/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | delegate_common.kshlib | 924 svcadm enable -rs nfs/server 925 typeset stat=$(svcs -H -o STA nfs/server:default) 927 log_fail "Could not enable nfs/server"
|
/illumos-gate/usr/src/uts/common/io/mac/ |
H A D | mac_protect.c | 57 * A DHCP handshake between client and server typically requires at least 62 * 2. OFFER - server responds to client with an IP address and 65 * 4. ACK - server verifies that the requested address matches 100 * If the server never responds with an ACK, there is a timer that is set after 310 uint16_t offset_and_flags, client, server; local 336 server = htons(IPPORT_BOOTPS); 337 if (udph->uh_sport != client && udph->uh_sport != server && 338 udph->uh_dport != client && udph->uh_dport != server) 809 uint16_t hdrlen, client, server; local 839 server [all...] |
/illumos-gate/usr/src/cmd/svc/milestone/ |
H A D | Makefile | 57 multi-user-server.xml \
|
/illumos-gate/usr/src/cmd/smbsrv/smbd/ |
H A D | Makefile | 48 MANIFEST= server.xml
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_srv.c | 120 * RFS4_MINLEN_RDDIR_BUF: minimum length of buffer server will provide to 274 rfs4_servinst_t *rfs4_cur_servinst = NULL; /* current server instance */ 512 * to be used as the write verifier returned from the server 514 * whenever the server reboots. Of secondary importance, it 520 * loaded. It is assumed that an NFS server will not be able 524 * time the server reboots and minimize the chances that two 544 /* Used to manage create/destroy of server state */ 547 /* Used to manage access to server instance linked list */ 628 * Indicates if server instance is within the 721 * Create a new server instanc 9819 char *server, *path, *symbuf; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNS.c | 715 // Suppose real record has TTL of 3600, and our local caching server has held it for 3500 seconds, so it returns an aged TTL of 100. 716 // If we do our normal refresh at 80% of the TTL, our local caching server will return 20 seconds, so we'll do another 717 // 80% refresh after 16 seconds, and then the server will return 4 seconds, and so on, in the fashion of Zeno's paradox. 720 // the cached copy at our local caching server will already have expired, so the server will be forced 721 // to fetch a fresh copy from the authoritative server, and then return a fresh record with the full TTL of 3600 seconds. 1046 // The records might already be registered with the server and hence could have NAT state. 1709 // from the server. In that case, if the records have been part of a group update, clear the 2882 // For Unicast, when we get the response from the server, we will call CompleteDeregistration 3893 // Reset unansweredQueries so that we don't penalize this server late 10540 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument [all...] |
/illumos-gate/usr/src/cmd/fm/fmadm/common/ |
H A D | faulty.c | 194 char *server; member in struct:host_id 271 find_hostid_in_list(char *platform, char *chassis, char *server, char *domain, argument 279 if (server == NULL) 280 server = "-"; 285 hostp->hostid.server && 286 strcmp(hostp->hostid.server, server) == 0 && 303 hostp->hostid.server = strdup(server); 317 char *platform = NULL, *chassis = NULL, *server local [all...] |
/illumos-gate/usr/src/cmd/fm/modules/common/ip-transport/ |
H A D | ip.c | 64 char *ipc_name; /* The name of the server or interface */ 122 static char *ip_port; /* port to connect to (or bind to if server) */ 720 ip_create_cinfo(char *server, boolean_t accept) argument 732 if (server != NULL) { 733 cinfo->ipc_name = fmd_hdl_strdup(ip_hdl, server, FMD_NOSLEEP); 744 if (server != NULL) { 745 ip_debug(IP_DEBUG_FINE, "resolving %s:%s\n", server, ip_port); 756 err = getaddrinfo(server, ip_port, &aih, &cinfo->ipc_addr); 774 ip_setup_addr(char *server, boolean_t accept) argument 777 ip_cinfo_t *cinfo = ip_create_cinfo(server, accep 798 ip_setup_addrs(char *server, boolean_t accept) argument [all...] |
/illumos-gate/usr/src/lib/fm/topo/libtopo/common/ |
H A D | hc.c | 253 char *prod, *psn, *csn, *server; local 291 if (nvlist_lookup_string(auth, FM_FMRI_AUTH_SERVER, &server) 294 FM_FMRI_AUTH_SERVER, TOPO_PROP_IMMUTABLE, server,
|
/illumos-gate/usr/src/cmd/fs.d/nfs/svc/ |
