| /freebsd/crypto/openssh/regress/ |
| H A D | keygen-knownhosts.sh | 8 # Generate some keys for testing (just ed25519 for speed) and make a hosts file. 13 echo "# $x" >> $OBJ/kh.hosts 26 echo "" >> $OBJ/kh.hosts 27 ) >> $OBJ/kh.hosts 33 cat $OBJ/kh.hosts >> $OBJ/kh.invalid 37 cp $OBJ/kh.hosts $OBJ/kh.hosts.orig 97 # find key among multiple hosts 100 check_find host-h "find multiple hosts" 150 # find key among multiple hosts 156 check_hashed_find host-h "find multiple hosts" [all …]
|
| /titanic_51/usr/src/man/man4/ |
| H A D | hosts.4 | 6 .TH HOSTS 4 "Feb 24, 2008" 8 hosts \- host name database 12 \fB/etc/inet/hosts\fR 17 \fB/etc/hosts\fR 28 The \fBhosts\fR file is a local database that associates the names of hosts 31 instead of, other hosts databases, including the Domain Name System (DNS), the 37 Note that \fB/etc/hosts\fR and \fB/etc/inet/ipnodes\fR are symbolic links to 38 \fB/etc/inet/hosts\fR. 112 host portion (exclusive of the domain component), choosing names for hosts that 118 of its name. Hosts whic [all...] |
| H A D | hosts.equiv.4 | 7 .TH HOSTS.EQUIV 4 "Jun 23, 1997" 9 hosts.equiv, rhosts \- trusted remote hosts and users 13 The \fB/etc/hosts.equiv\fR and \fB\&.rhosts\fR files provide the "remote 15 \fBrcmd\fR(3SOCKET). The files specify remote hosts and users that are 19 using the \fB/etc/hosts.equiv\fR and \fB\&.rhosts\fR files. The 20 \fB/etc/hosts.equiv\fR file applies to the entire system, while individual 31 user. This procedure first checks the \fB/etc/hosts.equiv\fR file and then 77 may be used in both the \fB/etc/hosts.equiv\fR and \fB\&.rhosts\fR files. 94 \fB/etc/hosts [all...] |
| H A D | nsswitch.conf.4 | 18 The operating system uses a number of databases of information about hosts, 21 addresses, for example, can be found in \fB/etc/hosts\fR, \fBNIS\fR, 77 \fB/etc/hosts\fR, \fB/etc/passwd\fR, \fB/etc/inet/ipnodes\fR, \fB/etc/shadow\fR, \fB/etc/security/auth_attr\fR, \fB/etc/user_attr\fR 84 Valid only for hosts and ipnodes. Uses the Internet Domain Name Service. 87 Valid only for hosts and ipnodes. Uses the Multicast Domain Name Service. 99 Note that \fB/etc/inet/ipnodes\fR is a symbolic link to \fB/etc/hosts\fR. 544 \fB/etc/hosts\fR. Because other sources for the \fBipnodes\fR and \fBhosts\fR 593 When using Active Directory, \fBdns\fR is required to perform hosts resolution. 636 In order to get information from the Internet Domain Name Service for hosts 788 hosts/device [all...] |
| H A D | hosts_access.4 | 29 the \fI/etc/hosts.allow\fR file. 32 entry in the \fI/etc/hosts.deny\fR file. 238 allows intruders to easily impersonate trusted hosts and to break in 272 hosts are permitted access. 278 /etc/hosts.deny: 282 This denies all service to all hosts, unless they are permitted access 285 The explicitly authorized hosts are listed in the allow file. 289 /etc/hosts.allow: 295 The first rule permits access from hosts in the local domain (no `.\' 297 netgroup. The second rule permits access from all hosts i [all...] |
