ_component(bsd_context, server, 0), 1462 krb5_free_principal(bsd_context, server);
|
H A D | in.telnetd.c | 43 * Telnet server. 534 krb5_principal server; local 570 &server); 576 server, 0), 580 server); 615 ticket->server, 0)->length < MAXPRINCLEN) { 619 ticket->server, 0)->data, 621 ticket->server, 0)->length); 623 ticket->server, 0)->length] = '\0'; 774 0, 0, KRB5_NT_SRV_HST, &server); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | nfs4_xdr.c | 303 if (!xdr_array(xdrs, (char **)&objp->server.server_val, 304 (uint_t *)&objp->server.server_len, ~0,
|
H A D | snoop_nfs4.c | 4371 for (i = 0; i < fsl->server.server_len; i++) 4372 sprintf(get_line(0, 0), "server: %s", 4373 utf8localize(&fsl->server.server_val[i])); 4645 sprintf(get_line(0, 0), "Access Time (set to server time)"); 4719 "Modification Time (set to server time)");
|
/illumos-gate/usr/src/cmd/dtrace/test/tst/common/mib/ |
H A D | tst.tcp.ksh | 79 server() function 143 server &
|
/illumos-gate/usr/src/cmd/fm/fmadm/common/ |
H A D | faulty.c | 194 char *server; member in struct:host_id 271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument 279 if (server == NULL) 280 server = "-"; 285 hostp->hostid.server && 286 strcmp(hostp->hostid.server, server) == 0 && 303 hostp->hostid.server = strdup(server); 317 char *platform = NULL, *chassis = NULL, *server local [all...] |
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/ |
H A D | ip.c | 64 char *ipc_name; /* The name of the server or interface */ 122 static char *ip_port; /* port to connect to (or bind to if server) */ 720 ip_create_cinfo(char *server, boolean_t accept) argument 732 if (server != NULL) { 733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP); 744 if (server != NULL) { 745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port); 756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr); 774 ip_setup_addr(char *server, boolean_t accept) argument 777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep 798 ip_setup_addrs(char *server, boolean_t accept) argument [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/clear_locks/ |
H A D | clear_locks.c | 142 gettext("Clearing locks held for NFS client %s on server %s\n"), 147 gettext("Clearing locks held for NFS client %s on server %s\n"), 158 * Request that host 'server' free all locks held by 162 share_zap(char *client, char *server) argument 169 rslt = rpc_call(server, NLM_PROG, NLM_VERSX, NLM_FREE_ALL, 177 client, server);
|
/illumos-gate/usr/src/cmd/fs.d/nfs/lib/ |
H A D | ref_subr.c | 143 for (j = 0; j < fs->server.server_len; j++) { 144 s = utf8_to_str(&fs->server.server_val[j], &l, NULL); 283 objp->server.server_val = NULL; 286 if (!xdr_array(xdrs, (char **)&objp->server.server_val, 287 (uint_t *)&objp->server.server_len, ~0,
|
/illumos-gate/usr/src/cmd/fs.d/nfs/rp_basic/ |
H A D | libnfs_basic.c | 194 fsl_array[i].server.server_len = 1; 195 fsl_array[i].server.server_val = 197 if (fsl_array[i].server.server_val == NULL) { 204 server.server_val); 209 fsl_array[i].server.server_val); 242 * server:/path pair and should discard the server and 247 free(fsl_array[i].server.server_val); 248 fsl_array[i].server.server_val = NULL; 249 fsl_array[i].server [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/svc/ |
H A D | Makefile | 30 MANIFEST= server.xml client.xml rquota.xml mapid.xml nlockmgr.xml \ 32 SVCMETHOD= nfs-server nfs-client nlockmgr
|
H A D | nfs-server | 29 # Start/stop processes required for server NFS 69 # The NFS server is not supported in a local zone 71 /usr/sbin/svcadm disable -t svc:/network/nfs/server 72 echo "The NFS server is not supported in a local zone" 90 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server 99 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server 126 # NFS related services are RPC. nfs/server has nfsd which has 130 # - nfs/server which has nfsd and mountd 134 # server, if nfs/client is enabled we'll treat them as client 140 NFS_FMRI="svc:/network/nfs/server [all...] |
/illumos-gate/usr/src/cmd/fs.d/smbclnt/test/ |
H A D | srvenum.c | 44 * Its purpose is to test the ability to connect to a server, 84 /* server name, length 14 vv ... */ 87 /* UNC server here, i.e.: "\\192.168.1.6" */ 98 static char *server; variable 105 printf("usage: srvenum [-d domain][-u user][-p passwd] server\n"); 140 server = argv[optind]; 159 * Set server, share, domain, user 162 smb_ctx_setfullserver(ctx, server); 185 * Resolve the server address, 200 server, erro [all...] |