Searched refs:server (Results 1 - 25 of 284) sorted by last modified time

1234567891011>>

/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/
H A Ddelegate_common.kshlib924 svcadm enable -rs nfs/server
925 typeset stat=$(svcs -H -o STA nfs/server:default)
927 log_fail "Could not enable nfs/server"
/illumos-gate/usr/src/uts/common/io/mac/
H A Dmac_protect.c57 * A DHCP handshake between client and server typically requires at least
62 * 2. OFFER - server responds to client with an IP address and
65 * 4. ACK - server verifies that the requested address matches
100 * If the server never responds with an ACK, there is a timer that is set after
310 uint16_t offset_and_flags, client, server; local
336 server = htons(IPPORT_BOOTPS);
337 if (udph->uh_sport != client && udph->uh_sport != server &&
338 udph->uh_dport != client && udph->uh_dport != server)
809 uint16_t hdrlen, client, server; local
839 server
[all...]
/illumos-gate/usr/src/cmd/svc/milestone/
H A DMakefile57 multi-user-server.xml \
/illumos-gate/usr/src/cmd/smbsrv/smbd/
H A DMakefile48 MANIFEST= server.xml
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs4_srv.c120 * RFS4_MINLEN_RDDIR_BUF: minimum length of buffer server will provide to
274 rfs4_servinst_t *rfs4_cur_servinst = NULL; /* current server instance */
512 * to be used as the write verifier returned from the server
514 * whenever the server reboots. Of secondary importance, it
520 * loaded. It is assumed that an NFS server will not be able
524 * time the server reboots and minimize the chances that two
544 /* Used to manage create/destroy of server state */
547 /* Used to manage access to server instance linked list */
628 * Indicates if server instance is within the
721 * Create a new server instanc
9819 char *server, *path, *symbuf; local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DmDNS.c715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100.
716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another
717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox.
720 // the cached copy at our local caching server will already have expired, so the server will be forced
721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds.
1046 // The records might already be registered with the server and hence could have NAT state.
1709 // from the server. In that case, if the records have been part of a group update, clear the
2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration
3893 // Reset unansweredQueries so that we don't penalize this server late
10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument
[all...]
/illumos-gate/usr/src/cmd/fm/fmadm/common/
H A Dfaulty.c194 char *server; member in struct:host_id
271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument
279 if (server == NULL)
280 server = "-";
285 hostp->hostid.server &&
286 strcmp(hostp->hostid.server, server) == 0 &&
303 hostp->hostid.server = strdup(server);
317 char *platform = NULL, *chassis = NULL, *server local
[all...]
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/
H A Dip.c64 char *ipc_name; /* The name of the server or interface */
122 static char *ip_port; /* port to connect to (or bind to if server) */
720 ip_create_cinfo(char *server, boolean_t accept) argument
732 if (server != NULL) {
733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP);
744 if (server != NULL) {
745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port);
756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr);
774 ip_setup_addr(char *server, boolean_t accept) argument
777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep
798 ip_setup_addrs(char *server, boolean_t accept) argument
[all...]
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/
H A Dhc.c253 char *prod, *psn, *csn, *server; local
291 if (nvlist_lookup_string(auth, FM_FMRI_AUTH_SERVER, &server)
294 FM_FMRI_AUTH_SERVER, TOPO_PROP_IMMUTABLE, server,
/illumos-gate/usr/src/cmd/fs.d/nfs/svc/
H A Dnfs-server29 # Start/stop processes required for server NFS
69 # The NFS server is not supported in a local zone
71 /usr/sbin/svcadm disable -t svc:/network/nfs/server
72 echo "The NFS server is not supported in a local zone"
90 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server
99 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server
126 # NFS related services are RPC. nfs/server has nfsd which has
130 # - nfs/server which has nfsd and mountd
134 # server, if nfs/client is enabled we'll treat them as client
140 NFS_FMRI="svc:/network/nfs/server
[all...]
