/titanic_41/usr/src/lib/libbsm/common/ |
H A D | audit_settid.c | 44 struct sockaddr_in6 peer; in audit_settid() local 46 int peerlen = sizeof (peer); in audit_settid() 55 if (getpeername(fd, (struct sockaddr *)&peer, (socklen_t *)&peerlen) in audit_settid() 66 if (peer.sin6_family == AF_INET6) in audit_settid() 67 rv = do_ipv6_address(&peer, &sock); in audit_settid() 69 rv = do_ipv4_address((struct sockaddr_in *)&peer, in audit_settid() 76 do_ipv6_address(struct sockaddr_in6 *peer, struct sockaddr_in6 *sock) in do_ipv6_address() argument 96 ai.ai_termid.at_port = ((peer->sin6_port<<16) | (sock->sin6_port)); in do_ipv6_address() 98 bcopy(&peer->sin6_addr, ai.ai_termid.at_addr, 16); in do_ipv6_address() 108 do_ipv4_address(struct sockaddr_in *peer, struct sockaddr_in *sock) in do_ipv4_address() argument [all …]
|
H A D | adt_token.c | 911 struct sockaddr_in6 peer; in adt_to_in_peer() local 912 int peerlen = sizeof (peer); in adt_to_in_peer() 926 if (getpeername(sock, (struct sockaddr *)&peer, (socklen_t *)&peerlen) in adt_to_in_peer() 932 if (peer.sin6_family == AF_INET6) { in adt_to_in_peer() 934 au_to_in_addr_ex(&(peer.sin6_addr))); in adt_to_in_peer() 936 au_to_iport((ushort_t)peer.sin6_port)); in adt_to_in_peer() 939 au_to_in_addr(&(((struct sockaddr_in *)&peer)->sin_addr))); in adt_to_in_peer() 942 (ushort_t)(((struct sockaddr_in *)&peer)->sin_port))); in adt_to_in_peer()
|
H A D | adt.c | 592 adt_do_ipv6_address(struct sockaddr_in6 *peer, struct sockaddr_in6 *sock, in adt_do_ipv6_address() argument 596 termid->at_port = ((peer->sin6_port<<16) | (sock->sin6_port)); in adt_do_ipv6_address() 598 (void) memcpy(termid->at_addr, &peer->sin6_addr, 4 * sizeof (uint_t)); in adt_do_ipv6_address() 602 adt_do_ipv4_address(struct sockaddr_in *peer, struct sockaddr_in *sock, in adt_do_ipv4_address() argument 606 termid->at_port = ((peer->sin_port<<16) | (sock->sin_port)); in adt_do_ipv4_address() 609 termid->at_addr[0] = (uint32_t)peer->sin_addr.s_addr; in adt_do_ipv4_address() 625 struct sockaddr_in6 peer; in adt_load_termid() local 627 int peerlen = sizeof (peer); in adt_load_termid() 632 if (getpeername(fd, (struct sockaddr *)&peer, (socklen_t *)&peerlen) in adt_load_termid() 650 if (peer.sin6_family == AF_INET6) { in adt_load_termid() [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | asppp2pppd | 382 local($peer,$intf); 388 $peer = $$options{"peer_system_name"}; 390 unless defined($peer); 392 warn("Missing interface on path to peer \"$peer\".\n"), return 394 warn("Bad interface $intf on path to peer \"$peer\".\n"), return 397 $peer, "\".\n"), return 399 warn "Multiple definitions of path to peer \"$peer\".\n", 400 if defined($paths{$peer}); 402 " encountered in path to peer \"", $peer, "\" (ignored).\n" 404 $paths{$peer} = $options; [all …]
|
/titanic_41/usr/src/uts/sun4/io/efcode/ |
H A D | fc_subr.c | 616 if (dp->peer != NULL) { in fc_remove_subtree() 617 for (np = dp->peer; np->peer; np = dp->peer) { in fc_remove_subtree() 618 for (/* empty */; np->peer; np = np->peer) in fc_remove_subtree() 620 fc_remove_subtree(np->peer); in fc_remove_subtree() 621 np->peer = NULL; in fc_remove_subtree() 623 fc_remove_subtree(dp->peer) in fc_remove_subtree() 624 dp->peer = NULL; in fc_remove_subtree() 627 ASSERT((dp->child == NULL) && (dp->peer == NULL)); in fc_remove_subtree() 653 if (dp->peer) in fc_remove_device_tree() 654 fc_remove_device_tree(&dp->peer); in fc_remove_device_tree() [all …]