| /titanic_51/usr/src/cmd/ypcmd/ |
| H A D | multi.sh | 29 # Script to examine hosts file and make "magic" entries for 30 # those hosts that have multiple IP addresses. 37 MAP="hosts.byname" 39 USAGE="Usage: multi [-b] [-l] [-s] [-n] [hosts file] 41 -b Add YP_INTERDOMAIN flag to hosts map 43 -s Add YP_SECURE flag to hosts map 46 hosts file defaults to /etc/hosts" 69 HOSTS=$1 72 HOSTS [all...] |
| /titanic_51/usr/src/cmd/sendmail/cf/sh/ |
| H A D | check-hostname.sh | 44 # Check the `getent hosts $1` output, skipping the 1st entry (IP address). 47 for host in `getent hosts $1 | awk '{for (f=2; f <= NF; f++) print $f}'` 53 # Parse /etc/hosts, looking for $1 as an entry by itself, and try to find 59 for entry in `sed -e 's/#.*$//' /etc/hosts | \ 77 # Check the `ypmatch $1 hosts` output, skipping the 1st entry (IP address). 80 for hst in `ypmatch $1 hosts | awk '{for (f=2; f <= NF; f++) print $f}'` 87 # $3 is the first entry for hosts in /etc/nsswitch.conf . 93 myipaddr=`getent hosts $myhost | head -1 | awk '{print $1}'` 98 set -- `grep "^$myipaddr[ ]" /etc/hosts 2>/dev/null` 103 echo "listing files first for hosts i [all...] |
| /freebsd/usr.sbin/rpc.statd/ |
| H A D | statd.c | 63 static char **hosts, *svcport_str = NULL; variable 105 hosts_bak = hosts; in main() 106 hosts_bak = realloc(hosts, nhosts * sizeof(char *)); in main() 108 if (hosts != NULL) { in main() 110 free(hosts[i]); in main() 111 free(hosts); in main() 115 hosts = hosts_bak; in main() 116 hosts[nhosts - 1] = strdup(optarg); in main() 117 if (hosts[nhosts - 1] == NULL) { in main() 119 free(hosts[i]); in main() [all …]
|
| /freebsd/share/doc/smm/01.setup/ |
| H A D | 5.t | 91 Alternatively, translations for such hosts may be set in advance 95 Note that the use of trailer link-level is now negotiated between \*(4B hosts 113 network to off-site hosts. Subnetworks are useful because 135 to hosts off-site. For example, if your site has a class B network 136 number, hosts on this network have an Internet address that contains 139 possessing at most 255 hosts, 8 bits may be taken from the local part. 171 ``128.32.1.7'' (host 7 on network 128.32.1). Hosts \fIm\fP on 175 For hosts with multiple interfaces, the network mask should 188 This allows networks consisting of both 4.2BSD, \*(Ps and \*(4B hosts 193 \*(4B hosts recognize and accept packets [all …]
|
| /titanic_51/usr/src/man/man1/ |
| H A D | rlogin.1 | 27 \fB/etc/hosts\fR file, the Network Information Service (\fBNIS\fR) \fBhosts\fR 275 \fB/etc/hosts.equiv\fR containing a list of trusted host names with which it 278 \fB/etc/hosts.equiv\fR file without supplying a password. Individual users 285 \fB/etc/hosts.equiv\fR file on the remote machine, and the local user name and 288 \fB/etc/hosts.equiv\fR and \fB\&.rhosts\fR files must be the official host 308 \fB\fB/usr/hosts/*\fR\fR 317 \fB\fB/etc/hosts.equiv\fR\fR 362 \fB\fB/etc/hosts\fR\fR 365 Hosts database.