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/
H A Dkclient.sh668 printf "\t$(gettext "[ -T kdc_vendor ] specifies which KDC vendor is the server")\n" >&2
675 printf "\t$(gettext "[ -m master ] master KDC server host name")\n" >&2
1080 smbFMRI=svc:/network/smb/server:default
1110 typeset server=$2
1111 smbFMRI=svc:/network/smb/server
1113 printf "%s" "$newpw" | $KSMB -d $domain -s $server
1115 printf "$(gettext "Warning: unable to set %s domain, server and password information").\n" $smbFMRI
1158 printf "$(gettext "Could not find domain controller server for '%s'. Exiting").\n" $realm >&2
1740 printf "$(gettext "Which type of KDC is the server"):\n"
1742 printf "\t$(gettext "mit: MIT KDC server")\
[all...]
/illumos-gate/usr/src/uts/common/fs/doorfs/
H A Ddoor_sys.c508 door_server_t *st; /* server thread door_data */
512 /* destructor for data returned by a kernel server */
593 * Check for in-kernel door server.
610 * Call kernel door server. Arguments are passed and
614 * structure pointers. It's the server function's
619 * files. When a reference is passed to a kernel server,
620 * it is the server's responsibility to release the reference
621 * (by calling closef). When the server includes a
623 * the call (the server must duplicate the reference if
664 * Get a server threa
2238 struct proc *server = d->door_target; local
2427 door_args(kthread_t *server, int is_private) argument
[all...]
/illumos-gate/usr/src/uts/common/smbsrv/
H A Dnetrauth.h124 char server[MAXHOSTNAMELEN]; /* Current DC, FQDN */ member in struct:netr_info
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dget_in_tkt.c46 Attempts to get an initial ticket for creds->client to use server
47 creds->server, (realm is taken from creds->client), with options
335 || !krb5_principal_compare(context, as_reply->enc_part2->server, request->server)
336 || !krb5_principal_compare(context, as_reply->ticket->server, request->server)
397 krb5_principal server; local
400 server = NULL;
406 if (!creds->server)
407 if ((retval = krb5_copy_principal(context, as_reply->enc_part2->server,
[all...]
H A Dsend_tgs.c47 (the KDC realm is extracted from in_cred->server's realm)
189 tgsreq.server = (krb5_principal) sname;
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Ddfs.c550 dfs_link_add(const char *path, const char *server, const char *share, argument
600 if (dfs_target_find(info.i_targets, ntargets, server, share) != -1) {
613 dfs_target_init(&info.i_targets[ntargets], server, share,
627 * 'server' and 'share' parameters specify a target, so if they are NULL
632 dfs_link_remove(const char *path, const char *server, const char *share) argument
644 if (server == NULL && share == NULL) {
659 idx = dfs_target_find(info.i_targets, info.i_ntargets, server, share);
855 * This is the function that is called by smbd door server to
1494 * server:share:state:class:rank
1541 * :server
1614 dfs_target_find(dfs_target_t *targets, uint32_t ntargets, const char *server, const char *share) argument
[all...]
H A Dlsalib.c133 * Obtains the primary domain SID and name from the specified server
141 lsa_query_primary_domain_info(char *server, char *domain, argument
150 status = lsar_open(server, domain, user, &domain_handle);
162 * Obtains the account domain SID and name from the current server
170 lsa_query_account_domain_info(char *server, char *domain, argument
179 status = lsar_open(server, domain, user, &domain_handle);
193 * Obtains the DNS domain info from the specified server
201 lsa_query_dns_domain_info(char *server, char *domain, smb_domain_t *info) argument
209 status = lsar_open(server, domain, user, &domain_handle);
230 lsa_enum_trusted_domains(char *server, cha argument
270 lsa_enum_trusted_domains_ex(char *server, char *domain, smb_trusted_domains_t *info) argument
421 lsa_list_privs(char *server, char *domain) argument
[all...]
H A Dlsar_clnt.c93 lsar_open(char *server, char *domain, char *username, argument
98 if (server == NULL || domain == NULL)
104 status = lsar_open_policy2(server, domain, username, domain_handle);
113 * LSA resources on a remote server. The server name supplied here does
121 lsar_open_policy2(char *server, char *domain, char *user, argument
129 status = ndr_rpc_bind(lsa_handle, server, domain, user, "LSARPC");
136 len = strlen(server) + 4;
143 (void) snprintf((char *)arg.servername, len, "\\\\%s", server);
289 * the infoClass returned from the server i
[all...]