|
/titanic_41/usr/src/lib/print/libipp-listener/common/ |
H A D | print-job.c | 108 struct sockaddr_in peer; in ipp_print_job() local 109 socklen_t peer_len = sizeof (peer); in ipp_print_job() 112 if (getpeername(fp, (struct sockaddr *)&peer, in ipp_print_job() 121 if ((he = getipnodebyaddr((const char *)&peer.sin_addr, in ipp_print_job() 122 sizeof (peer.sin_addr), peer.sin_family, in ipp_print_job() 129 (char *)inet_ntop(peer.sin_family, in ipp_print_job() 130 &peer.sin_addr, tmp_buf, in ipp_print_job()
|
/titanic_41/usr/src/cmd/ldap/ns_ldap/ |
H A D | standalone.c | 62 separatePort(char *peer, char **name, uint16_t *port) in separatePort() argument 66 chr = strchr(peer, '['); in separatePort() 71 chr = strchr(peer, ']'); in separatePort() 87 chr = strchr(peer, ']'); in separatePort() 95 chr = strchr(peer, ':'); in separatePort() 101 *name = peer; in separatePort()
|
H A D | standalone.h | 42 int separatePort(char *peer, char **name, uint16_t *port);
|
/titanic_41/usr/src/cmd/cmd-inet/etc/ppp/ |
H A D | chap-secrets | 32 # When authenticating to a peer (so-called "client mode;" as when dialing 34 # "server" will use the remote peer's name. CHAP does specify an 36 # a peer name, and the "remotename <name>" option should then be used. 39 # When authenticating a peer (so-called "server mode;" as when allowing 40 # dial-up access to this system), the remote peer's name is the "client" 43 # <name>" option cannot be used. The remote peer's name comes from the 44 # CHAP messages the peer sends. 47 # valid IP addresses for the peer appears. This must be present when 49 # addresses are given in the options. If a given dial-in peer has an 52 # to the peer as a hint.
|
H A D | pap-secrets | 32 # When authenticating to a peer (so-called "client mode;" as when dialing 34 # "server" will use the remote peer's name. PAP does not specify an 38 # When authenticating a peer (so-called "server mode;" as when allowing 39 # dial-up access to this system), the remote peer's name is the "client" 42 # <name>" option cannot be used. The remote peer's name comes from the PAP 43 # messages the peer sends. 46 # as a server, a list of valid IP addresses for the peer appears. This 49 # peer has an allocated IP address ("static IP addressing"), then this 51 # be sent to the peer as a hint.
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | kex.c | 175 buffer_clear(&kex->peer); in kex_finish() 232 buffer_append(&kex->peer, ptr, dlen); in kex_input_kexinit() 286 buffer_init(&kex->peer); in kex_setup() 438 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) in proposals_match() 449 if ((p = strchr(peer[*idx], ',')) != NULL) in proposals_match() 451 if (strcmp(my[*idx], peer[*idx]) != 0) { in proposals_match() 453 my[*idx], peer[*idx]); in proposals_match() 465 char **my, **peer; in kex_choose_conf() local 477 peer = kex_buf2prop(&kex->peer, &first_kex_follows); in kex_choose_conf() 480 cprop=peer; in kex_choose_conf() [all …]
|
H A D | kexdhc.c | 119 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexdh_client()
|
H A D | kexdhs.c | 106 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexdh_server()
|
H A D | kexgexs.c | 149 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexgex_server()
|
H A D | kexgexc.c | 167 buffer_ptr(&kex->peer), buffer_len(&kex->peer), in kexgex_client()
|
/titanic_41/usr/src/lib/libsmbfs/smb/ |