|
| H A D | rsh.1 | 240 \fB/etc/hosts\fR file, the Internet domain name database, or both. Each host 250 populating it with symbolic links in the names of commonly used hosts, then 275 \fB/etc/hosts.equiv\fR containing a list of trusted hostnames with which it 278 \fB/etc/hosts.equiv\fR file. Individual users can set up a similar private 283 host is not found in the \fB/etc/hosts.equiv\fR file on the remote machine, and 286 \fB/etc/hosts.equiv\fR and \fB\&.rhosts\fR files must be the official hostnames 354 \fB\fB/etc/hosts\fR\fR 363 \fB\fB/etc/hosts.equiv\fR\fR 366 Trusted remote hosts and users
|
| /titanic_51/usr/src/man/man1m/ |
| H A D | in.rlogind.1m | 78 exists in both \fB/etc/hosts\fR and \fB/etc/hosts.equiv\fR, a user logging in 80 with a host for which no corresponding entry exists in \fB/etc/hosts\fR, the 82 client is present in \fB/etc/hosts.equiv\fR. See \fBhosts\fR(4) and 286 entry for the client exists in both \fB/etc/hosts\fR and 287 \fB/etc/hosts.equiv\fR, a user logging in from the client is not prompted for a 289 entry exists in \fB/etc/hosts\fR, the user is prompted for a password, 291 \fB/etc/hosts.equiv\fR. See \fBhosts\fR(4) and \fBhosts.equiv\fR(4). 301 \fBpam_rhosts_auth.so.1\fR entry will disable the \fB/etc/hosts.equiv\fR and
|
| H A D | tcpdchk.1m | 16 \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the 24 instead of official host names; hosts with a name/address conflict; 52 /etc/hosts.allow 54 /etc/hosts.deny
|
| /freebsd/contrib/tcp_wrappers/ |
| H A D | hosts_access.5 | 24 the \fI/etc/hosts.allow\fR file. 27 entry in the \fI/etc/hosts.deny\fR file. 245 allows intruders to easily impersonate trusted hosts and to break in 279 hosts are permitted access. 285 /etc/hosts.deny: 289 This denies all service to all hosts, unless they are permitted access 292 The explicitly authorized hosts are listed in the allow file. 296 /etc/hosts.allow: 302 The first rule permits access from hosts in the local domain (no `.\' 304 netgroup. The second rule permits access from all hosts in the [all …]
|
| H A D | tcpdchk.8 | 11 \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the 19 instead of official host names; hosts with a name/address conflict; 32 Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current 47 /etc/hosts.allow 49 /etc/hosts.deny
|
| /freebsd/share/man/man5/ |
| H A D | hosts.equiv.5 | 32 .Nm hosts.equiv , 41 trusted hosts and users on the network. 60 matches all hosts or users. 64 all matching hosts and all their users. 67 will reject all matching users from matching hosts. 95 .Bl -tag -width /etc/hosts.equivxxx -compact 96 .It Pa /etc/hosts.equiv 116 Trust all hosts from netgroup 121 Trust all hosts from netgroup
|
| /freebsd/usr.bin/systat/ |
| H A D | netcmds.c | 63 } *hosts; variable 109 else if (prefix(args, "hosts")) in netcmd() 258 if (hosts == NULL) in selecthost() 260 free((char *)hosts), hosts = 0; in selecthost() 264 for (p = hosts; p < hosts+nhosts; p++) in selecthost() 270 hosts = (struct hitem *)malloc(sizeof (*p)); in selecthost() 272 hosts = (struct hitem *)realloc(hosts, (nhosts+1)*sizeof (*p)); in selecthost() 273 p = &hosts[nhosts++]; in selecthost() 284 if (hosts) in checkhost() 285 for (p = hosts; p < hosts+nhosts; p++) in checkhost() [all …]