H A Dmlsvc_client.c75 * NT_STATUS_BAD_NETWORK_PATH (get server addr)
85 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument
96 if (handle == NULL || server == NULL || server[0] == '\0' ||
107 * try to get the actual server version, but that RPC
128 * server, user, domain. It may return any of:
129 * NT_STATUS_BAD_NETWORK_PATH (get server addr)
133 status = smbrdr_ctx_new(&ctx, server, domain, username);
137 server, domain, username,
140 smb_ddiscover_bad_dc(server);
613 ndr_srvsvc_timecheck(char *server, char *domain) argument
[all...]
H A Dmlsvc_domain.c445 smb_ddiscover_qinfo(char *domain, char *server, smb_domainex_t *dxi) argument
450 ret = lsa_query_dns_domain_info(server, domain, &dxi->d_primary);
456 tmp = lsa_query_primary_domain_info(server, domain, &dxi->d_primary);
464 smb_ddiscover_enum_trusted(domain, server, dxi);
474 smb_ddiscover_enum_trusted(char *domain, char *server, smb_domainex_t *dxi) argument
480 status = lsa_enum_trusted_domains_ex(server, domain, list);
482 (void) lsa_enum_trusted_domains(server, domain, list);
H A Dmlsvc_util.c62 mlsvc_netlogon(char *server, char *domain) argument
67 status = netr_open(server, domain, &netr_handle);
70 "for domain %s (%s)", server, domain,
75 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT);
78 "credential chain with DC: %s (%s)", server,
143 * Ditto the SMB server domain.
161 "smbd: failed to locate AD server for domain %s (%s)",
168 * so that admin will know which AD server we were talking to.
171 syslog(LOG_INFO, "smbd: found AD server %s", dxi.d_dci.dc_name);
174 * Domain discovery needs to authenticate with the AD server
311 char *server = dxi->d_dci.dc_name; local
424 mlsvc_disconnect(const char *server) argument
[all...]
H A Dnetr_auth.c74 * pipe on a domain controller(server) should have already been opened.
82 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument
97 /* server is our DC. Note: normally an FQDN. */
98 (void) snprintf(netr_info->server, sizeof (netr_info->server),
99 "\\\\%s", server);
130 * We store the remote server information, which is used to drive Windows
136 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument
143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR");
172 arg.servername = (unsigned char *)netr_info->server;
[all...]
H A Dnetr_logon.c230 char server[MAXHOSTNAMELEN]; local
251 (*netr_global_info.server != '\0')) {
252 (void) snprintf(server, sizeof (server),
254 if (strncasecmp(netr_global_info.server,
255 server, strlen(server)) != 0)
376 char *server, smb_logon_t *user_info, smb_token_t *token)
393 * Should we get the server and hostname from netr_info?
396 len = strlen(server)
375 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_logon_t *user_info, smb_token_t *token) argument
[all...]
H A Dsamlib.c80 sam_remove_trust_account(char *server, char *domain) argument
87 return (sam_delete_account(server, domain, account_name));
95 * server.
100 sam_delete_account(char *server, char *domain_name, char *account_name) argument
114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument
178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION,
209 * Query a remote server to get the list of local domains that it
215 sam_get_local_domains(char *server, char *domain_name) argument
224 rc = samr_open(server, domain_nam
285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument
[all...]
H A Dsamr_clnt.c68 * Wrapper round samr_connect to ensure that we connect using the server
70 * supply a server name and a domain name.
78 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument
84 if (server == NULL || domain == NULL) {
87 server = di.d_dci.dc_name;
94 status = samr_connect(server, domain, username, access_mask,
104 * Connect to the SAMR service on the specified server (domain controller).
112 * Try the calls from most recent to oldest until the server responds with
117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument
130 status = ndr_rpc_bind(samr_handle, server, domai
158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
198 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
245 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument
966 samr_change_password( mlsvc_handle_t *handle, char *server, char *account, struct samr_encr_passwd *newpw, struct samr_encr_hash *oldpw) argument
[all...]

Completed in 179 milliseconds

1234567891011>>