H A D | nb_name.c | 81 nb_sockaddr(struct sockaddr *peer, struct nb_name *np, in nb_sockaddr() argument 89 if (peer && (peer->sa_family != AF_INET)) in nb_sockaddr() 105 if (peer) { in nb_sockaddr() 107 sin = (struct sockaddr_in *)peer; in nb_sockaddr()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.tftpd.c | 102 static int peer; variable 402 peer = socket(addrfmly, SOCK_DGRAM, 0); in main() 403 if (peer < 0) { in main() 414 (void) setsockopt(peer, SOL_SOCKET, SO_DEBUG, in main() 418 if (bind(peer, (struct sockaddr *)&client, fromplen) < 0) { in main() 440 if (getsockname(peer, (struct sockaddr *)&client, in main() 452 (void) close(peer); in main() 507 peer = socket(addrfmly, SOCK_DGRAM, 0); in delayed_responder() 508 if (peer == -1) { in delayed_responder() 518 (void) setsockopt(peer, SOL_SOCKET, SO_DEBUG, in delayed_responder() [all …]
|
/titanic_41/usr/src/uts/sun4v/promif/ |
H A D | promif_stree.c | 356 pnode_t peer; in create_peers() local 360 peer = prom_nextnode(node); in create_peers() 361 if (peer == 0) in create_peers() 363 if (prom_getproplen(peer, "name") <= 0) { in create_peers() 364 node = peer; in create_peers() 367 pnp = create_node(np->pn_parent, peer); in create_peers() 369 create_children(pnp, peer); in create_peers() 371 node = peer; in create_peers()
|
/titanic_41/usr/src/cmd/mdb/common/modules/logindmux/ |
H A D | logindmux.c | 40 uintptr_t peer, lower; in logdmux_uqinfo() local 54 peer = (uintptr_t)tmx.rdq; in logdmux_uqinfo() 57 peer, lower); in logdmux_uqinfo()
|
/titanic_41/usr/src/lib/efcode/engine/ |
H A D | package.c | 210 REVERT_PHANDLE(env, TOS, d->peer); in peer_node() 217 device_t *peer; in new_device() local 227 for (peer = parent->child; peer->peer; peer = peer->peer) in new_device() 229 peer->peer = phandle; in new_device() 580 d = d->peer; in match_package_path() 770 d = d->peer; in do_ls() 805 n = n->peer; in paren_cd() 916 &phandle->peer, phandle->peer); in dump_device()
|
/titanic_41/usr/src/cmd/ssh/doc/ |
H A D | nchan2.ms | 52 remote peer. 53 Data sent by the peer is received on the OUTPUT-end (receive-end), 57 INPUT-end of the channel, it sends an EOF message to the peer. 59 A CLOSE message is sent to the peer if
|
/titanic_41/usr/src/cmd/dtrace/test/tst/common/mib/ |
H A D | tst.tcp.ksh | 112 my \$peer = sockaddr_in($port, INADDR_ANY); 117 connect(S, \$peer) or die "connect failed: \$!";
|
/titanic_41/usr/src/cmd/print/bsd-sysv-commands/ |
H A D | in.lpd.c | 66 struct sockaddr_in6 peer; in remote_host_name() local 67 socklen_t peer_len = sizeof (peer); in remote_host_name() 74 if (getpeername(fd, (struct sockaddr *)&peer, &peer_len) < 0) { in remote_host_name() 82 if ((hp = getipnodebyaddr((const char *)&peer.sin6_addr, in remote_host_name() 85 return (strdup(inet_ntop(peer.sin6_family, in remote_host_name() 86 &peer.sin6_addr, tmp_buf, sizeof (tmp_buf)))); in remote_host_name()
|
/titanic_41/usr/src/head/rpcsvc/ |
H A D | yp.x | 87 peername peer; member 123 peername peer; member
|
/titanic_41/usr/src/lib/libresolv2/common/resolv/ |
H A D | res_send.c | 336 struct sockaddr_storage peer; in res_nsend() local 352 peerlen = sizeof(peer); in res_nsend() 354 (struct sockaddr *)&peer, &peerlen) < 0) { in res_nsend() 358 if (!sock_eq((struct sockaddr *)&peer, in res_nsend() 629 struct sockaddr_storage peer; in send_vc() local 630 ISC_SOCKLEN_T size = sizeof peer; in send_vc() 633 (struct sockaddr *)&peer, &size) < 0 || in send_vc() 634 !sock_eq((struct sockaddr *)&peer, nsap)) { in send_vc()
|