H A D | nfs-server | 29 # Start/stop processes required for server NFS 69 # The NFS server is not supported in a local zone 71 /usr/sbin/svcadm disable -t svc:/network/nfs/server 72 echo "The NFS server is not supported in a local zone" 90 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server 99 /usr/sbin/svcadm mark -t maintenance svc:/network/nfs/server 126 # NFS related services are RPC. nfs/server has nfsd which has 130 # - nfs/server which has nfsd and mountd 134 # server, if nfs/client is enabled we'll treat them as client 140 NFS_FMRI="svc:/network/nfs/server [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | kclient.sh | 668 printf "\t$(gettext "[ -T kdc_vendor ] specifies which KDC vendor is the server")\n" >&2 675 printf "\t$(gettext "[ -m master ] master KDC server host name")\n" >&2 1080 smbFMRI=svc:/network/smb/server:default 1110 typeset server=$2 1111 smbFMRI=svc:/network/smb/server 1113 printf "%s" "$newpw" | $KSMB -d $domain -s $server 1115 printf "$(gettext "Warning: unable to set %s domain, server and password information").\n" $smbFMRI 1158 printf "$(gettext "Could not find domain controller server for '%s'. Exiting").\n" $realm >&2 1740 printf "$(gettext "Which type of KDC is the server"):\n" 1742 printf "\t$(gettext "mit: MIT KDC server")\ [all...] |
/illumos-gate/usr/src/uts/common/fs/doorfs/ |
H A D | door_sys.c | 508 door_server_t *st; /* server thread door_data */ 512 /* destructor for data returned by a kernel server */ 593 * Check for in-kernel door server. 610 * Call kernel door server. Arguments are passed and 614 * structure pointers. It's the server function's 619 * files. When a reference is passed to a kernel server, 620 * it is the server's responsibility to release the reference 621 * (by calling closef). When the server includes a 623 * the call (the server must duplicate the reference if 664 * Get a server threa 2238 struct proc *server = d->door_target; local 2427 door_args(kthread_t *server, int is_private) argument [all...] |
/illumos-gate/usr/src/uts/common/smbsrv/ |
H A D | netrauth.h | 124 char server[MAXHOSTNAMELEN]; /* Current DC, FQDN */ member in struct:netr_info
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_in_tkt.c | 46 Attempts to get an initial ticket for creds->client to use server 47 creds->server, (realm is taken from creds->client), with options 335 || !krb5_principal_compare(context, as_reply->enc_part2->server, request->server) 336 || !krb5_principal_compare(context, as_reply->ticket->server, request->server) 397 krb5_principal server; local 400 server = NULL; 406 if (!creds->server) 407 if ((retval = krb5_copy_principal(context, as_reply->enc_part2->server, [all...] |
H A D | send_tgs.c | 47 (the KDC realm is extracted from in_cred->server's realm) 189 tgsreq.server = (krb5_principal) sname;
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | dfs.c | 550 dfs_link_add(const char *path, const char *server, const char *share, argument 600 if (dfs_target_find(info.i_targets, ntargets, server, share) != -1) { 613 dfs_target_init(&info.i_targets[ntargets], server, share, 627 * 'server' and 'share' parameters specify a target, so if they are NULL 632 dfs_link_remove(const char *path, const char *server, const char *share) argument 644 if (server == NULL && share == NULL) { 659 idx = dfs_target_find(info.i_targets, info.i_ntargets, server, share); 855 * This is the function that is called by smbd door server to 1494 * server:share:state:class:rank 1541 * :server 1614 dfs_target_find(dfs_target_t *targets, uint32_t ntargets, const char *server, const char *share) argument [all...] |
H A D | lsalib.c | 133 * Obtains the primary domain SID and name from the specified server 141 lsa_query_primary_domain_info(char *server, char *domain, argument 150 status = lsar_open(server, domain, user, &domain_handle); 162 * Obtains the account domain SID and name from the current server 170 lsa_query_account_domain_info(char *server, char *domain, argument 179 status = lsar_open(server, domain, user, &domain_handle); 193 * Obtains the DNS domain info from the specified server 201 lsa_query_dns_domain_info(char *server, char *domain, smb_domain_t *info) argument 209 status = lsar_open(server, domain, user, &domain_handle); 230 lsa_enum_trusted_domains(char *server, cha argument 270 lsa_enum_trusted_domains_ex(char *server, char *domain, smb_trusted_domains_t *info) argument 421 lsa_list_privs(char *server, char *domain) argument [all...] |
H A D | lsar_clnt.c | 93 lsar_open(char *server, char *domain, char *username, argument 98 if (server == NULL || domain == NULL) 104 status = lsar_open_policy2(server, domain, username, domain_handle); 113 * LSA resources on a remote server. The server name supplied here does 121 lsar_open_policy2(char *server, char *domain, char *user, argument 129 status = ndr_rpc_bind(lsa_handle, server, domain, user, "LSARPC"); 136 len = strlen(server) + 4; 143 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); 289 * the infoClass returned from the server i [all...] |