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | krb5_get_krbhst.3 | 43 .Nd lookup Kerberos KDC hosts 59 These functions implement the old API to get a list of Kerberos hosts, 64 hosts in one go, they potentially have to do more lookups than 71 terminated list of strings, pointing to the requested Kerberos hosts. These should be freed with 78 char **hosts, **p; 79 krb5_get_krbhst(context, "MY.REALM", &hosts); 80 for(p = hosts; *p; p++) 82 krb5_free_krbhst(context, hosts);
|
| /freebsd/usr.sbin/rpc.lockd/ |
| H A D | lockd.c | 89 char **hosts, *svcport_str = NULL; variable 151 hosts_bak = realloc(hosts, nhosts * sizeof(char *)); in main() 153 if (hosts != NULL) { in main() 155 free(hosts[i]); in main() 156 free(hosts); in main() 160 hosts = hosts_bak; in main() 161 hosts[nhosts - 1] = strdup(optarg); in main() 162 if (hosts[nhosts - 1] == NULL) { in main() 164 free(hosts[i]); in main() 165 free(hosts); in main() [all …]
|
| /freebsd/contrib/ntp/scripts/ntpsweep/ |
| H A D | ntpsweep.in | 50 my @hosts; 53 push @hosts, $opts->{host}; 56 @hosts = read_hosts($hostsfile) if $hostsfile; 57 push @hosts, @{$opts->{'host-list'}}; 68 scan_hosts(@hosts); 74 my (@hosts) = @_; 77 for $host (@hosts) { 84 my @hosts; 86 open my $hosts, $hostsfile 89 while (<$hosts>) { [all...] |
| /titanic_51/usr/src/cmd/svc/milestone/ |
| H A D | net-svc | 165 # to change in the nsswitch.conf (hosts or ipnodes) to update with dns. 203 # also uncomment hosts and ipnodes entries which were previously commented 210 -e 's/^\(#hosts:\)\(.*[^#]\)\(#.*\)$/hosts: \2/' \ 218 # Remove any lines with the "# Added by DHCP" tag from /etc/inet/hosts. 227 }' /etc/inet/hosts > /tmp/hosts.$$ 228 mv_file /tmp/hosts.$$ /etc/inet/hosts 444 256 update_nss hosts [all...] |
| /freebsd/crypto/openssh/ |
| H A D | ssh-keyscan.1 | 27 hosts. 38 uses non-blocking socket I/O to contact as many hosts as possible in 41 hosts can be collected in tens of seconds, even when some of those 42 hosts are down or do not run 48 Hosts to be scanned may be specified by hostname, address or by CIDR 64 Request certificates from target hosts instead of plain keys. 72 Read hosts or 131 Specify the type of the key to fetch from the scanned hosts. 167 Find all hosts from the file
|
| /freebsd/share/examples/etc/ |
| H A D | README.examples | 24 hosts - see hosts(5) 25 hosts.allow - defines allow trusted hosts 26 hosts.equiv - defines system-wide trusted hosts (see ruserok(3)) 27 hosts.lpd - defines trusted hosts for lpd(8)
|
| /freebsd/contrib/tcsh/ |
| H A D | dot.tcshrc | 48 # Setup $hosts from ~/.hosts, ~/.rhosts, ~/.ssh/known_hosts 51 if ( ! $?hosts ) then 52 set hosts=() 53 foreach f ( ~/.{,r,ssh/known_}hosts ) 55 set hosts=( \ 56 $hosts \
|
| /freebsd/lib/libc/tests/resolv/ |
| H A D | resolv_test.c | 59 static StringList *hosts = NULL; variable 91 sl_add(hosts, strdup(ptr)); in load() 177 size_t i = (random() & 0x0fffffff) % hosts->sl_cur; in resolvone() 178 char *host = hosts->sl_str[i]; in resolvone() 205 threadnum, hosts->sl_str[i], error, errstr); in resolvone() 259 hosts = sl_init(); in run_tests() 266 ATF_REQUIRE_MSG(0 < hosts->sl_cur, "0 hosts in %s", hostlist_file); in run_tests() 268 ask = calloc(hosts->sl_cur, sizeof(int)); in run_tests() 271 got = calloc(hosts->sl_cur, sizeof(int)); in run_tests() 280 /* Wait for all threads to join and check that they checked all hosts */ in run_tests() [all …]
|