H A D | mlsvc_client.c | 75 * NT_STATUS_BAD_NETWORK_PATH (get server addr) 85 ndr_rpc_bind(mlsvc_handle_t *handle, char *server, char *domain, argument 96 if (handle == NULL || server == NULL || server[0] == '\0' || 107 * try to get the actual server version, but that RPC 128 * server, user, domain. It may return any of: 129 * NT_STATUS_BAD_NETWORK_PATH (get server addr) 133 status = smbrdr_ctx_new(&ctx, server, domain, username); 137 server, domain, username, 140 smb_ddiscover_bad_dc(server); 613 ndr_srvsvc_timecheck(char *server, char *domain) argument [all...] |
H A D | mlsvc_domain.c | 445 smb_ddiscover_qinfo(char *domain, char *server, smb_domainex_t *dxi) argument 450 ret = lsa_query_dns_domain_info(server, domain, &dxi->d_primary); 456 tmp = lsa_query_primary_domain_info(server, domain, &dxi->d_primary); 464 smb_ddiscover_enum_trusted(domain, server, dxi); 474 smb_ddiscover_enum_trusted(char *domain, char *server, smb_domainex_t *dxi) argument 480 status = lsa_enum_trusted_domains_ex(server, domain, list); 482 (void) lsa_enum_trusted_domains(server, domain, list);
|
H A D | mlsvc_util.c | 62 mlsvc_netlogon(char *server, char *domain) argument 67 status = netr_open(server, domain, &netr_handle); 70 "for domain %s (%s)", server, domain, 75 status = netlogon_auth(server, &netr_handle, NETR_FLG_INIT); 78 "credential chain with DC: %s (%s)", server, 143 * Ditto the SMB server domain. 161 "smbd: failed to locate AD server for domain %s (%s)", 168 * so that admin will know which AD server we were talking to. 171 syslog(LOG_INFO, "smbd: found AD server %s", dxi.d_dci.dc_name); 174 * Domain discovery needs to authenticate with the AD server 311 char *server = dxi->d_dci.dc_name; local 424 mlsvc_disconnect(const char *server) argument [all...] |
H A D | netr_auth.c | 74 * pipe on a domain controller(server) should have already been opened. 82 netlogon_auth(char *server, mlsvc_handle_t *netr_handle, DWORD flags) argument 97 /* server is our DC. Note: normally an FQDN. */ 98 (void) snprintf(netr_info->server, sizeof (netr_info->server), 99 "\\\\%s", server); 130 * We store the remote server information, which is used to drive Windows 136 netr_open(char *server, char *domain, mlsvc_handle_t *netr_handle) argument 143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR"); 172 arg.servername = (unsigned char *)netr_info->server; [all...] |
H A D | netr_logon.c | 230 char server[MAXHOSTNAMELEN]; local 251 (*netr_global_info.server != '\0')) { 252 (void) snprintf(server, sizeof (server), 254 if (strncasecmp(netr_global_info.server, 255 server, strlen(server)) != 0) 376 char *server, smb_logon_t *user_info, smb_token_t *token) 393 * Should we get the server and hostname from netr_info? 396 len = strlen(server) 375 netr_server_samlogon(mlsvc_handle_t *netr_handle, netr_info_t *netr_info, char *server, smb_logon_t *user_info, smb_token_t *token) argument [all...] |
H A D | samlib.c | 80 sam_remove_trust_account(char *server, char *domain) argument 87 return (sam_delete_account(server, domain, account_name)); 95 * server. 100 sam_delete_account(char *server, char *domain_name, char *account_name) argument 114 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 163 sam_lookup_name(char *server, char *domain_name, char *account_name, argument 178 rc = samr_open(server, domain_name, user, SAM_LOOKUP_INFORMATION, 209 * Query a remote server to get the list of local domains that it 215 sam_get_local_domains(char *server, char *domain_name) argument 224 rc = samr_open(server, domain_nam 285 netr_change_password( char *server, char *account, char *old_pw_clear, char *new_pw_clear) argument [all...] |
H A D | samr_clnt.c | 68 * Wrapper round samr_connect to ensure that we connect using the server 70 * supply a server name and a domain name. 78 samr_open(char *server, char *domain, char *username, DWORD access_mask, argument 84 if (server == NULL || domain == NULL) { 87 server = di.d_dci.dc_name; 94 status = samr_connect(server, domain, username, access_mask, 104 * Connect to the SAMR service on the specified server (domain controller). 112 * Try the calls from most recent to oldest until the server responds with 117 samr_connect(char *server, char *domain, char *username, DWORD access_mask, argument 130 status = ndr_rpc_bind(samr_handle, server, domai 158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 198 samr_connect4(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 245 samr_connect5(char *server, char *domain, char *username, DWORD access_mask, mlsvc_handle_t *samr_handle) argument 966 samr_change_password( mlsvc_handle_t *handle, char *server, char *account, struct samr_encr_passwd *newpw, struct samr_encr_hash *oldpw) argument [all...] |